{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:00:17Z","timestamp":1772802017798,"version":"3.50.1"},"reference-count":44,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2008,10,10]],"date-time":"2008-10-10T00:00:00Z","timestamp":1223596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10,10]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The aim of this research is to make users aware of the importance surrounding the issue of security and security awareness while at the same time making educators as well as other individuals aware of the differing effects of cultural dimensions into the learning process.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>An inter\u2010cultural study was conducted to investigate if users from the USA and Taiwan exposed to the same situational awareness learning would have different performance in those security awareness outcomes.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The findings confirm that American users who received the situational learning outperformed those users who received the traditional face\u2010to\u2010face instruction. Taiwanese users did not perform significantly differently between these two treatments.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The study was only focused on two countries and therefore may limit its implications worldwide. But the study does show that global citizens also react differently to security awareness as would be expected due to differing cultures. Certainly, awareness of the risks and safeguards is the first line of defense that can be employed by any individual, but how individuals address these risks can be very dissimilar in different cultures. Therefore, the implications are apparent that the issue of security awareness should be studied from different cultural perspectives.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper offers original findings and value into the investigation of whether or not situational security awareness training is culturally\u2010bounded.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685220810908787","type":"journal-article","created":{"date-parts":[[2008,10,25]],"date-time":"2008-10-25T07:02:49Z","timestamp":1224918169000},"page":"360-376","source":"Crossref","is-referenced-by-count":49,"title":["A cross\u2010cultural investigation of situational information security awareness programs"],"prefix":"10.1108","volume":"16","author":[{"given":"Charlie C.","family":"Chen","sequence":"first","affiliation":[]},{"given":"B.","family":"Dawn Medlin","sequence":"additional","affiliation":[]},{"given":"R.S.","family":"Shaw","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020720333310100_b1","doi-asserted-by":"crossref","unstructured":"Albrechtsen, E. (2007), \u201cA qualitative study of user's view on information security\u201d, Computers & Security, Vol. 26 No. 4, p. 276.","DOI":"10.1016\/j.cose.2006.11.004"},{"key":"key2022020720333310100_b2","unstructured":"Agrawal, V.K., Haleem, A. and Sushil (2003), \u201cSuccessful implementation of business process reengineering and computer based information systems: awareness and training program (NIST SP 800\u201050)\u201d, National Social Science Journal, Vol. 20 No. 2, pp. 1\u201016."