<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Enhancing the SETA program with Mindfulness and Self-Efficacy</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jiri Vidgren</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Jyväskylä</institution>
          ,
          <country country="FI">Finland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The cyber threat landscape is constantly evolving. System vulnerabilities are identified and patched, digital defenses are strengthened, and policies are enforced. Still, the organization's most valuable resources, humans, are running their outdated operating systems without patching in sight. It is well proven that humans are the essential link in information security. With their humane feelings, emotions, thoughts, fears, hopes, and personal priorities, the users are more complicated to motivate, persuade, attract, and align with compliance than information systems. Mindfulness is a promising concept to assist users in pursuing more secure behavior and attitude, which proliferates in more secure organizations as a joint effort. Another promising strategy, developing self-efficacy, also appears to reinforce users' more secure behavior, thus complementing the benefits of mindfulness and contributing to the effectiveness of the security education, training, and awareness (SETA) program. However, incorporating the mentioned concepts with SETA programs needs to be researched further and with a broader scope. In this paper, future research is justified and motivated to discover and explore these promising approaches.</p>
      </abstract>
      <kwd-group>
        <kwd>1 SETA program</kwd>
        <kwd>Information Systems Security</kwd>
        <kwd>Mindfulness</kwd>
        <kwd>Self-Efficacy</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>From a highly abstract viewpoint, there are two
types of cyber-attacks: (1) digital system
vulnerability being exploited; or (2) a human
being acting maliciously against themselves or
their organization, intentionally or
unintentionally, and probably influenced by some
hoax or diversion. Technological advancements
have benefited defenders and attackers regarding
the recent history of information security.
Moreover, even considering that artificial
intelligence is assisting both sides to prosper in
their campaigns, the number of successful attacks
targeted at purely digital systems is decreasing
[1]. The malicious actors have always tried to
exploit “human firewalls” with phishing, social
engineering, and such human-targeted attempts.
Still, they are forced to expand and pivot more
towards humans to fund their business since
digital vulnerabilities are becoming scarce.</p>
      <p>
        In a modern business environment, where
information technology is ubiquitous [
        <xref ref-type="bibr" rid="ref1">2</xref>
        ],
countering emerging threats and securing data and
systems' confidentiality, integrity, and availability
is critical. However, users and employees,
primarily their actions, are secured with different
measures. The SETA program is a well-known
approach to enhancing users’ information security
awareness (ISA). Organizations have taken
unique approaches to implementing such
programs. While some organizations are putting
significant effort into the SETA program, some
are doing just the bare minimum in that segment.
Still, information security is often absent from the
top management’s table. [
        <xref ref-type="bibr" rid="ref2">3</xref>
        ].
      </p>
      <p>
        The foundation and anchoring point for
information security management should be an
appropriate information security policy [
        <xref ref-type="bibr" rid="ref2 ref3">3, 4</xref>
        ]
(ISP), which underlines the commitment of the
top management to information security.
However, information security is treated in many
organizations as a technical support function, and
information security is often regarded in corporate
strategy only by outsourcing the issue to IT
management [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6">4, 5, 6, 7</xref>
        ].
      </p>
      <p>
        ISPs have been described in various ways, with
distinct meanings in different organizations [
        <xref ref-type="bibr" rid="ref7">8</xref>
        ].
From the top management's information security
governance point of view, the function of ISP is
to "provide management direction and support for
information security in accordance with business
requirements and relevant laws and regulations."
[9, p. 96]. At the operational level, the ISP defines
the "rules and guidelines for the proper use of
organizational IS resources" [
        <xref ref-type="bibr" rid="ref9">10</xref>
        ].
      </p>
      <p>
        No matter how comprehensive the ISP is, user
compliance with the ISP is always under concern
[
        <xref ref-type="bibr" rid="ref10">11</xref>
        ]. For example, according to the study by
Siponen &amp; Vance [
        <xref ref-type="bibr" rid="ref11">12</xref>
        ], the users could employ the
"denial of the responsibility" [
        <xref ref-type="bibr" rid="ref12 ref13">13, 14</xref>
        ] of following
the ISP by appealing to unclear or absent
instructions. Regarding the same neutralization
theory, with the "denial of injury" -technique, a
user could argue that "no harm was caused" by
non-compliant ISP behavior [
        <xref ref-type="bibr" rid="ref13">14</xref>
        ]. Siponen et al.
[7, p. 217] claim, "A key threat to information
security comes from employees who do not
comply with information security policies." In a
recent report by Verizon [
        <xref ref-type="bibr" rid="ref14">15</xref>
        ], the human element
is involved in 82% of security breaches, proving
the challenge is persistent.
      </p>
      <p>
        One way to approach compliance is the
"security theatre" [
        <xref ref-type="bibr" rid="ref15">16</xref>
        ], where organizations are
just trying to write IS security procedures and
guidelines to make auditors happy. The aim and
motivation for these organizations are in the
certification (i.e., ISO/IEC 27001) itself, and not
in the holistic risk management, continuous
improvement of their information security
management system (ISMS), or focusing on the
users' IS security behavior [
        <xref ref-type="bibr" rid="ref16">17</xref>
        ]. In summary,
"compliance does not equal security." [17, p. 44].
