Abstract
Information security awareness (ISA) is a vital component of information security in organizations. The purpose of this research is to descriptively review and classify the current body of knowledge on ISA. A sample of 59 peer-reviewed academic journal articles, which were published over the last decade from 2008 to 2018, were analyzed. Articles were classified using coding techniques from the grounded theory literature-review method. The results show that ISA research is evolving with behavioral research studies still being explored. Quantitative empirical research is the dominant methodology and the top three theories used are general deterrence theory, theory of planned behavior, and protection motivation theory. Future research could focus on qualitative approaches to provide greater depth of ISA understanding.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Grant, K., Edgar, D., Sukumar, A., Meyer, M.: Risky business: perceptions of e-business risk by UK small and medium sized enterprises (SMEs). Int. J. Inf. Manag. 34(2), 99–122 (2014). https://doi.org/10.1016/j.ijinfomgt.2013.11.001
Arachchilage, N.A.G., Love, S.: Security awareness of computer users: a phishing threat avoidance perspective. Comput. Hum. Behav. 38, 304–312 (2014). https://doi.org/10.1016/j.chb.2014.05.046
Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., Zwaans, T.: The Human Aspects of Information Security Questionnaire (HAIS-Q): two further validation studies. Comput. Secur. 66, 40–51 (2017). https://doi.org/10.1016/j.cose.2017.01.004
Metalidou, E., Marinagi, C., Trivellas, P., Eberhagen, N., Giannakopoulos, G., Skourlas, C.: Human factor and information security in higher education. J. Syst. Inf. Technol. 16(3), 210–221 (2014). https://doi.org/10.1108/JSIT-01-2014-0007
Kruger, H.A., Drevin, L., Steyn, T.: A vocabulary test to assess information security awareness. Inf. Manag. Comput. Secur. 18(5), 316–327 (2010). https://doi.org/10.1108/09685221011095236
Bauer, S., Bernroider, E.W.N.: From information security awareness to reasoned compliant action. ACM SIGMIS Database: DATABASE Adv. Inf. Syst. 48(3), 44–68 (2017). https://doi.org/10.1145/3130515.3130519
Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M., Baskerville, R.: Future directions for behavioral information security research. Comput. Secur. 32, 90–101 (2013). https://doi.org/10.1016/j.cose.2012.09.010
Bauer, S., Bernroider, E.W.N., Chudzikowski, K.: Prevention is better than cure! Designing information security awareness programs to overcome users’ non-compliance with information security policies in banks. Comput. Secur. 68, 145–159 (2017). https://doi.org/10.1016/j.cose.2017.04.009
Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523–548 (2010)
Siponen, M.T.: A conceptual foundation for organizational information security awareness. Inf. Manag. Comput. Secur. 8(1), 31–41 (2000). https://doi.org/10.1108/09685220010371394
Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L., Shabtai, A.: Taxonomy of mobile users’ security awareness. Comput. Secur. 73, 266–293 (2018). https://doi.org/10.1016/j.cose.2017.10.015
Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., Jerram, C.: Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Comput. Secur. 42, 165–176 (2014). https://doi.org/10.1016/j.cose.2013.12.003
Okoli, C., Schabram, K.: A guide to conducting a systematic literature review of information systems research. In: Working Papers on Information Systems, vol. 10, no. 26, pp. 1–51 (2010). https://doi.org/10.2139/ssrn.1954824
Prasetio, A., Sari, P.K., Ramadhani, D.P.: Electronic Word-of-Mouth (EWOM) Adoption Model for Information Security Awareness: A Case Study in University Students, pp. 154–159 (2015) (2016)
Kruger, H.A., Kearney, W.D.: A prototype for assessing information security awareness. Comput. Secur. 25(4), 289–296 (2006). https://doi.org/10.1016/j.cose.2006.02.008
Haeussinger, F., Kranz, J.: Understanding the antecedents of information security awareness - an empirical study. In: Proceedings of the Nineteenth Americas Conference on Information Systems, (Section 6), pp. 1–9 (2013)
Tsohou, A., Kokolakis, S., Karyda, M., Kiountouzis, E.: Investigating information security awareness: research and practice gaps. Inf. Secur. J. 17(5–6), 207–227 (2008). https://doi.org/10.1080/19393550802492487
Straub, D.W., Welke, R.J.: Coping with systems risk: security planning models for management decision making. MIS Q. 22(4), 441–469 (1998). https://doi.org/10.2307/249551
