9,807
Views
190
CrossRef citations to date
0
Altmetric
Piracy and security on the Net

User preference of cyber security awareness delivery methods

Pages 237-248 | Received 10 Feb 2012, Accepted 21 Jun 2012, Published online: 01 Aug 2012

References

  • Abawajy, J., Tai-hoon, K. 2010. Performance analysis of cyber security awareness delivery methods. In: Security technology, disaster recovery and business continuity, (pp. 142–148). BerlinGermany: Spring-Verlag.
  • Abawajy, J. H., Thatcher, K., Tai-hoon, K. 2008. (pp. 472–476). Los Alamitos, CA: IEEE Computer Society. Investigation of stakeholders’ commitment to information security awareness programs, Proceedings of the 2nd international conference on information security and assurance (ISA 2008)
  • Albrechtsen, E., Hovden, J. 2010. Improving information security awareness and behaviour through dialogue, participation and collective reflection. An Intervention Study, Computer and Security, 29(4), 432–445. doi: 10.1016/j.cose.2009.12.005
  • Cone, B. D. 2007. A video game for cyber security training and awareness. Computers & Security, 26(1), 63–72. doi: 10.1016/j.cose.2006.10.005
  • Dodge, R. C. 2007. Phishing for user security awareness. Computers & Security, 26, 73–80. doi: 10.1016/j.cose.2006.10.009
  • Downs, J., Holbrook, M., Cranor, L. 2006. (pp. 79–90). New York, NY: ACM Press. Decision strategies and susceptibility to phishing. Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS’06)
  • Eminagaoglu, M., Ucar, E., Eren, S. 2010. The positive outcomes of information security awareness training in companies – a case study. Information Security Technical Report, 4, 1–7.
  • Fung, C. C. 2008. (pp. 375–380). Los Alamitos, CA: IEEE Press. Raising information security awareness in digital ecosystem with games – a pilot study in Thailand. 2nd IEEE international conference on digital ecosystems and technologies (IEEE DEST 2008)
  • Islam, R., Abawajy, J. 2012. A multi-tier phishing detection and filtering approach. Journal of Network and Computer Applications, DOI: 10.1016/j.jnca.2012.05.009
  • Jagatic, T. 2007. Social phishing. Communications of the ACM, 50(10), 94–100. doi: 10.1145/1290958.1290968
  • Knapp, K. J. 2007. Information security effectiveness: conceptualization and validation of a theory. International Journal of Information Security and Privacy, 1(2), 37–60. doi: 10.4018/jisp.2007040103
  • Kruger, H. A., Kearney, W. D. 2006. A prototype for assessing information security awareness. Computers & Security, 25(4), 289–296. doi: 10.1016/j.cose.2006.02.008
  • Kumaraguru, P. 2010. Teaching johnny not to fall for phish. ACM Transactions on Internet Technology, 10(2), 1–31. doi: 10.1145/1754393.1754396
  • Kumaraguru, P. 2007. (pp. 905–914). New York, NY: ACM Press. Protecting people from phishing: the design and evaluation of an embedded training email system. Proceedings of the computer human interaction (CHI 2007)
  • Leach, J. 2003. Improving user security behaviour. Computers & Security, 22(8), 685–692. doi: 10.1016/S0167-4048(03)00007-5
  • New York State Office of Cyber Security & Critical Infrastructure Coordination 2005. Gone phishing: a briefing on the anti-phishing exercise initiative for New York State Government. Aggregate exercise results for public release,
  • Ponemon Institute 2012. The human factor in data protection [online], Ponemon Institute. Available from: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_trend-micro_ponemon-survey-2012.pdf [Accessed 9 June 2012]
  • Rudis, B. 2012. Achievement unlocked: designing a compelling security awareness program. Security conference and training, 17–19 April, Boston.
  • Saunders, M. K., Lewis, P., Thornhill, A. 2003. Research methods for business students 4th ed, Spain: Financial Time Press.
  • Shaw, R. S. 2009. The impact of information richness on information security awareness training effectiveness. Computers & Education, 52(1), 92–100. doi: 10.1016/j.compedu.2008.06.011
  • Sheng, S. 2007. (pp. 88–99). New York, NY: ACM Press. Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. Proceeding on symposium on usable privacy and security (SOUPS’07)
  • Spagat, E. 2009. Justice Department Hoaxes Employees. News Article, , [online]. Available from: http://news.yahoo.com/s/ap/20090129/ [Accessed 8 June 2012]
  • Valentine, J. A. 2006. Enhancing the employee security awareness model. Computer Fraud & Security, 6, 17–19. doi: 10.1016/S1361-3723(06)70370-0
  • Wilson, M., Hash, J. 2003. Building an information technology security awareness and training program [online], National Institute of Standards and Technology. http://www.itl.nist.gov/lab/bulletns/bltnoct03.htm [Accessed 8 June 2012]
  • Workman, M. 2007. Gaining access with social engineering: an empirical study of the threat. Information Systems Security, 16(6), 315–331. doi: 10.1080/10658980701788165

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.