<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Information Technology People</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1108/ITP-09-2019-0452</article-id>
      <title-group>
        <article-title>Factors influencing the adoption of awareness-raising activities in SMEs</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Erik Bergström</string-name>
          <email>erik.bergstrom@ju.se</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Joakim Kävrestad</string-name>
          <email>joakim.kavrestad@ju.se</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Johannes Hou Gustafsson</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hannes Jonsson</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science and Informatics, School of Engineering, Jönköping University</institution>
          ,
          <addr-line>Jönköping</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2084</year>
      </pub-date>
      <volume>35</volume>
      <issue>2022</issue>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Information security incidents are most commonly caused by user behaviour, placing the user in focus. In order to mitigate information security threats and thereby protect the organisation, more and more are adopting a socio-technical viewpoint, which implies adopting the belief that information security cannot be solved with technology alone. A common way to address the user is by adopting awareness-raising activities. All types of organisations struggle to raise awareness. Several studies have pointed out small and medium-sized enterprises (SMEs) as being extra vulnerable and, in addition, having more issues adopting awareness-raising activities. There are few studies investigating factors influencing the adoption of awareness-raising activities in general, and the body of literature is even more scarce when focusing on the factors from an SME perspective. This study targets the gap by investigating what factors influence the adoption of awareness-raising activities in SMEs. We did this by conducting a semi-structured interview study in 10 organisations. Five factors with a total of seven sub-factors were found: Resources (with the sub-factors time and cost), implementation, content (with the sub-factors quality, adaptability, and comprehensibility), compliance, management (with the sub-factors management support and motivation of the employees).</p>
      </abstract>
      <kwd-group>
        <kwd>Information security awareness</kwd>
        <kwd>adoption factors</kwd>
        <kwd>small and medium-sized enterprises</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        It is estimated that a cyberattack occurs somewhere in the world every 39 seconds and costs
businesses an average of $4.45 million in 2023 [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Most of these attacks directly or indirectly
target small and medium-sized enterprises (SMEs). SMEs are particularly vulnerable as they often
do not have the capabilities or resources that larger companies have to secure their environment
and train their employees to be more aware of information security [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Furthermore, ENISA
(European Union Agency for Cybersecurity) describes that SMEs often work with critical
information. Consequently, severe consequences could result if SMEs are compromised [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
ENISA also shows that SMEs struggle to maintain suficient information security awareness
and establish a high level of protection for sensitive information [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        The problem of low information security awareness was addressed in, for example, Erdogan
et al.’s [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] paper on SME awareness and capabilities, where only 50% of the respondents rated
CEUR
Workshop
Proceedings
      </p>
      <p>
        ceur-ws.org
ISSN1613-0073
their awareness as moderate or higher. The human factor plays a major role in a company’s
information security, as it is becoming increasingly popular to carry out cyber attacks by
exploiting employees. A report by Verizon Business [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] showed that 74% of data breaches were
due to a lack of knowledge among employees. These breaches occur when employees lack the
knowledge and security awareness to make the correct decisions when faced with a cyber threat
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. To prevent social engineering, i.e. attacks that focus on tricking people into either giving
out information or performing certain actions for malicious purposes, companies should adopt
awareness-raising training and build a robust information security culture among employees
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        The problems for SMEs lie in adopting awareness-raising activities and motivating employees
to comply with company security policies. By creating a solid security culture among the
company’s employees and choosing the activities that best suit the company, companies can
increase their information security and minimise the risk of data breaches [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Previous studies
have focused on problems SMEs encounter when adopting awareness-raising activities to
raise employee awareness, where employee motivation is often highlighted. SMEs need to
choose the most suitable activity, where several options are available, such as text-based and
instructor-based learning activities [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        When adopting awareness-raising activities, SMEs face several factors influencing their
choice and the extent to which they can adopt them. Heidt et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] highlight that SMEs must
consider financial, time and skill constraints when adopting activities. SMEs, compared to larger
companies, do not have the same budget and, therefore, do not have the same opportunity to
adopt awareness-raising activities to the extent that large companies can. This is worrying since
studies show that the majority of SMEs close down after a major attack [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. SME employees do
not always have just one role. Someone who is a financial manager may also be in charge of IT,
which means that the person in question does not have the time needed to investigate which
solution is best for the company or to adopt activities correctly. This also afects competence, as
SMEs do not always have dedicated IT staf; if they do, the IT staf often has sole responsibility
for their environment. Therefore, managers must have the time and the skills to identify their
business needs to adopt the most relevant activities [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        We posit that information security is a socio-technical system (STS) where the interplay
between technology, user and the organisation at large is paramount for the efectiveness of
the system, in this case, the level of information security. Furthermore, the system entities
are co-dependant and heavily influenced by each other [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Consider, for example,
passwordbased authentication [12]. Technological rules will dictate what passwords users can create,
policies establish rules for handling the passwords and users are ultimately responsible for
creating the passwords and correctly handling them. Empowering the users will increase their
ability to comply with technical and organisational rules. Likewise, adapting the technical
implementation to the abilities of the users will make the users more able to comply [13].
