A conceptual analysis of information security education, information security training and information security awareness definitions

Author(s):  
Eric Amankwa ◽  
Marianne Loock ◽  
Elmarie Kritzinger
2019 ◽  
Vol 28 (1) ◽  
pp. 1-14 ◽  
Author(s):  
Malcolm Pattinson ◽  
Marcus Butavicius ◽  
Meredith Lillie ◽  
Beau Ciccarello ◽  
Kathryn Parsons ◽  
...  

Purpose This paper aims to introduce the concept of a framework of cyber-security controls that are adaptable to different types of organisations and different types of employees. One of these adaptive controls, namely, the mode of training provided, is then empirically tested for its effectiveness. Design/methodology/approach In total, 1,048 working Australian adults completed the human aspects of the information security questionnaire (HAIS-Q) to determine their individual information security awareness (ISA). This included questions relating to the various modes of cyber-security training they had received and how often it was provided. Also, a set of questions called the cyber-security learning-styles inventory was used to identify their preferred learning styles for training. Findings The extent to which the training that an individual received matched their learning preferences was positively associated with their information security awareness (ISA) level. However, the frequency of such training did not directly predict ISA levels. Research limitations/implications Further research should examine the influence of matching cyber-security learning styles to training packages more directly by conducting a controlled trial where the training packages provided differ only in the mode of learning. Further research should also investigate how individual tailoring of aspects of an adaptive control framework (ACF), other than training, may improve ISA. Practical implications If cyber-security training is adapted to the preferred learning styles of individuals, their level of ISA will improve, and therefore, their non-malicious behaviour, whilst using a digital device to do their work, will be safer. Originality/value A review of the literature confirmed that ACFs for cyber-security does exist, but only in terms of hardware and software controls. There is no evidence of any literature on frameworks that include controls that are adaptable to human factors within the context of information security. In addition, this is the first study to show that ISA is improved when cyber-security training is provided in line with an individual’s preferred learning style. Similar improvement was not evident when the training frequency was increased suggesting real-world improvements in ISA may be possible without increasing training budgets but by simply matching individuals to their desired mode of training.


2019 ◽  
Vol 8 (1) ◽  
pp. 48-52
Author(s):  
Samuel Oluranti Oladipupo

The purpose of the study is to examine the determinants of information security awareness (ISA) among employees of Capital Market Registrars (CMRs) in Lagos, Nigeria based on established factors from the existing literatures on ISA. The main objectives of the study are; to determine the level of information security awareness among CMRs’ employees and to identify the components that influence information security awareness. This study utilised a survey design. Stratified random sampling technique was used to select the respondents for the study. A total of 326 copies of questionnaires were distributed among the employees in CMRs, of which 267 properly completed questionnaires were returned. Descriptive statistics and simple regression were used for data analysis. Finding revealed that information security policy, information security education, knowledge of technology, and employee’s behaviour significantly influenced information security awareness. The results of the study further revealed the strong correlation between employee’s behaviour and information security awareness. Overall, the study showed that the level of information security awareness is high, which implies that employees of CMRs in Lagos are aware of the potential threats and risk associated with information security. Based on these research findings, recommendations were therefore made.


VINE ◽  
2001 ◽  
Vol 31 (2) ◽  
pp. 11-16 ◽  
Author(s):  
Andrew Cox ◽  
Sarah Connolly ◽  
James Currall

Sign in / Sign up

Export Citation Format

Share Document