Gamification in workforce training: Improving employees ' self-efficacy and information security and data protection behaviours

被引:2
|
作者
Bitrian, Paula [1 ]
Buil, Isabel [2 ]
Catalan, Sara [1 ]
Merli, Dominik [3 ]
机构
[1] Univ Zaragoza, Fac Business & Econ, Gran Via 2, Zaragoza 50005, Spain
[2] Econ Univ Zaragoza, Fac Business, Maria de Luna S-N,Edificio Lorenzo Normante, Zaragoza 50018, Spain
[3] Augsburg Univ Appl Sci, Fac Comp Sci, Hsch 1, D-86161 Augsburg, Germany
关键词
Gamification; E; -training; Information security; Data protection; Information system success; Phishing; TECHNOLOGY ACCEPTANCE; SYSTEMS SUCCESS; CYBER SECURITY; PERCEIVED EASE; SERIOUS GAMES; MCLEAN MODEL; PLS-SEM; DESIGN; DETERMINANTS; SATISFACTION;
D O I
10.1016/j.jbusres.2024.114685
中图分类号
F [经济];
学科分类号
02 ;
摘要
This research aims to address two questions: (1) how can gamification strategies increase success of e-training systems and enhance employees' information security and data protection self-efficacy? and (2) do gamified etraining systems improve employees' information security and data protection behaviours? Drawing on the information systems success literature, this research offers new insights into gamified information security and data protection e-trainings through two studies. Study 1 analyses the perceptions of 1,178 employees of an international company using structural equation modelling. The results show that gamification significantly influences information quality, system quality and enjoyment which, in turn, increase perceived usefulness and satisfaction. Perceived usefulness also enhances satisfaction, and both variables improve security self-efficacy. Study 2 investigates the employees' behaviours by analysing their responses to phishing. The results confirm that gamified e-training improves employees' security behaviours, as it reduces the percentage of employees who click on a phishing attack and promotes positive reactions.
引用
收藏
页数:19
相关论文
共 11 条
  • [1] Self-efficacy in Information Security: A Replication Study
    Xue, Botong
    Warkentin, Merrill
    Mutchler, Leigh A.
    Balozian, Puzant
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2023, 63 (01) : 1 - 10
  • [2] The Self-Efficacy Variable in Behavioral Information Security Research
    He, Wu
    Yuan, Xiaohong
    Tian, Xin
    2014 SECOND INTERNATIONAL CONFERENCE ON ENTERPRISE SYSTEMS (ES), 2014, : 28 - 32
  • [3] Self-efficacy in information security: its influence on end users' information security practice behavior
    Rhee, Hyeun-Suk
    Kim, Cheongtag
    Ryu, Young U.
    COMPUTERS & SECURITY, 2009, 28 (08) : 816 - 826
  • [4] Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) Model Comparison
    Al-Shawabkeh, Mahmoud
    Saudi, Madihah Mohd
    Alwi, Najwa Hayati Mohd
    Azman, Norhidayah
    ADVANCED SCIENCE LETTERS, 2017, 23 (06) : 5237 - 5241
  • [5] Pain self-management training increases self-efficacy, self-management behaviours and pain and depression outcomes
    Damush, T. M.
    Kroenke, K.
    Bair, M. J.
    Wu, J.
    Tu, W.
    Krebs, E. E.
    Poleshuck, E.
    EUROPEAN JOURNAL OF PAIN, 2016, 20 (07) : 1070 - 1078
  • [6] How senior management and workplace norms influence information security attitudes and self-efficacy
    Cuganesan, Suresh
    Steele, Cara
    Hart, Alison
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2018, 37 (01) : 50 - 65
  • [7] Effect of job maintenance training program for employees with chronic disease - a randomized controlled trial on self-efficacy, job satisfaction, and fatigue
    Varekamp, Inge
    Verbeek, Jos H.
    de Boer, Angela
    van Dijk, Frank J. H.
    SCANDINAVIAN JOURNAL OF WORK ENVIRONMENT & HEALTH, 2011, 37 (04) : 288 - 297
  • [8] Effect of temporal distance and goal type on predictions of future information security: Focus on moderation of self-efficacy and social responsibility
    Lee, Ryo-Whoa
    Choi, Seung-Hyuk
    Hu, Sung-Ho
    ACTA PSYCHOLOGICA, 2023, 238
  • [9] The Role of Self-Efficacy in Employee's Compliance Behaviour Towards Information Security Policies: Multi-Group Analysis
    Humaidi, Norshima
    Kassim, Erne Suzila
    Zamzuri, Norol Hamiza
    Shahrom, Melissa
    ADVANCED SCIENCE LETTERS, 2018, 24 (11) : 8600 - 8605
  • [10] Information security - Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language
    Tamjidyamcholo, Alireza
    Bin Baba, Mohd Sapiyan
    Tamjid, Hamed
    Gholipour, Rahmatollah
    COMPUTERS & EDUCATION, 2013, 68 : 223 - 232