Moving beyond cyber security awareness and training to engendering security knowledge sharing

被引:11
作者
Alahmari, Saad [1 ]
Renaud, Karen [2 ]
Omoronyia, Inah [3 ]
机构
[1] Northern Border Univ, Appl Coll, Ar Ar, Saudi Arabia
[2] Univ Strathclyde, Dept Comp & Informat Sci, Glasgow, Lanark, Scotland
[3] Univ Glasgow, Sch Comp Sci, Glasgow, Lanark, Scotland
关键词
Self-determination theory (SDT); Transactive memory system (TMS); Cyber security awareness (CSA); Security knowledge; Information security awareness (ISA); TRANSACTIVE MEMORY-SYSTEMS; SELF-DETERMINATION THEORY; INFORMATION SECURITY; POLICY COMPLIANCE; TEAM PERFORMANCE; MOTIVATION; IMPACT; TECHNOLOGY; PROTECTION; MODEL;
D O I
10.1007/s10257-022-00575-2
中图分类号
F [经济];
学科分类号
02 ;
摘要
Employees play a critical role in improving workplace cyber security, which builds on widespread security knowledge and expertise. To maximise knowledge levels, organisations run awareness and training course. Yet, they should also encourage and facilitate Security Knowledge Sharing (SKS). To facilitate such sharing, we used a bespoke App which deploys a game to deliver security training and to encourage sharing based on the Transactive Memory System (TMS) theory. An empirical study was conducted within a Saudi Arabian Fortune 100 organisation to test the impact of the app on employee knowledge. The app demonstrated efficacy in enhancing organisational security awareness and knowledge. The results highlight the potential of TMS in improving overall security knowledge in organisations.
引用
收藏
页码:123 / 158
页数:36
相关论文
共 106 条
  • [71] Mejias R. J., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P3258, DOI 10.1109/HICSS.2012.104
  • [72] User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
    Menard, Philip
    Bott, Gregory J.
    Crossler, Robert E.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2017, 34 (04) : 1203 - 1230
  • [73] Mermoud A, 2018, 17 WORKSH EC INF SEC, P1
  • [74] Moriarty Jo., 2011, QUALITATIVE METHODS
  • [75] Oates BJ., 2005, RESEAR INFO SYS COMP
  • [76] Olusegun OJ, 2013, ARXIV
  • [77] The contradiction between self-protection and self-presentation on knowledge sharing behavior
    Ortiz, Jaime
    Chang, Shu-Hao
    Chih, Wen-Hai
    Wang, Chia-Hao
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2017, 76 : 406 - 416
  • [78] Perkins S. J., 2020, Reward Management: Alternatives, Consequences and Contexts
  • [79] Politis J. D., 2003, Journal of Knowledge Management, V7, P55, DOI 10.1108/13673270310505386
  • [80] Puhakainen P, 2010, MIS QUART, V34, P757