Social relationships in electronic communities
Computerization and controversy
Communications of the ACM
Web security & commerce
IEEE Spectrum
Selected legal issues related to Internet use
ENCRESS '97 IFIP TC5 WG5.4 3rd internatinal conference on on Reliability, quality and safety of software-intensive systems
Taking the byte out of cookies: privacy, consent, and the Web
Proceedings of the ethics and social impact component on Shaping policy in the information age
Fighting computer crime: a new framework for protecting information
Fighting computer crime: a new framework for protecting information
Computer security
Internet privacy concerns confirm the case for intervention
Communications of the ACM
Principles of Informational Ethics
Principles of Informational Ethics
Management Strategies for Computer Security
Management Strategies for Computer Security
Internet Security: Professional Reference with Cdrom
Internet Security: Professional Reference with Cdrom
Computer
Information Security Awareness - Selling the Cause
IFIP/Sec '92 Proceedings of the IFIP TC11, Eigth International Conference on Information Security: IT Security: The Need for International Cooperation
Future Trends in Internet Security
FTDCS '97 Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computing Systems
Java Security: From HotJava to Netscape and Beyond
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Work-Oriented Design of Computer Artifacts
Work-Oriented Design of Computer Artifacts
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
An Economic Analysis of the Software Market with a Risk-Sharing Mechanism
International Journal of Electronic Commerce
A web-based multi-perspective decision support system for information security planning
Decision Support Systems
Analyzing information security awareness through networks of association
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Sweetening the medicine: educating users about information security by means of game play
SAICSIT '10 Proceedings of the 2010 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists
Guiding decisions on authorization policies: a participatory approach to decision support
Proceedings of the 27th Annual ACM Symposium on Applied Computing
The human element in cyber security: a study on student motivation to act
Proceedings of the 2012 Information Security Curriculum Development Conference
Journal of Organizational and End User Computing
Determining the antecedents of digital security practices in the general public dimension
Information Technology and Management
Can we sell security like soap?: a new approach to behaviour change
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.00 |
Until the era of the information society, information was a concern mainly for organizations whose line of business demanded a high degree of security. However, the growing use of information technology is affecting the status of information security so that it is gradually becoming an area that plays an important role in our everyday lives. As a result, information security issues should now be regarded on a par with other security issues. Using this assertion as the point of departure, this paper outlines the dimensions of information security awareness, namely its organizational, general public, socio-political, computer ethical and institutional education dimensions, along with the categories (or target groups) within each dimension.