• Part of
    Ubiquity Network logo
    Submit a journal article Submit a book proposal

    Read Chapter
  • No readable formats available
  • Exploring Knowledge Sharing Practices for Raising Security Awareness

    Hiep-Cong Pham Irfan Ulhaq Mathews Nkhoma Minh Nhat Nguyen Linda Brennan

    Chapter from the book: Australasian Conference on Information Systems, . 2018. Australasian Conference on Information Systems 2018.

     Download

    This study aims to explore the types of information can be effectively communicated in three knowledge-sharing methods and their impact on employees’ security practice. On one end, guarding the organisation’s information system against cyber-attacks is critical and improving users’ knowledge and skills is a common approach to any security program. On the other end, organisations lack a clear understanding in determining what types of security information should be delivered through various methods of communication to be effective in boosting users’ knowledge and compliance behaviour. The study employed a qualitative method using semi-structured interviews with business users in Vietnam. The initial findings indicate a single method of knowledge and skill development is not sufficient to assist users to deal with complex and constant changing security needs. It is necessary to further experiment methods of encouraging formal and peer knowledge sharing that can support individual effort in complying with security policies.

    Chapter Metrics:

    How to cite this chapter
    Pham, H et al. 2018. Exploring Knowledge Sharing Practices for Raising Security Awareness. In: Australasian Conference on Information Systems, (ed.), Australasian Conference on Information Systems 2018. Sydney: UTS ePRESS. DOI: https://doi.org/10.5130/acis2018.cs
    License

    This chapter distributed under the terms of the Creative Commons Attribution + Noncommercial + NoDerivatives 4.0 license. Copyright is retained by the author(s)

    Peer Review Information

    This book has been peer reviewed. See our Peer Review Policies for more information.

    Additional Information

    Published on Jan. 1, 2018

    DOI
    https://doi.org/10.5130/acis2018.cs


    comments powered by Disqus