5,950
Views
36
CrossRef citations to date
0
Altmetric
Articles

Enterprise cybersecurity training and awareness programs: Recommendations for success

& ORCID Icon

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (10)

Jamaine Mungo. (2023) Self-paced cybersecurity awareness training educating retail employees to identify phishing attacks. Journal of Cyber Security Technology 0:0, pages 1-49.
Read now
Lakshmi Goel, Justin Zuopeng Zhang & Steven Williamson. (2023) IT assimilation: construct, measurement, and implications in cybersecurity. Enterprise Information Systems 17:7.
Read now
Galit Klein & Moti Zwilling. (2023) The Weakest Link: Employee Cyber-Defense Behaviors While Working from Home. Journal of Computer Information Systems 0:0, pages 1-15.
Read now
Nitin Singh, Venkataraghavan Krishnaswamy & Justin Zuopeng Zhang. (2023) Intellectual structure of cybersecurity research in enterprise information systems. Enterprise Information Systems 17:6.
Read now
Salifu Yusif & Abdul Hafeez-Baig. (2023) Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework. Journal of Applied Security Research 18:2, pages 267-288.
Read now
Swati Jain, Arunabha Mukhopadhyay & Saloni Jain. (2023) CAN CYBER RISK OF HEALTH CARE FIRMS BE INSURED? A MULTINOMIAL LOGISTIC REGRESSION MODEL. Journal of Organizational Computing and Electronic Commerce 33:1-2, pages 41-69.
Read now
Hwee-Joo Kam, Dan J. Kim & Wu He. (2022) Should we wear a velvet glove to enforce Information security policies in higher education?. Behaviour & Information Technology 41:10, pages 2259-2273.
Read now
Kalpit Sharma & Arunabha Mukhopadhyay. (2022) Sarima-Based Cyber-Risk Assessment and Mitigation Model for A Smart City’s Traffic Management Systems (Scram). Journal of Organizational Computing and Electronic Commerce 32:1, pages 1-20.
Read now
Rathika Palanisamy, Azah Anir Norman & Laiha Mat Kiah. (2021) BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts. Journal of Organizational Computing and Electronic Commerce 31:4, pages 320-342.
Read now
Kalpit Sharma & Arunabha Mukhopadhyay. (2021) Kernel naïve Bayes classifier-based cyber-risk assessment and mitigation framework for online gaming platforms. Journal of Organizational Computing and Electronic Commerce 31:4, pages 343-363.
Read now

Articles from other publishers (26)

