4.4 Review

A systematic review of approaches to assessing cybersecurity awareness

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Going Spear Phishing: Exploring Embedded Training and Awareness

Deanna D. Caputo et al.

IEEE SECURITY & PRIVACY (2014)

Article Computer Science, Information Systems

Basing Cybersecurity Training on User Perceptions

Susanne M. Furman et al.

IEEE SECURITY & PRIVACY (2012)

Article Computer Science, Information Systems

How Effective Is Your Security Awareness Program? An Evaluation Methodology

Konstantinos Rantos et al.

INFORMATION SECURITY JOURNAL (2012)

Article Computer Science, Information Systems

The cyber threat landscape: Challenges and future research directions

Kim-Kwang Raymond Choo

COMPUTERS & SECURITY (2011)

Article Pediatrics

Clinical Report-The Impact of Social Media on Children, Adolescents, and Families

Gwenn Schurgin O'Keeffe et al.

PEDIATRICS (2011)

Article Computer Science, Information Systems

Cyber security for home users: A new way of protection through awareness enforcement

E. Kritzinger et al.

COMPUTERS & SECURITY (2010)

Article Education & Educational Research

Online activities and writing practices of urban Malaysian adolescents

Kok Eng Tan et al.

SYSTEM (2010)

Article Computer Science, Interdisciplinary Applications

The impact of information richness on information security awareness training effectiveness

R. S. Shaw et al.

COMPUTERS & EDUCATION (2009)

Article Computer Science, Information Systems

Information security: The moving target

M. T. Dlamini et al.

COMPUTERS & SECURITY (2009)

Article Computer Science, Information Systems

Information security awareness in higher education: An exploratory study

Yacine Rezgui et al.

COMPUTERS & SECURITY (2008)

Article Computer Science, Information Systems

Security beliefs and barriers for novice Internet users

Steven Furnell et al.

COMPUTERS & SECURITY (2008)

Article Management

Improving end user behaviour in password utilization: An action research initiative

Danuvasin Charoen et al.

SYSTEMIC PRACTICE AND ACTION RESEARCH (2008)

Article Computer Science, Information Systems

Investigating Information Security Awareness: Research and Practice Gaps

Aggeliki Tsohou et al.

INFORMATION SECURITY JOURNAL (2008)

Article Computer Science, Information Systems

Assessing the security perceptions of personal Internet users

S. M. Furnell et al.

COMPUTERS & SECURITY (2007)

Article Computer Science, Information Systems

A qualitative study of users' view on information security

Eirik Albrechtsen

COMPUTERS & SECURITY (2007)

Article Computer Science, Information Systems

Value-focused assessment of ICT security awareness in an academic environment

L. Drevin et al.

COMPUTERS & SECURITY (2007)

Article Computer Science, Information Systems

A video game for cyber security training and awareness

Benjamin D. Cone et al.

COMPUTERS & SECURITY (2007)

Article Computer Science, Information Systems

A contextual framework for combating identity theft

WJ Wang et al.

IEEE SECURITY & PRIVACY (2006)

Article Computer Science, Information Systems

A prototype for assessing information security awareness

H. A. Kruger et al.

COMPUTERS & SECURITY (2006)

Article Communication

Teenagers' perceptions of online privacy and coping behaviors: A risk-benefit appraisal approach

S Youn

JOURNAL OF BROADCASTING & ELECTRONIC MEDIA (2005)

Article Computer Science, Information Systems

Analysis of end user security behaviors

JM Stanton et al.

COMPUTERS & SECURITY (2005)

Article Social Sciences, Interdisciplinary

A critical analysis of evaluation practice: the Kirkpatrick model and the principle of beneficence

R Bates

EVALUATION AND PROGRAM PLANNING (2004)

Article Psychology, Multidisciplinary

Internet addiction:: Characteristics of a questionnaire and prevalence in Norwegian youth (12-18 years)

A Johansson et al.

SCANDINAVIAN JOURNAL OF PSYCHOLOGY (2004)