      </p>
      <p>
        To achieve ISP compliance and attain an
adequate level of (IS) security, it is crucial to
emphasize the users' behavioral dimensions and
the socio-organizational aspects contributing to
the information security resilience of the
organization [
        <xref ref-type="bibr" rid="ref17">18</xref>
        ]. Precedent research has already
established the importance of information security
culture and its impact on the overall information
security levels in the organization [
        <xref ref-type="bibr" rid="ref18">19</xref>
        ]. For
organizations’ information security to thrive, a
security culture must be actively developed and
nurtured by balancing socio-technological
dimensions [
        <xref ref-type="bibr" rid="ref18 ref19">19, 20</xref>
        ]. In addition, there is evidence
that mere technical and procedural measures are
inadequate to engage with information security's
human dimension [
        <xref ref-type="bibr" rid="ref19">20</xref>
        ]. Understanding the users'
information security behavior (ISB) is a path
toward more efficient SETA programs.
      </p>
      <p>
        Mindfulness has been applied broadly
throughout information systems (IS) research.
Dernbecher and Beck [
        <xref ref-type="bibr" rid="ref20">21</xref>
        ] conducted an extensive
literature review regarding using mindfulness
concepts in IS research. As we advance,
mindfulness in IS security research is still
emerging and forming its shape. Mindfulness is a
promising approach to improve SETA programs
from an individual and organizational level. The
characteristics of mindfulness, such as orientating
in the present, giving attention to operational
detail, and being willing to consider alternative
perspectives [
        <xref ref-type="bibr" rid="ref21">22</xref>
        ], are rather practical approaches
regarding IS security. (Organizational)
Mindfulness has been suggested as a possible
approach for efficient ISP management [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ], and
enhancing the SETA program with mindfulness
has been pointed out as a future research direction
[
        <xref ref-type="bibr" rid="ref23">24</xref>
        ].
      </p>
      <p>
        Regarding ISP compliance, self-efficacy has
been a promising dimension to assess the
phenomena behind the users’ behavior and
motivation [
        <xref ref-type="bibr" rid="ref24">25</xref>
        ]. Self-efficacy, an essential
construct of social cognitive theory, refers to an
individual's belief in their ability to perform a
specific task [
        <xref ref-type="bibr" rid="ref25">26</xref>
        ]. Self-efficacy in information
security is developed through the ongoing
acquisition of knowledge related to information
security, possibly from the training that one
receives. Previous studies have shown the link
between self-efficacy and behavior; therefore,
information security self-efficacy is expected to
influence compliant behavior [
        <xref ref-type="bibr" rid="ref25 ref26">26, 27</xref>
        ].
      </p>
      <p>This paper examines and justifies tailoring the
SETA program by incorporating mindfulness and
self-efficacy. This paper aims to guide scholars to
empirically explore the validity and efficiency of
such tailoring. Also, the paper intends to instruct
the SETA program designers to modify their
information security curriculum respectively.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Security Education, Training, and</title>
    </sec>
    <sec id="sec-3">
      <title>Awareness (SETA) Program</title>
      <p>SETA is "a managerial program designed to
improve the security of information assets by
providing targeted knowledge, skills, and
guidance for an organization's employees" [28, p.
211]. A SETA program is built on three elements:
security education, security training, and security
awareness. These elements are introduced in table
1.</p>
      <p>
        ISA program is a sub-program of SETA. The
role of the ISA program is typically designed to
keep information security at the forefront of users'
minds and provide recognition of possible threats,
risks, and mitigations for those. Information
Security Training (IST) builds on the foundation
of ISA. The primary purpose of IST is to teach and
train the skills needed to perform the user's duties
securely. IST may also include security
workshops and hands-on practice to engage with
the users. The third level in SETA is Information
Security Education (ISE) program, which is not
on everybody's curriculum in the organization.
Generally, the information security professionals
are the users who are committed to ISE programs,
championing information security and possibly
pursuing also to certify their knowledge with
third-party institutions. [
        <xref ref-type="bibr" rid="ref28">29</xref>
        ].
2.1.
      </p>
    </sec>
    <sec id="sec-4">
      <title>SETA and ISP</title>
      <p>
        No matter what shape the SETA program
assumes, it is fundamentally grounded in ISP [
        <xref ref-type="bibr" rid="ref9">10</xref>
        ].
Moreover, typically, SETA programs rely on the
ISP as their primary means of instruction [
        <xref ref-type="bibr" rid="ref29">30</xref>
        ]. By
raising awareness among the users about security
issues, users better understand protecting
themselves, which safeguards the company and
the business. Eventually, it also fulfills the basic
requirements of the ISP. Peltier [
        <xref ref-type="bibr" rid="ref29">30</xref>
        ] also argue
that an adequate information security and
      </p>
      <sec id="sec-4-1">
        <title>Training</title>
        <p>"How"</p>
      </sec>
      <sec id="sec-4-2">
        <title>Knowledge</title>
      </sec>
      <sec id="sec-4-3">
        <title>Skill</title>
      </sec>
      <sec id="sec-4-4">
        <title>Practical Instruction</title>
        <p>• Lecture
• Case study
workshop
• Hands-on
practice</p>
      </sec>
      <sec id="sec-4-5">
        <title>Problem-Solving (Apply learning)</title>
      </sec>
      <sec id="sec-4-6">
        <title>Education "Why"</title>
      </sec>
      <sec id="sec-4-7">
        <title>Insight</title>
      </sec>
      <sec id="sec-4-8">
        <title>Understanding</title>
      </sec>
      <sec id="sec-4-9">
        <title>Theoretical Instruction</title>
        <p>• Discussion</p>
      </sec>
      <sec id="sec-4-10">
        <title>Seminar</title>
        <p>• Background</p>
      </sec>
      <sec id="sec-4-11">
        <title>Reading</title>
      </sec>
      <sec id="sec-4-12">
        <title>Essay (Interpret learning)</title>
      </sec>
      <sec id="sec-4-13">
        <title>Intermediate Long-term</title>
        <p>
          cybersecurity program cannot be implemented
without implementing an employee information
security awareness and training program (SETA)
as an underpinning foundation for information
security. Scholl et al. [
          <xref ref-type="bibr" rid="ref30">31</xref>
          ] also suggest qualities
like behavioral awareness and self-responsibility
for all employees to be educated, trained, and
measured aligned to the information security and
cybersecurity awareness training.
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>3. Mindfulness and SETA</title>
      <p>
        Mindfulness is a psychological construct
conceptualized on an individual level by Ellen J.
Langer, who presents mindfulness as a cognitive
process of alertness and dynamic awareness [
        <xref ref-type="bibr" rid="ref31">32</xref>
        ].
Based on Langer [
        <xref ref-type="bibr" rid="ref32">33</xref>
        ], the concept of mindfulness
revolves around certain psychological states that
are different versions of the same thing: (1)
openness to novelty; (2) alertness to distinction;
(3) sensitivity to different contexts; (4) implicit, if
not explicit, awareness of multiple perspectives;
and (5) orientation in the present. These
characteristics predominantly concern the
(individual) trait mindfulness, which is often
discriminated from more specific mindfulness
concepts, like IT mindfulness [
        <xref ref-type="bibr" rid="ref33">34</xref>
        ] and
Eastern/Western approaches to mindfulness [
        <xref ref-type="bibr" rid="ref20 ref34">35,
21</xref>
        ].
      </p>
    </sec>
    <sec id="sec-6">
      <title>Security</title>
      <p>
        In addition to the eastern, even religious (e.g.,
Buddhism) approaches, mindfulness is divided
and branched into many different sub-concepts,
broadly identified by current research. The most
notable differences, in general, are between the
Eastern and Western mindfulness traditions,
whereas the Eastern tradition is rarely integrated
with IS research [
        <xref ref-type="bibr" rid="ref20">21</xref>
        ]. Ray et al. [
        <xref ref-type="bibr" rid="ref35">36</xref>
        ] have
characterized more of these Western approaches
and highlighted primarily organizational
mindfulness. Organizational mindfulness has
been studied mainly from high-reliability
organizations (HROs) perspective [
        <xref ref-type="bibr" rid="ref34 ref36 ref37">37, 35, 38</xref>
        ].
HROs focus on a minimum level of variance in
performance, therefore aiming for reliability and
safety but also security as a priority [
        <xref ref-type="bibr" rid="ref36">37</xref>
        ]. Some
common examples of HROs are air traffic control
teams, nuclear power plants, law enforcement
special units (e.g., SWAT teams), and emergency
room staff.
      </p>
      <p>
        The most apparent counterpart for
organizational mindfulness is individual
mindfulness, the most interesting one regarding IS
security research from an individual's information
security awareness point of view. This paper
follows Langer’s perception of mindfulness [
        <xref ref-type="bibr" rid="ref32">33</xref>
        ].
It represents the Western tradition from an
individual perspective and focuses on external
factors like information categorization for solving
active and goal-oriented tasks [
        <xref ref-type="bibr" rid="ref20">21</xref>
        ].
      </p>
      <p>Motivating future research about incorporating
mindfulness in IS research, Dernbecher and Beck
[21, p. 138] encourage scholars by stating: "As a
result, we recommend that IS research endeavors
to extend the mindfulness concept by combining
it with existing theories from the IS discipline as
well as from other related disciplines."</p>
    </sec>
    <sec id="sec-7">
      <title>4. Enhancing</title>
    </sec>
    <sec id="sec-8">
      <title>Mindfulness</title>
    </sec>
    <sec id="sec-9">
      <title>SETA</title>
    </sec>
    <sec id="sec-10">
      <title>Program with</title>
      <p>
        The human factor of individual members is an
essential aspect of cybersecurity research. With
the users' humane approach and “outdated
operating system,” individual members are the
crucial link between business and technology in
the converged world ahead, where technology is
embedded in everything [
        <xref ref-type="bibr" rid="ref1">2</xref>
        ]. Embedded
technology will emerge new challenges related to
IS security, which eventually be coped with on an
individual level.
