A Constructive Approach to Information Systems Security Training: An Action Research Experience

Information systems (IS) security breaches cause significant losses to organizations worldwide. Many approaches have been introduced in order to improve employees’ security behavior. Earlier research shows that only seven out of 59 approaches are based on sound theoretical background, and the resear...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autor principal: Heikka, Juhani (Autor)
Tipo de documento: Electrónico Libro
Lenguaje:Inglés
Publicado: 2008
En:Año: 2008
Acceso en línea: Volltext (kostenfrei)
Verificar disponibilidad: HBZ Gateway

MARC

LEADER 00000cam a22000002c 4500
001 1866148583
003 DE-627
005 20250124054859.0
007 cr uuu---uuuuu
008 231018s2008 xx |||||o 00| ||eng c
035 |a (DE-627)1866148583 
035 |a (DE-599)KXP1866148583 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Heikka, Juhani  |e VerfasserIn  |4 aut 
245 1 2 |a A Constructive Approach to Information Systems Security Training: An Action Research Experience 
264 1 |c 2008 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Information systems (IS) security breaches cause significant losses to organizations worldwide. Many approaches have been introduced in order to improve employees’ security behavior. Earlier research shows that only seven out of 59 approaches are based on sound theoretical background, and the research in the area of IS security awareness and security behavior has neglected the use of relevant theories of psychology, pedagogy and management. The lack of utilizing theories may have a negative impact on the effectiveness of IS security training and on understanding how to change and improve employees’ security behavior towards compliance to organizational information security policies. In this paper we describe a theoretically grounded approach to IS security training based on constructivism. The approach is empirically validated in a telecommunications company. The results show that the approach has a positive impact on employees’ security behavior 
856 4 0 |u https://core.ac.uk/download/301342058.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4391829347 
LOK |0 003 DE-627 
LOK |0 004 1866148583 
LOK |0 005 20231018043713 
LOK |0 008 231018||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE17795207 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw