Information Security Awareness On-Line Materials Design with Knowledge Maps

Author(s):  
Ruey-Shiang Shaw ◽  
Huan-Chao Keh ◽  
Nan-Ching Huang ◽  
Tien-Chuan Huang

Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception building. Therefore, the authors have tried to figure out if the implementation of knowledge maps on the training materials of Information Security Awareness will improve the learning performance. Based on the e-learning materials for E-Mail Information Security Awareness, the authors designed them in the format of knowledge maps and compared the learning performance with common browsing-based materials. The results showed the knowledge map-based materials lead to higher learning performance than browse-based ones.

2011 ◽  
Vol 9 (4) ◽  
pp. 41-56 ◽  
Author(s):  
Ruey-Shiang Shaw ◽  
Huan-Chao Keh ◽  
Nan-Ching Huang

Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception building. Therefore, the authors have tried to figure out if the implementation of knowledge maps on the training materials of Information Security Awareness will improve the learning performance. Based on the e-learning materials for E-Mail Information Security Awareness, the authors designed them in the format of knowledge maps and compared the learning performance with common browsing-based materials. The results showed the knowledge map-based materials lead to higher learning performance than browse-based ones.


2014 ◽  
Vol 22 (1) ◽  
pp. 115-126 ◽  
Author(s):  
Eyong B. Kim

Purpose – The purpose of this paper is to survey the status of information security awareness among college students in order to develop effective information security awareness training (ISAT). Design/methodology/approach – Based on a review of the literature and theoretical standpoints as well as the National Institute of Standards and Technology Special Publication 800-50 report, the author developed a questionnaire to investigate the attitudes toward information security awareness of undergraduate and graduate students in a business college at a mid-sized university in New England. Based on that survey and the previous literature, suggestions for more effective ISAT are provided. Findings – College students understand the importance and the need for ISAT but many of them do not participate in it. However, security topics that are not commonly covered by any installed (or built-in) programs or web sites have a significant relationship with information security awareness. It seems that students learned security concepts piecemeal from variety of sources. Practical implications – Universities can assess their ISAT for students based on the findings of this study. Originality/value – If any universities want to improve their current ISAT, or establish it, the findings of this study offer some guidelines.


2012 ◽  
pp. 193-225
Author(s):  
Jack Wiles ◽  
Terry Gudaitis ◽  
Jennifer Jabbusch ◽  
Russ Rogers ◽  
Sean Lowther

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Laila Dahabiyeh

Purpose As insiders remain to be a main reason behind security breaches, effective information security awareness campaigns become critical in protecting organizations from security incidents. The purpose of this paper is to identify factors that influence organizational adoption and acceptance of computer-based security awareness training tools. Design/methodology/approach The paper uses content analysis of online reviews of the top ten computer-based security awareness training tools that received Gartner peer insights Customers’ Choice 2019 award. Findings This study identifies nine critical adoption and success factors. These are synthesized into a conceptual framework based on the technology–organization–environment framework. The findings reveal that technological, organizational and environmental factors come into play in adoption decisions but with varying degrees of importance. Practical implications This study highlights key factors that technology vendors should take into consideration when designing computer-based security awareness training tools to increase adoption rates. Originality/value This research offers a novel contribution to the literature on information security awareness delivery methods by identifying key factors that influence organizational adoption and acceptance of computer-based security awareness training tools. Those factors were identified using content analysis of online reviews, which is a new methodological approach to the information security awareness literature.


Author(s):  
Gary Hinson

This chapter highlights the broad range of factors that are relevant to the design of information security awareness programs, primarily by reference to the literature. It emphasizes the need to supplement technical information security controls with security awareness, training and educational activities to address human vulnerabilities. It outlines requirements noted in standards, laws and regulations, and explains the value of motivational employee communications techniques in creating a security culture.


Sign in / Sign up

Export Citation Format

Share Document