Search: onr:"swepub:oai:DiVA.org:his-22261" > A taxonomy of SETA ...
Fältnamn | Indikatorer | Metadata |
---|---|---|
000 | 04106naa a2200481 4500 | |
001 | oai:DiVA.org:his-22261 | |
003 | SwePub | |
008 | 230214s2023 | |||||||||||000 ||eng| | |
009 | oai:DiVA.org:hj-62752 | |
024 | 7 | a https://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-222612 URI |
024 | 7 | a https://doi.org/10.1145/3631341.36313482 DOI |
024 | 7 | a https://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-627522 URI |
040 | a (SwePub)hisd (SwePub)hj | |
041 | a engb eng | |
042 | 9 SwePub | |
072 | 7 | a ref2 swepub-contenttype |
072 | 7 | a art2 swepub-publicationtype |
100 | 1 | a Kävrestad, Joakim,d 1989-u Högskolan i Skövde,Institutionen för informationsteknologi,Forskningsmiljön Informationsteknologi,Informationssystem, Information Systems,University of Skövde, Skövde, Sweden4 aut0 (Swepub:hj)kavjoa |
245 | 1 0 | a A taxonomy of SETA methods and linkage to delivery preferences |
264 | 1 | b Association for Computing Machinery (ACM),c 2023 |
338 | a electronic2 rdacarrier | |
500 | a The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2023 ACM, Inc. | |
520 | a Cybersecurity threats targeting users are common in today’s information systems. Threat actors exploit human behavior to gain unauthorized access to systems and data. The common suggestion for addressing this problem is to train users to behave better using SETA programs. The notion of training users is old, and several SETA methods are described in scientific literature. Yet, incidents stemming from insecure user behavior continue to happen and are reported as one of the most common types of incidents. Researchers argue that empirically proven SETA programs are needed and point out focus on knowledge rather than behavior, and poor user adoption, as problems with existing programs. The present study aims to research user preferences regarding SETA methods, with the motivation that a user is more likely to adopt a program perceived positively. A qualitative approach is used to identify existing SETA methods, and a quantitative approach is used to measure user preferences regarding SETA delivery. We show that users prefer SETA methods to be effortless and flexible and outline how existing methods meet that preference. The results outline how SETA methods respond to user preferences and how different SETA methods can be implemented to maximize user perception, thereby supporting user adoption. | |
650 | 7 | a SAMHÄLLSVETENSKAPx Medie- och kommunikationsvetenskapx Systemvetenskap, informationssystem och informatik med samhällsvetenskaplig inriktning0 (SwePub)508042 hsv//swe |
650 | 7 | a SOCIAL SCIENCESx Media and Communicationsx Information Systems, Social aspects0 (SwePub)508042 hsv//eng |
653 | a Cybersecurity | |
653 | a Security Training | |
653 | a Security Behavior | |
653 | a Security Awareness | |
653 | a User Training | |
653 | a INF303 Informationssäkerhet | |
653 | a INF303 Information Security | |
653 | a Information Systems | |
653 | a Informationssystem (IS) | |
700 | 1 | a Nohlberg, Marcus,d 1976-u Högskolan i Skövde,Institutionen för informationsteknologi,Forskningsmiljön Informationsteknologi,Informationssystem, Information Systems,University of Skövde, Skövde, Sweden4 aut0 (Swepub:his)noha |
700 | 1 | a Furnell, Stevenu University of Nottingham, Nottingham, United Kingdom4 aut |
710 | 2 | a Högskolan i Skövdeb Institutionen för informationsteknologi4 org |
773 | 0 | t The Data base for Advances in Information Systemsd : Association for Computing Machinery (ACM)g 54:4, s. 107-133q 54:4<107-133x 0095-0033x 1532-0936 |
856 | 4 | u https://his.diva-portal.org/smash/get/diva2:1736660/FULLTEXT01.pdfx primaryx Raw objecty fulltext:postprint |
856 | 4 | u https://hj.diva-portal.org/smash/get/diva2:1806906/FULLTEXT02.pdfx primaryx Raw objecty fulltext:postprint |
856 | 4 8 | u https://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-22261 |
856 | 4 8 | u https://doi.org/10.1145/3631341.3631348 |
856 | 4 8 | u https://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-62752 |
Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.
Copy and save the link in order to return to this view