首页> 外文学位 >The impact of information security awareness on compliance with information security policies: A phishing perspective.
【24h】

The impact of information security awareness on compliance with information security policies: A phishing perspective.

机译:信息安全意识对遵守信息安全策略的影响:网络钓鱼的观点。

获取原文
获取原文并翻译 | 示例

摘要

This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment.;The results indicate that security awareness is in fact a second-order formative construct composed of six components. There are significant differences in security awareness levels between the victims of the phishing experiment and the employees who maintain compliance with security policies. The study extends the theory by proposing and validating a universal definition of security awareness. It provides practitioners with an instrument to examine awareness in a plethora of settings and design customized security training activities.;The study is executed in two stages. First, the participants (employees of a municipality) are exposed to a series of phishing and spear-phishing messages to assess if there are any common characteristics shared by the phishing victims. The differences between the phished and the not phished group are assessed through multiple discriminant analysis. Second, the same individuals are asked to participate in a survey designed to examine their security awareness. The research model is tested using PLS-SEM approach.
机译:这项研究旨在得出和检查信息安全意识的多维定义,调查其前因,并分析其对遵守组织信息安全政策的影响。通过技术威胁规避理论和保护动机理论的理论视角检验了以上研究目标。信息安全意识被定义​​为由威胁和应对评估元素组成的第二级结构,并辅以负责组织环境的责任结构。结果表明,安全意识实际上是由六个组成的第二级形成结构组件。网络钓鱼实验的受害者与维护安全策略的员工之间在安全意识水平上存在显着差异。该研究通过提出和验证安全意识的通用定义扩展了该理论。它为从业人员提供了一种工具,可用于检查过多设置中的意识并设计定制的安全培训活动。该研究分两个阶段执行。首先,将参与者(一个城市的雇员)暴露于一系列网络钓鱼和鱼叉式网络钓鱼消息中,以评估网络钓鱼受害者是否具有任何共同特征。通过多重判别分析评估有钓鱼组和未有钓鱼组之间的差异。其次,要求同一个人参加旨在检查其安全意识的调查。使用PLS-SEM方法对研究模型进行了测试。

著录项

  • 作者

    Hanus, Bartlomiej T.;

  • 作者单位

    University of North Texas.;

  • 授予单位 University of North Texas.;
  • 学科 Business administration.;Information technology.
  • 学位 Ph.D.
  • 年度 2014
  • 页码 163 p.
  • 总页数 163
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:40:42

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号