Openly accessible

Investigation of stakeholders commitment to information security awaremess programs

Abawajy, J. H., Thatcher, K. and Kim, Tai-hoon 2008, Investigation of stakeholders commitment to information security awaremess programs, in Proceedings of the 2nd International Conference on Information Security and Assurance : ISA 2008, IEEE Computer Society, Los Alamitos, Calif., pp. 472-476.

Attached Files
Name Description MIMEType Size Downloads
abawajy-investigationofstakeholders-2008.pdf Published version application/pdf 97.18KB 205

Title Investigation of stakeholders commitment to information security awaremess programs
Author(s) Abawajy, J. H.
Thatcher, K.
Kim, Tai-hoon
Conference name The 2nd International Conference on Information Security and Assurance (2nd : 2008 : Busan, Korea)
Conference location Hanwha Resort Haeundae, Busan, Korea
Conference dates 24-26 April 2008
Title of proceedings Proceedings of the 2nd International Conference on Information Security and Assurance : ISA 2008
Editor(s) [Unknown]
Publication date 2008
Conference series International Conference on Information Security and Assurance
Start page 472
End page 476
Publisher IEEE Computer Society
Place of publication Los Alamitos, Calif.
Keyword(s) human factor
IT security
security
Summary Organisations have become increasingly dependent on technology in order to compete in their respective markets. As IT technology advances at a rapid pace, so does its complexity, giving rise to new IT security vulnerabilities and methods of attack. Even though the human factors have been recognized to have a crucial role in information security management, the effects of weakness of will and lack of commitment on the stakeholders (i.e., employers and employees) parts has never been factored into the design and delivery of awareness programs. To this end, this paper investigates the impacts of the availability of awareness programs and end-user drive and lack of commitment to information security awareness program design, delivery and success.
ISBN 9780769531267
Language eng
Field of Research 080499 Data Format not elsewhere classified
HERDC Research category E1 Full written paper - refereed
HERDC collection year 2008
Copyright notice ©2008, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30018225

Document type: Conference Paper
Collections: School of Engineering and Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 373 Abstract Views, 205 File Downloads  -  Detailed Statistics
Created: Fri, 14 Aug 2009, 14:06:13 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.