{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T02:56:05Z","timestamp":1771037765554,"version":"3.50.1"},"reference-count":53,"publisher":"Informa UK Limited","issue":"6","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1080\/19393555.2024.2307632","type":"journal-article","created":{"date-parts":[[2024,1,21]],"date-time":"2024-01-21T17:21:25Z","timestamp":1705857685000},"page":"626-634","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Security literacy model for strategic, tactical, &amp; operational management levels"],"prefix":"10.1080","volume":"33","author":[{"given":"Garry L.","family":"White","sequence":"first","affiliation":[{"name":"Department of Information systems &amp; Analytics, Texas State University, San Marcos, Texas, USA"}]}],"member":"301","published-online":{"date-parts":[[2024,1,21]]},"reference":[{"issue":"3","key":"e_1_3_2_2_1","first-page":"249","article-title":"Internet security management: A joint postgraduate curriculum design","volume":"13","author":"Armstrong H.","year":"2002","unstructured":"Armstrong, H., & Jayaratna, N. (2002). Internet security management: A joint postgraduate curriculum design. Journal of Information Systems Education, 13(3), 249\u2013258.","journal-title":"Journal of Information Systems Education"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2012.10845654"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502666"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.009"},{"issue":"7","key":"e_1_3_2_6_1","first-page":"44","article-title":"You\u2019ve got mail \u2026 .And security breaches","volume":"25","author":"Britt P.","year":"2008","unstructured":"Britt, P. (2008). You\u2019ve got mail \u2026 .And security breaches. Information Today, 25(7), 44.","journal-title":"Information Today"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2012.11645573"},{"key":"e_1_3_2_9_1","volume-title":"What is cyber literacy and why is it important?","author":"Devon","year":"2018","unstructured":"Devon. (2018, November 23). What is cyber literacy and why is it important?. Cybint Solutions. https:\/\/www.cybintsolutions.com\/what-is-cyber-literacy-why-important\/"},{"key":"e_1_3_2_10_1","unstructured":"Ezingeard J. N. McFadzean E. & Birchall D. (2004). Board of directors and information security: A perception grid. Paper No. 222 in Proceedings of British Academy of Management Conference Harrogatte."},{"issue":"4","key":"e_1_3_2_11_1","first-page":"33","article-title":"Lizards in the street! Introducing cybersecurity awareness in a digital literacy context","volume":"18","author":"Frydenberg M.","year":"2020","unstructured":"Frydenberg, M., & Lorenz, B. (2020). Lizards in the street! Introducing cybersecurity awareness in a digital literacy context. Information Systems Education Journal, 18(4), 33\u201345.","journal-title":"Information Systems Education Journal"},{"issue":"16","key":"e_1_3_2_12_1","first-page":"32","article-title":"Security training 101","volume":"26","author":"Haber L.","year":"2009","unstructured":"Haber, L. (April, 2009). Security training 101. Network World, 26(16), 32\u201333.","journal-title":"Network World"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1697860"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.18260\/1-2\u20148741"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2019.1685142"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2012.6462423"},{"issue":"12","key":"e_1_3_2_17_1","first-page":"118","article-title":"Security and risk assessment","volume":"144","author":"Kalbaugh G. E.","year":"2001","unstructured":"Kalbaugh, G. E. (2001, December). Security and risk assessment. Rough Notes, 144(12), 118\u2013119.","journal-title":"Rough Notes"},{"issue":"3","key":"e_1_3_2_18_1","first-page":"237","article-title":"Education requirement analysis for information security professionals in Korea","volume":"13","author":"Kim S.","year":"2002","unstructured":"Kim, S., & Choi, M. (2002). Education requirement analysis for information security professionals in Korea. Journal of Information Systems Education, 13(3), 237\u2013247.","journal-title":"Journal of Information Systems Education"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1108\/02635570510616111"},{"issue":"3","key":"e_1_3_2_20_1","first-page":"66","article-title":"Protect your business against dangerous information leaks","volume":"78","author":"Kirkpatrick J.","year":"2006","unstructured":"Kirkpatrick, J. (2006). Protect your business against dangerous information leaks. Machine Design, 78(3), 66.","journal-title":"Machine Design"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2009.03.002"},{"key":"e_1_3_2_22_1","first-page":"12","article-title":"Managing information security","author":"Lohmeyer D.","year":"2002","unstructured":"Lohmeyer, D., McCrory, J., & Pogreb, S. (June 1,2002). Managing information security. The McKinsey Quarterly. 12\u201314.","journal-title":"The McKinsey Quarterly"},{"key":"e_1_3_2_23_1","first-page":"35","article-title":"COMPTIA: End-user training is critical to security","volume":"1194","author":"McLaughlin K.","year":"2006","unstructured":"McLaughlin, K. (April 28, 2006). COMPTIA: End-user training is critical to security. CRN, 1194, 35.","journal-title":"CRN"},{"key":"e_1_3_2_24_1","article-title":"Everything you\u2019ve ever wanted to know about bloom\u2019s taxonomy","author":"McNulty N.","year":"2022","unstructured":"McNulty, N. (2022). Everything you\u2019ve ever wanted to know about bloom\u2019s taxonomy. Learning by Design. https:\/\/www.niallmcnulty.com\/2019\/12\/introduction-to-blooms-taxonomy\/","journal-title":"Learning by Design"},{"key":"e_1_3_2_25_1","volume-title":"After reading, writing and arithmetic, the 4th \u2018r\u2019 of literacy is cyber-risk","author":"Mee P.","year":"2020","unstructured":"Mee, P., & Brandenburg, R. (2020). After reading, writing