      </p>
      <p>
        SETA programs must be developed and
tailored to improve the perceived information
security level and protect the IS operating
environment of the organization [
        <xref ref-type="bibr" rid="ref29">30</xref>
        ]. However,
tailoring the awareness program “to fit” does not
end with tailoring by role and level of the user.
This paper argues that tailoring should also
include elements from mindfulness.
      </p>
      <p>
        Langer [
        <xref ref-type="bibr" rid="ref21 ref32">33, 22</xref>
        ] indicates that when individuals
feel elevated involvement and wakefulness in the
present, they are more likely to detect changes in
their setting and consequent opportunities for
action [
        <xref ref-type="bibr" rid="ref38">39</xref>
        ]. In addition, findings by Jensen et al.
[
        <xref ref-type="bibr" rid="ref39">40</xref>
        ] suggest that mindfulness techniques can be
successfully taught to individuals and that the
results of the training rise above mere awareness
of the level of behavior.
      </p>
    </sec>
    <sec id="sec-11">
      <title>4.1. Avoiding</title>
    </sec>
    <sec id="sec-12">
      <title>Program</title>
    </sec>
    <sec id="sec-13">
      <title>Mindless</title>
    </sec>
    <sec id="sec-14">
      <title>SETA</title>
      <p>
        Organizations often use rule-based
information security awareness programs to train
their users, where regular repetition leads to
mindless behavior [
        <xref ref-type="bibr" rid="ref39">40</xref>
        ]. Also, the chosen delivery
mediums might be incapable of delivering the
actual training content effectively, i.e., a tedious
video or an irrelevant web-based application is not
adequate to change the behavior of the users [
        <xref ref-type="bibr" rid="ref40">41</xref>
        ].
      </p>
      <p>
        Based on recent research results, Jensen et al.
discovered that rule-based training might be less
effective than other training approaches. They
noted the discrepancy between the training
participants’ self-estimated skills and actual
behavior considering targeted phishing attacks.
Jensen et al. conclude that the training may affect
attitudes and behavior differently [
        <xref ref-type="bibr" rid="ref39">40</xref>
        ].
Rulebased activity may spark confidence and
perceived expertise in the users’ intentions, but
improvements in protective behavior may not be
achieved.
      </p>
      <p>
        To avoid mindless SETA programs,
Nwachukwu et al. [
        <xref ref-type="bibr" rid="ref40">41</xref>
        ] have provided six tentative
design recommendations for SETA programs: (1)
Engaging participants through interaction and
active participation via different training delivery
methods [
        <xref ref-type="bibr" rid="ref41 ref42 ref43 ref44">42, 43, 44, 45</xref>
        ]; (2) ensuring contextual
relevance [
        <xref ref-type="bibr" rid="ref45">46</xref>
        ]; (3) taking the particular
susceptibility to threats in account to ensure
personal relevance [
        <xref ref-type="bibr" rid="ref45 ref46">46, 47</xref>
        ]; (4) using concrete
and strong fear appeal messages [
        <xref ref-type="bibr" rid="ref11 ref47 ref48">48, 49, 12</xref>
        ]; (5)
running training programs periodically [
        <xref ref-type="bibr" rid="ref49">50</xref>
        ], and
finally; (6) developing essential skills required to
the compliant behavior, rather than just
facilitating unidirectional messaging about the
desired outcome [
        <xref ref-type="bibr" rid="ref50">51</xref>
        ].
4.2.
      </p>
    </sec>
    <sec id="sec-15">
      <title>Towards Mindful SETA Program</title>
      <p>
        It is predominant for any SETA or ISA
program to aim to change the actual behavior
rather than just intentions. Jensen et al. have
indicated that incorporating mindfulness
techniques aids the transition from awareness to
real behavioral change [
        <xref ref-type="bibr" rid="ref39">40</xref>
        ]. According to Jensen
et al., the program content should be delivered
using engaging delivery methods with
corresponding audience portions and
supplementing such rule-based training with
mindfulness approaches [
        <xref ref-type="bibr" rid="ref39 ref45">40, 46</xref>
        ].
      </p>
      <p>
        The research by Jensen et al. [
        <xref ref-type="bibr" rid="ref39">40</xref>
        ] focuses on
mitigating phishing attacks with mindfulness
techniques. However, ENISA [
        <xref ref-type="bibr" rid="ref51">52</xref>
        ] has identified
multiple additional human-related emerging
threats, which cannot be mitigated without
changing the behavior of users. These threats
include advanced disinformation campaigns,
human errors, and skills shortages, which catalyze
challenges such as lack of knowledge, training,
and understanding [
        <xref ref-type="bibr" rid="ref51">52</xref>
        ]. Social engineering,
including the physical dimension, and threats
against data are also listed as human-related
emerging “prime threats” [1].
