Skip to main content
Erschienen in: Education and Information Technologies 7/2023

23.12.2022

Information Security Awareness practices: Omani Government Agencies as a case study

verfasst von: Malik Al-Shamli, Khalfan Zahran Al Hijji, Abdul Khalique Shaikh

Erschienen in: Education and Information Technologies | Ausgabe 7/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper aims at reviewing Information Security Awareness (ISA) practices in general and at Omani Government Agencies (OGA) in particular. It also explores the concerns and challenges that may affect their implementation, and the reasons why ISA practices remained problematic for more than a decade at the OGAs. To inform the aim of this research, the researchers employed a systematic process to review the publications that explored ISA practices in general and at OGAs in particular. As a sampling technique, the researchers created a research strategy to select relevant publications for the study. The grounded theory technique is adopted for data analysis since it provides an inductive and systematic interpretive approach to generate theoretical insights from the data. The review reveals that current ISA practices seem ineffective in meeting the needs of employees. Furthermore, a set of important ISA practices are either missing or undeveloped. The review also revealed the absence of a framework for the ISA process at OGAs. To the best of our knowledge, the present study is one of the first to conduct an in-depth review on ISA practices applied in general and at OGAs in particular. Therefore, this study contributed to the emerging field of information security by reviewing the current state of ISA practices. In addition, this research study contributed a comprehensive picture of sources dealing with vital issues of insider threats and human factors within OGAs that were indeed unclear and surrounded by various ambiguities in the past.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237–248.MathSciNetCrossRef Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237–248.MathSciNetCrossRef
Zurück zum Zitat Al-Awadi, M. (2009). A study of employees’ attitudes towards organisational information security policies in the UK and Oman. University of Glasgow. Al-Awadi, M. (2009). A study of employees’ attitudes towards organisational information security policies in the UK and Oman. University of Glasgow.
Zurück zum Zitat Al-Izki, F., & Weir, G.R. (2016). Management attitudes toward information security in omani public sector organisations. 2016 Cybersecurity and Cyberforensics Conference (CCC), 107–112. Al-Izki, F., & Weir, G.R. (2016). Management attitudes toward information security in omani public sector organisations. 2016 Cybersecurity and Cyberforensics Conference (CCC), 107–112.
Zurück zum Zitat Al-Kalbani, A. (2017). A compliance based framework for information security in e-government in Oman. RMIT University. Al-Kalbani, A. (2017). A compliance based framework for information security in e-government in Oman. RMIT University.
Zurück zum Zitat Al-Shanfari, I., Yassin, W., & Abdullah, R. (2020). Identify of factors affecting information security awareness and weight analysis process. International Journal of Engineering and Advanced Technology (IJEAT), 9(3), 534–542.CrossRef Al-Shanfari, I., Yassin, W., & Abdullah, R. (2020). Identify of factors affecting information security awareness and weight analysis process. International Journal of Engineering and Advanced Technology (IJEAT), 9(3), 534–542.CrossRef
Zurück zum Zitat Alotaibi, M., & Alfehaid, W. (2018). Information security awareness: A review of methods, challenges and solutions. Proceedings of the ICITST-WorldCIS-WCST-WCICSS-2018, Cambridge, UK, 10–13. Alotaibi, M., & Alfehaid, W. (2018). Information security awareness: A review of methods, challenges and solutions. Proceedings of the ICITST-WorldCIS-WCST-WCICSS-2018, Cambridge, UK, 10–13.
Zurück zum Zitat Alshaikh, M., Maynard, S.B., Ahmad, A., & Chang, S. (2018). An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations. Hawaii International Conference on System Sciences. Alshaikh, M., Maynard, S.B., Ahmad, A., & Chang, S. (2018). An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations. Hawaii International Conference on System Sciences.