and arithmetic, the 4th \u2018r\u2019 of literacy is cyber-risk. World Economic Forum. https:\/\/www.weforum.org\/agenda\/2020\/12\/cyber-risk-cyber-security-education\/"},{"issue":"2","key":"e_1_3_2_26_1","first-page":"91","article-title":"Information security activities of college students: An exploratory study","volume":"14","author":"Mensch S.","year":"2011","unstructured":"Mensch, S., & Wilkie, L. (2011). Information security activities of college students: An exploratory study. Academy of Information and Management Sciences Journal, 14(2), 91\u2013116.","journal-title":"Academy of Information and Management Sciences Journal"},{"key":"e_1_3_2_27_1","volume-title":"Information security: Principles and practices","author":"Merkow M.","year":"2006","unstructured":"Merkow, M., & Breithaupt, J. (2006). Information security: Principles and practices. Pearson\/Prentice Hall."},{"issue":"1","key":"e_1_3_2_28_1","first-page":"55","article-title":"Aligning the information security policy with the strategic information systems plan","volume":"25","author":"Misra S.","year":"2007","unstructured":"Misra, S., Kumar, V., & Kumar, U. (2007). Aligning the information security policy with the strategic information systems plan. Computers & Security, 25(1), 55.","journal-title":"Computers & Security"},{"key":"e_1_3_2_29_1","volume-title":"The art of deception","author":"Mitnick K.","year":"2002","unstructured":"Mitnick, K. (2002). The art of deception. John Wiley & Sons."},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-12r1"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)04021-9"},{"key":"e_1_3_2_32_1","volume-title":"Developing cybersecurity literacy in the workplace","author":"Oesch T.","year":"2016","unstructured":"Oesch, T. (2016). Developing cybersecurity literacy in the workplace. Training Industry. https:\/\/trainingindustry.com\/articles\/compliance\/developing-cybersecurity-literacy-in-the-workplace\/"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1201\/1079.07366981\/45423.33.1.20050701\/89329.1"},{"issue":"12","key":"e_1_3_2_34_1","first-page":"46","article-title":"Security goes to school","volume":"50","author":"Piazza P.","year":"2006","unstructured":"Piazza, P. (2006). Security goes to school. Security Management, 50(12), 46.","journal-title":"Security Management"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2007.11645992"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1108\/09670730510586986"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750704"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.09.004"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701260579"},{"issue":"2","key":"e_1_3_2_40_1","first-page":"67","article-title":"Finding security","volume":"4","author":"Rangaswami M. R.","year":"2005","unstructured":"Rangaswami, M. R. (2005, February). Finding security. Optimize, 4(2), 67\u201368.","journal-title":"Optimize"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.07.008"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1108\/INTR-02-2021-0087"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.11.009"},{"issue":"3","key":"e_1_3_2_45_1","first-page":"173","article-title":"Accommodating information security in our curricula","volume":"13","author":"Surendran K.","year":"2002","unstructured":"Surendran, K., Ki-Yoon, K., & Harris, A. (2002). Accommodating information security in our curricula. Journal of Information Systems Education, 13(3), 173\u2013176.","journal-title":"Journal of Information Systems Education"},{"issue":"1","key":"e_1_3_2_46_1","first-page":"253","article-title":"Basic cyber defence education for everyone","volume":"16","author":"T\u0103bu\u015fc\u0103 A.","year":"2022","unstructured":"T\u0103bu\u015fc\u0103, A., & T\u0103bu\u015fc\u0103, S. (2022). Basic cyber defence education for everyone. Journal of Information Systems & Operations Management, 16(1), 253\u2013263. https:\/\/libproxy.txstate.edu\/login?url=https:\/\/www.proquest.com\/scholarly-journals\/basic-cyber-defence-education-everyone\/docview\/2696902221\/se-2","journal-title":"Journal of Information Systems & Operations Management"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2007.11645971"},{"key":"e_1_3_2_48_1","volume-title":"Security literacy?","author":"Tills C.","year":"2017","unstructured":"Tills, C. (2017, August). Security literacy?. Clear Security Communication. https:\/\/www.clairetills.com\/post\/2017\/08\/16\/security-literacy"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.04.004"},{"issue":"4","key":"e_1_3_2_50_1","first-page":"44","article-title":"Breaches lead to employee training","volume":"54","author":"Wagley J.","year":"2010","unstructured":"Wagley, J. (2010). Breaches lead to employee training. Secure Manage, 54(4), 44.","journal-title":"Secure Manage"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2009.11645326"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1864680"},{"key":"e_1_3_2_53_1","volume-title":"Principles of information security","author":"Whitman M. E.","year":"2005","unstructured":"Whitman, M. E., & Mattord, H. J. (2005). Principles of information security (Second ed.). Thomson\/Course Technology."},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-16"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2006.11645910"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2024.2307632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:18:34Z","timestamp":1731284314000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2024.2307632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,21]]},"references-count":53,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["10.1080\/19393555.2024.2307632"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2024.2307632","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-01-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}