SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:his-22261"
 

Search: onr:"swepub:oai:DiVA.org:his-22261" > A taxonomy of SETA ...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist
LIBRIS Formathandbok  (Information om MARC21)
FältnamnIndikatorerMetadata
00004106naa a2200481 4500
001oai:DiVA.org:his-22261
003SwePub
008230214s2023 | |||||||||||000 ||eng|
009oai:DiVA.org:hj-62752
024a https://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-222612 URI
024a https://doi.org/10.1145/3631341.36313482 DOI
024a https://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-627522 URI
040 a (SwePub)hisd (SwePub)hj
041 a engb eng
042 9 SwePub
072 7a ref2 swepub-contenttype
072 7a art2 swepub-publicationtype
100a Kävrestad, Joakim,d 1989-u Högskolan i Skövde,Institutionen för informationsteknologi,Forskningsmiljön Informationsteknologi,Informationssystem, Information Systems,University of Skövde, Skövde, Sweden4 aut0 (Swepub:hj)kavjoa
2451 0a A taxonomy of SETA methods and linkage to delivery preferences
264 1b Association for Computing Machinery (ACM),c 2023
338 a electronic2 rdacarrier
500 a The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2023 ACM, Inc.
520 a Cybersecurity threats targeting users are common in today’s information systems. Threat actors exploit human behavior to gain unauthorized access to systems and data. The common suggestion for addressing this problem is to train users to behave better using SETA programs. The notion of training users is old, and several SETA methods are described in scientific literature. Yet, incidents stemming from insecure user behavior continue to happen and are reported as one of the most common types of incidents. Researchers argue that empirically proven SETA programs are needed and point out focus on knowledge rather than behavior, and poor user adoption, as problems with existing programs. The present study aims to research user preferences regarding SETA methods, with the motivation that a user is more likely to adopt a program perceived positively. A qualitative approach is used to identify existing SETA methods, and a quantitative approach is used to measure user preferences regarding SETA delivery. We show that users prefer SETA methods to be effortless and flexible and outline how existing methods meet that preference. The results outline how SETA methods respond to user preferences and how different SETA methods can be implemented to maximize user perception, thereby supporting user adoption.
650 7a SAMHÄLLSVETENSKAPx Medie- och kommunikationsvetenskapx Systemvetenskap, informationssystem och informatik med samhällsvetenskaplig inriktning0 (SwePub)508042 hsv//swe
650 7a SOCIAL SCIENCESx Media and Communicationsx Information Systems, Social aspects0 (SwePub)508042 hsv//eng
653 a Cybersecurity
653 a Security Training
653 a Security Behavior
653 a Security Awareness
653 a User Training
653 a INF303 Informationssäkerhet
653 a INF303 Information Security
653 a Information Systems
653 a Informationssystem (IS)
700a Nohlberg, Marcus,d 1976-u Högskolan i Skövde,Institutionen för informationsteknologi,Forskningsmiljön Informationsteknologi,Informationssystem, Information Systems,University of Skövde, Skövde, Sweden4 aut0 (Swepub:his)noha
700a Furnell, Stevenu University of Nottingham, Nottingham, United Kingdom4 aut
710a Högskolan i Skövdeb Institutionen för informationsteknologi4 org
773t The Data base for Advances in Information Systemsd : Association for Computing Machinery (ACM)g 54:4, s. 107-133q 54:4<107-133x 0095-0033x 1532-0936
856u https://his.diva-portal.org/smash/get/diva2:1736660/FULLTEXT01.pdfx primaryx Raw objecty fulltext:postprint
856u https://hj.diva-portal.org/smash/get/diva2:1806906/FULLTEXT02.pdfx primaryx Raw objecty fulltext:postprint
8564 8u https://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-22261
8564 8u https://doi.org/10.1145/3631341.3631348
8564 8u https://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-62752

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view