},{"key":"key2022020720333310100_b44","doi-asserted-by":"crossref","unstructured":"Batra, R. and Ray, M.L. (1986), \u201cSituational effects of advertising repetition: the moderating influence of motivation, ability, and opportunity to respond\u201d, Journal of Consumer Research, Vol. 12, pp. 432\u201045.","DOI":"10.1086\/208528"},{"key":"key2022020720333310100_b3","doi-asserted-by":"crossref","unstructured":"Bia, M. and Kalika, M. (2007), \u201cAdopting an ICT code of conduct: an empirical study of organizational factors\u201d, Journal of Enterprise Information Management, Vol. 20 No. 4, p. 432.","DOI":"10.1108\/17410390710772704"},{"key":"key2022020720333310100_b4","doi-asserted-by":"crossref","unstructured":"Branzei, O., Vertinsky, I. and Camp, R.D. (2007), \u201cCulture\u2010contingent signs of trust in emergent relationships\u201d, Organizational Behavior & Human Decision Processes, Vol. 104 No. 1, pp. 61\u201082.","DOI":"10.1016\/j.obhdp.2006.11.002"},{"key":"key2022020720333310100_b5","doi-asserted-by":"crossref","unstructured":"Charbaji, A. and Jannoun, S.E.L. (2005), \u201cIndividuality, willingness to take risk, and use of a personal e\u2010card: a Lebanese study\u201d, Journal of Managerial Psychology, Vol. 20 No. 1, pp. 51\u20108.","DOI":"10.1108\/02683940510571649"},{"key":"key2022020720333310100_b6","doi-asserted-by":"crossref","unstructured":"Dominguez, C., Vidulich, M., Vogel, E. and Mcmillan, G. (1994), Situation Awareness: Papers and Annotated Bibliography, Armstrong Laboratory, Human System Center.","DOI":"10.21236\/ADA284752"},{"key":"key2022020720333310100_b7","doi-asserted-by":"crossref","unstructured":"Endsley, M. (1995), \u201cMeasurement of situation awareness in dynamic systems\u201d, Human Factors, Vol. 37 No. 1, pp. 65\u201084.","DOI":"10.1518\/001872095779049499"},{"key":"key2022020720333310100_b8","unstructured":"Endsley, M. and Garland, D. (2000), Experimental Analysis and Measurement of Situation Awareness, Embry\u2010Little University Press, Daytona Beach, FL."},{"key":"key2022020720333310100_b9","doi-asserted-by":"crossref","unstructured":"Ess, C. (2006), \u201cEthical pluralism and global information ethics\u201d, Ethics and Information Technology, Vol. 8 No. 4, pp. 215\u201026.","DOI":"10.1007\/s10676-006-9113-3"},{"key":"key2022020720333310100_b10","unstructured":"Filipek, R. (2007), \u201cEuropean nations make security a high priority\u201d, The Internal Auditor, Vol. 64 No. 5, pp. 15\u201017."},{"key":"key2022020720333310100_b11","doi-asserted-by":"crossref","unstructured":"Floridi, L. (2006), \u201cFour challenges for a theory of information privacy\u201d, Ethics and Information Technology, Vol. 8 No. 3, pp. 109\u201019.","DOI":"10.1007\/s10676-006-9121-3"},{"key":"key2022020720333310100_b12","unstructured":"Fracker, M. (1991), Measures of Situation Awareness: Review and Future Directions, Armstrong Laboratories, Wright Patterson Air Force Base, OH."},{"key":"key2022020720333310100_b16","unstructured":"Gibson, B. (2006), \u201cMobile is ideal channel for casual gambling\u201d, New Media Age, p. 7."},{"key":"key2022020720333310100_b42","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Richardson, R. (2006), 2006 CSI\/FBI Computer Crime and Security Survey, Computer Security Institute."},{"key":"key2022020720333310100_b17","unstructured":"Grant, I. (2007), \u201cDaimlerChrysler security drive targets 360,000 staff\u201d, Computer Weekly, p. 4."},{"key":"key2022020720333310100_b18","unstructured":"Harrington, J. (2005), \u201cSen. Baucus relishes resisting Bush's social security privatization plan\u201d, Knight Rider Tribune Business News, August 16."},{"key":"key2022020720333310100_b21","unstructured":"Hofstede, G. (1991), Cultures and Organizations: Software of the Mind, McGraw\u2010Hill, London."},{"key":"key2022020720333310100_b22","doi-asserted-by":"crossref","unstructured":"Hofstede, G. (1993), \u201cCultural constraints in management theories\u201d, Academy of Management Executive, Vol. 7 No. 1, pp. 81\u201094.","DOI":"10.5465\/ame.1993.9409142061"},{"key":"key2022020720333310100_b20","doi-asserted-by":"crossref","unstructured":"Hofstede, G. and Bond, M. (1988), \u201cThe confucius connection: from cultural roots to economic growth\u201d, Organizational Dynamics, Vol. 16 No. 4, pp. 4\u201021.","DOI":"10.1016\/0090-2616(88)90009-5"},{"key":"key2022020720333310100_b23","doi-asserted-by":"crossref","unstructured":"Hoppe, M. (2004), \u201cIntroduction: Geert Hofstede's culture's consequences: international differences in work\u2010related values\u201d, Academy of Management Executive, Vol. 18 No. 1, pp. 73\u20104.","DOI":"10.5465\/ame.2004.12689661"},{"key":"key2022020720333310100_b24","unstructured":"Huse, E.F. and Cummings, T.G. (1985), Organization Development and Change, West, New York, NY."