Rhee, H., Ryu, Y., Kim, C.-T.: I am fine but you are not: optimistic bias and illusion of control on information security. In: ICIS, pp. 381–394, April 2005
Tsohou, A., Karyda, M., Kokolakis, S., Kiountouzis, E.: Managing the introduction of information security awareness programmes in organisations. Eur. J. Inf. Syst. 24, 38–58 (2013)
Jaeger, L.: Information security awareness: literature review and integrative framework. In: 51st Hawaii International Conference on System Sciences, vol. 9, no. 3, pp. 4703–4712 (2018)
Anderson, B.B., Kirwan, C.B., Eargle, D.: Using measures of risk perception to predict information security behavior: insights from using measures of risk perception to predict information security behavior: insights from electroencephalography (EEG). J. Assoc. Inf. Syst. 15(April 2013), 679–722 (2014)
Scholl, M.C., Wildau, T., Fuhrmann, F., Scholl, L.R.: Scientific knowledge of the human side of information security as a basis for sustainable trainings in organizational practices. In: Hawaii International Conference on System Sciences, vol. 9, p. 10 (2018)
Tsohou, A., Karyda, M., Kokolakis, S., Kiountouzis, E.: Analyzing trajectories of information security awareness. Inf. Technol. People 25(3), 327–352 (2012). https://doi.org/10.1108/09593841211254358
Khan, B., Alghathbar, K., Nabi, S., Khan, K.: Effectiveness of information security awareness methods based on psychological theories. Afr. J. Bus. Manag. 5, 26 (2011)
Puhakainen, P., Siponen, M.: Improving employees’ compliance through information systems security training: an action research study. MIS Q. 34 (2010). https://doi.org/10.2307/25750704
Posey, C., Roberts, T.L., Lowry, P.B.: The impact of organizational commitment on insiders motivation to protect organizational information assets. J. Manag. Inf. Syst. 32(4), 179–214 (2015). https://doi.org/10.1080/07421222.2015.1138374
Merete Hagen, J., Albrechtsen, E., Hovden, J.: Implementation and effectiveness of organizational information security measures. Inf. Manag. Comput. Secur. 16(4), 377–397 (2008). https://doi.org/10.1108/09685220810908796
D’Arcy, J., Hovav, A., Galletta, D.: User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inf. Syst. Res. 20(1), 79–98 (2009). https://doi.org/10.1287/isre.1070.0160
Herath, T., Rao, H.R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inf. Syst. 18(2), 106–125 (2009). https://doi.org/10.1057/ejis.2009.6
Chen, C.C., Medlin, B.D., Shaw, R.S.: A cross-cultural investigation of situational information security awareness programs. Inf. Manag. Comput. Secur. 16(4), 360–376 (2008). https://doi.org/10.1108/09685220810908787
Karjalainen, M., Siponen, M.: Toward a new meta-theory for designing information systems (IS) security training approaches. J. Assoc. Inf. Syst. 12(8), 518–555 (2011)
Johnston, A.C., Warkentin, M., Siponen, M.: An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric. MIS Q. 39(1), 113–134 (2015). https://doi.org/10.25300/MISQ/2015/39.1.06
Johnston, A.C., Warkentin, M., McBride, M., Carter, L.: Dispositional and situational factors: influences on information security policy violations. Eur. J. Inf. Syst. 25(3), 231–251 (2016). https://doi.org/10.1057/ejis.2015.15
Lebek, B., Uffen, J., Breitner, M.H., Neumann, M., Hohler, B.: Employees’ information security awareness and behavior: a literature review. In: Proceedings of the Annual Hawaii International Conference on System Sciences, pp. 2978–2987 (2013). https://doi.org/10.1109/HICSS.2013.192
Lebek, B., Uffen, J., Neumann, M., Hohler, B., Breitner, M.: Information security awareness and behavior: a theory-based literature review. Manag. Res. Rev. 37(12), 1049–1092 (2014). https://doi.org/10.1108/MRR-04-2013-0085
D’Arcy, J., Herath, T.: A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. Eur. J. Inf. Syst. 20(6), 643–658 (2011). https://doi.org/10.1057/ejis.2011.23
Sommestad, T., Hallberg, J., Lundholm, K., Bengtsson, J.: Variables influencing information security policy compliance: a systematic review of quantitative studies. Inf. Manag. Comput. Secur. 22(1), 42–75 (2014). https://doi.org/10.1108/IMCS-08-2012-0045
Dang-Pham, D., Pittayachawan, S., Bruno, V.: Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace. Comput. Hum. Behav. 67, 196–206 (2017). https://doi.org/10.1016/j.chb.2016.10.025
Sparks, P., Ajzen, I., Hall-box, T.: Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior, pp. 665–683 (2002)
Safa, N., von Solms, R.: An information security knowledge sharing model in organizations. Comput. Hum. Behav. 57, 442–451 (2016). https://doi.org/10.1016/j.chb.2015.12.037
