A study of information security awareness in Australian government organisations

Purpose - The purpose of this paper is to investigate the human-based information security (InfoSec) vulnerabilities in three Australian government organisations. Design/methodology/approach - A Web-based survey was developed to test attitudes, knowledge and behaviour across eight policy-based focus...

Full description

Saved in:
Bibliographic Details
Published inInformation management & computer security Vol. 22; no. 4; pp. 334 - 345
Main Authors Parsons, Kathryn, McCormac, Agata, Pattinson, Malcolm, Butavicius, Marcus, Jerram, Cate
Format Journal Article
LanguageEnglish
Published Bradford Emerald Group Publishing Limited 07.10.2014
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Purpose - The purpose of this paper is to investigate the human-based information security (InfoSec) vulnerabilities in three Australian government organisations. Design/methodology/approach - A Web-based survey was developed to test attitudes, knowledge and behaviour across eight policy-based focus areas. It was completed by 203 participants across the three organisations. This was complemented by interviews with senior management from these agencies. Findings - Overall, management and employees had reasonable levels of InfoSec awareness. However, weaknesses were identified in the use of wireless technology, the reporting of security incidents and the use of social networking sites. These weaknesses were identified in the survey data of the employees and corroborated in the management interviews. Research limitations/implications - As with all such surveys, responses to the questions on attitude and behaviour (but not knowledge) may have been influenced by the social desirability bias. Further research should establish more extensive baseline data for the survey and examine its effectiveness in assessing the impact of training and risk communication interventions. Originality/value - A new survey tool is presented and tested which is of interest to academics as well as management and IT systems (security) auditors.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:0968-5227
2056-4961
2056-497X
DOI:10.1108/IMCS-10-2013-0078