},{"key":"key2022020720333310100_b26","doi-asserted-by":"crossref","unstructured":"Kavan, C.B., O'Hara, M.T., Patterson, E.C. and Bostrom, R.P. (1999), \u201cExcellence in client\/server information system implementations: understanding the STS connection\u201d, Management Decision, Vol. 37 No. 3, pp. 295\u2010304.","DOI":"10.1108\/00251749910264532"},{"key":"key2022020720333310100_b43","doi-asserted-by":"crossref","unstructured":"Kirkman, B.L. and Shapiro, D.L. (1997), \u201cThe impact of cultural values on employee resistance to teams: towards a model of globalized self\u2010managed work teams effectiveness\u201d, Journal of International Business Studies, Vol. 22 No. 3, pp. 730\u201057.","DOI":"10.5465\/amr.1997.9708210724"},{"key":"key2022020720333310100_b27","doi-asserted-by":"crossref","unstructured":"Kucuk, S.U. (2002), \u201cThe changing consumerism with the internet: a global perspective\u201d, Journal of Euro \u2013 Marketing, Vol. 12 No. 1, p. 41.","DOI":"10.1300\/J037v12n01_04"},{"key":"key2022020720333310100_b15","doi-asserted-by":"crossref","unstructured":"Lipsey, M.W. and Wilson, D.B. (1993), \u201cThe efficacy of psychological, educational, and behavioral treatment: confirmation from meta\u2010analysis\u201d, American Psychologist, Vol. 48, pp. 1181\u2010209.","DOI":"10.1037\/0003-066X.48.12.1181"},{"key":"key2022020720333310100_b28","doi-asserted-by":"crossref","unstructured":"McCoy, S., Galletta, D.F. and William, R. (2005), \u201cIntegrating national culture into IS research\u201d, Communications of AIS, Vol. 2005 No. 15, pp. 211\u201024.","DOI":"10.17705\/1CAIS.01512"},{"key":"key2022020720333310100_b29","doi-asserted-by":"crossref","unstructured":"Montealegre, R. (1998), \u201cManaging information technology in modernizing \u2018against the odds\u2019: lesson from an organization in a less\u2010developed country\u201d, Information & Management, Vol. 34, pp. 103\u201016.","DOI":"10.1016\/S0378-7206(98)00051-2"},{"key":"key2022020720333310100_b30","doi-asserted-by":"crossref","unstructured":"Moon, J., Chadee, D. and Tikoo, S. (2008), \u201cCulture, product type, and price influences on consumer purchase intention to buy personalized products online\u201d, Journal of Business Research, Vol. 61 No. 1, pp. 31\u20109.","DOI":"10.1016\/j.jbusres.2006.05.012"},{"key":"key2022020720333310100_b31","unstructured":"PriceWaterHouseCoopers (2006), \u201cInformation security breaches survey 2006\u201d, available at: www.pwc.com\/uk\/eng\/ins\u2010sol\/publ\/pwc_dti\u2010fullsurveyresults06.pdf (accessed November 24, 2007)."},{"key":"key2022020720333310100_b41","unstructured":"PR Newswire (2007), \u201cBlue coat and New York State PTA to raise awareness on child internet safety; joint initiative launched in recognition of cyber security awareness month to educate members, parents and community on the impact of internet dangers\u201d, PR Newswire, New York, NY."