Safa, N., Sookhak, M., von Solms, R., Furnell, S., Ghani, N.A., Herawan, T.: Information security conscious care behaviour formation in organizations. Comput. Secur. 53, 65–78 (2015). https://doi.org/10.1016/j.cose.2015.05.012
Myers, M.D.: Qualitative Research in Business and Management. SAGE Publications Ltd., London (2013)
King, W.R., He, J.: Understanding the role and methods of meta-analysis in is research. Commun. Assoc. Inf. Syst. 16(October), 654 (2005)
Wolfswinkel, J.F., Furtmueller, E., Wilderom, C.P.M.: Using grounded theory as a method for rigorously reviewing literature. Eur. J. Inf. Syst. 22(1), 45–55 (2011). https://doi.org/10.1057/ejis.2011.51
Saunders, M.N.K., Lewis, P., Thornhill, A.: Research Methods for Business Students. Pearson Education Limited, London (2015)
Tsohou, A., Karyda, M., Kokolakis, S.: Analyzing the role of cognitive and cultural biases in the internalization of information security policies: recommendations for information security awareness programs. Comput. Secur. 52, 128–141 (2015). https://doi.org/10.1016/j.cose.2015.04.006
Da Veiga, A., Eloff, J.H.P.: A framework and assessment instrument for information security culture. Comput. Secur. 29(2), 196–207 (2010). https://doi.org/10.1016/j.cose.2009.09.002
Liang, H., Xue, Y.: Avoidance of information technology threats: a theoretical perspective. MIS Q. 33(1), 71–90 (2009). https://doi.org/10.2307/20650279
Öʇütçü, G., Testik, Ö.M., Chouseinoglou, O.: Analysis of personal information security behavior and awareness. Comput. Secur. 56, 83–93 (2016). https://doi.org/10.1016/j.cose.2015.10.002
Snyman, D., Kruger, H.A.: The application of behavioural thresholds to analyse collective behaviour in information security. Inf. Comput. Secur. 25(2), 152–164 (2017). https://doi.org/10.1108/ICS-03-2017-0015
Connolly, L., Lang, M., Gathegi, J., Tygar, D.J.: Organisational culture, procedural countermeasures, and employee security behaviour: a qualitative study. Inf. Comput. Secur. 25(2), 118–136 (2017). https://doi.org/10.1108/ICS-03-2017-0013
D’Arcy, J., Greene, G.: Security culture and the employment relationship as drivers of employees’ security compliance. Inf. Manag. Comput. Secur. 22(5), 474–489 (2014). https://doi.org/10.1108/IMCS-08-2013-0057
Da Veiga, A., Martins, N.: Defining and identifying dominant information security cultures and subcultures. Comput. Secur. 70, 72–94 (2017). https://doi.org/10.1016/j.cose.2017.05.002
Da Veiga, A., Martins, N.: Improving the information security culture through monitoring and implementation actions illustrated through a case study. Comput. Secur. 49, 162–176 (2015). https://doi.org/10.1016/j.cose.2014.12.006
Merete Hagen, J., Albrechtsen, E.: Effects on employees’ information security abilities by e-learning. Inf. Manag. Comput. Secur. 17(5), 388–407 (2009). https://doi.org/10.1108/09685220911006687
Chen, C.C., Ramamurthy, K., Wen, K.-W.: Organizations’ information security policy compliance: stick or carrot approach? J. Manag. Inf. Syst. 29(3), 157–188 (2012). https://doi.org/10.2753/MIS0742-1222290305
Tsohou, A., Karyda, M., Kokolakis, S., Kiountouzis, E.: Managing the introduction of information security awareness programmes in organisations. Eur. J. Inf. Syst. 24(1), 38–58 (2015). https://doi.org/10.1057/ejis.2013.27
Thomson, K., van Niekerk, J.: Combating information security apathy by encouraging prosocial organisational behaviour. Inf. Manag. Comput. Secur. 20(1), 39–46 (2012). https://doi.org/10.1108/09685221211219191
Menard, P., Bott, G.J., Crossler, R.E.: User motivations in protecting information security: protection motivation theory versus self-determination theory. J. Manag. Inf. Syst. 34(4), 1203–1230 (2017). https://doi.org/10.1080/07421222.2017.1394083
Acknowledgements
This work is based on the research supported wholly/in part by the National Research Foundation of South Africa (Grant Numbers 114838).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Hutchinson, G., Ophoff, J. (2020). A Descriptive Review and Classification of Organizational Information Security Awareness Research. In: Venter, H., Loock, M., Coetzee, M., Eloff, M., Eloff, J. (eds) Information and Cyber Security. ISSA 2019. Communications in Computer and Information Science, vol 1166. Springer, Cham. https://doi.org/10.1007/978-3-030-43276-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-43276-8_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43275-1
Online ISBN: 978-3-030-43276-8
eBook Packages: Computer ScienceComputer Science (R0)