Zurück zum Zitat Alsowail, R. A., & Al-Shehari, T. (2021). A multi-tiered framework for insider threat prevention. Electronics, 10(9), 1005.CrossRef Alsowail, R. A., & Al-Shehari, T. (2021). A multi-tiered framework for insider threat prevention. Electronics, 10(9), 1005.CrossRef
Zurück zum Zitat Alzubaidi, A. (2021). Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia. Heliyon, 7(1), e06016.CrossRef Alzubaidi, A. (2021). Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia. Heliyon, 7(1), e06016.CrossRef
Zurück zum Zitat Atheer (2018a). Significant increase in WhatsApp penetration … and “Information Technology” clarifies the steps of prevention and recovery. Atheer. https://cutt.ly/IlDGuTr. Accessed 16 Aug 2020 Atheer (2018a). Significant increase in WhatsApp penetration … and “Information Technology” clarifies the steps of prevention and recovery. Atheerhttps://​cutt.​ly/​IlDGuTr. Accessed 16 Aug 2020 
Zurück zum Zitat Atheer (2018b). Monitor attempts at electronic blackmail in government institutions and the “Oman National CERT” warns. Atheer. https://cutt.ly/jlDGgu0. Accessed 16 Aug 2020 Atheer (2018b). Monitor attempts at electronic blackmail in government institutions and the “Oman National CERT” warns. Atheerhttps://​cutt.​ly/​jlDGgu0. Accessed 16 Aug 2020 
Zurück zum Zitat Atheer (2018c). What do the numbers say about the reality of electronic blackmail in the Sultanate during 2018. Atheer. https://cutt.ly/AlDGmYN. Accessed 16 Aug 2020 Atheer (2018c). What do the numbers say about the reality of electronic blackmail in the Sultanate during 2018. Atheerhttps://​cutt.​ly/​AlDGmYN. Accessed 16 Aug 2020
Zurück zum Zitat Argote, L., McEvily, B., & Reagans, R. (2003). Introduction to the special issue on managing knowledge in organizations: creating, retaining, and transferring knowledge. Management Science, 49(4), v–viii.CrossRef Argote, L., McEvily, B., & Reagans, R. (2003). Introduction to the special issue on managing knowledge in organizations: creating, retaining, and transferring knowledge. Management Science, 49(4), v–viii.CrossRef
Zurück zum Zitat Aydın, ÖM., & Chouseinoglou, O. (2013). Fuzzy assessment of health information system users’ security awareness. Journal of Medical Systems, 37(6), 1–13.CrossRef Aydın, ÖM., & Chouseinoglou, O. (2013). Fuzzy assessment of health information system users’ security awareness. Journal of Medical Systems, 37(6), 1–13.CrossRef
Zurück zum Zitat Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672. Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672.
Zurück zum Zitat Chmura, J. (2017). Forming the awareness of employees in the field of information security. Journal of Positive Management, 8(1), 78–85.CrossRef Chmura, J. (2017). Forming the awareness of employees in the field of information security. Journal of Positive Management, 8(1), 78–85.CrossRef
Zurück zum Zitat Chowdhury, N., & Gkioulos, V. (2021). Cyber security training for critical infrastructure protection: a literature review. Computer Science Review, 40, 100361.CrossRef Chowdhury, N., & Gkioulos, V. (2021). Cyber security training for critical infrastructure protection: a literature review. Computer Science Review, 40, 100361.CrossRef
Zurück zum Zitat Daily, O. (2019). How do Omani government agencies and private companies address the threat of cyber-attacks? Oman Daily. omandaily.om/?p=729347. Daily, O. (2019). How do Omani government agencies and private companies address the threat of cyber-attacks? Oman Daily. omandaily.om/?p=729347.
Zurück zum Zitat Dalal, R. S., Howard, D. J., Bennett, R. J., Posey, C., Zaccaro, S. J., & Brummel, B. J. (2022). Organizational science and cybersecurity: abundant opportunities for research at the interface. Journal of Business and Psychology, 37(1), 1–29.CrossRef Dalal, R. S., Howard, D. J., Bennett, R. J., Posey, C., Zaccaro, S. J., & Brummel, B. J. (2022). Organizational science and cybersecurity: abundant opportunities for research at the interface. Journal of Business and Psychology, 37(1), 1–29.CrossRef
Zurück zum Zitat Education, M. (2017). An official statement on the penetration of the Sultanate of Oman educational portal. In. Education, M. (2017). An official statement on the penetration of the Sultanate of Oman educational portal. In.
