By: Zulhemay, M. N., Rohana, M. R., Zakaria, O.
FSTP, UPNM, Kuala Lumpur, Malaysia.
• The evolution of economy
• K-economy utilising information as key materials to operate and survive in the
market
• Economy has switched from being organised around the flow of things and
money to the flow of information (Drucker, 1992).
• Information is vital asset to organisation – secure the information is
paramount to company – information security is business process (Pipkin,
20000).
Agriculture Industrial Knowledge
Organisation
information Security
Utilise
Information
Protect by
Figure 1: The relationship between organisation and information security
Towards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness Programme
Information SecurityInformation
Technical
solutions
Social-technical
solutions
Approaches
Firewall
Antivirus
software
Biometrics
Theexampleofthesolutions
Awareness
Training
Education
Figure 2: Approaches in information security
• This paper review relevant literatures regarding Information Security
Awareness (ISA) and suggest a structured approach of ISA programme for
organisation.
• Adapt Information Security (IS) process by (Pipkin, 2000).
• IS process can give general idea on security knowledge
• Security knowledge can help to reduce security incidents.
• A conceptual framework is proposed based on IS process to increase IS in
organisations.
• Content
• The information on how the desired results are to be achieved in practice (M.
Siponen, 2006).
• E.g., Johnson (2006) suggest the ideas on how to switch security awareness into
a better programme and highlight the important issues such as changing
employees perception towards security, topic that should be covered on
awareness programme the need for measuring effectiveness of the programme,
and security guidance.
• Rezgui and Marks (2008) indirectly provide the content to awareness
programme by exploring the factors that contribute to the security awareness of
staff in higher education and provide a number of recommendations to
promote security awareness. The recommendation is the example of ‘how the
desired results are to be achieved’ in promoting awareness programme.
• Evaluation
• Several authors acknowledge the significance of evaluating awareness
programme as the way to be better in securing information assets such present
in a number of literatures (i.e., (Albrechtsen & Hovden, 2010; Eminağaoğlu, Uçar,
& Eren, 2009; H. Kruger, Drevin, & Steyn, 2006; H. Kruger & Kearney, 2005)).
• I.e., Alarifi et al. (2012) study on awareness level among public in Saudi Arabia
using online survey.
• Without measurement, rating, metrics, or indicators, one cannot demonstrate
the value of information security effort especially to their top level management
(Eminağaoğlu et al., 2009; Herold, 2011).
• Framework
• Provide the relationships among the variables, explains the theory and describe
the direction of the relationships (Sekaran, 2007).
• Aggeliki, Maria, Spyros, and Evangelos (2012) analysed why security awareness
and training in the company failed to meet their goals and provide a framework
that enables the analysis of awareness activities by using actor network theory
(ANT).
• Zakaria (2013) adapt Schein’s organisational culture model to establish security
culture. In addition, the research concludes that one of the prerequisite to
establish security culture in an organisation is by having a structured security
awareness programme.
• H. Kruger et al. (2006); Thomson and Von Solms (1998) utilise social psychology
model in security awareness. (Chan & Wei, 2009) uses educational psychology
called conceptual change to embedded awareness to the students.
• Tools
• In terms of this study evice or implement to carry out a particular function.
• I.e., knowledge regarding information security is delivering by using game play
(Chun-Che, Khera, Depickere, Tantatsanawong, & Boonbrahm, 2008; Cone,
Irvine, Thompson, & Nguyen, 2007). Such therefore, game is a tool to deliver
awareness message.
• Based on our analysis, another popular tool develop by researchers is web
based application such as online portal, intranet and online learning such
present in (Chen, Shaw, & Yang, 2006; Shaw, Chen, Harris, & Huang, 2009).
Towards a Structured Information Security Awareness Programme
• The themes provide us with several approaches towards effectiveness of information
security awareness. However, there is no research that provides a framework for
information security awareness programme based on information security processes.
• By identifying several themes of information security awareness strategy in the
previous section, we manage to prove that the human dimension of information
security such as awareness is not being neglected, at least in academic field. In
fact, the significance of human dimension on information security such as
awareness programme has been acknowledged in many literatures
• Nevertheless, it has gone quite far without noticing that there is an absent of realistic
function which is to introduce information security to the audience. As a result, only a
few security elements are being covered in awareness programme and it is not
structured according to the proper chronology of information security processes.
Also, it is not comprehensive in terms of not cover all aspects of information security
processes. Only favourite topics are being concern based on the previous issues
faced by the organisation or just randomly pick by the consultant or security officer.
INSPECTION
PROTECTION
DETECTION
REACTION
REFLECTION
Inspection is a process of
regulating and appraising the
relevant security level in the
organisation.
Protection is a proactive process
that enforces a secure
environment at the appropriate
level.
Detection is a reactive
process that identifies any
appropriate events.
Reaction is a response process
to a security incident.
Reflection is a follow-up
process that evaluates the
existing implementation of a
security system.
Adapt Pipkin’s information
security processes
Structured
security
awareness
in
organisation
Challenges /
Gap
Information
security risks
A structured information
security awareness
programme principles
An ideal situation
 Employees
aware on
security
processes
 Employees can
perform security
tasks
Establish
basic security
knowledge
Appropriate
security practices
Yes
Determine
No
Leads to
Develop
Revisited
Figure 3. A structured information security awareness framework
• We analysed and discuss the implication of the current approaches and
contribute to the body of knowledge by locating a structured information
security awareness.
• This study adapts Pipkin’s (2000) security processes into a structured security
awareness conceptual framework to investigate awareness programme
challenges within an organisation.
• Pipkin’s security processes has been choose based on the theory develop by
(Zakaria, 2013) where basic security knowledge can further help to increase
awareness amongst all level of employees of their security responsibilities
and promote a collective security responsibility.
• In order to enable employees to internalise security knowledge, organisation
need to establish appropriate (structured) information security awareness
programmes.
Alarifi, A., Tootell, H., & Hyland, P. (2012, 26-28 June 2012). A study of information security awareness and practices in Saudi Arabia. Paper presented at the Communications and Information
Technology (ICCIT), 2012 International Conference on.
Albrechtsen, E., & Hovden, J. (2010). Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers &
Security, 29(4), 432-445. doi: 10.1016/j.cose.2009.12.005
Anggeliki, T., Maria, K., Spyros, K., & Evangelos, K. (2012). Analyzing trajectories of information security awareness. Information Technology & People, 25(3), 327-352. doi:
10.1108/09593841211254358
Chen, C. C., Shaw, R. S., & Yang, S. C. (2006). Mitigating Information Security Risks by Increasing User Security Awareness: A Case Study of an Information Security Awareness System.
Information technology learning and performance journal, 24(1), 1-14.
Chun-Che, F., Khera, V., Depickere, A., Tantatsanawong, P., & Boonbrahm, P. (2008, 26-29 Feb. 2008). Raising information security awareness in digital ecosystem with games - a pilot study in
Thailand. Paper presented at the Digital Ecosystems and Technologies, 2008. DEST 2008. 2nd IEEE International Conference on.
Cone, B. D., Irvine, C. E., Thompson, M. F., & Nguyen, T. D. (2007). A video game for cyber security training and awareness. Computers & Security, 26(1), 63-72. doi: 10.1016/j.cose.2006.10.005
Drucker, P. F. (1992). The Economy’s Power Shift. The Wall Street journal. Eastern edition.
Eminağaoğlu, M., Uçar, E., & Eren, Ş. (2009). The positive outcomes of information security awareness training in companies – A case study. Information Security Technical Report, 14(4), 223-
229. doi: 10.1016/j.istr.2010.05.002.
Herold, R. (2011). Managing an information security and privacy awareness and training program Information Security Management Handbook (2nd ed.). Boca Raton, Fla.: CRC Press.
Johnson, E. C. (2006). Security awareness: switch to a better programme. Network Security, 2006(2), 15-18.
Kruger, H., Drevin, L., & Steyn, T. (2006). A framework for evaluating ICT security awareness. Paper presented at the Proceeding of the Information Security South Africa (ISSA), Johannesburg,
South Africa.
Kruger, H., & Kearney, W. (2005). Measuring information security awareness: a west africa gold mining environment case study. Paper presented at the Proceedings of the ISSA 2005 New
Knowledge Today Conference, Balalaika Hotel, Sandton, South Africa 2005. http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/018_Article.pdf.
Pipkin, D. L. (2000). Information security: Protecting the global enterprise Upper Saddle River, New Jersey.: Prentice Hall.
Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7–8), 241-253. doi:
http://dx.doi.org/10.1016/j.cose.2008.07.008
Sekaran, U. (2007). Research Methods for Business (4 ed.). New Delhi: Wiley India.
Siponen, M. (2006). Information security standards focus on the existence of process, not its content. Commun. ACM, 49(8), 97-100. doi: 10.1145/1145287.114531.
Shaw, R. S., Chen, C. C., Harris, A. L., & Huang, H.-J. (2009). The impact of information richness on information security awareness training effectiveness. Computers & Education, 52(1), 92-100.
doi: http://dx.doi.org/10.1016/j.compedu.2008.06.011
Zakaria, O. (2013). Information Security Culture: A Human Firewall Approach. German: Lambert Academic Publishing.

