Reference Hub11
Achieving a Security Culture

Achieving a Security Culture

Adéle Da Veiga
Copyright: © 2019 |Pages: 29
ISBN13: 9781522578475|ISBN10: 1522578471|ISBN13 Softcover: 9781522591535|EISBN13: 9781522578482
DOI: 10.4018/978-1-5225-7847-5.ch005
Cite Chapter Cite Chapter

MLA

Da Veiga, Adéle. "Achieving a Security Culture." Cybersecurity Education for Awareness and Compliance, edited by Ismini Vasileiou and Steven Furnell, IGI Global, 2019, pp. 72-100. https://doi.org/10.4018/978-1-5225-7847-5.ch005

APA

Da Veiga, A. (2019). Achieving a Security Culture. In I. Vasileiou & S. Furnell (Eds.), Cybersecurity Education for Awareness and Compliance (pp. 72-100). IGI Global. https://doi.org/10.4018/978-1-5225-7847-5.ch005

Chicago

Da Veiga, Adéle. "Achieving a Security Culture." In Cybersecurity Education for Awareness and Compliance, edited by Ismini Vasileiou and Steven Furnell, 72-100. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7847-5.ch005

Export Reference

Mendeley
Favorite

Abstract

A security culture can be a competitive advantage when employees uphold strong values for the protection of information and exhibit behavior that is in compliance with policies, thereby introducing minimal incidents and breaches. The security culture in an organization might, though, not be similar among departments, job levels, or even generation groups. It can pose a risk when it is not conducive to the protection of information and when security incidents and breaches occur due to employee error or negligence. This chapter aims to give organizations an overview of the concept of security culture, the factors that could influence it, an approach to assess the security culture, and to prioritize and tailor interventions for high-risk areas. The outcome of the security culture assessment can be used as input to define security awareness, training, and education programs aiding employees to exhibit behavior that is in compliance with security policies.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.