      </p>
      <p>
        This research explores SME adoption of awareness-raising activities through a socio-technical
lens. How and why SMEs adopt diferent awareness-raising activities has not been extensively
researched but is fundamental in understanding the motivations and obstacles SMEs face when
adopting awareness-raising activities [
        <xref ref-type="bibr" rid="ref10">14, 10</xref>
        ]. This research takes its starting point in this
problem and has focused on the following research question: ”What factors influence the adoption
of awareness-raising activities in SMEs?”
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <sec id="sec-2-1">
        <title>2.1. Awareness-raising activities</title>
        <p>Information security awareness can be defined as an employee’s general awareness of
information security and knowledge of the company’s information security policies [15]. The role of
information security awareness in an organisation, according to Khan et al. [16], is to ensure
that employees are aware of applicable rules, regulations and policies. Through this awareness,
employees can make informed decisions about information security.</p>
        <p>
          Companies increasingly use diferent activities to raise employee awareness of security
threats [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Employees in organisations need the right behaviours, knowledge, and attitudes to
make the right decisions when technological protections cannot filter out the threats, which
often occur via social engineering attacks. Organisations can minimise the risk of data breaches
or other incidents by educating and preparing employees for the threats. Several methods
exist to train employees, including instructor-based, text-based, and video-based training [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
Instructor-based training is performed for a specific amount of time in a room with an instructor
and is often perceived by employees as time-consuming [ 17]. Text-based interventions include
information provided through emails or newsletters at regular intervals. Text-based training
allows the user to read at their own pace and enables them to re-read if the information is
dificult to understand. Still, it is dificult to force employees to consume the material.
Videobased training uses videos, like text-based measures, allowing employees to revisit if something
is unclear [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>Organisations have many security awareness-raising activities to choose from, but a common
problem is motivating employees to participate in and absorb information from the diferent
activities. Previous publications show that employees feel bored with many types of activities,
where, for example, instructor-led elements were highlighted as “boring statement of policies
and procedures” [18, p. 250]. In addition, employees often lack motivation to participate in
organisations’ training programs as they feel they are not rewarded for the time spent on
these activities. It is not enough for companies to only implement awareness-raising training;
they must also adapt it to fit the employees. According to a study by Kävrestad et al. [19], the
preferred delivery method for training is relevant and short sequences, such as password hints,
when creating passwords. Their study also showed that the least preferred delivery method
for training was through physical sessions attended at a specific time. Similarly, Johansson
et al. [20] found that small, focused, and contained modules were preferred among SMEs in the
manufacturing sector.</p>
        <p>
          Chaudhary et al. [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] describes SMEs as companies with limited resources and with employees
who fill more than one role in the organisation. Recommendations and frameworks exist to
support SMEs in raising awareness of the company and employees by helping them prioritise
what should be adopted based on their resources and making the whole adoption process
more straightforward and easier to understand. However, studies show that the frameworks
and models available to SMEs do not provide the support they need. For instance, there are
no frameworks tailored to all the sectors in which SMEs are active [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Supporting SMEs
in the domain of awareness-increasing activities is a goal of several authorities. ENISA, for
instance, provide a tool called awareness-raising in a box (AR-in-a-box) to help SMEs work
with awareness-raising techniques [21]. Also, various national initiatives (such as The Swedish
Civil Contingencies Agency [22]) ofer information security training, guidance, templates, and
advice for organisations regarding information security. In addition, there are directives aimed
at creating a high level of readiness among companies and helping them prepare to defend
against current and future threats. For example, the NIS2 directive will afect several sectors,
including chemical manufacturing, food production and digital infrastructure in Europe [22].