More Related Content

PDF
Measuring Information Security: Understanding And Selecting Appropriate Metrics
PPTX
Cite presentation
PDF
Security in Learning Management Systems: Designing Collaborative Learning Act...
PDF
Management information system mordern perspective
PDF
The Impacts Of Information And Communication Technology (ICT) On The Teaching...
PDF
An analysis of factors influencing implementation of computer based informati...
PPT
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Cite presentation
Security in Learning Management Systems: Designing Collaborative Learning Act...
Management information system mordern perspective
The Impacts Of Information And Communication Technology (ICT) On The Teaching...
An analysis of factors influencing implementation of computer based informati...

What's hot (17)

PPTX
Digital Portfolios
PDF
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
PDF
Game based learning for safety and security education
PDF
ADOPTION OF CLOUD COMPUTING IN HIGHER EDUCATION INSTITUTION IN NIGERIA
PDF
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
PDF
IoT-based students interaction framework using attention-scoring assessment i...
PDF
Journal of Information Technology Education/tutorialoutletdotcom
PPT
Security and personnel bp11521
PPTX
120321 IAPS Some things Prep Heads need to know about ICT
PDF
Ijcatr04041023
PPTX
PDF
information management
PDF
Conceptualizing Information Technology Governance Model for Higher Education:...
PPTX
MAKING LEARNING STRESS-FREE TO SAVE THE CHILDREN: NEW THEORIES AND STRATEGIES
PPTX
E LEARNING
PDF
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
Digital Portfolios
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
Game based learning for safety and security education
ADOPTION OF CLOUD COMPUTING IN HIGHER EDUCATION INSTITUTION IN NIGERIA
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
IoT-based students interaction framework using attention-scoring assessment i...
Journal of Information Technology Education/tutorialoutletdotcom
Security and personnel bp11521
120321 IAPS Some things Prep Heads need to know about ICT
Ijcatr04041023
information management
Conceptualizing Information Technology Governance Model for Higher Education:...
MAKING LEARNING STRESS-FREE TO SAVE THE CHILDREN: NEW THEORIES AND STRATEGIES
E LEARNING
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
Ad

Viewers also liked (13)

