User Awareness Design for Electronic Money User Using Protection Motivation Theory and NIST 800-50 Framework
Abstract
Keywords
Full Text:
PDFReferences
R. E. Crossler, “Protection motivation theory: Understanding determinants to backing up personal data,” in Proceedings of the Annual Hawaii International Conference on System Sciences, 2010.
Bank Indonesia, “Peraturan Bank Indonesia Nomor 20/6/PBI/2018, Tentang Uang Elektronik.” Jakarta.
M. Wilson and J. Hash, “SP 800-50, Building an Information Technology Security Awareness and Training Program,” Washington D.C., 2003.
R. LaRose, N. J. Rifon, and R. Enbody, “Promoting personal responsibility for internet safety,” Commun. ACM, vol. 51, no. 3, pp. 71–76, 2008.
D. J. C. Brosdahl and J. M. Carpenter, “Shopping orientations of US males: A generational cohort comparison,” J. Retail. Consum. Serv., vol. 18, no. 6, pp. 548–554, 2011.
R. N. Bolton et al., “Understanding Generation Y and their use of social media: A review and research agenda,” J. Serv. Manag., vol. 24, no. 3, pp. 245–267, 2013.
European Payment Council, “Payment Threats and Fraud Trends Report,” 2018. [Online]. Available: availableat:https://www.europeanpaymentscouncil.eu. [Accessed: 24-Apr-2019].
M. Bada, A. M. Sasse, and J. R. C. Nurse, “Cyber security awareness campaigns: Why do they fail to change behaviour?,” in International Conference on Cyber Security for Sustainable Society, 2015.
Techinasia.com, “Connecting Asia’s Startup Ecosystem,” Tech in Asia, 2019. [Online]. Available: https://www.techinasia.com/fake-qr-code-scams-china. [Accessed: 18-Jun-2019].
ELSAM Multimedia, “Infografis Kasus Penyalahgunaan Data Pribadi Sepanjang 2013-2017,” ELSAM Multimedia, 2019. [Online]. Available: https://multimedia.elsam.or.id/infografis-kasus-penyalahgunaan-data-pribadi-sepanjang-2013-2017/. [Accessed: 13-Jun-2019].
Stay Safe Online, “Get Online Safety Resources From the National Cyber Security Alliance,” 2019. [Online]. Available: https://staysafeonline.org/. [Accessed: 13-Jun-2019].
I-SAFE.org, “i-SAFE Home Content | iSAFE Ventures,” 2019. [Online]. Available: http://www.isafe.org/. [Accessed: 13-Jun-2019].
J. Abawajy, “User preference of cyber security awareness delivery methods,” J. Behav. Inf. Technol., vol. 33, no. 3, pp. 237–248, 2014.
V. Thomas and B. Gardner, Building an Information Security Awareness Program: Defending Against Social Engineering Hacks and Technical Threats. Waltham, MA: Syngress Publishing, 2014.
DOI: http://dx.doi.org/10.12962/j23546026.y2019i5.6380
Refbacks
- There are currently no refbacks.
View my Stat: Click Here
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.