Zurück zum Zitat Georgiadou, A., Mouzakitis, S., Bounas, K., & Askounis, D. (2022). A cyber-security culture framework for assessing organization readiness. Journal of Computer Information Systems, 62(3), 452–462.CrossRef Georgiadou, A., Mouzakitis, S., Bounas, K., & Askounis, D. (2022). A cyber-security culture framework for assessing organization readiness. Journal of Computer Information Systems, 62(3), 452–462.CrossRef
Zurück zum Zitat Ghazvini, A., & Shukur, Z. (2016). Awareness training transfer and information security content development for healthcare industry. International Journal of Advanced Computer Science and Applications, 7(5), 361–370.CrossRef Ghazvini, A., & Shukur, Z. (2016). Awareness training transfer and information security content development for healthcare industry. International Journal of Advanced Computer Science and Applications, 7(5), 361–370.CrossRef
Zurück zum Zitat Grobler, M., Gaire, R., & Nepal, S. (2021). User, usage and usability: redefining human centric cyber security. Frontiers in big Data, 4, 583723.CrossRef Grobler, M., Gaire, R., & Nepal, S. (2021). User, usage and usability: redefining human centric cyber security. Frontiers in big Data, 4, 583723.CrossRef
Zurück zum Zitat Gundu, T., & Flowerday, S. (2013). Ignorance to awareness: towards an information security awareness process. SAIEE Africa Research Journal, 104(2), 69–79.CrossRef Gundu, T., & Flowerday, S. (2013). Ignorance to awareness: towards an information security awareness process. SAIEE Africa Research Journal, 104(2), 69–79.CrossRef
Zurück zum Zitat Gundu, T., Flowerday, S., & Renaud, K. (2019). Deliver security awareness training, then repeat:{Deliver; Measure Efficacy}. 2019 conference on information communications technology and society (ICTAS). Gundu, T., Flowerday, S., & Renaud, K. (2019). Deliver security awareness training, then repeat:{Deliver; Measure Efficacy}. 2019 conference on information communications technology and society (ICTAS).
Zurück zum Zitat Hansche, S. (2001). Designing a security awareness program: part 1. Information Systems Security, 9(6), 1–9.CrossRef Hansche, S. (2001). Designing a security awareness program: part 1. Information Systems Security, 9(6), 1–9.CrossRef
Zurück zum Zitat Hassandoust, F., & Techatassanasoontorn, A. A. (2020). Understanding users’ information security awareness and intentions: a full nomology of protection motivation theory. Cyber influence and cognitive threats (pp. 129–143). Elsevier. Hassandoust, F., & Techatassanasoontorn, A. A. (2020). Understanding users’ information security awareness and intentions: a full nomology of protection motivation theory. Cyber influence and cognitive threats (pp. 129–143). Elsevier.
Zurück zum Zitat Hassanzadeh, M., Jahangiri, N., & Brewster, B. (2014). A conceptual framework for information security awareness, assessment, and training. Emerging Trends in ICT Security (pp. 99–110). Elsevier. Hassanzadeh, M., Jahangiri, N., & Brewster, B. (2014). A conceptual framework for information security awareness, assessment, and training. Emerging Trends in ICT Security (pp. 99–110). Elsevier.
Zurück zum Zitat Jacobs, J. L., Haney, J. M., & Furman, S. M. (2022, July). Measuring the Effectiveness of US Government Security Awareness Programs: A Mixed-Methods Study. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022) 8th Workshop on Security Information Workers (WSIW 2022). This workshop aims to develop and stimulate discussion about security information workers., Boston, MA, US. Jacobs, J. L., Haney, J. M., & Furman, S. M. (2022, July). Measuring the Effectiveness of US Government Security Awareness Programs: A Mixed-Methods Study. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022) 8th Workshop on Security Information Workers (WSIW 2022). This workshop aims to develop and stimulate discussion about security information workers., Boston, MA, US.
