메뉴 건너뛰기




Volumn 44, Issue 4, 2015, Pages 606-622

A systematic review of approaches to assessing cybersecurity awareness

Author keywords

Adaptation; Cybernetics

Indexed keywords


EID: 84930789675     PISSN: 0368492X     EISSN: None     Source Type: Journal    
DOI: 10.1108/K-12-2014-0283     Document Type: Article
Times cited : (74)

References (67)
  • 3
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users view on information security”
    • Albrechtsen, E. (2007), “A qualitative study of users’ view on information security”, Computers & Security, Vol. 26 No. 4, pp. 276-289.
    • (2007) Computers &Amp; Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 4
    • 67651148484 scopus 로고    scopus 로고
    • Securing the next generation: Enhancing e-safety awareness among young people
    • Atkinson, S., Furnell, S. and Phippen, A. (2009), “Securing the next generation: enhancing e-safety awareness among young people”, Computer Fraud & Security, Vol. 2009 No. 7, pp. 13-19.
    • (2009) Computer Fraud &Amp; Security , vol.2009 , Issue.7 , pp. 13-19
    • Atkinson, S.1    Furnell, S.2    Phippen, A.3
  • 5
    • 4444284631 scopus 로고    scopus 로고
    • A critical analysis of evaluation practice: The Kirkpatrick model and the principle of beneficence
    • Bates, R. (2004), “A critical analysis of evaluation practice: the Kirkpatrick model and the principle of beneficence”, Evaluation and Program Planning, Vol. 27 No. 3, pp. 341-347.
    • (2004) Evaluation and Program Planning , vol.27 , Issue.3 , pp. 341-347
    • Bates, R.1
  • 6
    • 37249018138 scopus 로고    scopus 로고
    • Why youth (Heart) social network sites: The role of networked publics in teenage social life
    • Identity, and Digital Media Volume
    • Boyd, D. (2007), “Why youth (heart) social network sites: the role of networked publics in teenage social life”, MacArthur Foundation Series on Digital Learning – Youth, Identity, and Digital Media Volume, pp. 119-142.
    • (2007) Macarthur Foundation Series on Digital Learning – Youth , pp. 119-142
    • Boyd, D.1
  • 8
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • Bulgurcu, B., Cavusoglu, H. and Benbasat, I. (2010), “Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness”, MIS Quarterly, Vol. 34 No. 3, pp. 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 10
    • 37749015799 scopus 로고    scopus 로고
    • Improving end user behaviour in password utilization: An action research initiative
    • Charoen, D., Raman, M. and Olfman, L. (2007), “Improving end user behaviour in password utilization: an action research initiative”, Systemic Practice and Action Research, Vol. 21 No. 1, pp. 55-72.
    • (2007) Systemic Practice and Action Research , vol.21 , Issue.1 , pp. 55-72
    • Charoen, D.1    Raman, M.2    Olfman, L.3
  • 11
    • 60049085275 scopus 로고    scopus 로고
    • Mitigating information security risks by increasing user security awareness: A case study of an information security awareness system
    • Chen, C.C., Shaw, R.S. and Yang, S.C. (2006), “Mitigating information security risks by increasing user security awareness: a case study of an information security awareness system”, Information Technology, Learning and Performance Journal, Vol. 24 No. 1, pp. 1-15.
    • (2006) Information Technology, Learning and Performance Journal , vol.24 , Issue.1 , pp. 1-15
    • Chen, C.C.1    Shaw, R.S.2    Yang, S.C.3
  • 12
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • Choo, K.-K.R. (2011), “The cyber threat landscape: challenges and future research directions”, Computers & Security, Vol. 30 No. 8, pp. 719-731.
    • (2011) Computers &Amp; Security , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.-K.R.1
  • 15
    • 63049137706 scopus 로고    scopus 로고
    • Information security: The moving target
    • Dlamini, M.T., Eloff, J.H.P. and Eloff, M.M. (2009), “Information security: the moving target”, Computers & Security, Vol. 28 Nos 3-4, pp. 189-198.
    • (2009) Computers &Amp; Security , vol.28 , Issue.3-4 , pp. 189-198
    • Dlamini, M.T.1    Eloff, J.2    Eloff, M.M.3
  • 16
    • 33846807812 scopus 로고    scopus 로고
    • Value-focused assessment of ICT security awareness in an academic environment
    • Drevin, L., Kruger, H.A. and Steyn, T. (2007), “Value-focused assessment of ICT security awareness in an academic environment”, Computers & Security, Vol. 26 No. 1, pp. 36-43.
