User preference of cyber security awareness delivery methods

Abawajy, Jemal 2014, User preference of cyber security awareness delivery methods, Behaviour and information technology, vol. 33, no. 3, pp. 237-248.

Attached Files
Name Description MIMEType Size Downloads

Title User preference of cyber security awareness delivery methods
Author(s) Abawajy, Jemal
Journal name Behaviour and information technology
Volume number 33
Issue number 3
Start page 237
End page 248
Total pages 12
Publisher Taylor & Francis
Place of publication Oxford, England
Publication date 2014
ISSN 0144-929X
Keyword(s) Information security
Human factor
Awareness delivery methods
Social engineering
Information security programme
Summary Operating systems and programmes are more protected these days and attackers have shifted their attention to human elements to break into the organisation's information systems. As the number and frequency of cyber-attacks designed to take advantage of unsuspecting personnel are increasing, the significance of the human factor in information security management cannot be understated. In order to counter cyber-attacks designed to exploit human factors in information security chain, information security awareness with an objective to reduce information security risks that occur due to human related vulnerabilities is paramount. This paper discusses and evaluates the effects of various information security awareness delivery methods used in improving end-users’ information security awareness and behaviour. There are a wide range of information security awareness delivery methods such as web-based training materials, contextual training and embedded training. In spite of efforts to increase information security awareness, research is scant regarding effective information security awareness delivery methods. To this end, this study focuses on determining the security awareness delivery method that is most successful in providing information security awareness and which delivery method is preferred by users. We conducted information security awareness using text-based, game-based and video-based delivery methods with the aim of determining user preferences. Our study suggests that a combined delivery methods are better than individual security awareness delivery method.
Language eng
Field of Research 089999 Information and Computing Sciences not elsewhere classified
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2012, Taylor & Francis
Persistent URL http://hdl.handle.net/10536/DRO/DU:30046966

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Google Scholar Search Google Scholar
Access Statistics: 153 Abstract Views, 8 File Downloads  -  Detailed Statistics
Created: Mon, 13 Aug 2012, 12:54:59 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.