dc.contributor.author | Nwachukwu, Uchechukwu | |
dc.contributor.author | Vidgren, Jiri | |
dc.contributor.author | Niemimaa, Marko | |
dc.contributor.author | Järveläinen, Jonna | |
dc.contributor.editor | Bui, Tung X. | |
dc.date.accessioned | 2023-05-02T10:06:43Z | |
dc.date.available | 2023-05-02T10:06:43Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Nwachukwu, U., Vidgren, J., Niemimaa, M., & Järveläinen, J. (2023). Do SETA Interventions Change Security Behavior? : A Literature Review. In T. X. Bui (Ed.), <i>Proceedings of the 56th Annual Hawaii International Conference on System Sciences (HICSS 2023)</i> (pp. 6300-6309). University of Hawaiʻi at Mānoa. Proceedings of the Annual Hawaii International Conference on System Sciences. <a href="https://hdl.handle.net/10125/103396" target="_blank">https://hdl.handle.net/10125/103396</a> | |
dc.identifier.other | CONVID_182928816 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/86718 | |
dc.description.abstract | Information security education, training, and awareness (SETA) are approaches to changing end-users’ security behavior. Research into SETA has conducted interventions to study the effects of SETA on security behavior. However, we lack aggregated knowledge on ‘how do SETA interventions influence security behavior?’. This study reviews 21 empirical SETA intervention studies published across the top IS journals. The theoretical findings show that the research has extended Protection Motivation Theory by (1) enhancements to fear appeals; (2) drawing attention to relevance; (3) incorporating temporality; (4) and shifting from intentions to behavior. In terms of behavior, the SETA interventions have targeted (1) information security policy compliance behavior; and (2) information protection behavior. We argue that while these studies have provided insights into security intentions and behavior, knowledge on designing effective SETA training has remained primarily anecdotal. We contribute (1) by pointing out gaps in the knowledge; and (2) by proposing tentative design recommendations. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | University of Hawaiʻi at Mānoa | |
dc.relation.ispartof | Proceedings of the 56th Annual Hawaii International Conference on System Sciences (HICSS 2023) | |
dc.relation.ispartofseries | Proceedings of the Annual Hawaii International Conference on System Sciences | |
dc.relation.uri | https://hdl.handle.net/10125/103396 | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | socio-technical issues in organizational information technologies | |
dc.subject.other | awareness | |
dc.subject.other | intervention | |
dc.subject.other | security behavior | |
dc.subject.other | security management | |
dc.subject.other | seta | |
dc.subject.other | training | |
dc.title | Do SETA Interventions Change Security Behavior? : A Literature Review | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202305022813 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Empirical Cyber Security and Software Engineering | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.contributor.oppiaine | Empirical Cyber Security and Software Engineering | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-0-9981331-6-4 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 6300-6309 | |
dc.relation.issn | 1530-1605 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © Authors, 2023 | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | Hawaii International Conference on System Sciences | |
dc.subject.yso | käyttäytyminen | |
dc.subject.yso | interventio | |
dc.subject.yso | tietoturva | |
dc.subject.yso | koulutus | |
dc.subject.yso | turvallisuusjohtaminen | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3625 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p41 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p84 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p553 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.type.okm | A4 | |