PDF
Information Security Awareness Training (En)_Information Security Awareness F...
PPT
Saahil Goel Information Security Awareness Amongst Top Management
PPT
Elements of an Information Security Awareness Program
PDF
Information security (un)awareness by Marc Vael
PDF
Information security awareness, middle management
PPTX
CISSP Information Systems Security Training Course
PPTX
Information Security Awareness Training Open
PPT
New Hire Information Security Awareness
PDF
Information Security Awareness Training
PPT
UW School of Medicine Social Engineering and Phishing Awareness
PPTX
Social engineering-Attack of the Human Behavior
PPT
Computer Security
PDF
What Do Real Women Look Like? 100 Stock Photos of Real Women
Information Security Awareness Training (En)_Information Security Awareness F...
Saahil Goel Information Security Awareness Amongst Top Management
Elements of an Information Security Awareness Program
Information security (un)awareness by Marc Vael
Information security awareness, middle management
CISSP Information Systems Security Training Course
Information Security Awareness Training Open
New Hire Information Security Awareness
Information Security Awareness Training
UW School of Medicine Social Engineering and Phishing Awareness
Social engineering-Attack of the Human Behavior
Computer Security
What Do Real Women Look Like? 100 Stock Photos of Real Women
Ad

Similar to Towards a Structured Information Security Awareness Programme (20)

PDF
The human factor
PDF
How To Promote Security Awareness In Your Company
PDF
The Difference Between the Reality and Feeling of Security by Thomas Kurian
PDF
Social Engineering Audit & Security Awareness
PPTX
Security Awareness and Training
PPT
Information security
PPTX
Human Factors_MODULE_2.pptx
PDF
Fissea09 mgupta-day3-panel process-program-build-effective-training
PDF
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
PPTX
Introduction to information security
PDF
A Descriptive Review And Classification Of Organizational Information Securit...
PDF
Information security principles to the private versus public sector.pdf
PPTX
A model for reducing information security risks due to human error
PPT
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
PPT
Introduction to Information Security
PPTX
The difference between the Reality and Feeling of Security
PPTX
IS Chap 1 by whitman chapter 1 pptx.pptx
PPTX
Information Security Blueprint
PDF
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
PPT
Isa Prog Need L
The human factor
How To Promote Security Awareness In Your Company
The Difference Between the Reality and Feeling of Security by Thomas Kurian
Social Engineering Audit & Security Awareness
Security Awareness and Training
Information security
Human Factors_MODULE_2.pptx
Fissea09 mgupta-day3-panel process-program-build-effective-training
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
Introduction to information security
A Descriptive Review And Classification Of Organizational Information Securit...
Information security principles to the private versus public sector.pdf
A model for reducing information security risks due to human error
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
Introduction to Information Security
The difference between the Reality and Feeling of Security
IS Chap 1 by whitman chapter 1 pptx.pptx
Information Security Blueprint
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
Isa Prog Need L

More from tulipbiru64 (20)