    • (2007) Computers &Amp; Security , vol.26 , Issue.1 , pp. 36-43
    • Drevin, L.1    Kruger, H.A.2    Steyn, T.3
  • 18
    • 41749105994 scopus 로고    scopus 로고
    • End-user security culture: A lesson that will never be learnt ?
    • Furnell, S. (2008), “End-user security culture: a lesson that will never be learnt ?”, Computer Fraud & Security, Vol. 2008 No. 40, pp. 6-9.
    • (2008) Computer Fraud &Amp; Security , vol.2008 , Issue.40 , pp. 6-9
    • Furnell, S.1
  • 19
    • 77955390059 scopus 로고    scopus 로고
    • Jumping security hurdles
    • Furnell, S. (2010), “Jumping security hurdles”, Computer Fraud & Security, Vol. 2010 No. 6, pp. 10-14.
    • (2010) Computer Fraud &Amp; Security , vol.2010 , Issue.6 , pp. 10-14
    • Furnell, S.1
  • 20
    • 61349200300 scopus 로고    scopus 로고
    • From culture to disobedience: Recognising the varying user acceptance of IT security
    • Furnell, S. and Thomson, K.-L. (2009), “From culture to disobedience: recognising the varying user acceptance of IT security”, Computer Fraud & Security, Vol. 2009 No. 2, pp. 5-10.
    • (2009) Computer Fraud &Amp; Security , vol.2009 , Issue.2 , pp. 5-10
    • Furnell, S.1    Thomson, K.-L.2
  • 21
    • 34447503284 scopus 로고    scopus 로고
    • Assessing the security perceptions of personal internet users
    • Furnell, S.M., Bryant, P. and Phippen, A. (2007), “Assessing the security perceptions of personal internet users”, Computers & Security, Vol. 26 No. 5, pp. 410-417.
    • (2007) Computers &Amp; Security , vol.26 , Issue.5 , pp. 410-417
    • Furnell, S.M.1    Bryant, P.2    Phippen, A.3
  • 22
    • 55649114179 scopus 로고    scopus 로고
    • Security beliefs and barriers for novice Internet users
    • Furnell, S., Tsaganidi, V. and Phippen, A. (2008), “Security beliefs and barriers for novice Internet users”, Computers & Security, Vol. 27 Nos 7-8, pp. 235-240.
    • (2008) Computers &Amp; Security , vol.27 , Issue.7-8 , pp. 235-240
    • Furnell, S.1    Tsaganidi, V.2    Phippen, A.3
  • 24
    • 79960754088 scopus 로고    scopus 로고
    • The long-term effects of information security e-learning on organizational learning
    • Hagen, J., Albrechtsen, E. and Ole Johnsen, S. (2010), “The long-term effects of information security e-learning on organizational learning”, Information Management & Computer Security, Vol. 19 No. 3, pp. 140-154.
    • (2010) Information Management &Amp; Computer Security , vol.19 , Issue.3 , pp. 140-154
    • Hagen, J.1    Albrechtsen, E.2    Ole Johnsen, S.3
  • 25
    • 84946144286 scopus 로고    scopus 로고
    • The world in 2014: ICT facts and figures
    • ITU, accessed 29 April 2015
    • ITU (2014), “The world in 2014: ICT facts and figures”, International Telecommunication Union, available at: www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2014-e.pdf (accessed 29 April 2015).
    • (2014) International Telecommunication Union
  • 26
    • 3442882530 scopus 로고    scopus 로고
    • Internet addiction: Characteristics of a questionnaire and prevalence in norwegian youth (12-18 years)
    • Johansson, A. and Götestam, K.G. (2004), “Internet addiction: characteristics of a questionnaire and prevalence in norwegian youth (12-18 years)”, Scandinavian Journal of Psychology, Vol. 45 No. 3, pp. 223-229.
    • (2004) Scandinavian Journal of Psychology , vol.45 , Issue.3 , pp. 223-229
    • Johansson, A.1    Götestam, K.G.2
  • 27
    • 33644755338 scopus 로고    scopus 로고
    • Security awareness : Switch to a better programme
    • Johnson, E.C. (2006), “Security awareness : switch to a better programme”, Network Security, February, Vol. 2006 No. 2, pp. 15-18.
    • (2006) Network Security, February , vol.2006 , Issue.2 , pp. 15-18
    • Johnson, E.C.1
  • 28
    • 80052902327 scopus 로고    scopus 로고
    • Toward a new meta-theory for designing information systems (IS) security training approaches
    • Karjalainen, M. and Siponen, M. (2011), “Toward a new meta-theory for designing information systems (IS) security training approaches”, Journal of the Association for Information Systems, Vol. 12 No. 8, pp. 518-555.
    • (2011) Journal of the Association for Information Systems , vol.12 , Issue.8 , pp. 518-555
    • Karjalainen, M.1    Siponen, M.2
  • 29
