scispace - formally typeset
Open AccessProceedings Article

Towards A Needs Assessment Process Model For Security, Education, Training And Awareness Programs: An Action Design Research Study

Reads0
Chats0
TLDR
This study aims to close the gap in generic process models for conducting SETA needs assessments by suggesting a systematic approach to capturing, evaluating, and depicting the current state of employees’ security awareness and behavior.
Abstract
Employees are considered to be the weakest link in information systems (IS) security. Many companies and organizations started to implement security education, training and awareness (SETA) programs. These provide their employees awareness of information security risks and the necessary skills to protect a companies’ or organizations’ information assets. To ensure that SETA programs are efficiently aligned to an organization’s objectives, it is essential to identify the most important areas on which to concentrate. In research, there is a lack of generic process models for conducting SETA needs assessments. In this study, we aim to close this gap by suggesting a systematic approach to capturing, evaluating, and depicting the current state of employees’ security awareness and behavior. Actual behavior is evaluated by determining the target values and measuring actual values with respect to security metrics. In order to contribute to both, practical and academic knowledge, we used an action design research (ADR) approach to draw general design principles from organizational intervention within an international engineering company.

read more

Citations
More filters
Book ChapterDOI

Cooperation Experience-Ansatz in der Anwendung

TL;DR: In this paper, a beitrag zur Kooperationsvisualisierung im Allgemeinen wird das Augenmerk vor allem auf die Fallbeispiele bei der CLASS KGaA mbH, bei the Bilfinger HSG Facility Management GmbH sowie bei dem Kreis Coesfeld gelegt.
References
More filters
Journal ArticleDOI

Basics of qualitative research : grounded theory procedures and techniques

TL;DR: In this article, the authors discuss the uses of literature and open coding techniques for enhancing theoretical sensitivity of theoretical studies, and give guidelines for judging a grounded theory study.
Journal ArticleDOI

Design science in information systems research

TL;DR: The objective is to describe the performance of design-science research in Information Systems via a concise conceptual framework and clear guidelines for understanding, executing, and evaluating the research.
Book

Marketing Research: An Applied Orientation

TL;DR: The content of this 3rd edition marketing research textbook is practical and up to date and is based on an applied and managerially focused approach.
Journal Article

Analyzing the past to prepare for the future: writing a literature review

TL;DR: A review of prior, relevant literature is an essential feature of any academic project that facilitates theory development, closes areas where a plethora of research exists, and uncovers areas where research is needed.