Zurück zum Zitat Kalhoro, S., Rehman, M., Ponnusamy, V., & Shaikh, F. B. (2021). Extracting key factors of cyber hygiene behaviour among software engineers: a systematic literature review. Ieee Access: Practical Innovations, Open Solutions, 9, 99339–99363.CrossRef Kalhoro, S., Rehman, M., Ponnusamy, V., & Shaikh, F. B. (2021). Extracting key factors of cyber hygiene behaviour among software engineers: a systematic literature review. Ieee Access: Practical Innovations, Open Solutions, 9, 99339–99363.CrossRef
Zurück zum Zitat Khan, B., Alghathbar, K. S., Nabi, S. I., & Khan, M. K. (2011). Effectiveness of information security awareness methods based on psychological theories. African Journal of Business Management, 5(26), 10862–10868. Khan, B., Alghathbar, K. S., Nabi, S. I., & Khan, M. K. (2011). Effectiveness of information security awareness methods based on psychological theories. African Journal of Business Management, 5(26), 10862–10868.
Zurück zum Zitat Khandkar, S. H. (2009). Open coding. University of Calgary, 23, 2009. Khandkar, S. H. (2009). Open coding. University of Calgary, 23, 2009.
Zurück zum Zitat Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021). Enhancing employees information security awareness in private and public organisations: a systematic literature review. Computers & Security, 106, 102267.CrossRef Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021). Enhancing employees information security awareness in private and public organisations: a systematic literature review. Computers & Security, 106, 102267.CrossRef
Zurück zum Zitat Korpela, K. (2015). Improving cyber security awareness and training programs with data analytics. Information Security Journal: A Global Perspective, 24(1–3), 72–77. Korpela, K. (2015). Improving cyber security awareness and training programs with data analytics. Information Security Journal: A Global Perspective, 24(1–3), 72–77.
Zurück zum Zitat Kritzinger, E., & Smith, E. (2008). Information security management: an information security retrieval and awareness model for industry. Computers & Security, 27(5–6), 224–231.CrossRef Kritzinger, E., & Smith, E. (2008). Information security management: an information security retrieval and awareness model for industry. Computers & Security, 27(5–6), 224–231.CrossRef
Zurück zum Zitat Kruger, H.A., & Kearney, W.D. (2005). Measuring Information Security Awareness - A West Africa Gold Mining Environment Case. ISSA. Kruger, H.A., & Kearney, W.D. (2005). Measuring Information Security Awareness - A West Africa Gold Mining Environment Case. ISSA.
Zurück zum Zitat Labuschagne, W. A., & Veerasamy, N. (2017). Metrics for smart security awareness. European Conference on Cyber Warfare and Security. Labuschagne, W. A., & Veerasamy, N. (2017). Metrics for smart security awareness. European Conference on Cyber Warfare and Security.
Zurück zum Zitat Lawrence, J., & Tar, U. (2013). The use of grounded theory technique as a practical tool for qualitative data collection and analysis. Electronic Journal of Business Research Methods, 11(1), 29–40. Lawrence, J., & Tar, U. (2013). The use of grounded theory technique as a practical tool for qualitative data collection and analysis. Electronic Journal of Business Research Methods, 11(1), 29–40.
Zurück zum Zitat Lebek, B., Uffen, J., Neumann, M., & Hohler, B. (2013). Towards a needs assessment process model for security, education, training and awareness programs: an Action Design Research Study. ECIS. Available at https://cutt.ly/d0RUD7N Lebek, B., Uffen, J., Neumann, M., & Hohler, B. (2013). Towards a needs assessment process model for security, education, training and awareness programs: an Action Design Research Study. ECIS. Available at https://​cutt.​ly/​d0RUD7N
Zurück zum Zitat Liu, L., Han, M., Wang, Y., & Zhou, Y. (2018). Understanding data breach: A visualization aspect. International Conference on Wireless Algorithms, Systems, and Applications. Liu, L., Han, M., Wang, Y., & Zhou, Y. (2018). Understanding data breach: A visualization aspect. International Conference on Wireless Algorithms, Systems, and Applications.
