Behind the digital veil: decoding the influence of HR training on information security awareness in Saudi Arabia

被引:1
作者
Asfahani, Ahmed M. [1 ]
机构
[1] Univ Business & Technol, Jeddah, Saudi Arabia
关键词
Information security awareness; employee training; digital transformation; collaboration dynamics; data protection; ARTIFICIAL-INTELLIGENCE; CYBERSECURITY; CHALLENGES; TRANSFORMATION; FUTURE; WORK;
D O I
10.1080/23311975.2024.2395430
中图分类号
F [经济];
学科分类号
02 ;
摘要
Amidst Saudi Arabia's digital transformation, this study investigates the impact of HR training on information security awareness in the finance and healthcare sectors. Grounded in an interpretivist paradigm, semi-structured interviews with 26 participants reveal HR's crucial role in fostering a security-aware culture and facilitating collaboration between HR and IT departments. Key findings highlight five main themes: organizational culture and approach, collaboration and communication, training and education mechanisms, measurement and feedback, and sectoral insights. The study addresses literature gaps by presenting a novel perspective on HR's role in information security, emphasizing the balance between security and individual rights. Despite sector-specific limitations, the research underscores the importance of collaborative cybersecurity efforts and suggests areas for future exploration, particularly in data consistency. This research provides valuable theoretical and practical implications for the evolving landscape of information security in Saudi Arabia, aligning with the nation's Vision 2030 goals.
引用
收藏
页数:22
相关论文
共 114 条
[91]   Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia [J].
Saeed, Saqib .
SUSTAINABILITY, 2023, 15 (07)
[92]   Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity [J].
Safitra, Muhammad Fakhrul ;
Lubis, Muharman ;
Fakhrurroja, Hanif .
SUSTAINABILITY, 2023, 15 (18)
[93]  
Salem M. Z., 2023, Journal of Statistics Applications and Probability, V12, P61, DOI [https://doi.org/10.18576/jsap/120106, DOI 10.18576/JSAP/120106]
[94]   Antecedents and consequences of data breaches: A systematic review [J].
Schlackl, Frederic ;
Link, Nico ;
Hoehle, Hartmut .
INFORMATION & MANAGEMENT, 2022, 59 (04)
[95]   Designing interviews to generate rich data for information systems research [J].
Schultze, Ulrike ;
Avital, Michel .
INFORMATION AND ORGANIZATION, 2011, 21 (01) :1-16
[96]   Organizational and team culture as antecedents of protection motivation among IT employees [J].
Sharma, Shwadhin ;
Aparicio, Eduardo .
COMPUTERS & SECURITY, 2022, 120
[97]   Cyber-noir: Cybersecurity and popular culture [J].
Shires, James .
CONTEMPORARY SECURITY POLICY, 2020, 41 (01) :82-107
[98]   Technical Requirements and Approaches in Personal Data Control [J].
Sim, Junsik ;
Kim, Beomjoong ;
Jeon, Kiseok ;
Joo, Moonho ;
Lim, Jihun ;
Lee, Junghee ;
Choo, Kim-Kwang Raymond .
ACM COMPUTING SURVEYS, 2023, 55 (09)
[99]   Thinking in Systems, Sifting Through Simulations: A Way Ahead for Cyber Resilience Assessment [J].
Simone, Francesco ;
Akel, Antonio Javier Nakhal ;
Di Gravio, Giulio ;
Patriarca, Riccardo .
IEEE ACCESS, 2023, 11 :11430-11450
[100]  
Snchez J., 2020, STEM in the Technopolis: The power of STEM education in regional technology policy, P131, DOI [https://doi.org/10.1007/978-3-030-39851-48, DOI 10.1007/978-3-030-39851-48]