        </p>
        <p>SMEs need to choose the training that best suits the company and its employees and ensure
the training is tailored to the needs of the company and its employees. Employees are more likely
to absorb the presented information if they can relate it to their role within the organisation or
the company’s needs [18]. Furthermore, it is highlighted that if the information is related to
employees’ personal lives and how it can improve their safety at home and work, employees
are more motivated to receive and apply the information [18].</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Factors influencing the introduction of awareness-raising activities</title>
        <p>
          While it is important to adopt awareness-raising activities, the organisation must strive for an
activity that suits them, as one of the most critical factors in raising security awareness is the
choice of activities. In a study by Dahabiyeh [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], the Technology-Organisation-Environment
(TOE) (developed by Tornatzky et al. [23]) highlighted factors that influence organisations’
adoption of new technologies. Dahabiyeh [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] used TOE to discuss the factors that influenced
organisations’ choice of information security awareness-raising measures, where the focus was
computer-based tools. The technology aspect highlighted the factors of how easy the activity
is to use and implement, the quality of the content, the integration and how easy it is for the
organisation to adapt the content to their needs. From an organisational point of view, the
support of the management team, the employees’ commitment, and a dedicated IT security team
were considered the most important factors. From the environmental point of view, two factors
were considered to be most important, with the support of those delivering activities being
considered important, including customer care and their technical competence. In addition,
compliance was highlighted as an important factor [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>
          SMEs often do not have the resources to adopt awareness-raising activities, as a study by
Heidt et al. [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] showed. All those who participated in their study highlighted the lack of
resources as an obstacle, where budget, time and workforce took up most of them. The budget
was the main factor highlighted by management, and they did not have the finances to invest
in activities but instead had to spend it on investments to increase the company’s financial
profit. Heidt et al. [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] found that the most commonly raised factor, regardless of the role in the
company, was time constraints. Employees felt there was no time to adopt awareness-raising
activities [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. SMEs usually have employees with more than one role in the company and,
therefore, do not have the time to read up and educate themselves on the best options for the
company. Without dedicated information security staf, it is possible that SMEs do not have
the skills and knowledge to understand why awareness-raising training is needed or how to
implement it, and it is likely they end up choosing and prioritising the economic growth of the
company [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Research approach</title>
      <p>To be able to investigate what factors influence SMEs when adopting awareness-raising measures,
we opted for a qualitative research approach. The study has been conducted by collecting data
using semi-structured interviews and analysing that data thematically. Recent studies on
awareness in SMEs have successfully used a similar approach with semi-structured interviews
as a basis (e.g. [20, 24, 25]).</p>
      <sec id="sec-3-1">
        <title>3.1. Data collection</title>
        <p>
          Interviews are widely used for gathering data in qualitative research and can be performed
in various ways [
          <xref ref-type="bibr" rid="ref12">26</xref>
          ]. As the aim of the study is exploratory, semi-structured interviews were
selected as they allow the respondent to elaborate on their answers [
          <xref ref-type="bibr" rid="ref13 ref14">27, 28</xref>
          ], and because the
interviewer can raise ideas and questions that emerge during the interview [
          <xref ref-type="bibr" rid="ref15">29</xref>
          ]. Thornhill et al.
[
          <xref ref-type="bibr" rid="ref16">30</xref>
          ] highlight that semi-structured interviews allow, for example, the exploration of the ideas
and word choices of the respondents, which in turn can lead to more in-depth answers and
a deeper understanding. Qualitative interviews are designed to generate more detailed and
in-depth data, which is useful when studying “why” factors [
          <xref ref-type="bibr" rid="ref17">31</xref>
          ].
        </p>
        <p>
          Semi-structured interviews are characterized by open-ended questions and an interview
guide where a broader theme is developed [
          <xref ref-type="bibr" rid="ref14">28</xref>
          ]. In this research, an interview guide was created
and revised after the first interview. The guide consisted of three parts: an introductory part
aimed at collecting background data on the respondent, a part that aimed at collecting more
general data on how they work with awareness-raising activities, and the main part of the guide
focusing on eliciting the adoption of awareness-raising activities. In the first part, a typical
question was, “How long have you been doing this?” In the second part, “How are you currently
working on raising information security awareness?” Finally, in the last part, we used questions
like “What factors limited the adoption of that specific activity?”
        </p>
        <p>
          Respondents were recruited through various channels, such as, emails available on company
websites and via LinkedIn’s message function. Around 60 company representatives were asked
for an interview, but unfortunately, the majority of them did not respond to the request. Some
respondents declined because they did not feel confident in their knowledge of the subject or
because they did not have time, but we also know that security-related topics generally have
issues finding participants [
          <xref ref-type="bibr" rid="ref18 ref19 ref20">32, 33, 34</xref>
          ]. In total, ten respondents who work at SMEs in diferent
types of industries were interviewed. Table 1 shows an overview of the respondents and their
experience of their current role.