      </p>
      <p>
        Regarding the sustainable development of
security-aware culture, Bulgurcu et al. [
        <xref ref-type="bibr" rid="ref24">25</xref>
        ]
suggest that organizations should organize
security training to ensure users' self-efficacy,
which correlates strongly with users’ positive
information security behavior [
        <xref ref-type="bibr" rid="ref48 ref52 ref53">53, 54, 49</xref>
        ]. As the
results of Rhee et al. [54, p. 822] confirm:
“selfefficacy in information security (SEIS) is a
meaningful construct in explaining users’ security
practice behavior.”
      </p>
    </sec>
    <sec id="sec-16">
      <title>5. Discussion</title>
      <p>While technical countermeasures advance,
threat actors and cybercriminals are pivoting to
easier targets, like humans, which are relatively
more susceptible to security breaches. This
emerging trend will challenge organizations with
constantly evolving threats and strategies by
malicious actors. Users in different organizations,
roles, and levels need to be trained adequately to
support the individuals’ awareness and skills in
information security. The security culture in
organizations builds on active discussion,
interaction, involvement, participation, and user
cooperation. The positive development of the
security culture will depend on the organizations’
management decisions on whether to invest
(more) in SETA programs or not. For this culture
to thrive, organizations must take a humane
approach in their SETA programs and empower
the users to behave securely, sustain compliance
with ISP, and perform as the most vital link of
information security.</p>
      <p>Mindfulness should be integrated into SETA in
various formats and approaches to habilitate the
users from encountering unforeseen threats.
Current empirical research on mindfulness and
information security is narrowed to specific
interventions, such as phishing and identifying
fake news. However, mindfulness should be
studied empirically with other emerging,
extensive human-related information security
topics, like social engineering. A more
comprehensive approach would allow us also to
examine the physical dimension of security, in
which mindfulness could prove helpful.</p>
      <p>This paper is intended to bridge publication
between two articles related to a dissertation.
Therefore, the traditional IMRaD is not followed
precisely; for example, the methods and results
are absent. The primary purpose of this paper is to
motivate further research regarding the topic and
predispose the research recommendations for
critique and review.</p>
    </sec>
    <sec id="sec-17">
      <title>5.1. Recommendations for Future</title>
    </sec>
    <sec id="sec-18">
      <title>Research</title>
      <p>I suggest that mindfulness techniques should
be implemented in any SETA program, especially
in those which are more generic,
awarenessfocused, and therefore targeted to every user in the
organization. I assume it would naturally position
mindfulness as the foundation of information
security awareness training. Organizations should
also develop users' self-efficacy and enhance the
information security-aware culture organizations.
All in all, I allege that the humane approach could
result in more secure behavior, which is the root
of information security, as discussed. However,
this needs to be researched further. In addition, it
must be ensured that the behavior is measured, not
just the intention to behave or the self-estimated
level of awareness, perceived expertise, or
confidence about protecting the organization's
assets. Therefore, a sheer survey would not be
adequate to measure the sustaining effect of SETA
programs. Instead, empirical research is needed to
validate how mindfulness could be incorporated
into the SETA program with suitable
interventions and corresponding training with a
mindfulness angle. In addition, the possible
benefits of such an approach should be measured
and evaluated. Finally, introducing self-efficacy
development with the SETA program to pursue
secure behavior should also be considered a
substantial research opportunity.</p>
    </sec>
    <sec id="sec-19">
      <title>6. References</title>
      <p>[1] European Union Agency for Cybersecurity
(ENISA), "ENISA Threat Landscape
2022," European Union Agency for
Cybersecurity (ENISA), Athens, Greece,
2022.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dufva</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Megatrendit</source>
          <year>2020</year>
          ,
          <article-title>"</article-title>
          <string-name>
            <surname>Sitra</surname>
          </string-name>
          , Vantaa,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [3]
          <string-name>
            <surname>B. von Solms</surname>
          </string-name>
          and R. von Solms,
          <article-title>"The 10 deadly sins of information security management,"</article-title>
          <source>Computers &amp; Security</source>
          , vol.
          <volume>23</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>371</fpage>
          -
          <lpage>376</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Rothrock</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kaplan</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Van Der Oord</surname>
          </string-name>
          ,
          <article-title>"The Board's Role in Managing Cybersecurity Risks," MIT Sloan Management Review</article-title>
          , vol.
          <volume>59</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>12</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Siponen</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Oinas-Kukkonen</surname>
          </string-name>
          ,
          <article-title>"A review of information security issues and respective research contributions," ACM SIGMIS Database: the DATABASE for Advances in Information Systems</article-title>
          , vol.
          <volume>38</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>60</fpage>
          -
          <lpage>80</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [6]
          <string-name>
            <surname>B. von Solms</surname>
          </string-name>
          ,
          <article-title>"Corporate Governance and Information Security,"</article-title>
          <source>Computers &amp; Security</source>
          , vol.
          <volume>20</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>215</fpage>
          -
          <lpage>218</lpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Siponen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Mahmood</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Pahnila</surname>
          </string-name>
          ,
          <article-title>"Employees' adherence to information security policies: An exploratory field study,"</article-title>
          <source>Information &amp; Management</source>
          , vol.
