151
Views
0
CrossRef citations to date
0
Altmetric
Articles

The Role of Libraries in Creating a Safer Cyberspace: Awareness of Estonian Library Employees in Information Security

References

  • Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237–248. https://doi.org/10.1080/0144929X.2012.708787
  • Abdel-Kader, M., & Robert Luther, R. (2008). The impact of firm characteristics on management accounting practices: A UK-based empirical analysis. The British Accounting Review, 40(1), 2–27. https://doi.org/10.1016/j.bar.2007.11.003
  • Al-Suqri, M. N., Alkindi, S. S., Saleem, N. E., Al-Nabhani, M. S., & Fadhil, B. S. (2023). Libraries and national security: A review of evidence and a proposed new strategic direction. Journal of Arts and Social Sciences [JASS], 11(3), 17–27. https://journals.squ.edu.om/index.php/jass/article/view/4479/3264 https://doi.org/10.53542/jass.v11i3.4479
  • Brown, J. D. (2011). Likert items and scales of measurement? Shiken Research Bulletin: JALT Testing & Evaluation SIG Newsletter, 15(1), 10–14. https://hosted.jalt.org/test/PDF/Brown34.pdf
  • Chen, Y. H., Rendina-Gobioff, G., & Dedrick, R. F. (2007). Detecting effects of positively and negatively worded items on a self-concept scale for third and sixth grade elementary students [Paper presentation]. Paper Presented at the Annual Meeting of the Florida Educational Research Association, Tampa, FL, November 14–16. https://files.eric.ed.gov/fulltext/ED503122.pdf
  • Clark, I. (2016). The digital divide in the post-Snowden era. Journal of Radical Librarianship, 2, 1–32. https://journal.radicallibrarianship.org/index.php/journal/article/view/12
  • Croasmun, J. T., & Ostrom, L. (2011). Using Likert-type scales in the social sciences. Journal of Adult Education, 40(1), 19–22. https://files.eric.ed.gov/fulltext/EJ961998.pdf
  • Dupuis, M. J. (2017). Cyber security for everyone: An introductory course for non technical majors. Journal of Cybersecurity Education, Research and Practice, 1, 1–17. https://digitalcommons.kennesaw.edu/jcerp/vol2017/iss1/3
  • Eagly, A. H., & Chaiken, S. (1993). The psychology of attitudes. Harcourt Brace Jovanovich College Publishers. https://psycnet.apa.org/record/1992-98849-000
  • Egelman, S., Peer, E. (2015). Scaling the security wall: Developing a Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15) (pp. 2873–2882). https://www.icsi.berkeley.edu/pubs/networking/scalingwall15.pdf
  • Fakeh, S. K. W., Zulhemay, M. N., Shahibi, M. S., Ali, J., & Zaini, M. K. (2012). Information Security Awareness Amongst Academic Librarians. Journal of Applied Sciences Research, 8(3), 1723–1735.
  • Gliem, J. A., & Gliem, R. R. (2003). Calculating, interpreting, and reporting Cronbach’s alpha reliability coefficient for Likert-type scales [Paper presentation]. 2003 Midwest Research to Practice Conference in Adult, Continuing, and Community Education (pp. 82–88). https://core.ac.uk/reader/46954970
  • Hadlington, L. (2017). Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7), e00346. https://doi.org/10.1016/j.heliyon.2017.e00346
  • Hadlington, L., & Scase, M. O. (2018). End-user frustrations and failures in digital technology: Exploring the role of Fear of Missing Out, Internet addiction and personality. Heliyon, 4(11), e00872. https://doi.org/10.1016/j.heliyon.2018.e00872
  • Han, J., Kim, Y. J., & Kim, H. (2017). An integrative model of information security policy compliance with psychological contract: Examining a bilateraal perspective. Computers & Security, 66, 52–65. https://doi.org/10.1016/j.cose.2016.12.016
  • McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. (2017). Individual differences and information security awareness. Computers in Human Behavior, 69, 151–156. https://doi.org/10.1016/j.chb.2016.11.065
  • Mäses, S. (2015). Infoturbe inimfaktori hindamismeetod. [Evaluation Method for Human Aspects in Information Security]. Tallinna Tehnikaülikool. https://digikogu.taltech.ee/et/Item/1c19ddce-e325-440c-838f-9a349e087ca6
  • Neigel, A. R., Claypoole, V. L., Waldfogle, G. E., Acharya, S., & Hancock, G. M. (2020). Holistic cyber hygiene education: Accounting for the human factors. Computers & Security, 92, 101731. https://doi.org/10.1016/j.cose.2020.101731
  • Nunnally, J. C. (1978). Psychometric theory (2nd ed.). McGraw-Hill.
  • Öğütçü, G., Özlem, M., Testik, Ö. M., & Chouseinoglou, O. (2016). Analysis of personal information security behavior and awareness. Computers & Security, 56, 83–93. https://doi.org/10.1016/j.cose.2015.10.002
  • Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., & Jerram, C. (2014). Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Computers & Security, 42(May), 165–176. https://doi.org/10.1016/j.cose.2013.12.003
  • Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies. Computers & Security, 66, 40–51. https://doi.org/10.1016/j.cose.2017.01.004
  • Piirmets, E. (2022). Librarians – The unsung heroes of digitalisation. https://e-estonia.com/librarians-the-unsung-heroes-of-digitalisation/
  • Powell, J., Barkway, T., Browett, O. (2021). SNSI libraries: Research report. https://www.snsi.info/media/kqlkdv5z/shift-learning-snsi-libraries-research-report.pdf
  • Ranas, T., Fariz, A., Dirgantara, B., Muhamad, A., Ruldeviyan, Y. (2020). Measuring information security awareness of client's information security: case study at PT XYZ. International Journal of Advances in Electronics and Computer Science, 7(7), 2394–2835. https://www.iraj.in/journal/journal_file/journal_pdf/12-669-15992140201-6.pdf
  • Rootalu, K. (2014). Sotsiaalse analüüsi meetodite ja metodoloogia õpibaas. Tartu Ülikool. https://samm.ut.ee/korrelatsioonikordajad
  • Schlienger, T., & Teufel, S. (2003). Analyzing information security culture: Increased trust by an appropriate information security culture [Paper presentation]. 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings (pp. 405–409). https://doi.org/10.1109/DEXA.2003.1232055
  • Sobiesk, E., Blair, J., Conti, G., Lanham, M., Taylor, H. (2015). Cyber education: A multi-level, multi-discipline approach [Paper presentation]. SIGITE '15: Proceedings of the 16th Annual Conference on Information Technology Education (pp. 43–47). https://doi.org/10.1145/2656450.2656478
  • Spector, P. (1992). Summated rating scale construction: An introduction. Sage.
  • Tavakol, M., & Dennick, R. (2011). Making sense of Cronbach’s alpha. International Journal of Medical Education, 2, 53–55. https://doi.org/10.5116/ijme.4dfb.8dfd
  • Thomson, M. E., & von Solms, R. (1998). Information security awareness: Educating your users effectively. Information Management & Computer Security, 6(4), 167–173. https://doi.org/10.1108/09685229810227649
  • Van Zadelhoff, M. (2016). The biggest cybersecurity threats are inside your company. Harvard Business Review. https://hbr.org/2016/09/the-biggest-cybersecurity-threats-are-inside-your-company

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.