Show simple item record

dc.contributor.authorNwachukwu, Uchechukwu
dc.contributor.authorVidgren, Jiri
dc.contributor.authorNiemimaa, Marko
dc.contributor.authorJärveläinen, Jonna
dc.contributor.editorBui, Tung X.
dc.date.accessioned2023-05-02T10:06:43Z
dc.date.available2023-05-02T10:06:43Z
dc.date.issued2023
dc.identifier.citationNwachukwu, U., Vidgren, J., Niemimaa, M., & Järveläinen, J. (2023). Do SETA Interventions Change Security Behavior? : A Literature Review. In T. X. Bui (Ed.), <i>Proceedings of the 56th Annual Hawaii International Conference on System Sciences (HICSS 2023)</i> (pp. 6300-6309). University of Hawaiʻi at Mānoa. Proceedings of the Annual Hawaii International Conference on System Sciences. <a href="https://hdl.handle.net/10125/103396" target="_blank">https://hdl.handle.net/10125/103396</a>
dc.identifier.otherCONVID_182928816
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/86718
dc.description.abstractInformation security education, training, and awareness (SETA) are approaches to changing end-users’ security behavior. Research into SETA has conducted interventions to study the effects of SETA on security behavior. However, we lack aggregated knowledge on ‘how do SETA interventions influence security behavior?’. This study reviews 21 empirical SETA intervention studies published across the top IS journals. The theoretical findings show that the research has extended Protection Motivation Theory by (1) enhancements to fear appeals; (2) drawing attention to relevance; (3) incorporating temporality; (4) and shifting from intentions to behavior. In terms of behavior, the SETA interventions have targeted (1) information security policy compliance behavior; and (2) information protection behavior. We argue that while these studies have provided insights into security intentions and behavior, knowledge on designing effective SETA training has remained primarily anecdotal. We contribute (1) by pointing out gaps in the knowledge; and (2) by proposing tentative design recommendations.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherUniversity of Hawaiʻi at Mānoa
dc.relation.ispartofProceedings of the 56th Annual Hawaii International Conference on System Sciences (HICSS 2023)
dc.relation.ispartofseriesProceedings of the Annual Hawaii International Conference on System Sciences
dc.relation.urihttps://hdl.handle.net/10125/103396
dc.rightsCC BY-NC-ND 4.0
dc.subject.othersocio-technical issues in organizational information technologies
dc.subject.otherawareness
dc.subject.otherintervention
dc.subject.othersecurity behavior
dc.subject.othersecurity management
dc.subject.otherseta
dc.subject.othertraining
dc.titleDo SETA Interventions Change Security Behavior? : A Literature Review
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202305022813
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringfi
dc.contributor.oppiaineInformation Systems Scienceen
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-0-9981331-6-4
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange6300-6309
dc.relation.issn1530-1605
dc.type.versionpublishedVersion
dc.rights.copyright© Authors, 2023
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceHawaii International Conference on System Sciences
dc.subject.ysokäyttäytyminen
dc.subject.ysointerventio
dc.subject.ysotietoturva
dc.subject.ysokoulutus
dc.subject.ysoturvallisuusjohtaminen
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p3625
jyx.subject.urihttp://www.yso.fi/onto/yso/p41
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p84
jyx.subject.urihttp://www.yso.fi/onto/yso/p553
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY-NC-ND 4.0
Except where otherwise noted, this item's license is described as CC BY-NC-ND 4.0