PPTX
Towards The Curated web
PPTX
Kajian Kepuasan Pengguna Terhadap Kualiti Perkhidmatan Ruang Pembelajaran di ...
PPTX
Multi-factor Information Security Risk in Information System
PPT
Informative Centers' Intelligent Agent Based Model - a preliminary study
PPTX
Research Data Management: Our Role
PPTX
Transforming The Academic Library Services For Generation Y Using Knowledge M...
PPTX
Repositori Institusi Isu Dan Cabaran: Kajian Kes Perpustakaan Universiti Tekn...
PPTX
Social Tagging/Bookmarking Application: The Usage In Academic Libraries
PPTX
e-Books: Putting Librarians And Researchers 'In The Know'
PPTX
Buku Masa Depan
PPTX
Measurement Of Values And Performance For The Institutions Of Higher Educatio...
PPTX
Keynote Speech by YBhg. Profesor Datuk Dr. Shahrin Sahib, Vice Chancellor UTeM
PDF
Repository : A Brief Comparative Study Between The National University Of Mal...
PDF
Mobile OPAC Prototype Based On Koha Open Source Integrated Library System
PDF
Kajian Tinjauan Tanggapan Pengguna Terhadap Profesion Pustakawan Dalam Kalang...
PDF
Corporate Social Responsibility (CSR) And Library Collaborative Partnership
PDF
The Effectiveness Of Searching Arabic Resources Through OPAC : A Case Study I...
PDF
Library Usage Among Medical Students In The Faculty Of Medicine And Health Sc...
PDF
Kajian Kepuasan Pelanggan Di Perpustakaan UTHM Dalam Meningkatkan Kualiti Per...
PDF
An Assessment Of The Effectiveness Of Library Resources And Services In Suppo...
Towards The Curated web
Kajian Kepuasan Pengguna Terhadap Kualiti Perkhidmatan Ruang Pembelajaran di ...
Multi-factor Information Security Risk in Information System
Informative Centers' Intelligent Agent Based Model - a preliminary study
Research Data Management: Our Role
Transforming The Academic Library Services For Generation Y Using Knowledge M...
Repositori Institusi Isu Dan Cabaran: Kajian Kes Perpustakaan Universiti Tekn...
Social Tagging/Bookmarking Application: The Usage In Academic Libraries
e-Books: Putting Librarians And Researchers 'In The Know'
Buku Masa Depan
Measurement Of Values And Performance For The Institutions Of Higher Educatio...
Keynote Speech by YBhg. Profesor Datuk Dr. Shahrin Sahib, Vice Chancellor UTeM
Repository : A Brief Comparative Study Between The National University Of Mal...
Mobile OPAC Prototype Based On Koha Open Source Integrated Library System
Kajian Tinjauan Tanggapan Pengguna Terhadap Profesion Pustakawan Dalam Kalang...
Corporate Social Responsibility (CSR) And Library Collaborative Partnership
The Effectiveness Of Searching Arabic Resources Through OPAC : A Case Study I...
Library Usage Among Medical Students In The Faculty Of Medicine And Health Sc...
Kajian Kepuasan Pelanggan Di Perpustakaan UTHM Dalam Meningkatkan Kualiti Per...
An Assessment Of The Effectiveness Of Library Resources And Services In Suppo...

Recently uploaded (20)

PPTX
Neurology of Systemic disease all systems
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PPT
Acidosis in Dairy Herds: Causes, Signs, Management, Prevention and Treatment
PPTX
Power Point PR B.Inggris 12 Ed. 2019.pptx
PDF
Physical education and sports and CWSN notes
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PPTX
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PPT
hsl powerpoint resource goyloveh feb 07.ppt
PPTX
Climate Change and Its Global Impact.pptx
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PDF
Hospital Case Study .architecture design
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PDF
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
PDF
Nurlina - Urban Planner Portfolio (english ver)
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PPTX
Neurological complocations of systemic disease
Neurology of Systemic disease all systems
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Acidosis in Dairy Herds: Causes, Signs, Management, Prevention and Treatment
Power Point PR B.Inggris 12 Ed. 2019.pptx
Physical education and sports and CWSN notes
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
PLASMA AND ITS CONSTITUENTS 123.pptx
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
hsl powerpoint resource goyloveh feb 07.ppt
Climate Change and Its Global Impact.pptx
4. Diagnosis and treatment planning in RPD.pptx
Everyday Spelling and Grammar by Kathi Wyldeck
Hospital Case Study .architecture design
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Disorder of Endocrine system (1).pdfyyhyyyy
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
Nurlina - Urban Planner Portfolio (english ver)
2025 High Blood Pressure Guideline Slide Set.pptx
Neurological complocations of systemic disease