        </p>
        <p>The interviews were conducted using online conferencing software that allowed for the
recording of the interviews. All interviews were recorded and transcribed.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Analysis</title>
        <p>
          Thematic analysis was chosen to analyse the data from the semi-structured interviews. The
thematic analysis focuses on identifying, analysing and interpreting themes from qualitative
data [
          <xref ref-type="bibr" rid="ref21">35</xref>
          ]. When applying thematic analysis and identifying themes, looking for repetition,
diferences, and similarities is important [
          <xref ref-type="bibr" rid="ref22">36</xref>
          ]. The coding guidelines from Saldaña [
          <xref ref-type="bibr" rid="ref22">36</xref>
          ] were
followed. More specifically, a two-cycle coding procedure was adopted. The first cycle used
structural coding, which is especially suitable when the data comes from semi-structured
interviews [
          <xref ref-type="bibr" rid="ref22">36</xref>
          ]. In structural coding, large segments of text form the basis for in-depth analysis
[
          <xref ref-type="bibr" rid="ref23">37</xref>
          ]. After this step, codes are developed that are categorised based on similarities, diferences,
and repetition [
          <xref ref-type="bibr" rid="ref22">36</xref>
          ]. Busetto et al. [
          <xref ref-type="bibr" rid="ref14">28</xref>
          ] highlight that it is important that at least two researchers
are involved during the coding process, especially at the beginning, so it is possible to compare
the coding to ensure that coding is applied consistently to the data [
          <xref ref-type="bibr" rid="ref14">28</xref>
          ]. Therefore, the data
coding was first carried out individually by two authors, and then the categories identified were
compared and consolidated jointly. The final process of deriving the themes was a joint efort.
In this case, the themes were the factors found to influence the adoption of awareness-raising
activities.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Results</title>
      <p>The thematic analysis resulted in the identification of 5 factors with a total of 7 sub-factors.
The following factors were found: Resources (with the sub-factors time and cost),
implementation, content (with the sub-factors quality, adaptability, and comprehensibility), compliance,
management (with the sub-factors management support and motivation of the employees).</p>
      <sec id="sec-4-1">
        <title>4.1. Resources</title>
        <p>Resources was found to contain two sub-factors: time and cost. Several respondents mentioned
that time is a factor that afects them greatly, both when introducing and investigating new
activities. Respondent 1 explains that the reason why they have not introduced even more
awareness-raising activities is that ”we are a small company with few employees, and it’s really
only me who works with this ... and I have other things to do.” Several of the respondents raise
similar arguments as to why they have not adopted more activities. Some respondents also
expressed the time it takes to carry out the training, with staf feeling that they do not have
time to, for example, do micro-training or attend lectures on information security because they
are already too busy. The cost was a well-discussed factor. The respondents were split into
two groups: those who felt constrained by the costs and those who saw the costs as secondary
to the potential benefit of raising awareness in the organisation. This can be exemplified by
Respondent 1, who said: “that it shouldn’t cost too much is quite important because as we are
a small company… [where] costs are a big issue,” whereas Respondent 2 puts less emphasis on
cost: ”money is secondary in the context of security.”</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Implementation</title>
        <p>Being able to implement an awareness-raising activity easily is considered an important factor
by the respondents. Some respondents wanted measures that come pre-packaged by an external
party so they don’t have to spend too much time on them. Preferably, the activity should also
be easy to manage after the implementation. This can be exemplified by Respondent 2: “It is
easier when you get it served by an external party so you do not have to sit and work on the issue
yourself.“</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Content</title>
        <p>The content contained three sub-factors: quality, adaptability and comprehensibility. The
respondents emphasise that the quality of the activity’s content is important. What constitutes
higher-quality material is, of course, something subjective. Here, it can be summarised from the
respondents’ descriptions as material that is not substandard and that the employees would not
understand or consider when exposed to it. Interesting to note is that none of the respondents
worked with the content quality actively to try to raise the level. Some respondents also address
why they consider the information in awareness-raising activities should be comprehensible.
For example, Respondent 5 explained that the quality of the content can be very high, but what
is important is that employees can easily absorb the information: “in the end, you can have
the world’s most high-quality material that does no good if no one reads it, so comprehensibility,
there should be a very low threshold there, to absorb the information, so people actually do it.”