},{"key":"key2022020720333310100_b32","doi-asserted-by":"crossref","unstructured":"Probst, T.M. and Lawler, J. (2006), \u201cCultural values as moderators of the outcomes of job insecurity: the role of individualism and collectivism\u201d, Applied Psychology: An International Review, Vol. 55, pp. 234\u201054.","DOI":"10.1111\/j.1464-0597.2006.00239.x"},{"key":"key2022020720333310100_b45","doi-asserted-by":"crossref","unstructured":"Richins, M. and Bloch, P.H. (1986), \u201cAfter the new wears off: the temporal context of product involvement\u201d, Journal of Consumer Research, Vol. 13, pp. 280\u20105.","DOI":"10.1086\/209067"},{"key":"key2022020720333310100_b35","doi-asserted-by":"crossref","unstructured":"Rouse, W.B. and Morris, N.M. (1985), On Looking into the Blackbox: Prospects and Limits in the Search for Mental Models (DTIC#AD\u2010A159080), Center for Man\u2010Machine Systems Research, Georgia Institute of Technology, Atlanta, GA.","DOI":"10.21236\/ADA159080"},{"key":"key2022020720333310100_b36","doi-asserted-by":"crossref","unstructured":"Sarter, N. and Woods, D. (1991), \u201cSituation awareness: a critical but ill\u2010defined phenomenon\u201d, International Journal of Aviation Psychology, Vol. 1, pp. 45\u20107.","DOI":"10.1207\/s15327108ijap0101_4"},{"key":"key2022020720333310100_b37","unstructured":"Schoderbek, P.P., Schoderbek, C.G. and Kefalas, A.G. (1985), Management Systems: Conceptual Considerations, 3rd ed., Business Publications, Plano, TX."},{"key":"key2022020720333310100_b25","doi-asserted-by":"crossref","unstructured":"Tondel, I.A., Jaatun, M.G. and Meland, P.H. (2008), \u201cSecurity requirements for the rest of US: a survey\u201d, IEEE Software, Vol. 25 No. 1, p. 20.","DOI":"10.1109\/MS.2008.19"},{"key":"key2022020720333310100_b38","unstructured":"Triandis, H.C. (1991), Cross\u2010cultural Industrial and Organizational Psychology, Consulting Psychologists Press, Inc., Palo Alto, CA."},{"key":"key2022020720333310100_b39","doi-asserted-by":"crossref","unstructured":"Van Everdingen, Y.M. and Waarts, E. (2003), \u201cThe effect of national culture on the adoption of innovations\u201d, Marketing Letters, Vol. 14 No. 3, pp. 217\u201032.","DOI":"10.1023\/A:1027452919403"},{"key":"key2022020720333310100_b40","doi-asserted-by":"crossref","unstructured":"Wilson, M. and Hash, J. (2003), Building an Information Technology Security Awareness and Training Program, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD.","DOI":"10.6028\/NIST.SP.800-50"},{"key":"key2022020720333310100_b19","unstructured":"Wireless Asia (2005), \u201cHefty appetite for music on cellphones\u201d, available at: www.telecomasia.com (accessed November 14, 2007)."},{"key":"key2022020720333310100_frd1","unstructured":"CSI\/FBI (2006), \u201cComputer crime and security survey\u201d, Computer Security Institute, available at: www.gocsi.com\/forms\/fbi\/csi_fbi_survey.jhtml (accessed November 13, 2007)."},{"key":"key2022020720333310100_frd2","doi-asserted-by":"crossref","unstructured":"Gomez, C., Kirkman, B.L. and Shapiro, D.L. (2000), \u201cThe impact of collectivism and in\u2010group\/out\u2010group membership on the evaluation generosity of team members\u201d, the Academy of Management Journal, Vol. 43 No. 6, pp. 1097\u2010106.","DOI":"10.2307\/1556338"},{"key":"key2022020720333310100_frd3","doi-asserted-by":"crossref","unstructured":"Richins, M.L., Bloch, P.H. and McQuarrie, E.F. (1992), \u201cHow enduring and situational involvement combine to create involvement responses\u201d, Journal of Consumer Psychology, Vol. 1 No. 2, pp. 143\u201054.","DOI":"10.1016\/S1057-7408(08)80054-X"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220810908787","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220810908787\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220810908787\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:07Z","timestamp":1753402147000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/16\/4\/360-376\/181870"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,10]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,10,10]]}},"alternative-id":["10.1108\/09685220810908787"],"URL":"https:\/\/doi.org\/10.1108\/09685220810908787","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[2008,10,10]]}}}