References
- Adams, R. (2018). Our approach to employee security training. https://www.pagerduty.com/blog/security-training-at-pagerduty/
- Chau, M. C. L., and J. Xu. 2012. Business intelligence in blogs: Understanding consumer interactions and communities. MIS Quarterly 36 (4):1189–1216.
- Chen, R., H. R. Rao, and R. Valecha (2016). Response to the office of personnel management data breaches: A conceptual exploration. The 2016 Americas Conference on Information Systems, 2016, San Diego.
- Choi, H., J. Park, and Y. Jung. 2018. The role of privacy fatigue in online privacy behavior. Computers in Human Behavior 81:42–51. doi:10.1016/j.chb.2017.12.001.
- Dobran, B. (2018). Start a security awareness training program your staff can‘t ignore. https://phoenixnap.com/blog/security-awareness-training-program
- Gross, A. (2018). Effective security training requires change in employee behavior. https://www.hitechanswers.net/effective-security-training-requires-change-in-employee-behavior/
- He, W., and S. Zha. 2014. Insights into the adoption of social media mashups. Internet Research 24 (2):160–180.
- IBM (2014). IBM security services 2014 cyber security intelligence index. http://media.scmagazine.com/documents/82/ibm_cyber_security_intelligenc_20450.pdf
- Katz, I. (2017). Cybersecurity awareness training: How to improve employee security behavior. https://blog.dashlane.com/cybersecurity-awareness-training-how-to/
- Kostadinov, D. (2018). The components of a successful security awareness program. https://resources.infosecinstitute.com/components-successful-security-awareness-program/#gref
- Li, L., W. He, L. Xu, I. Ash, M. Anwar, and X. Yuan. 2019. Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management 45:13–24. doi:10.1016/j.ijinfomgt.2018.10.017.
- Nadkarni, S. (2012). Security awareness training made easy. https://www.computerweekly.com/tip/Security-awareness-training-made-easy.
- O‘Reilly, P. D., K. G. Rigopoulos, G. A. Witte, and L. Feldman (2018). 2017 NIST/ITL cybersecurity program: Annual report. https://www.nist.gov/publications/2017-nistitl-cybersecurity-program-annual-report
- Pandasecurity (2017). 3 Ways to minimize “Security Fatigue” among employees. https://www.pandasecurity.com/mediacenter/tips/minimize-security-fatigue/
- Piccoli, G., and F. Pigni. 2019. Information systems for managers. Burlington, VT: Prospect Press.
- Rhee, H. S., Y. Ryu, and C. T. Kim (2005). I am fine but you are not: Optimistic bias and illusion of control on information security. ICIS 2005 Proceedings, 32, Las Vegas, NV.
- Rosenberg, J. 2011. The carry book: Minnesota edition, 52. Elegon.
- Schwarzer, R. 1994. Optimism, vulnerability, and self-beliefs as health-related cognitions: A systematic overview. Psychology and Health 9 (3):161–80. doi:10.1080/08870449408407475.
- Singer, P. W., and A. Friedman. 2014. Cybersecurity: What everyone needs to know. OUP.
- Stilgherrian (2018). Security training is useless unless it changes behaviours. ZDNet. https://www.zdnet.com/article/security-training-is-useless-unless-it-changes-behaviours/
- Winkler, I. (2016). 9 reasons why your security awareness program sucks. https://www.csoonline.com/article/3075722/security-awareness/8-reasons-why-your-security-awareness-program-sucks.html
- Winkler, I. (2018). The fundamental flaw in security awareness programs. InformationWeek. https://www.darkreading.com/endpoint/the-fundamental-flaw-in-security-awareness-programs/a/d-id/1332301