Information Security Awareness: Comparing Perceptions and Training Preferences

被引:0
|
作者
Farooq, Ali [1 ]
Kakakhel, Syed Rameez Ullah [1 ]
机构
[1] Univ Turku, Dept Informat Technol, Turku, Finland
关键词
Information Security; Information Security Assessment; Trainings; Perceptions; Information Sharing; Social Networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Use of the Internet has become our second nature. With each passing day computers and mobile devices are becoming ubiquitous in our society. In this backdrop the confidentiality of information is now a question of paramount importance. It is understood fact now that merely technical security solutions cannot guarantee security. End users are required to have solid understanding of the security issues. This study is carried out to compare and understand the perceived Information Technology (IT) and Information Security knowledge level of Information and Communication Technologies (ICT) users of two countries, Pakistan and Finland. The respondents are university students belonging to different age groups and with different educational background. Perception of respondents regarding Information Security Awareness (ISA) has been compared and no significant difference has been found. There is visible difference among information sharing habits in both groups of respondents. In both cases, respondents turn to similar sources for information security knowledge, however, there is difference in order of preference. Preferences toward Information Security related trainings are also same but with difference in order.
引用
收藏
页码:53 / 57
页数:5
相关论文
共 50 条
  • [1] Gamification of Information Security Awareness and Training
    Gjertsen, Eyvind Garder B.
    Gjaere, Erlend Andreas
    Bartnes, Maria
    Flores, Waldo Rocha
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 59 - 70
  • [2] Effectiveness of and user preferences for security awareness training methodologies
    Tschakert, Kai Florian
    Ngamsuriyaroj, Sudsanguan
    [J]. HELIYON, 2019, 5 (06)
  • [3] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
  • [4] TRAINING IN SHAPING EMPLOYEE INFORMATION SECURITY AWARENESS
    Stefaniuk, Tomasz
    [J]. ENTREPRENEURSHIP AND SUSTAINABILITY ISSUES, 2020, 7 (03): : 1832 - 1846
  • [5] The impact of information richness on information security awareness training effectiveness
    Shaw, R. S.
    Chen, Charlie C.
    Harris, Albert L.
    Huang, Hui-Jou
    [J]. COMPUTERS & EDUCATION, 2009, 52 (01) : 92 - 100
  • [6] Improving Organisational Information Security Management: The Impact of Training and Awareness
    Waly, Nesren
    Tassabehji, Rana
    Kamala, Mumtaz
    [J]. 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1270 - 1275
  • [7] Awareness Training Transfer and Information Security Content Development for Healthcare Industry
    Ghazvini, Arash
    Shukur, Zarina
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (05) : 361 - 370
  • [8] ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment
    Cohen, Ofir
    Bitton, Ron
    Shabtai, Asaf
    Puzis, Rami
    [J]. COMPUTER SECURITY - ESORICS 2023, PT III, 2024, 14346 : 431 - 451
  • [9] Review of Information Security Guidelines for Awareness Training Program in Healthcare Industry
    Ghazvini, Arash
    Shukur, Zarina
    [J]. PROCEEDINGS OF THE 2017 6TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI'17), 2017,
  • [10] Health care management and information systems security: awareness, training or education?
    Katsikas, SK
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2000, 60 (02) : 129 - 135