Zurück zum Zitat Maeyer, D. D. (2007). Setting up an effective information security awareness programme. ISSE/SECURE 2007 Securing Electronic business processes (pp. 49–58). Springer. Maeyer, D. D. (2007). Setting up an effective information security awareness programme. ISSE/SECURE 2007 Securing Electronic business processes (pp. 49–58). Springer.
Zurück zum Zitat Manifavas, C., Fysarakis, K., Rantos, K., & Hatzivasilis, G. (2014). DSAPE–dynamic security awareness program evaluation. International Conference on Human Aspects of Information Security, Privacy, and Trust. Manifavas, C., Fysarakis, K., Rantos, K., & Hatzivasilis, G. (2014). DSAPE–dynamic security awareness program evaluation. International Conference on Human Aspects of Information Security, Privacy, and Trust.
Zurück zum Zitat Mejias, R. J., & Balthazard, P. A. (2014). A model of information security awareness for assessing information security risk for emerging technologies. Journal of Information Privacy and Security, 10(4), 160–185.CrossRef Mejias, R. J., & Balthazard, P. A. (2014). A model of information security awareness for assessing information security risk for emerging technologies. Journal of Information Privacy and Security, 10(4), 160–185.CrossRef
Zurück zum Zitat McCormac, A., Calic, D., Parsons, K., Zwaans, T., Butavicius, M., & Pattinson, M. (2016). Test-retest reliability and internal consistency of the human aspects of Information Security Questionnaire (HAIS-Q). McCormac, A., Calic, D., Parsons, K., Zwaans, T., Butavicius, M., & Pattinson, M. (2016). Test-retest reliability and internal consistency of the human aspects of Information Security Questionnaire (HAIS-Q).
Zurück zum Zitat Nobles, C. (2018). Botching human factors in cybersecurity in business organizations. HOLISTICA–Journal of Business and Public Administration, 9(3), 71–88.CrossRef Nobles, C. (2018). Botching human factors in cybersecurity in business organizations. HOLISTICA–Journal of Business and Public Administration, 9(3), 71–88.CrossRef
Zurück zum Zitat Ntwali, B. (2021). Investigating the relationship between learning styles and delivery methods in Information Security Awareness Programs (Master’s thesis, Faculty of Commerce). Ntwali, B. (2021). Investigating the relationship between learning styles and delivery methods in Information Security Awareness Programs (Master’s thesis, Faculty of Commerce).
Zurück zum Zitat Omar, N. S., Foozy, C. F. M., Hamid, I. R. A., Hafit, H., Arbain, A. F., & Shamala, P. (2021, May). Malware awareness tool for internet safety using gamification techniques. In Journal of Physics: Conference Series (Vol.1874, No. 1, p.012023). IOP Publishing. Omar, N. S., Foozy, C. F. M., Hamid, I. R. A., Hafit, H., Arbain, A. F., & Shamala, P. (2021, May). Malware awareness tool for internet safety using gamification techniques. In Journal of Physics: Conference Series (Vol.1874, No. 1, p.012023). IOP Publishing.
Zurück zum Zitat Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Computers & Security, 66, 40–51.CrossRef Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Computers & Security, 66, 40–51.CrossRef
Zurück zum Zitat Rantos, K., Fysarakis, K., & Manifavas, C. (2012). How effective is your security awareness program? An evaluation methodology. Information Security Journal: A Global Perspective, 21(6), 328–345. Rantos, K., Fysarakis, K., & Manifavas, C. (2012). How effective is your security awareness program? An evaluation methodology. Information Security Journal: A Global Perspective, 21(6), 328–345.
