This study aims to explore the types of information can be effectively communicated in three knowledge sharing methods and their impact on employees' security practice. On one end, guarding the organisation's information system against cyber-attacks is critical and improving users' knowledge and skills is a common approach to any security program. On the other end, organisations lack a clear understanding in determining what types of security information should be delivered through various methods of communication to be effective in boosting users' knowledge and compliance behaviour. The study employed a qualitative method using semi-structured interviews with business users in Vietnam. The initial findings indicate a si...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
Part 4: Organisational AspectsInternational audienceEducating end-users to improve information secur...
This study focused on the knowledge sharing of employees at homeland security. In this study we deve...
This study aims to explore the types of information can be effectively communicated in three knowled...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
Knowledge sharing is a vital business strategy that creates value for an organisation. It also leads...
As an organisation, it is important with technical security controls to protect information assets, ...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
This article focuses on the importance of information sharing practices for capacity building compet...
Knowledge sharing plays an important role in the domain of information security, due to its positive...
It is crucial for knowledge to be shared in the information security domain. In effect, sharing ensu...
Good security cannot be achieved through technical means alone and a solid understanding of the issu...
Organizations are increasingly utilizing knowledge-sharing technologies to increase the amount of kn...
The literature on cyber security information sharing enumerates an extensive list of potential benef...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
Part 4: Organisational AspectsInternational audienceEducating end-users to improve information secur...
This study focused on the knowledge sharing of employees at homeland security. In this study we deve...
This study aims to explore the types of information can be effectively communicated in three knowled...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
Knowledge sharing is a vital business strategy that creates value for an organisation. It also leads...
As an organisation, it is important with technical security controls to protect information assets, ...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
This article focuses on the importance of information sharing practices for capacity building compet...
Knowledge sharing plays an important role in the domain of information security, due to its positive...
It is crucial for knowledge to be shared in the information security domain. In effect, sharing ensu...
Good security cannot be achieved through technical means alone and a solid understanding of the issu...
Organizations are increasingly utilizing knowledge-sharing technologies to increase the amount of kn...
The literature on cyber security information sharing enumerates an extensive list of potential benef...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
Part 4: Organisational AspectsInternational audienceEducating end-users to improve information secur...
This study focused on the knowledge sharing of employees at homeland security. In this study we deve...