Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives (English)
Free access
- New search for: Alyami, Areej
- New search for: Sammon, David
- New search for: Neville, Karen
- New search for: Mahony, Carolanne
- New search for: Alyami, Areej
- New search for: Sammon, David
- New search for: Neville, Karen
- New search for: Mahony, Carolanne
In:
Information & Computer Security
;
32
, 1
;
53-73
;
2024
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives
-
Contributors:Alyami, Areej ( author ) / Sammon, David ( author ) / Neville, Karen ( author ) / Mahony, Carolanne ( author )
-
Published in:Information & Computer Security ; 32, 1 ; 53-73
-
Publisher:
- New search for: Emerald Publishing Limited
-
Publication date:2024-01-22
-
Size:21 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Licence:
-
Source:
Table of contents – Volume 32, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps’ features and providersNikkhah, Hamid Reza / Grover, Varun / Sabherwal, Rajiv et al. | 2024
- 38
-
Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessmentNeri, Martina / Niccolini, Federico / Martino, Luigi et al. | 2024
- 53
-
Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectivesAlyami, Areej / Sammon, David / Neville, Karen / Mahony, Carolanne et al. | 2024
- 74
-
Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigationDev, Manimay / Saha, Debashis et al. | 2024
- 93
-
Analytical hierarchy process model for managing cloud securityRizvi, Zainab Batool / Ahmad Khan, Chaudry Bilal / O’Sullivan, Michael et al. | 2024
- 112
-
Framework for critical information infrastructure protection in smart government: a case study in IndonesiaPutro, Prasetyo Adi Wibowo / Sensuse, Dana Indra / Wibowo, Wahyu Setiawan Setiawan et al. | 2024