          <volume>51</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>217</fpage>
          -
          <lpage>224</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baskerville</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Siponen</surname>
          </string-name>
          ,
          <article-title>"An information security meta‐policy for emergent organizations,"</article-title>
          <source>Logistics Information Management</source>
          , vol.
          <volume>15</volume>
          , no.
          <issue>5</issue>
          /6, pp.
          <fpage>337</fpage>
          -
          <lpage>346</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G.</given-names>
            <surname>Disterer</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>ISO/IEC 27000, 27001 and 27002 for Information Security Management," Journal of Information Security</source>
          , vol.
          <volume>4</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>92</fpage>
          -
          <lpage>100</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <surname>J. D'Arcy</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Hovav</surname>
            and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Galletta</surname>
          </string-name>
          ,
          <article-title>"User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach,"</article-title>
          <source>Information Systems Research</source>
          , vol.
          <volume>20</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>79</fpage>
          -
          <lpage>98</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Karjalainen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Siponen</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Sarker</surname>
          </string-name>
          ,
          <article-title>"Toward a stage theory of the development of employees' information security behavior,"</article-title>
          <source>Computers &amp; Security</source>
          , vol.
          <volume>93</volume>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Siponen</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Vance</surname>
          </string-name>
          ,
          <article-title>"Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations,"</article-title>
          <source>MIS Quarterly</source>
          , vol.
          <volume>34</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>487</fpage>
          -
          <lpage>502</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Rogers and M. D. Buffalo</surname>
          </string-name>
          ,
          <article-title>"Neutralization Techniques: Toward a Simplified Measurement Scale," The Pacific Sociological Review</article-title>
          , vol.
          <volume>17</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>313</fpage>
          -
          <lpage>331</lpage>
          ,
          <year>1974</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Sykes</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Matza</surname>
          </string-name>
          ,
          <article-title>"Techniques of Neutralization: A Theory of Delinquency," American Sociological Review</article-title>
          , vol.
          <volume>22</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>664</fpage>
          -
          <lpage>670</lpage>
          ,
          <year>1957</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Verizon</surname>
          </string-name>
          ,
          <article-title>"Data Breach Investigations Report (DBIR),"</article-title>
          <string-name>
            <surname>Verizon</surname>
          </string-name>
          , New York City, NY, USA,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>B.</given-names>
            <surname>Schneier</surname>
          </string-name>
          , Beyond Fear, Berlin: Springer,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>L.</given-names>
            <surname>Zinatullin</surname>
          </string-name>
          , The Psychology of Information Security:
          <article-title>Resolving conflicts between security compliance and human behaviour</article-title>
          , Cambridgeshire: IT Governance Publishing,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. T.</given-names>
            <surname>Martins</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Bernik</surname>
          </string-name>
          ,
          <article-title>"Information security: Listening to the perspective of organisational insiders,"</article-title>
          <source>Journal of Information Science</source>
          , vol.
          <volume>44</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>752</fpage>
          -
          <lpage>767</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <surname>J. Van Niekerk</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. Von</given-names>
            <surname>Solms</surname>
          </string-name>
          ,
          <article-title>"Information security culture: A management perspective,"</article-title>
          <source>Computers &amp; Security</source>
          , vol.
          <volume>29</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>476</fpage>
          -
          <lpage>486</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>P.</given-names>
            <surname>Puhakainen</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Siponen</surname>
          </string-name>
          ,
          <article-title>"Improving employees' compliance through information systems security training: An action research study,"</article-title>
          <source>MIS Quarterly: Management Information Systems</source>
          , vol.
          <volume>34</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>757</fpage>
          -
          <lpage>778</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Dernbecher</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Beck</surname>
          </string-name>
          ,
          <article-title>"The concept of mindfulness in information systems research: a multi-dimensional analysis,"</article-title>
          <source>European Journal of Information Systems</source>
          , vol.
          <volume>26</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>121</fpage>
          -
          <lpage>142</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>E. J.</given-names>
            <surname>Langer</surname>
          </string-name>
          ,
          <source>The Power of Mindful Learning</source>
          , Reading, MA: Addison-Wesley,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Parrish</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Kuhn</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. F.</given-names>
            <surname>Courtney</surname>
          </string-name>
          ,
          <article-title>"Mindful administration of IS security policies,"</article-title>
          <source>in 14th Americas Conference on Information Systems, AMCIS</source>
          <year>2008</year>
          , Toronto, ON, Canada,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [24]
          <string-name>
            <surname>A. D. Landress</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Parrish</surname>
            and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Terrell</surname>
          </string-name>
          ,
          <article-title>"Resiliency as an Outcome of SETA Programs,"</article-title>
          <source>in AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation</source>
          , Boston, MA, USA,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bulgurcu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Cavusoglu</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Benbasat</surname>
          </string-name>
          ,
          <article-title>"Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness,"</article-title>
          <source>MIS Quarterly</source>
          , vol.
          <volume>34</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>523</fpage>
          -
          <lpage>548</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bandura</surname>
          </string-name>
          ,
          <article-title>"Self-efficacy: Toward a unifying theory of behavioral change</article-title>
          .,
          <source>" Psychological Review</source>
          , vol.