Furthermore, it was explained that content needs to be adapted to the company’s lowest level
and that there are often very diferent digital maturity levels. That is to say, that content
needs to be adapted in various ways, but most respondents did not adapt their
awarenessraising activities. Especially the ones using micro-training did not adapt the content to fit
the organisation. Respondents that used newsletters customised them for the threats they
considered relevant at the moment, but other than that, they did not adapt them to fit the
organisation either.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Compliance</title>
        <p>Compliance is a factor that can potentially positively impact awareness-raising activities. As
discussed previously, there is no guarantee that employees will remember the information in
the awareness-raising activity. Depending on the type of awareness-raising activity, there are
diferent possibilities from a compliance perspective. For example, newsletters and lectures were
seen as dificult activities from a compliance perspective, i.e., the respondents had dificulties
knowing if their employees actively read or absorbed the information. On the other hand,
activities like micro-training and simulated phishing attacks were seen as compliance enablers
as they came with a built-in option to track statistics on completion rates and how many
employees clicked on phishing emails. I.e., it allows the manager to measure the awareness
temperature in the organisation or, as Respondent 9 phrased it: “There [in our micro-training
system] we have continuous monitoring and measurement.”</p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Management</title>
        <p>Finally, management is a factor that contains two sub-factors: management support and how
the management works with the motivation of the employees. Most respondents considered
the support of management crucial. There was a belief in a need for management support for
information security in general, but also that the management showed its commitment to the
activities selected. By actively showing support, preferably repeatedly over time, the employees
understand the importance of the activities. It was emphasised that management support should
come not only from the highest level but also from other managers, such as IT managers. IT
managers also explained that they needed support from upper management in terms of time,
in this case, so that they could spend the necessary time to research possible future activities,
properly implement activities, and to be able to follow up on the results. Motivating employees
to take part in the awareness-raising activities was seen as a dificulty, or as it was described by
Respondent 4: “The first dificulty that I see is that people should understand that they should do it
and then actually do it.“ How the organisation worked to motivate employees difered. Several
respondents talked directly to the employees since the investigated organisations were SMEs
and hence had smaller organisations. The managers tried to explain why they had chosen their
activities and why it was important that they take part in them. All respondents except one used
a normative approach (i.e., moral reasoning and the values behind it). One respondent used a
coercive approach (i.e., threats and punishments) by employing scare tactics. The normative
group tried to highlight why taking part was good for the organisation and what could happen
if there was an attack. The motivation of the employees to actively participate in an
awarenessraising activity was seen as a very important factor, as without active participation, it doesn’t
matter what activities to adopt; the employee would not be actively involved anyway. I.e.,
employee motivation is crucial for the adoption of awareness-raising activities.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>This paper has investigated factors influencing the adoption of awareness-raising activities in
SMEs. A number of factors were found, and a summary of these factors can be found in Table 2.</p>
      <p>
        A recurring theme that emerged from the interviews was that management needs to be
more engaged in awareness-raising activities. This is achieved by giving those responsible
more time to work on these issues and by being involved in the adoption process to show
employees that this is an important issue. These results are in line with, for example, Renaud
[
        <xref ref-type="bibr" rid="ref24">38</xref>
        ] and Chaudhary et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Management involvement in awareness-raising activities is
crucial, and we know that awareness-raising activities are most efective when management
fully supports them, as employees are more likely to participate more actively in these activities
if they can see that management is dedicated to the issue. Much literature on the topic is getting
There is a lack of time for introducing and investigating new
activities and carrying out the training.
      </p>
      <p>Split into two groups: the ones feeling constrained by costs and
the ones who perceive the cost to be secondary to the benefit.</p>
      <p>Implementation and maintenance should be easy. They should
preferably come as pre-packaged solutions.</p>
      <p>Content should be of a high standard, and users should
understand and consider it when exposed.</p>
      <p>Users should easily be able to absorb the content.</p>
      <p>It should be possible to adapt the content to organisational
needs and for users on diferent levels.</p>
      <p>Depending on the awareness-raising activity, there are diferent
possibilities for tracking completion and absorption rates.</p>
      <p>Show support by giving more time to work on awareness-raising
activities and be active in the adoption process.</p>
      <p>
        Employee motivation for actively participating in
awarenessraising activities.
somewhat old, and the advice for engaging management (e.g. by explaining the cost-benefit
of awareness-raising activities [
        <xref ref-type="bibr" rid="ref25">39</xref>
        ], to design and utilise low-cost awareness-raising activities
[
        <xref ref-type="bibr" rid="ref26 ref27">40, 41</xref>
        ], and to show that awareness-raising activities are efective [
        <xref ref-type="bibr" rid="ref28">42</xref>
        ]) does not seem to work,
at least not for SMEs. Some newer suggestions could be interesting to pursue to see if they
could afect SME management, for example, to utilise peer comparisons through benchmarking,
illustrating to leadership the investments competitors are doing [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Our study also arrives
at a slightly diferent conclusion than Dahabiyeh’s [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] study that found management not as
important a factor as we do in this study. Perhaps this can be explained by our respondents’
perceptions of the limitations regarding available resources. There is also how management
works to motivate the employees to partake in awareness-raising activities. Here, we found that
all except one used a normative approach, which is an interesting find since previous literature
has shown inconsistent findings [
        <xref ref-type="bibr" rid="ref29">43</xref>
        ], and there are many calls for more research on this aspect
[
        <xref ref-type="bibr" rid="ref29">43, 44</xref>
        ].
