How to Cultivate Cyber Security Culture? The Evidences from Literature
Cyber Security Culture (CSC) is a culture that could produce a secure cyber space and could improve the quality of cyber world engagement. Despite many benefits that could be offered by CSC, there is a lack of models and guidelines on how to cultivate this culture. This pa...
| Main Authors: | Akhyari, Nasir, Syahrul, Fahmy, Wan Roslina, Othman, Noor Suhana, Sulaiman, Nooraida, Samsudin, Azham, Ahmad, M R A, Hamid |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
University College TATI
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/39568/ http://umpir.ump.edu.my/id/eprint/39568/1/How%20to%20Cultivate%20Cyber%20Security%20Culture%20-%20The%20%20Evidences%20from%20Literature.pdf |
Similar Items
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022)
by: Akhyari, Nasir, et al.
Published: (2022)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
UMP, CyberSecurity tingkat keupayaan pakar keselamatan siber
by: Nor Salwana, Mohammad Idris
Published: (2021)
by: Nor Salwana, Mohammad Idris
Published: (2021)
Antecedents of cyber security behavior: the roles of coping appraisal, threat appraisal and responsibility norms among government employees
by: Noor Suhani, Sulaiman
Published: (2023)
by: Noor Suhani, Sulaiman
Published: (2023)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
Information security culture model for Malaysian organizations: A review
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
A systematic literature review of mitigating cyber security risk
by: Kamarudin, Syafila, et al.
Published: (2023)
by: Kamarudin, Syafila, et al.
Published: (2023)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
Securing cyber security at all fronts
by: Sani, Rozana
Published: (2017)
by: Sani, Rozana
Published: (2017)
Cyber supply chain risk management and performance in industry 4.0 era: Information system security practices in Malaysia
by: Yudi, Fernando, et al.
Published: (2023)
by: Yudi, Fernando, et al.
Published: (2023)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Determinants and practices towards cyber supply chain performance with cyber supply chain visibility as a mediator
by: Anisha Banu, Dawood Gani
Published: (2022)
by: Anisha Banu, Dawood Gani
Published: (2022)
Socio-technical mitigation effort to combat cyber propaganda: a systematic literature mapping
by: Maseri, Aimi Nadrah, et al.
Published: (2020)
by: Maseri, Aimi Nadrah, et al.
Published: (2020)
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016)
by: Nasir, Akhyari, et al.
Published: (2016)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Administrators need to cultivate a culture of excellence, dynamism and strategic thinking
by: Mimi Rabita, Abdul Wahit
Published: (2020)
by: Mimi Rabita, Abdul Wahit
Published: (2020)
How Many Securities Make A Diversified Portfolio In
Klse Stocks?
by: G.S. Gupta, G.S. Gupta, et al.
Published: (2001)
by: G.S. Gupta, G.S. Gupta, et al.
Published: (2001)
Cyber value stream system reduced waste and non-value added of manufacturing operation
by: Ahmad, A.N. Aizat, et al.
Published: (2015)
by: Ahmad, A.N. Aizat, et al.
Published: (2015)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
How do we cultivate in England? Tillage practices in crop production systems
by: Townsend, Toby J., et al.
Published: (2016)
by: Townsend, Toby J., et al.
Published: (2016)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Cyber security in the open data: where is the equilibrium?
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
An overview on cyber security awareness in Muslim countries
by: Basamh, Saeed S., et al.
Published: (2014)
by: Basamh, Saeed S., et al.
Published: (2014)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
Citizen, cyber government and the legal aspects
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
Technical efficiency in transport manufacturing firms: evidence from Malaysia
by: Abdullah, Mohd Fahmy, et al.
Published: (2017)
by: Abdullah, Mohd Fahmy, et al.
Published: (2017)
Workplace spirituality and counterproductive work behaviour (CWB): A Malaysian perspective
by: Mat, Norazuwa, et al.
Published: (2012)
by: Mat, Norazuwa, et al.
Published: (2012)
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Cyber security and open government in Malaysia: issues and development
by: Zulhuda, Sonny
Published: (2016)
by: Zulhuda, Sonny
Published: (2016)
Webinar Cyber security and IR 4.0 Awareness
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Cyber warfare impact to national security - Malaysia experiences
by: Azian, Ibrahim, et al.
Published: (2019)
by: Azian, Ibrahim, et al.
Published: (2019)
Cultivating the Communities of Practice in the Academia
by: Wahiddin, Mohamed Ridza
Published: (2016)
by: Wahiddin, Mohamed Ridza
Published: (2016)
Cyber security maturity model and Maqasid al-Shari'ah
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
A systematic review of approaches to assessing cyber security awareness
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
A comprehensive insight into game theory in relevance to cyber security
by: Anwar, Farhat, et al.
Published: (2020)
by: Anwar, Farhat, et al.
Published: (2020)
Interplay between Supply Chain Visibility and Cyber Security Performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2021)
by: Gani, Anisha Banu Dawood, et al.
Published: (2021)
Similar Items
-
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022) -
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019) -
UMP, CyberSecurity tingkat keupayaan pakar keselamatan siber
by: Nor Salwana, Mohammad Idris
Published: (2021) -
Antecedents of cyber security behavior: the roles of coping appraisal, threat appraisal and responsibility norms among government employees
by: Noor Suhani, Sulaiman
Published: (2023) -
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)