          <volume>84</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>191</fpage>
          -
          <lpage>215</lpage>
          ,
          <year>1977</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Chambliss</surname>
          </string-name>
          and
          <string-name>
            <given-names>E. J.</given-names>
            <surname>Murray</surname>
          </string-name>
          ,
          <article-title>"Efficacy attribution, locus of control, and weight loss,"</article-title>
          <source>Cognitive Therapy and Research</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>349</fpage>
          -
          <lpage>353</lpage>
          ,
          <year>1979</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Whitman</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Mattord</surname>
          </string-name>
          ,
          <source>Principles of Information Security, 6th edition</source>
          , Boston, MA, USA: Cengage Learning,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [29]
          <article-title>National Institute of Standards and Technology (NIST), "An Introduction to Computer Security: the NIST Handbook," National Institute of Standards and Technology</article-title>
          , Gaithersburg,
          <string-name>
            <surname>MD</surname>
          </string-name>
          , USA,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>T. R.</given-names>
            <surname>Peltier</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Implementing an Information Security Awareness Program," Information Systems Security</source>
          , vol.
          <volume>14</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>49</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>M.</given-names>
            <surname>Scholl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. B.</given-names>
            <surname>Leiner</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Fuhrmann</surname>
          </string-name>
          ,
          <article-title>"Blind Spot: Do You Know the Effectiveness of Your Information Security Awareness-Raising Program?," Journal of systemics, cybernetics and informatics</article-title>
          , vol.
          <volume>15</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>58</fpage>
          -
          <lpage>62</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>E. J.</given-names>
            <surname>Langer</surname>
          </string-name>
          ,
          <article-title>"Minding Matters: The Consequences of MindlessnessMindfulness," Advances in Experimental Social Psychology</article-title>
          , vol.
          <volume>22</volume>
          , pp.
          <fpage>137</fpage>
          -
          <lpage>173</lpage>
          ,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>E. J.</given-names>
            <surname>Langer</surname>
          </string-name>
          , Mindfulness, Reading, MA: Perseus Books, cop.,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [34]
          <string-name>
            <surname>J. B. Thatcher</surname>
            , R. T. Wright,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>T. J.</given-names>
          </string-name>
          <string-name>
            <surname>Zagenczyk</surname>
            and
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Klein</surname>
          </string-name>
          ,
          <article-title>"Mindfulness in information technology use: Definitions, distinctions, and a new measure,"</article-title>
          <source>MIS Quarterly: Management Information Systems</source>
          , vol.
          <volume>42</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>831</fpage>
          -
          <lpage>847</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>K. E.</given-names>
            <surname>Weick and K. M. Sutcliffe</surname>
          </string-name>
          ,
          <article-title>"Mindfulness and the Quality of Organizational Attention,"</article-title>
          <source>Organization Science</source>
          , vol.
          <volume>17</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>514</fpage>
          -
          <lpage>524</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Ray</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. T.</given-names>
            <surname>Baker</surname>
          </string-name>
          and
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Plowman</surname>
          </string-name>
          ,
          <article-title>"Organizational Mindfulness in Business Schools," Academy of Management Learning &amp; Education</article-title>
          , vol.
          <volume>10</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>188</fpage>
          -
          <lpage>203</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Burns</surname>
          </string-name>
          ,
          <article-title>"Security organizing: A framework for organizational information security mindfulness," Data Base for Advances in Information Systems</article-title>
          , vol.
          <volume>50</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>14</fpage>
          -
          <lpage>27</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>T. J.</given-names>
            <surname>Vogus</surname>
          </string-name>
          and
          <string-name>
            <surname>K. M. Sutcliffe</surname>
          </string-name>
          ,
          <article-title>"Organizational mindfulness and mindful organizing: A reconciliation and path forward," Academy of Management Learning and Education</article-title>
          , vol.
          <volume>11</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>722</fpage>
          -
          <lpage>735</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>E. J.</given-names>
            <surname>Langer</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Moldoveanu</surname>
          </string-name>
          ,
          <article-title>"The Construct of Mindfulness,"</article-title>
          <source>Journal of Social Issues</source>
          , vol.
          <volume>56</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [40]
          <string-name>
            <surname>M. L. Jensen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Dinger</surname>
            ,
            <given-names>R. T.</given-names>
          </string-name>
          <string-name>
            <surname>Wright</surname>
            and
            <given-names>J. B.</given-names>
          </string-name>
          <string-name>
            <surname>Thatcher</surname>
          </string-name>
          ,
          <article-title>"Training to Mitigate Phishing Attacks Using Mindfulness Techniques,"</article-title>
          <source>Journal of Management Information Systems</source>
          , vol.