      </p>
      <p>Related to management is resources, as management can afect time constraints and costs.
The respondents highlighted that IT managers need more time to implement and maintain
awareness-raising activities. Also, the cost was found to be an obstacle, which has been observed
as a general SME problem [18] as fewer financial resources imply having to choose between
awareness-raising activities or economic growth. As this is such a big issue where the majority
of companies are struggling, we recommend numerous national and international initiatives,
such as AR-in-a-box [21], to ramp up their marketing as the awareness of the initiatives is low.
Another way to increase such initiatives’ usage is to (further) adapt them to various sectors (e.g.
manufacturing, healthcare, etc.) to make them more relevant for the target groups. It is also
interesting to study in future research as little is known about the adaptation to diferent user
groups or, for that matter, what types of user groups exist.</p>
      <p>
        Several of the respondents thought that the quality of the content of the awareness-raising
activity was the most important aspect. Previous research, such as He and Zhang [18], has
discussed the importance of activities that should be adapted to the level of the employee so
that the content is comprehensible. Here, we found that the respondents acknowledged this, but
very few of them worked with this type of adaptation due to resource limitations. In general,
adaptability was considered important, which is consistent with Dahabiyeh [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], but again, the
respondents did not do it in practice. This further strengthens the argument above about the
necessity to adapt awareness-raising activities sectorally and to diferent user groups so that
the ones implementing them in the organisation can easily push out suitable content on the
correct level to their colleagues. Especially since we know that the quality of the content is
highlighted as a critical factor in successful awareness-raising activities [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        Related to implementation is integration, which was raised in Dahabiyeh’s [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] study as a factor,
but this study showed that integration was not something respondents considered important.
This may be due to the fact that SMEs rarely have systems that can be regarded as necessary
for integrating awareness-raising activities. Regarding implementation, we found that
prepackaged content by an external provider was favoured among the respondents. Similarly,
it should be easy to manage after the implementation. So, yet again, we find a gap between
content providers and their users.
      </p>
      <p>Finally, compliance was found to be a factor that ultimately can afect the type of activities
to be adopted. Depending on the type of activity, there are diferent possibilities for tracking
completion and absorption rates among employees. We found that activities that include such
functionality (e.g. micro-training and simulated phishing emails) were seen positively. Being
able to track performance, of course, also influences motivation as tracking enables finding
those who do not participate in training or those who are performing poorly. With a normative
approach, one can also possibly find the underlying reasons why someone is not participating.
Is it too hard, or is there perhaps a problem with time?</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>The research question, What factors influence the adoption of awareness-raising activities in SMEs? ,
was addressed using semi-structured interviews with ten participants who are responsible for
awareness-raising within their respective organisations. Adopting a socio-technical lens, this
research confirms that awareness-raising is dependent on the interplay between management,
technology and system users. The results show five main factors that are of importance for the
organisational adoption of awareness-raising activities, which span the entire socio-technical
spectrum. The perhaps most notable conclusion is that management is an enabler which can
both provide resources and lead by example. Lack of resources is constantly mentioned as an
obstacle by the participants who, for instance, describe a need for ready-to-use solutions to save
time or not being able to modify activities due to a lack of time. A second notable finding is that
this research confirms the importance of activities that are adapted to the organisation where
they are used. The respondents describe adaption as important to raise employee motivation and
increase relevance. However, while the respondents emphasise the importance of adaptation,
they do not work with it in practice. While this conclusion appears to be a conundrum, it is well
aligned with the fact that SMEs are struggling to find resources for awareness-raising activities.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>We gratefully acknowledge the grants from the Swedish Civil Contingencies Agency (MSB),
projects VISKA (MSB 2021–14650) and ICANP (MSB 2023-10887).
[12] C. P. Pfleeger, S. L. Pfleeger, J. Margulies, Security in computing, fith edition ed., Prentice</p>
      <p>Hall, Upper Saddle River, NJ, 2015.
[13] B. Ur, F. Noma, J. Bees, S. M. Segreti, R. Shay, L. Bauer, N. Christin, L. F. Cranor, ” i
added’!’at the end to make it secure”: Observing password creation in the lab, in: Eleventh
symposium on usable privacy and security (SOUPS 2015), 2015, pp. 123–140.