Towards a Structured Information Security Awareness Programme

  • 1. By: Zulhemay, M. N., Rohana, M. R., Zakaria, O. FSTP, UPNM, Kuala Lumpur, Malaysia.
  • 2. • The evolution of economy • K-economy utilising information as key materials to operate and survive in the market • Economy has switched from being organised around the flow of things and money to the flow of information (Drucker, 1992). • Information is vital asset to organisation – secure the information is paramount to company – information security is business process (Pipkin, 20000). Agriculture Industrial Knowledge
  • 3. Organisation information Security Utilise Information Protect by Figure 1: The relationship between organisation and information security
  • 7. • This paper review relevant literatures regarding Information Security Awareness (ISA) and suggest a structured approach of ISA programme for organisation. • Adapt Information Security (IS) process by (Pipkin, 2000). • IS process can give general idea on security knowledge • Security knowledge can help to reduce security incidents. • A conceptual framework is proposed based on IS process to increase IS in organisations.
  • 8. • Content • The information on how the desired results are to be achieved in practice (M. Siponen, 2006). • E.g., Johnson (2006) suggest the ideas on how to switch security awareness into a better programme and highlight the important issues such as changing employees perception towards security, topic that should be covered on awareness programme the need for measuring effectiveness of the programme, and security guidance. • Rezgui and Marks (2008) indirectly provide the content to awareness programme by exploring the factors that contribute to the security awareness of staff in higher education and provide a number of recommendations to promote security awareness. The recommendation is the example of ‘how the desired results are to be achieved’ in promoting awareness programme.
  • 9. • Evaluation • Several authors acknowledge the significance of evaluating awareness programme as the way to be better in securing information assets such present in a number of literatures (i.e., (Albrechtsen & Hovden, 2010; Eminağaoğlu, Uçar, & Eren, 2009; H. Kruger, Drevin, & Steyn, 2006; H. Kruger & Kearney, 2005)). • I.e., Alarifi et al. (2012) study on awareness level among public in Saudi Arabia using online survey. • Without measurement, rating, metrics, or indicators, one cannot demonstrate the value of information security effort especially to their top level management (Eminağaoğlu et al., 2009; Herold, 2011).
  • 10. • Framework • Provide the relationships among the variables, explains the theory and describe the direction of the relationships (Sekaran, 2007). • Aggeliki, Maria, Spyros, and Evangelos (2012) analysed why security awareness and training in the company failed to meet their goals and provide a framework that enables the analysis of awareness activities by using actor network theory (ANT). • Zakaria (2013) adapt Schein’s organisational culture model to establish security culture. In addition, the research concludes that one of the prerequisite to establish security culture in an organisation is by having a structured security awareness programme. • H. Kruger et al. (2006); Thomson and Von Solms (1998) utilise social psychology model in security awareness. (Chan & Wei, 2009) uses educational psychology called conceptual change to embedded awareness to the students.
  • 11. • Tools • In terms of this study evice or implement to carry out a particular function. • I.e., knowledge regarding information security is delivering by using game play (Chun-Che, Khera, Depickere, Tantatsanawong, & Boonbrahm, 2008; Cone, Irvine, Thompson, & Nguyen, 2007). Such therefore, game is a tool to deliver awareness message. • Based on our analysis, another popular tool develop by researchers is web based application such as online portal, intranet and online learning such present in (Chen, Shaw, & Yang, 2006; Shaw, Chen, Harris, & Huang, 2009).
  • 13. • The themes provide us with several approaches towards effectiveness of information security awareness. However, there is no research that provides a framework for information security awareness programme based on information security processes. • By identifying several themes of information security awareness strategy in the previous section, we manage to prove that the human dimension of information security such as awareness is not being neglected, at least in academic field. In fact, the significance of human dimension on information security such as awareness programme has been acknowledged in many literatures • Nevertheless, it has gone quite far without noticing that there is an absent of realistic function which is to introduce information security to the audience. As a result, only a few security elements are being covered in awareness programme and it is not structured according to the proper chronology of information security processes. Also, it is not comprehensive in terms of not cover all aspects of information security processes. Only favourite topics are being concern based on the previous issues faced by the organisation or just randomly pick by the consultant or security officer.
