Title | ||
---|---|---|
Enhancing information security education and awareness: Proposed characteristics for a model |
Abstract | ||
---|---|---|
The use of models has been one of the prevalent approaches to enhancing information security education and awareness in existing literature. Models provide step by step problem solving opportunities and are thus essential in security education and awareness activities. This paper categorized models for enhancing security education and awareness based on their stakeholder domains into: End-Users, Institutions and Industry domains. Analysis of literature on information security education and awareness indicates that approaches for enhancing end-users' security knowledge do exist, as do models for promoting organizational security knowledge in the industry domain. However, only one model was found to exist for enhancing security knowledge of employees in the institutions domain. This paper therefore describes a gap identified in the existing information security education and awareness models and presents the required relevant characteristics for developing information security education and awareness models for bridging the gap (in the institutions domain). The paper also evaluates and compares characteristics of existing models in order to identify the most relevant characteristics for a new model and makes a presentation to that effect. This was done through a review of existing literature on information security education and awareness models and a comparative analysis of models identified in the three domains. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/InfoSec.2015.7435509 | 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec) |
Keywords | Field | DocType |
Information Security,Information Security Education,Information Security Awareness,Information Security Awareness and Education Model,Information Security Awareness and Education Model Characteristics | Security convergence,Certified Information Security Manager,Knowledge management,Information security,Security service,Information security management,Security information and event management,Information security audit,Computer security model,Business | Conference |
Citations | PageRank | References |
0 | 0.34 | 13 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Eric Amankwa | 1 | 6 | 1.13 |
Marianne Loock | 2 | 23 | 8.26 |
Elmarie Kritzinger | 3 | 9 | 7.31 |