[14] A. Al-Salek, J. Kävrestad, M. Nohlberg, Exploring experiences of using seta in nordic
municipalities, in: S. Furnell, N. Clarke (Eds.), Human Aspects of Information Security
and Assurance, Springer International Publishing, 2021, pp. 22–31.
[15] B. Bulgurcu, H. Cavusoglu, I. Benbasat, Information security policy compliance: an
empirical study of rationality-based beliefs and information security awareness, MIS
quarterly 34 (2010) 523–548.
[16] B. Khan, K. S. Alghathbar, S. I. Nabi, M. K. Khan, Efectiveness of information
security awareness methods based on psychological theories, African journal of business
management 5 (2011) 10862.
[17] K. F. Tschakert, S. Ngamsuriyaroj, Efectiveness of and user preferences for security
awareness training methodologies, Heliyon 5 (2019). URL: https://doi.org/10.1016/j.heliyon.
2019.e02010. doi:10.1016/j.heliyon.2019.e02010, doi: 10.1016/j.heliyon.2019.e02010.
[18] W. He, Z. Zhang, Enterprise cybersecurity training and awareness programs:
Recommendations for success, Journal of Organizational Computing and Electronic
Commerce 29 (2019) 249–257. URL: https://doi.org/10.1080/10919392.2019.1611528. doi:10.
1080/10919392.2019.1611528.
[19] J. Kävrestad, M. Nohlberg, S. Furnell, A taxonomy of seta methods and linkage to delivery
preferences, SIGMIS Database 54 (2023) 107–133. doi:10.1145/3631341.3631348.
[20] K. Johansson, T. Paulsson, E. Bergström, U. Seigerroth, Improving cybersecurity awareness
among smes in the manufacturing industry, in: A. H. C. Ng, A. Syberfelt, D. Högberg,
M. Holm (Eds.), SPS2022: Proceedings of the 10th Swedish production symposium, IOS
Press, 2022, pp. 209–220.
[21] ENISA, Custom-made awareness raising to enhance
cybersecurity culture, 2024. URL: https://www.enisa.europa.eu/news/
custom-made-awareness-raising-to-enhance-cybersecurity-culture.
[22] The Swedish Civil Contingencies Agency, Informationssäkerhet för
små och medelstora organisationer [information security for small
and medium-sized organisations], 2024. URL: https://www.msb.se/sv/
amnesomraden/informationssakerhet-cybersakerhet-och-sakra-kommunikationer/
arbeta-systematiskt-informationssakerhet-och-cybersakerhet/
informationssakerhet-for-sma-och-medelstora-organisationer/.
[23] L. G. Tornatzky, M. Fleischer, A. K. Chakrabarti, The processes of technological innovation,</p>
      <p>Lexington Books, Lexington, MA, USA, 1990.
[24] M. Sadok, S. Alter, P. Bednar, It is not my job: exploring the disconnect between corporate
security policies and actual security practices in smes, Information Computer Security 28
(2020) 467–483. doi:10.1108/ICS- 01- 2019- 0010.
[25] N. Rawindaran, A. Jayal, E. Prakash, Exploration of the impact of cybersecurity awareness
on small and medium enterprises (smes) in wales using intelligent software to combat
cybercrime, Computers 11 (2022) 174. URL: https://www.mdpi.com/2073-431X/11/12/174.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <issue>ThriveDX</issue>
          , 15 alarming cybersecurity facts and statistics,
          <year>2022</year>
          . URL: https://thrivedx.com/ resources/article/cyber-security
          <string-name>
            <surname>-</surname>
          </string-name>
          facts-statistics.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>I. Security</surname>
          </string-name>
          ,
          <source>Cost of a data breach report</source>
          <year>2023</year>
          ,
          <year>2023</year>
          . URL: https://www.ibm.com/reports/ data-breach.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chaudhary</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gkioulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Katsikas</surname>
          </string-name>
          ,
          <article-title>A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises</article-title>
          ,
          <source>Computer Science Review</source>
          <volume>50</volume>
          (
          <year>2023</year>
          )
          <article-title>100592</article-title>
          . doi:https://doi.org/10.1016/j.cosrev.
          <year>2023</year>
          .
          <volume>100592</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sarri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Paggio</surname>
          </string-name>
          , G. Bafoutsou,
          <article-title>Cybersecurity for smes-challenges and recommendations, 2021</article-title>
          . URL: https://www.enisa.europa.eu/publications/ enisa
          <article-title>-report-cybersecurity-for-smes.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>G.</given-names>
            <surname>Erdogan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Halvorsrud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Boletsis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tverdal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Brian</given-names>
            <surname>Pickering</surname>
          </string-name>
          ,
          <article-title>Cybersecurity awareness and capacities of smes</article-title>
          ,
          <source>in: 9th International Conference on Information Systems Security and Privacy - ICISSP</source>
          , volume
          <volume>1</volume>
          , SciTePress,
          <year>2023</year>
          , pp.
