To make employees aware of their important role for information security, companies typically carry out security awareness campaigns. The success and effectiveness of those campaigns has to be measured to justify the budget for example. Therefore, we did a systematic literature review in order to learn how information security awareness (ISA) is measured in theory and practice. We covered published literature as well as unpublished information. The unpublished information was retrieved by interviewing experts of small and medium-sized enterprises. The results showed that ISA is mostly measured via questionnaires. Round about 40 % of the questionnaires are based on the Knowledge-Attitude-Behavior-Model which is itself scientifically weak. Ac...
The government continually expresses concern that critical infrastructures are vulnerable to a host ...
Over the last twenty years, technical controls for information security have advanced and matured co...
In today’s digital age, in which all kinds of information can be accessed electronically at all time...
To make employees aware of their important role for information security, companies typically carry ...
Research shows security awareness lacks a uniform definition. This paper explores the various attem...
Measuring information security awareness (ISA) is mostly done by the measurement of knowledge. Howev...
Information security awareness (ISA) is referred to as a state of consciousness where user ideally c...
Individuals’ information security awareness (ISA) plays a critical role in determining their securit...
Many researchers and experts in the information security field stress that the user is the weakest l...
Research purpose: The aim of this study is to present the essence and importance of information secu...
This paper describes a procedure to enable the planning of targeted measures to increase the Informa...
The need to protect information systems as much as possible from security threats and risks has rise...
The Human Aspects of Information Security Questionnaire (HAIS-Q) is designed to measure Information ...
The Human Aspects of Information Security Questionnaire (HAIS-Q) is designed to measure Information ...
Employees’ information security awareness (ISA) is a key antecedent of information security behavior...
The government continually expresses concern that critical infrastructures are vulnerable to a host ...
Over the last twenty years, technical controls for information security have advanced and matured co...
In today’s digital age, in which all kinds of information can be accessed electronically at all time...
To make employees aware of their important role for information security, companies typically carry ...
Research shows security awareness lacks a uniform definition. This paper explores the various attem...
Measuring information security awareness (ISA) is mostly done by the measurement of knowledge. Howev...
Information security awareness (ISA) is referred to as a state of consciousness where user ideally c...
Individuals’ information security awareness (ISA) plays a critical role in determining their securit...
Many researchers and experts in the information security field stress that the user is the weakest l...
Research purpose: The aim of this study is to present the essence and importance of information secu...
This paper describes a procedure to enable the planning of targeted measures to increase the Informa...
The need to protect information systems as much as possible from security threats and risks has rise...
The Human Aspects of Information Security Questionnaire (HAIS-Q) is designed to measure Information ...
The Human Aspects of Information Security Questionnaire (HAIS-Q) is designed to measure Information ...
Employees’ information security awareness (ISA) is a key antecedent of information security behavior...
The government continually expresses concern that critical infrastructures are vulnerable to a host ...
Over the last twenty years, technical controls for information security have advanced and matured co...
In today’s digital age, in which all kinds of information can be accessed electronically at all time...