Julia Prümmer, Tommy van Steen & Bibi van den Berg. (2024) A systematic review of current cybersecurity training methods. Computers & Security 136, pages 103585.
Crossref
Areej Alyami, David Sammon, Karen Neville & Carolanne Mahony. (2023) The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: a lifecycle model. Information Technology & People 36:8, pages 94-125.
Crossref
Joakim Kävrestad, Marcus Nohlberg & Steven Furnell. (2023) A Taxonomy of SETA Methods and Linkage to Delivery Preferences. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 54:4, pages 107-133.
Crossref
Oteng Ntsweng, Ransome Bawack, Xixian Peng & Shem Amalaya. (2023) Development of the Reflective User: The Additive Effects of Reflective Practices and Gameful Learning on Flow and Cybersecurity Awareness. Development of the Reflective User: The Additive Effects of Reflective Practices and Gameful Learning on Flow and Cybersecurity Awareness.
Veikko Markkanen & Tapio Frantti. (2023) Secure 3 rd party software integration . Secure 3 rd party software integration .
Nabin Chowdhury & Vasileios Gkioulos. (2023) A personalized learning theory-based cyber-security training exercise. International Journal of Information Security.
Crossref
Nabin Chowdhury & Vasileios Gkioulos. 2023. Computer Security. ESORICS 2022 International Workshops. Computer Security. ESORICS 2022 International Workshops 116 133 .
Ivano Bongiovanni, Karen Renaud, Humphrey Brydon, Renette Blignaut & Angelo Cavallo. (2022) A quantification mechanism for assessing adherence to information security governance guidelines. Information & Computer Security 30:4, pages 517-548.
Crossref
Shahriar Akter, Mohammad Rajib Uddin, Shahriar Sajib, Wai Jin Thomas Lee, Katina Michael & Mohammad Alamgir Hossain. (2022) Reconceptualizing cybersecurity awareness capability in the data-driven digital economy. Annals of Operations Research.
Crossref
Paul Agu Igwe, Nnamdi O. Madichie, Okechukwu Chukwuemeka, Mahfuzur Rahman, Nonso Ochinanwata & Ikenna Uzuegbunam. (2022) Pedagogical Approaches to Responsible Entrepreneurship Education. Sustainability 14:15, pages 9440.
Crossref
Hwee‐Joo Kam, Dustin K. Ormond, Philip Menard & Robert E. Crossler. (2021) That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training. Information Systems Journal 32:4, pages 888-926.
Crossref
Si Chunlei & Liu Yuxin. (2022) Exploring the discourse of enterprise cyber governance in the covid-19 era: a sociosemiotic perspective. International Journal of Legal Discourse 7:1, pages 53-82.
Crossref
Nabin Chowdhury, Sokratis Katsikas & Vasileios Gkioulos. (2022) Modeling effective cybersecurity training frameworks: A delphi method-based study. Computers & Security 113, pages 102551.
Crossref
S. Raschid Muller & Darrell Norman Burrell. (2022) Social Cybersecurity and Human Behavior. International Journal of Hyperconnectivity and the Internet of Things 6:1, pages 1-13.
Crossref
Bader Alkhazi, Moneer Alshaikh, Sulaiman Alkhezi & Hamza Labbaci. (2022) Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior. IEEE Access 10, pages 132132-132143.
Crossref
Thaddeus Eze & Neil Hawker. 2022. Human Aspects of Information Security and Assurance. Human Aspects of Information Security and Assurance 106 119 .
Joakim Kävrestad, Martin Gellerstedt, Marcus Nohlberg & Jana Rambusch. 2022. Human Aspects of Information Security and Assurance. Human Aspects of Information Security and Assurance 14 23 .
Moses Moyo, Osman Sadeck, Nyarai Tunjera & Agnes Chigona. 2022. Information Systems. Information Systems 527 550 .
Stuart O’Connor, Salim Hasshu, James Bielby, Simon Colreavy-Donnelly, Stefan Kuhn, Fabio Caraffini & Richard Smith. (2021) SCIPS: A serious game using a guidance mechanic to scaffold effective training for cyber security. Information Sciences 580, pages 524-540.
Crossref
Sokratis Nifakos, Krishna Chandramouli, Charoula Konstantina Nikolaou, Panagiotis Papachristou, Sabine Koch, Emmanouil Panaousis & Stefano Bonacina. (2021) Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 21:15, pages 5119.
Crossref
Zuopeng (Justin) Zhang, Wu He, Wenzhuo Li & M'Hammed Abdous. (2021) Cybersecurity awareness training programs: a cost–benefit analysis framework. Industrial Management & Data Systems 121:3, pages 613-636.
Crossref
Damjan Fujs, Simon Vrhovec & Damjan Vavpotic. (2021) Know Your Enemy: User Segmentation Based on Human Aspects of Information Security. IEEE Access 9, pages 157306-157315.
Crossref
Marie Haugli Larsen & Mass Soldal Lund. (2021) Cyber Risk Perception in the Maritime Domain: A Systematic Literature Review. IEEE Access 9, pages 144895-144905.
Crossref
Hennie Kruger, Tiny du Toit, Lynette Drevin & Nicolaas Maree. (2020) Acquiring sentiment towards information security policies through affective computing. Acquiring sentiment towards information security policies through affective computing.
Julie Marie Baldwin, John M. Eassey & Erika J. Brooke. (2020) Court Operations during the COVID-19 Pandemic. American Journal of Criminal Justice 45:4, pages 743-758.
Crossref
Wu He, Ivan Ash, Mohd Anwar, Ling Li, Xiaohong Yuan, Li Xu & Xin Tian. (2019) Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training. Journal of Intellectual Capital 21:2, pages 203-213.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.