Zurück zum Zitat Razaque, A., Al Ajlan, A., Melaoune, N., Alotaibi, M., Alotaibi, B., Dias, I., & Zhao, C. (2021). Avoidance of cybersecurity threats with the deployment of a web-based blockchain-enabled cybersecurity awareness system. Applied Sciences, 11(17), 7880.CrossRef Razaque, A., Al Ajlan, A., Melaoune, N., Alotaibi, M., Alotaibi, B., Dias, I., & Zhao, C. (2021). Avoidance of cybersecurity threats with the deployment of a web-based blockchain-enabled cybersecurity awareness system. Applied Sciences, 11(17), 7880.CrossRef
Zurück zum Zitat Sahi, S. K. (2017). A study of wannacry ransomware attack. International Journal of Engineering Research in Computer Science and Engineering (IJERCSE), 4(9), 5–7. Sahi, S. K. (2017). A study of wannacry ransomware attack. International Journal of Engineering Research in Computer Science and Engineering (IJERCSE), 4(9), 5–7.
Zurück zum Zitat Sari, P. K., & Trianasari, N. (2014). Information security awareness measurement with confirmatory factor analysis. 2014 International Symposium on Technology Management and Emerging Technologies. Sari, P. K., & Trianasari, N. (2014). Information security awareness measurement with confirmatory factor analysis. 2014 International Symposium on Technology Management and Emerging Technologies.
Zurück zum Zitat Tolah, A., Furnell, S. M., & Papadaki, M. (2021). An empirical analysis of the information security culture key factors framework. Computers & Security, 108, 102354.CrossRef Tolah, A., Furnell, S. M., & Papadaki, M. (2021). An empirical analysis of the information security culture key factors framework. Computers & Security, 108, 102354.CrossRef
Zurück zum Zitat Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E. (2010). Aligning security awareness with information systems security management. Journal of Information System Security, 6(1), 36–54. Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E. (2010). Aligning security awareness with information systems security management. Journal of Information System Security, 6(1), 36–54.
Zurück zum Zitat Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E. (2015). Managing the introduction of information security awareness programmes in organisations. European Journal of Information Systems, 24(1), 38–58.CrossRef Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E. (2015). Managing the introduction of information security awareness programmes in organisations. European Journal of Information Systems, 24(1), 38–58.CrossRef
Zurück zum Zitat Uchendu, B., Nurse, J. R., Bada, M., & Furnell, S. (2021). Developing a cyber security culture: current practices and future needs. Computers & Security, 109, 102387.CrossRef Uchendu, B., Nurse, J. R., Bada, M., & Furnell, S. (2021). Developing a cyber security culture: current practices and future needs. Computers & Security, 109, 102387.CrossRef
Zurück zum Zitat Wiley, A., McCormac, A., & Calic, D. (2020). More than the individual: examining the relationship between culture and information security awareness. Computers & Security, 88, 101640.CrossRef Wiley, A., McCormac, A., & Calic, D. (2020). More than the individual: examining the relationship between culture and information security awareness. Computers & Security, 88, 101640.CrossRef
Zurück zum Zitat Wilson, M., & Hash, J. (2003). Building an information technology security awareness and training program. NIST Special Publication, 800(50), 1–39. Wilson, M., & Hash, J. (2003). Building an information technology security awareness and training program. NIST Special Publication, 800(50), 1–39.
Zurück zum Zitat Zani, A.A., Norman, A.A., & Ghani, N.B. (2018). A Review of Security Awareness Approach: Ensuring Communal Learning. PACIS. Zani, A.A., Norman, A.A., & Ghani, N.B. (2018). A Review of Security Awareness Approach: Ensuring Communal Learning. PACIS.
Metadaten
Titel
Information Security Awareness practices: Omani Government Agencies as a case study
verfasst von
Malik Al-Shamli
Khalfan Zahran Al Hijji
Abdul Khalique Shaikh
Publikationsdatum
23.12.2022
Verlag
Springer US
Erschienen in
Education and Information Technologies / Ausgabe 7/2023
Print ISSN: 1360-2357
Elektronische ISSN: 1573-7608
DOI
https://doi.org/10.1007/s10639-022-11513-7

Weitere Artikel der Ausgabe 7/2023

Education and Information Technologies 7/2023 Zur Ausgabe

Premium Partner