ICT resources are important assets of any organization and the protection of these resources are equally important. To be able to protect themselves and their profitability, many organizations have established information security awareness programs. In order for a security awareness program to add value to an organization and at the same time make a contribution to the field of information security it is necessary to have a set of methods to study and measure its effect. This paper gives an overview of a suggested framework for evaluating ICT security awareness. Following a brief description of the framework, a more detailed overview on the identification of areas to be evaluated, using a value focused assessment, will be presented. Commen...
Organisations have become increasingly dependent on technology in order to compete in their respecti...
Operating systems and programmes are more protected these days and attackers have shifted their atte...
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are r...
The increased advancement and integration of information and communication technology (ICT) applicat...
Many researchers and experts in the information security field stress that the user is the weakest l...
[[abstract]]Organizations that lack security awareness can miss detecting many obvious security risk...
Managing Information Security (InfoSec) within an organization is becoming a very complex task. Curr...
Information and IT security awareness-raising measures and the evaluation of these measures are an i...
Digital convergence and diffusion of Information and Communication Technology (ICT) solutions in mor...
The aim of this project and dissertation is to develop an effective information security awareness p...
A lack of information security awareness within some parts of society as well as some organisations ...
Part 3: Security and Privacy IssuesInternational audienceThis paper describes the development of an ...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
his paper presents an empirical framework for implementing Situation Awareness Measurement Technique...
In today’s business environment where all operations are enabled by technology, information security...
Organisations have become increasingly dependent on technology in order to compete in their respecti...
Operating systems and programmes are more protected these days and attackers have shifted their atte...
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are r...
The increased advancement and integration of information and communication technology (ICT) applicat...
Many researchers and experts in the information security field stress that the user is the weakest l...
[[abstract]]Organizations that lack security awareness can miss detecting many obvious security risk...
Managing Information Security (InfoSec) within an organization is becoming a very complex task. Curr...
Information and IT security awareness-raising measures and the evaluation of these measures are an i...
Digital convergence and diffusion of Information and Communication Technology (ICT) solutions in mor...
The aim of this project and dissertation is to develop an effective information security awareness p...
A lack of information security awareness within some parts of society as well as some organisations ...
Part 3: Security and Privacy IssuesInternational audienceThis paper describes the development of an ...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
his paper presents an empirical framework for implementing Situation Awareness Measurement Technique...
In today’s business environment where all operations are enabled by technology, information security...
Organisations have become increasingly dependent on technology in order to compete in their respecti...
Operating systems and programmes are more protected these days and attackers have shifted their atte...
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are r...