The Enemy Within: A Behavioural Intention Model and an Information Security Awareness Process

被引:0
|
作者
Gundu, Tapiwa [1 ]
Flowerday, Stephen V. [1 ]
机构
[1] Univ Ft Hare, Dept Informat Syst, E London, South Africa
来源
2012 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA) | 2012年
关键词
Information Security Awareness; Security Behaviour; POLICY COMPLIANCE; CULTURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most employees in small and medium enterprise (SME) engineering firms now have access to their own personal workstations which have become part of their daily functions. This has led to an increased need for information security management to safeguard against loss/alteration or theft of the firm's important information. SMEs tend to be concerned with vulnerabilities from external threats, although industry research suggests that a substantial proportion of security incidents originate from insiders within the firm. Hence, physical preventative measures such as antivirus software and firewalls are proving to solve only part of the problem as the employees controlling them do not have adequate information security knowledge. This tends to expose the firm to costly mistakes that can be made by naive/uninformed employees. This paper presents an information security awareness process that seeks to cultivate positive security behaviours using the behavioural intentions models i.e. the Theory of Reasoned Action and the Protection Motivation Theory. The process presented has been tested at an SME engineering firm, and findings are also presented and discussed in this paper.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
  • [32] Conveying Intention by Motions With Awareness of Information Asymmetry
    Fukuchi, Yosuke
    Osawa, Masahiko
    Yamakawa, Hiroshi
    Takahashi, Tatsuji
    Imai, Michita
    FRONTIERS IN ROBOTICS AND AI, 2022, 9
  • [33] A Holistic Evaluation Model for Information Security Awareness Programs in Work Environment
    Alharbi, Talal
    2023 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES, MOBISECSERV, 2023,
  • [34] Model for Sharing the Information of Cyber Security Situation Awareness between Organizations
    Kokkonen, Tero
    Hautamaki, Jari
    Siltanen, Jarmo
    Hamalainen, Timo
    2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2016,
  • [35] Building an awareness-centered information security policy compliance model
    Koohang, Alex
    Anderson, Jonathan
    Nord, Jeretta Horn
    Paliszkiewicz, Joanna
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2019, 120 (01) : 231 - 247
  • [36] An environmental awareness purchasing intention model
    Xu, Lu
    Prybutok, Victor
    Blankson, Charles
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2019, 119 (02) : 367 - 381
  • [37] A process model for implementing information systems security governance
    Nicho, Mathew
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 10 - 38
  • [38] An information security behavioural model for the bring-your-own-device trend
    Musarurwa, Alfred
    Flowerday, Stephen
    Cilliers, Liezel
    SOUTH AFRICAN JOURNAL OF INFORMATION MANAGEMENT, 2018, 20 (01):
  • [39] A host security situational awareness model based on process and file behaviors
    Zhou, Ti
    Zhang, Jian
    Wang, Xiaofei
    Feng, Li
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (10): : 39 - 42
  • [40] Individual differences and Information Security Awareness
    McCormac, Agata
    Zwaans, Tara
    Parsons, Kathryn
    Calic, Dragana
    Butavicius, Marcus
    Pattinson, Malcolm
    COMPUTERS IN HUMAN BEHAVIOR, 2017, 69 : 151 - 156