Evolution of information security awareness towards maturity: a systematic review
This systematic review provides an in-depth analysis of existing information security awareness (ISA) maturity models. This review synthesizes findings from 25 scholarly articles, identifying standard dimensions such as risk management, organizational culture, training programs, policy compliance, a...
| Main Authors: | Ahmad, Mohd Ridzam, Osman, Mohd Hafeez, Abdullah, Azizol, Sharif, Khaironi Yatim |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Insight Society
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/118994/ http://psasir.upm.edu.my/id/eprint/118994/1/118994.pdf |
Similar Items
A systematic review of approaches to assessing cyber security awareness
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
Preliminary systematic literature review on the adoption of Security as a Service (SECaaS)
by: Tanko, Mohammed Yahaya, et al.
Published: (2023)
by: Tanko, Mohammed Yahaya, et al.
Published: (2023)
Persuasive technology contributions toward enhance information security awareness in an organization
by: Qudaih, Hani A., et al.
Published: (2014)
by: Qudaih, Hani A., et al.
Published: (2014)
Persuasive technology for improving information security awareness and behavior: literature review
by: Bawazir, Mohammed Abdullah, et al.
Published: (2016)
by: Bawazir, Mohammed Abdullah, et al.
Published: (2016)
Personal Information Security Awareness The Influencing Factors And The Awareness Level
by: Keong, Yew Wei
Published: (2006)
by: Keong, Yew Wei
Published: (2006)
An empirically-based characterization and quantification of information seeking through mailing lists during open source developers software evolution
by: Sharif, Khaironi Yatim, et al.
Published: (2015)
by: Sharif, Khaironi Yatim, et al.
Published: (2015)
A solution design and test case for invoice generation system in operational dynamic Telco industry
by: Ahmad, Mohd Ridzam, et al.
Published: (2014)
by: Ahmad, Mohd Ridzam, et al.
Published: (2014)
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: comprehensive taxonomy, open issues and challenges and recommended solution
by: Qahtan, Sarah, et al.
Published: (2023)
by: Qahtan, Sarah, et al.
Published: (2023)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Open source programmers' information seeking during software maintenance
by: Sharif, Khaironi Yatim, et al.
Published: (2011)
by: Sharif, Khaironi Yatim, et al.
Published: (2011)
A decision cloud ranking approach based on privacy and security in blockchain E-Health Industry 4.0 systems
by: Qahtan, Sarah, et al.
Published: (2023)
by: Qahtan, Sarah, et al.
Published: (2023)
Improved extreme programming methodology with inbuilt security
by: Shuaibu, Bala Musa, et al.
Published: (2011)
by: Shuaibu, Bala Musa, et al.
Published: (2011)
Implication of human attitude factors toward information security: awareness in Malaysia Public University
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
Cyber–information security compliance and violation behaviour in organisations: A systematic review
by: Sulaiman, Noor Suhani, et al.
Published: (2022)
by: Sulaiman, Noor Suhani, et al.
Published: (2022)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
An analysis of information security awareness within home and work environments
by: Talib, Shuhaili, et al.
Published: (2010)
by: Talib, Shuhaili, et al.
Published: (2010)
Effects of informal economy towards employment : a systematic review
by: Nor Amaleena Mazlan,, et al.
Published: (2021)
by: Nor Amaleena Mazlan,, et al.
Published: (2021)
Cyber security maturity model and Maqasid al-Shari'ah
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
Information security awareness at the knowledge-based institution: its antecedents and measures
by: Ahlan, Abdul Rahman, et al.
Published: (2015)
by: Ahlan, Abdul Rahman, et al.
Published: (2015)
Systematics and evolution of droseraceae
by: Fleischmann, A., et al.
Published: (2018)
by: Fleischmann, A., et al.
Published: (2018)
From monolith to microservices: a semi-automated approach for legacy to modern architecture transition using static analysis
by: Osman, Mohd Hafeez, et al.
Published: (2022)
by: Osman, Mohd Hafeez, et al.
Published: (2022)
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022)
by: Akhyari, Nasir, et al.
Published: (2022)
Mitigating privacy issues on Facebook by implementing information security awareness with Islamic perspectives
by: Faisal, Ammy Amelia, et al.
Published: (2013)
by: Faisal, Ammy Amelia, et al.
Published: (2013)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Factors associated with carbon tax awareness: a systematic review
by: Dapari, Rahmat, et al.
Published: (2024)
by: Dapari, Rahmat, et al.
Published: (2024)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
A systematic literature review on characteristics influencing
software reliability
by: Hassan, Sa'adah, et al.
Published: (2024)
by: Hassan, Sa'adah, et al.
Published: (2024)
Towards a systematic description of the field using bibliometric analysis: malware evolution
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
Classification, yield to maturity determinants and valuation of Islamic debt securities
by: Safari, Meysam
Published: (2012)
by: Safari, Meysam
Published: (2012)
Information security awareness in university: maintaining learnability, performance and adaptability through roles of responsibility
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
Effect of age on information security awareness level among young internet users in Malaysia
by: Omar, Siti Zobidah, et al.
Published: (2021)
by: Omar, Siti Zobidah, et al.
Published: (2021)
Information security awareness among youth in Klang Valley: a focus group discussion
by: Omar, Siti Zobidah, et al.
Published: (2020)
by: Omar, Siti Zobidah, et al.
Published: (2020)
A systematic literature review of mitigating cyber security risk
by: Kamarudin, Syafila, et al.
Published: (2023)
by: Kamarudin, Syafila, et al.
Published: (2023)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
Information security culture model for Malaysian organizations: A review
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015)
by: Olalere, Morufu, et al.
Published: (2015)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Pedestrian safety and security for female users in urban alleys: a systematic review
by: Xu, Tengyun, et al.
Published: (2024)
by: Xu, Tengyun, et al.
Published: (2024)
Similar Items
-
A systematic review of approaches to assessing cyber security awareness
by: Abd Rahim, Noor Hayani, et al.
Published: (2015) -
Preliminary systematic literature review on the adoption of Security as a Service (SECaaS)
by: Tanko, Mohammed Yahaya, et al.
Published: (2023) -
Persuasive technology contributions toward enhance information security awareness in an organization
by: Qudaih, Hani A., et al.
Published: (2014) -
Persuasive technology for improving information security awareness and behavior: literature review
by: Bawazir, Mohammed Abdullah, et al.
Published: (2016) -
Personal Information Security Awareness The Influencing Factors And The Awareness Level
by: Keong, Yew Wei
Published: (2006)