Cybersecurity Awareness

somdn_product_page

(Downloads - 0)

For more info about our services contact : help@bestpfe.com

Table of contents

1. Introduction
1.1 Research Question
1.2 Delimitation
1.3 Disposition
2. Theoretical Background
2.1 Related research
2.2 Cybersecurity awareness programs
2.3 Motivation theory
2.3.1 Protection motivation theory
2.4 Understanding the barriers
3. Research Method
3.1 Research methodology
3.2 Case study approach
3.3 Case study participants selection
3.4 Case study design
3.5 Data collection
3.5.1 Primary data source: Interviews
3.6 Data Analysis
4. Findings
4.1 Theme 1: Using different engaging techniques
4.2 Theme 2: Making it personal and relatable
4.3 Theme 3: Utilising leadership commitment
4.4 Theme 4: Embracing technical controls
5. Discussion
5.1 Discussion of findings
5.2 Implications for practice
5.3 Limitations and future research
6. Conclusion
References
Appendix A. Interview Protocol Guide

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *