Moving beyond cyber security awareness and training to engendering security knowledge sharing

被引:11
作者
Alahmari, Saad [1 ]
Renaud, Karen [2 ]
Omoronyia, Inah [3 ]
机构
[1] Northern Border Univ, Appl Coll, Ar Ar, Saudi Arabia
[2] Univ Strathclyde, Dept Comp & Informat Sci, Glasgow, Lanark, Scotland
[3] Univ Glasgow, Sch Comp Sci, Glasgow, Lanark, Scotland
关键词
Self-determination theory (SDT); Transactive memory system (TMS); Cyber security awareness (CSA); Security knowledge; Information security awareness (ISA); TRANSACTIVE MEMORY-SYSTEMS; SELF-DETERMINATION THEORY; INFORMATION SECURITY; POLICY COMPLIANCE; TEAM PERFORMANCE; MOTIVATION; IMPACT; TECHNOLOGY; PROTECTION; MODEL;
D O I
10.1007/s10257-022-00575-2
中图分类号
F [经济];
学科分类号
02 ;
摘要
Employees play a critical role in improving workplace cyber security, which builds on widespread security knowledge and expertise. To maximise knowledge levels, organisations run awareness and training course. Yet, they should also encourage and facilitate Security Knowledge Sharing (SKS). To facilitate such sharing, we used a bespoke App which deploys a game to deliver security training and to encourage sharing based on the Transactive Memory System (TMS) theory. An empirical study was conducted within a Saudi Arabian Fortune 100 organisation to test the impact of the app on employee knowledge. The app demonstrated efficacy in enhancing organisational security awareness and knowledge. The results highlight the potential of TMS in improving overall security knowledge in organisations.
引用
收藏
页码:123 / 158
页数:36
相关论文
共 106 条
  • [1] User preference of cyber security awareness delivery methods
    Abawajy, Jemal
    [J]. BEHAVIOUR & INFORMATION TECHNOLOGY, 2014, 33 (03) : 236 - 247
  • [2] A systematic review of approaches to assessing cybersecurity awareness
    Abd Rahim, Noor Hayani
    Hamid, Suraya
    Kiah, Laiha Mat
    Shamshirband, Shahaboddin
    Furnell, Steven
    [J]. KYBERNETES, 2015, 44 (04) : 606 - 622
  • [3] Ahmed G, 2014, PROC EUR CONF KNOWL, P1083
  • [4] Ahmed Monjur, 2020, Advances in Intelligent Systems and Interactive Applications. Proceedings of the 4th International Conference on Intelligent, Interactive Systems and Applications (IISA2019). Advances in Intelligent Systems and Computing (AISC 1084), P568, DOI 10.1007/978-3-030-34387-3_70
  • [5] Al-Ahmari S, 2018, PROCEEDINGS OF THE TWELFTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE (HAISA 2018), P101
  • [6] PERSUADED: Fighting Social Engineering Attacks with a Serious Game
    Aladawy, Dina
    Beckers, Kristian
    Pape, Sebastian
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2018, 11033 : 103 - 118
  • [7] Alahmari S, 2020, 2020 15 INT C INTERN, P1
  • [8] Alahmari S, 2019, EUROPEAN MEDITERRANE, P376
  • [9] Reviewing Cyber Security Social Engineering Training and Awareness Programs-Pitfalls and Ongoing Issues
    Aldawood, Hussain
    Skinner, Geoffrey
    [J]. FUTURE INTERNET, 2019, 11 (03)
  • [10] Mechanism to enhance team creative performance through social media: A Transactive memory system approach
    Ali, Ahsan
    Wang, Hongwei
    Khan, Ali Nawaz
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2019, 91 : 115 - 126