Title: A case for information security awareness (ISA) programmes to protect global information, innovation and knowledge resources

Authors: Roberto J. Mejias; Michael G. Harvey

Addresses: Department of Information Systems, W.P. Carey School of Business, Arizona State University, Tempe, Arizona 85287, USA ' Department of Management, School of Business Administration, University of Mississippi, 38677, USA; School of Business Administration, Bond University, Robina Queensland 4229, Australia

Abstract: The global diffusion of new technology, the increasing use of Web 2.0 networking and cloud computing have enable organisations to exchange significant amounts of information and knowledge. The successful transfer of knowledge and innovation has become critical to organisational competitiveness and survival. However, increased connectivity and unrestricted information sharing has rendered global organisations vulnerable to cyber-threats capable of breaching databases and restricted information. As cyber-attacks have become increasingly successful, organisations have invested more into cyber-safeguards to protect intellectual property and strategic data. Often absent in this strategic equation is the dissemination of knowledge to employees regarding the impact of cyber-attacks and how to protect informational resources. Research demonstrates that cyber-attacks are deterred and mitigated by the use of information security awareness (ISA) programmes. This paper discusses key components recommended for a viable ISA programme for global organisations seeking to educate their employees on the due care to protect knowledge resources and intellectual property.

Keywords: information security awareness; ISA training; cyber threats; cyber attacks; IP protection; intellectual property; strategic information protection; knowledge transfer; innovation transfer; cyber safeguards; strategic data; data protection; knowledge resources.

DOI: 10.1504/IJTIS.2012.051535

International Journal of Transitions and Innovation Systems, 2012 Vol.2 No.3/4, pp.302 - 324

Received: 17 Oct 2012
Accepted: 16 Nov 2012

Published online: 30 Sep 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article