    • 84893649270 scopus 로고    scopus 로고
    • Recommendations for information security awareness training for college students
    • Kim, E.B. (2013), “Recommendations for information security awareness training for college students”, Information Management & Computer Security, Vol. 22 No. 1, pp. 115-126.
    • (2013) Information Management &Amp; Computer Security , vol.22 , Issue.1 , pp. 115-126
    • Kim, E.B.1
  • 31
    • 78449305755 scopus 로고    scopus 로고
    • Cyber security for home users: A new way of protection through awareness enforcement
    • Kritzinger, E. and von Solms, S.H. (2010), “Cyber security for home users: a new way of protection through awareness enforcement”, Computer & Security, Vol. 29 No. 8, pp. 840-847.
    • (2010) Computer &Amp; Security , vol.29 , Issue.8 , pp. 840-847
    • Kritzinger, E.1    Von Solms, S.H.2
  • 32
    • 33746994612 scopus 로고    scopus 로고
    • A prototype for assessing information security awareness
    • Kruger, H.A. and Kearney, W.D. (2006), “A prototype for assessing information security awareness”, Computers & Security, Vol. 25 No. 4, pp. 289-296.
    • (2006) Computers &Amp; Security , vol.25 , Issue.4 , pp. 289-296
    • Kruger, H.A.1    Kearney, W.D.2
  • 34
    • 80053992653 scopus 로고    scopus 로고
    • Design of cyber security awareness game utilizing a social media framework
    • 15-17 August, Johannesburg
    • Labuschagne, W.A., Veerasamy, N., Burke, I. and Eloff, M.M. (2011), “Design of cyber security awareness game utilizing a social media framework”, Information Security South Africa (ISSA), 15-17 August, Johannesburg, pp. 1-9.
    • (2011) Information Security South Africa (ISSA) , pp. 1-9
    • Labuschagne, W.A.1    Veerasamy, N.2    Burke, I.3    Eloff, M.M.4
  • 35
    • 33845367600 scopus 로고    scopus 로고
    • A systems approach to conduct an effective literature review in support of information systems research
    • Levy, Y. and Ellis, T.J. (2006), “A systems approach to conduct an effective literature review in support of information systems research”, Informing Science Journal, Vol. 9 No. 1, pp. 181-212.
    • (2006) Informing Science Journal , vol.9 , Issue.1 , pp. 181-212
    • Levy, Y.1    Ellis, T.J.2
  • 37
    • 70450274963 scopus 로고    scopus 로고
    • Internet literacy among children and young people: Findings from the UK children go online project
    • London, accessed 5 July 2014
    • Livingstone, S., Bober, M. and Helsper, E. (2005), “Internet literacy among children and young people: findings from the UK children go online project” LSE Research Online, London, available at: http://eprints.lse.ac.uk/archive/00000397 (accessed 5 July 2014).
    • (2005) LSE Research Online
    • Livingstone, S.1    Bober, M.2    Helsper, E.3
  • 39
    • 84893656776 scopus 로고    scopus 로고
    • Information security in the South Australian real estate industry: A study of 40 real estate organisations
    • Mani, D., Raymond Choo, K.K. and Mubarak, S. (2013), “Information security in the South Australian real estate industry: a study of 40 real estate organisations”, Information Management & Computer Security, Vol. 22 No. 1, pp. 24-41.
    • (2013) Information Management &Amp; Computer Security , vol.22 , Issue.1 , pp. 24-41
    • Mani, D.1    Raymond Choo, K.K.2    Mubarak, S.3
  • 40
    • 51549098348 scopus 로고    scopus 로고
    • Approaches to user education
    • May, C. (2008), “Approaches to user education”, Network Security, Vol. 2008 No. 9, pp. 15-17.
    • (2008) Network Security , vol.2008 , Issue.9 , pp. 15-17
    • May, C.1
  • 44
    • 79953302829 scopus 로고    scopus 로고
    • The impact of social media on children, adolescents, and families
    • Council on Communications and Media
    • O’Keeffe, G.S., Clarke-Pearson, K. and Council on Communications and Media (2011), “The impact of social media on children, adolescents, and families”, Pediatrics, Vol. 127 No. 4, pp. 800-804.
    • (2011) Pediatrics , vol.127 , Issue.4 , pp. 800-804
    • O’keeffe, G.S.1    Clarke-Pearson, K.2
  • 47
    • 84993099250 scopus 로고    scopus 로고
    • Implementing an information security awareness program
    • Peltier, T.R. (2005), “Implementing an information security awareness program”, Information Systems Security, Vol. 14 No. 2, pp. 37-49.
    • (2005) Information Systems Security , vol.14 , Issue.2 , pp. 37-49
