TY - JOUR
T1 - Information Security Awareness practices
T2 - Omani Government Agencies as a case study
AU - Al-Shamli, Malik
AU - Al Hijji, Khalfan Zahran
AU - Shaikh, Abdul Khalique
N1 - Funding Information:
We are grateful to the Nagai Memorial Research Scholarship from the Pharmaceutical Society of Japan for a doctoral scholarship. We thank Takashi Udagawa, Hiroki Murayama, Kaito Yamazaki, Sayaka Fukuda, Riko Shibuichi, and Komugi Tsuruta for their technical assistance.
Publisher Copyright:
© 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
PY - 2022
Y1 - 2022
N2 - This paper aims at reviewing Information Security Awareness (ISA) practices in general and at Omani Government Agencies (OGA) in particular. It also explores the concerns and challenges that may affect their implementation, and the reasons why ISA practices remained problematic for more than a decade at the OGAs. To inform the aim of this research, the researchers employed a systematic process to review the publications that explored ISA practices in general and at OGAs in particular. As a sampling technique, the researchers created a research strategy to select relevant publications for the study. The grounded theory technique is adopted for data analysis since it provides an inductive and systematic interpretive approach to generate theoretical insights from the data. The review reveals that current ISA practices seem ineffective in meeting the needs of employees. Furthermore, a set of important ISA practices are either missing or undeveloped. The review also revealed the absence of a framework for the ISA process at OGAs. To the best of our knowledge, the present study is one of the first to conduct an in-depth review on ISA practices applied in general and at OGAs in particular. Therefore, this study contributed to the emerging field of information security by reviewing the current state of ISA practices. In addition, this research study contributed a comprehensive picture of sources dealing with vital issues of insider threats and human factors within OGAs that were indeed unclear and surrounded by various ambiguities in the past.
AB - This paper aims at reviewing Information Security Awareness (ISA) practices in general and at Omani Government Agencies (OGA) in particular. It also explores the concerns and challenges that may affect their implementation, and the reasons why ISA practices remained problematic for more than a decade at the OGAs. To inform the aim of this research, the researchers employed a systematic process to review the publications that explored ISA practices in general and at OGAs in particular. As a sampling technique, the researchers created a research strategy to select relevant publications for the study. The grounded theory technique is adopted for data analysis since it provides an inductive and systematic interpretive approach to generate theoretical insights from the data. The review reveals that current ISA practices seem ineffective in meeting the needs of employees. Furthermore, a set of important ISA practices are either missing or undeveloped. The review also revealed the absence of a framework for the ISA process at OGAs. To the best of our knowledge, the present study is one of the first to conduct an in-depth review on ISA practices applied in general and at OGAs in particular. Therefore, this study contributed to the emerging field of information security by reviewing the current state of ISA practices. In addition, this research study contributed a comprehensive picture of sources dealing with vital issues of insider threats and human factors within OGAs that were indeed unclear and surrounded by various ambiguities in the past.
KW - Delivery methods
KW - Evaluation methods
KW - Information Security Awareness (ISA)
KW - Information Security Awareness practices
KW - Information Security awareness process
UR - http://www.scopus.com/inward/record.url?scp=85144732119&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85144732119&partnerID=8YFLogxK
U2 - 10.1007/s10639-022-11513-7
DO - 10.1007/s10639-022-11513-7
M3 - Article
AN - SCOPUS:85144732119
SN - 1360-2357
JO - Education and Information Technologies
JF - Education and Information Technologies
ER -