{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:39:37Z","timestamp":1775745577470,"version":"3.50.1"},"reference-count":7,"publisher":"Emerald","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,10,1]]},"abstract":"<jats:p>This article investigates the evolution of computing, with specific reference to the security issues involved. These issues are then taken further to determine the need for education in the workplace through an information security awareness program. Techniques borrowed from the field of social psychology, which have been largely ignored in current awareness programs, are highlighted in order to show how they could be utilized to improve the effectiveness of the awareness program.<\/jats:p>","DOI":"10.1108\/09685229810227649","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"167-173","source":"Crossref","is-referenced-by-count":139,"title":["Information security awareness: educating your users effectively"],"prefix":"10.1108","volume":"6","author":[{"given":"M.E.","family":"Thomson","sequence":"first","affiliation":[{"name":"Port Elizabeth Technikon, Port Elizabeth, South Africa"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"von Solms","sequence":"additional","affiliation":[{"name":"Port Elizabeth Technikon, Port Elizabeth, South Africa"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"2025072819525579300_b1","unstructured":"Baron, R.A.\n           and Byrne, D. (1991), Social Psychology - Understanding Human Interaction, Allyn and Bacon, Boston, MA."},{"key":"2025072819525579300_b2","unstructured":"Greenberg, J.\n           and Baron, R.A. (1993), Behavior in Organisations, Allyn and Bacon, Boston, MA."},{"key":"2025072819525579300_b3","unstructured":"Haber, A.\n           and Runyon, R.P. (1986), Fundamentals of Psychology, 4th ed., Random House, New York, NY."},{"issue":"10","key":"2025072819525579300_b4","first-page":"1","article-title":"Psychological factors in the implementation of information security policy","volume":"XXI","author":"Kabay","year":"1994","journal-title":"EDPACS, The EDP Audit, Control, and Security Newsletter"},{"key":"2025072819525579300_b5","unstructured":"Schaeffer, H.\n           (1987), Data Center Operations, 2nd ed., Prentice-Hall, Englewood Cliffs, NJ."},{"key":"2025072819525579300_b6","unstructured":"Shelley, G.B.\n          , Cashman, T.J., Waggoner, G.A. and Waggoner, W.C. (1992), Complete Computer Concepts, Boyd and Fraser, Danvers."},{"key":"2025072819525579300_b7","unstructured":"Zimbardo, P.G.\n           and Leippe, M.R. (1991), The Psychology of Attitude Change and Social Influence, McGraw-Hill, New York, NY."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229810227649","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810227649\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/6\/4\/167\/1246861\/09685229810227649.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/6\/4\/167\/1246861\/09685229810227649.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T23:53:01Z","timestamp":1753746781000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ics\/article\/6\/4\/167\/182339\/Information-security-awareness-educating-your"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,10,1]]},"references-count":7,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1998,10,1]]}},"URL":"https:\/\/doi.org\/10.1108\/09685229810227649","relation":{},"ISSN":["0968-5227","1758-5805"],"issn-type":[{"value":"0968-5227","type":"print"},{"value":"1758-5805","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998,10,1]]}}}