    • Peltier, T.R.1
  • 48
    • 37249038076 scopus 로고    scopus 로고
    • Developing a culture of privacy: A case study
    • Power, E.M. (2007), “Developing a culture of privacy: a case study”, IEEE Security & Privacy Magazine, Vol. 5 No. 6, pp. 58-60.
    • (2007) IEEE Security &Amp; Privacy Magazine , vol.5 , Issue.6 , pp. 58-60
    • Power, E.M.1
  • 49
  • 50
    • 55849105212 scopus 로고    scopus 로고
    • Information security awareness in higher education: An exploratory study
    • Rezgui, Y. and Marks, A. (2008), “Information security awareness in higher education: an exploratory study”, Computers & Security, Vol. 27 Nos 7-8, pp. 241-253.
    • (2008) Computers &Amp; Security , vol.27 , Issue.7-8 , pp. 241-253
    • Rezgui, Y.1    Marks, A.2
  • 52
    • 56249140028 scopus 로고    scopus 로고
    • The impact of information richness on information security awareness training effectiveness
    • Shaw, R.S., Chen, C.C., Harris, A.L. and Huang, H.-J. (2009), “The impact of information richness on information security awareness training effectiveness”, Computers & Education, Vol. 52 No. 1, pp. 92-100.
    • (2009) Computers &Amp; Education , vol.52 , Issue.1 , pp. 92-100
    • Shaw, R.S.1    Chen, C.C.2    Harris, A.L.3    Huang, H.-J.4
  • 53
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M.T. (2000), “A conceptual foundation for organizational information security awareness”, Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
    • (2000) Information Management &Amp; Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 57
    • 78649632049 scopus 로고    scopus 로고
    • Online activities and writing practices of urban Malaysian adolescents
    • Tan, K.E., Ng, M.L. and Saw, K.G. (2010), “Online activities and writing practices of urban Malaysian adolescents”, System, Vol. 38 No. 4, pp. 548-559.
    • (2010) System , vol.38 , Issue.4 , pp. 548-559
    • Tan, K.E.1    Ng, M.L.2    Saw, K.G.3
  • 58
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating your users effectively
    • Thomson, M.E. and von Solms, R. (1998), “Information security awareness: educating your users effectively”, Information Management & Computer Security, Vol. 6 No. 4, pp. 167-173.
    • (1998) Information Management &Amp; Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    Von Solms, R.2
  • 60
    • 33745500491 scopus 로고    scopus 로고
    • Enhancing the employee security awareness model
    • Valentine, J.A. and Labs, I. (2006), “Enhancing the employee security awareness model”, Computer Fraud & Security, Vol. 2006 No. 6, pp. 17-19.
    • (2006) Computer Fraud &Amp; Security , vol.2006 , Issue.6 , pp. 17-19
    • Valentine, J.A.1    Labs, I.2
  • 61
    • 33646433992 scopus 로고    scopus 로고
    • A contextual framework for combating identity theft
    • WenJie, W., Yufei, Y. and Archer, N. (2006), “A contextual framework for combating identity theft”, IEEE Security & Privacy Magazine, Vol. 4 No. 2, pp. 30-38.
    • (2006) IEEE Security &Amp; Privacy Magazine , vol.4 , Issue.2 , pp. 30-38
    • Wenjie, W.1    Yufei, Y.2    Archer, N.3
  • 62
    • 62949216467 scopus 로고    scopus 로고
    • Identity theft and the challenges of caring for your virtual self
    • Whitson, J. (2009), “Identity theft and the challenges of caring for your virtual self”, Interactions, Vol. 16 No. 2, p. 41.
    • (2009) Interactions , vol.16 , Issue.2
    • Whitson, J.1
  • 63
    • 33745046332 scopus 로고    scopus 로고
    • Teenagers perceptions of online privacy and coping behaviors: A risk – benefit appraisal approach”
    • Youn, S. (2005), “Teenagers’ perceptions of online privacy and coping behaviors: a risk – benefit appraisal approach”, Journal of Broadcasting & Electronic Media, Vol. 49 No. 1, pp. 86-110.
    • (2005) Journal of Broadcasting &Amp; Electronic Media , vol.49 , Issue.1 , pp. 86-110
    • Youn, S.1
  • 64
    • 0002305454 scopus 로고
    • From intentions to actions: A theory of planned behaviour
    • in Kuhl, J. and Beckmann, J, Springer, Berlin Heidelberg
    • Ajzen, I. (1985), “From intentions to actions: a theory of planned behaviour”, in Kuhl, J. and Beckmann, J. (Eds), Action Control, Springer, Berlin Heidelberg, pp. 11-39.
    • (1985) Action Control , pp. 11-39
    • Ajzen, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.