          <volume>34</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>597</fpage>
          -
          <lpage>626</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>U.</given-names>
            <surname>Nwachukwu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Vidgren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Niemimaa</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Järveläinen</surname>
          </string-name>
          ,
          <article-title>"Do SETA Interventions Change Security Behavior? - A Literature Review,"</article-title>
          <source>in 56th Hawaii International Conference on System Sciences, Lahaina</source>
          ,
          <string-name>
            <surname>HI</surname>
          </string-name>
          , Usa,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>M.</given-names>
            <surname>Karjalainen</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Siponen</surname>
          </string-name>
          ,
          <article-title>"Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches,"</article-title>
          <source>Journal of the Association for Information Systems</source>
          , vol.
          <volume>12</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>518</fpage>
          -
          <lpage>555</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>E.</given-names>
            <surname>Albrechtsen</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Hovden</surname>
          </string-name>
          ,
          <article-title>"Improving information security awareness and behaviour through dialogue, participation and collective reflection</article-title>
          .
          <source>An intervention study," Computers and Security</source>
          , vol.
          <volume>29</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>432</fpage>
          -
          <lpage>445</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>E.</given-names>
            <surname>Dincelli</surname>
          </string-name>
          and
          <string-name>
            <given-names>I.</given-names>
            <surname>Chengalur-Smith</surname>
          </string-name>
          ,
          <article-title>"Choose your own training adventure: designing a gamified SETA artefact for improving information security and privacy through interactive storytelling,"</article-title>
          <source>European Journal of Information Systems</source>
          , vol.
          <volume>29</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>669</fpage>
          -
          <lpage>687</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>S.</given-names>
            <surname>Abraham</surname>
          </string-name>
          and
          <string-name>
            <given-names>I.</given-names>
            <surname>Chengalur-Smith</surname>
          </string-name>
          ,
          <article-title>"Evaluating the effectiveness of learner controlled information security training,"</article-title>
          <source>Computers &amp; Security</source>
          , vol.
          <volume>87</volume>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>L.</given-names>
            <surname>Jaeger</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Eckhardt</surname>
          </string-name>
          ,
          <article-title>"Eyes wide open: The role of situational information security awareness for security-related behaviour,"</article-title>
          <source>Information Systems Journal</source>
          , vol.
          <volume>31</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>429</fpage>
          -
          <lpage>471</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>R.</given-names>
            <surname>Wright</surname>
          </string-name>
          and
          <string-name>
            <given-names>K. T.</given-names>
            <surname>Marett</surname>
          </string-name>
          ,
          <article-title>"The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived,"</article-title>
          <source>Journal of Management Information Systems</source>
          , vol.
          <volume>27</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>273</fpage>
          -
          <lpage>303</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Boss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. F.</given-names>
            <surname>Galletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. B.</given-names>
            <surname>Lowry</surname>
          </string-name>
          , G. D. Moody and P. Polak,
          <article-title>"What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors,"</article-title>
          <source>MIS Quarterly</source>
          , vol.
          <volume>39</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>837</fpage>
          -
          <lpage>864</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>A. C.</given-names>
            <surname>Johnston</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Warkentin</surname>
          </string-name>
          ,
          <article-title>"Fear Appeals and Information Security Behaviors: An Empirical Study,"</article-title>
          <source>MIS Quarterly</source>
          , vol.
          <volume>34</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>549</fpage>
          -
          <lpage>566</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>P. J.</given-names>
            <surname>Steinbart</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. J.</given-names>
            <surname>Keith</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Babb</surname>
          </string-name>
          ,
          <article-title>"Examining the Continuance of Secure Behavior: A Longitudinal Field Study of Mobile Device Authentication,"</article-title>
          <source>Information Systems Research</source>
          , vol.
          <volume>27</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>219</fpage>
          -
          <lpage>239</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [51]
          <string-name>
            <given-names>M.</given-names>
            <surname>Wolf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Haworth</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Pietron</surname>
          </string-name>
          ,
          <article-title>"Measuring An Information Security Awareness Program,"</article-title>
          <source>Review of Business Information Systems (RBIS)</source>
          , vol.
          <volume>15</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>22</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [52]
          <article-title>European Union Agency for Cybersecurity (ENISA), "Cybersecurity Threats FastForward 2030: Fasten your Security-Belt Before the Ride!,"</article-title>
          <source>ENISA, 11 November</source>
          <year>2022</year>
          . [Online]. Available: https://www.enisa.europa.eu/news/cyberse curity-threats
          <string-name>
            <surname>-</surname>
          </string-name>
          fast-forward-
          <source>2030. [Accessed 29 March</source>
          <year>2023</year>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [53]
          <string-name>
            <given-names>B.</given-names>
            <surname>Xue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Warkentin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Mutchler</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Balozian</surname>
          </string-name>
          ,
          <article-title>"Self-efficacy in Information Security: A Replication Study,"</article-title>
          <source>Journal of Computer Information Systems</source>
          , vol.
          <volume>63</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [54]
          <string-name>
            <given-names>H.-S.</given-names>
            <surname>Rhee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Kim</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y. U.</given-names>
            <surname>Ryu</surname>
          </string-name>
          ,
          <article-title>"Selfefficacy in information security: Its influence on end users' information security practice behavior,"</article-title>
          <source>Computers &amp; Security</source>
          , vol.
          <volume>28</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>816</fpage>
          -
          <lpage>826</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>