  • 14. INSPECTION PROTECTION DETECTION REACTION REFLECTION Inspection is a process of regulating and appraising the relevant security level in the organisation. Protection is a proactive process that enforces a secure environment at the appropriate level. Detection is a reactive process that identifies any appropriate events. Reaction is a response process to a security incident. Reflection is a follow-up process that evaluates the existing implementation of a security system.
  • 15. Adapt Pipkin’s information security processes Structured security awareness in organisation Challenges / Gap Information security risks A structured information security awareness programme principles An ideal situation  Employees aware on security processes  Employees can perform security tasks Establish basic security knowledge Appropriate security practices Yes Determine No Leads to Develop Revisited Figure 3. A structured information security awareness framework
  • 16. • We analysed and discuss the implication of the current approaches and contribute to the body of knowledge by locating a structured information security awareness. • This study adapts Pipkin’s (2000) security processes into a structured security awareness conceptual framework to investigate awareness programme challenges within an organisation. • Pipkin’s security processes has been choose based on the theory develop by (Zakaria, 2013) where basic security knowledge can further help to increase awareness amongst all level of employees of their security responsibilities and promote a collective security responsibility. • In order to enable employees to internalise security knowledge, organisation need to establish appropriate (structured) information security awareness programmes.
  • 17. Alarifi, A., Tootell, H., & Hyland, P. (2012, 26-28 June 2012). A study of information security awareness and practices in Saudi Arabia. Paper presented at the Communications and Information Technology (ICCIT), 2012 International Conference on. Albrechtsen, E., & Hovden, J. (2010). Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers & Security, 29(4), 432-445. doi: 10.1016/j.cose.2009.12.005 Anggeliki, T., Maria, K., Spyros, K., & Evangelos, K. (2012). Analyzing trajectories of information security awareness. Information Technology & People, 25(3), 327-352. doi: 10.1108/09593841211254358 Chen, C. C., Shaw, R. S., & Yang, S. C. (2006). Mitigating Information Security Risks by Increasing User Security Awareness: A Case Study of an Information Security Awareness System. Information technology learning and performance journal, 24(1), 1-14. Chun-Che, F., Khera, V., Depickere, A., Tantatsanawong, P., & Boonbrahm, P. (2008, 26-29 Feb. 2008). Raising information security awareness in digital ecosystem with games - a pilot study in Thailand. Paper presented at the Digital Ecosystems and Technologies, 2008. DEST 2008. 2nd IEEE International Conference on. Cone, B. D., Irvine, C. E., Thompson, M. F., & Nguyen, T. D. (2007). A video game for cyber security training and awareness. Computers & Security, 26(1), 63-72. doi: 10.1016/j.cose.2006.10.005 Drucker, P. F. (1992). The Economy’s Power Shift. The Wall Street journal. Eastern edition. Eminağaoğlu, M., Uçar, E., & Eren, Ş. (2009). The positive outcomes of information security awareness training in companies – A case study. Information Security Technical Report, 14(4), 223- 229. doi: 10.1016/j.istr.2010.05.002. Herold, R. (2011). Managing an information security and privacy awareness and training program Information Security Management Handbook (2nd ed.). Boca Raton, Fla.: CRC Press. Johnson, E. C. (2006). Security awareness: switch to a better programme. Network Security, 2006(2), 15-18. Kruger, H., Drevin, L., & Steyn, T. (2006). A framework for evaluating ICT security awareness. Paper presented at the Proceeding of the Information Security South Africa (ISSA), Johannesburg, South Africa. Kruger, H., & Kearney, W. (2005). Measuring information security awareness: a west africa gold mining environment case study. Paper presented at the Proceedings of the ISSA 2005 New Knowledge Today Conference, Balalaika Hotel, Sandton, South Africa 2005. http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/018_Article.pdf. Pipkin, D. L. (2000). Information security: Protecting the global enterprise Upper Saddle River, New Jersey.: Prentice Hall. Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7–8), 241-253. doi: http://dx.doi.org/10.1016/j.cose.2008.07.008 Sekaran, U. (2007). Research Methods for Business (4 ed.). New Delhi: Wiley India. Siponen, M. (2006). Information security standards focus on the existence of process, not its content. Commun. ACM, 49(8), 97-100. doi: 10.1145/1145287.114531. Shaw, R. S., Chen, C. C., Harris, A. L., & Huang, H.-J. (2009). The impact of information richness on information security awareness training effectiveness. Computers & Education, 52(1), 92-100. doi: http://dx.doi.org/10.1016/j.compedu.2008.06.011 Zakaria, O. (2013). Information Security Culture: A Human Firewall Approach. German: Lambert Academic Publishing.