          <fpage>296</fpage>
          -
          <lpage>304</lpage>
          . doi:
          <volume>10</volume>
          . 5220/0011609600003405.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Business</surname>
          </string-name>
          ,
          <source>2024 data breach investigations report</source>
          ,
          <year>2024</year>
          . URL: https://www.verizon.com/ business/resources/reports/dbir/2023/summary-of-findings/.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Salahdine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kaabouch</surname>
          </string-name>
          ,
          <article-title>Social engineering attacks: A survey</article-title>
          ,
          <source>Future Internet</source>
          <volume>11</volume>
          (
          <year>2019</year>
          )
          <article-title>89</article-title>
          . URL: https://www.mdpi.com/1999-5903/11/4/89.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. R. C.</given-names>
            <surname>Nurse</surname>
          </string-name>
          ,
          <article-title>Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (smes</article-title>
          ),
          <source>Information Computer Security</source>
          <volume>27</volume>
          (
          <year>2019</year>
          )
          <fpage>393</fpage>
          -
          <lpage>410</lpage>
          . doi:
          <volume>10</volume>
          .1108/ICS- 07- 2018- 0080.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>L.</given-names>
            <surname>Dahabiyeh</surname>
          </string-name>
          ,
          <article-title>Factors afecting organizational adoption and acceptance of computer-based security awareness training tools</article-title>
          ,
          <source>Information Computer Security</source>
          <volume>29</volume>
          (
          <year>2021</year>
          )
          <fpage>836</fpage>
          -
          <lpage>849</lpage>
          . doi:
          <volume>10</volume>
          .1108/ICS- 12- 2020- 0200.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Heidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Gerlach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Buxmann</surname>
          </string-name>
          ,
          <article-title>Investigating the security divide between sme and large companies: How sme characteristics influence organizational it security investments</article-title>
          ,
          <source>Information Systems Frontiers</source>
          <volume>21</volume>
          (
          <year>2019</year>
          )
          <fpage>1285</fpage>
          -
          <lpage>1305</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10796- 019- 09959- 1.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>E. Mumford,</surname>
          </string-name>
          <article-title>The story of socio-technical design: Reflections on its successes, failures and potential</article-title>
          ,
          <source>Information systems journal 16</source>
          (
          <year>2006</year>
          )
          <fpage>317</fpage>
          -
          <lpage>342</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>B. J.</given-names>
            <surname>Oates</surname>
          </string-name>
          ,
          <source>Researching Information Systems and Computing</source>
          , Sage, London,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>W. C.</given-names>
            <surname>Adams</surname>
          </string-name>
          , Conducting
          <string-name>
            <surname>Semi-Structured Interviews</surname>
          </string-name>
          ,
          <year>2015</year>
          , pp.
          <fpage>492</fpage>
          -
          <lpage>505</lpage>
          . doi:https: //doi.org/10.1002/9781119171386.ch19.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>L.</given-names>
            <surname>Busetto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wick</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gumbinger</surname>
          </string-name>
          ,
          <article-title>How to use and assess qualitative research methods</article-title>
          ,
          <source>Neurological Research and Practice</source>
          <volume>2</volume>
          (
          <year>2020</year>
          )
          <article-title>14</article-title>
          . doi:
          <volume>10</volume>
          .1186/s42466-020-00059-z.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>O. A.</given-names>
            <surname>Adeoye-Olatunde</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. L.</given-names>
            <surname>Olenik</surname>
          </string-name>
          , Research and scholarly methods:
          <article-title>Semi-structured interviews, JACCP: JOURNAL OF THE AMERICAN COLLEGE OF CLINICAL PHARMACY 4 (</article-title>
          <year>2021</year>
          )
          <fpage>1358</fpage>
          -
          <lpage>1367</lpage>
          . doi:https://doi.org/10.1002/jac5.
          <fpage>1441</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Thornhill</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Saunders</surname>
          </string-name>
          , P. Lewis,
          <article-title>Research methods for business students</article-title>
          , seventh edition ed., Prentice Hall: London,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>A.</given-names>
            <surname>Blackstone</surname>
          </string-name>
          ,
          <article-title>Principles of sociological inquiry: Qualitative and quantitative methods</article-title>
          , Saylor Academy Open Textbooks,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baskerville</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rowe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.-C.</given-names>
            <surname>Wolf</surname>
          </string-name>
          ,
          <article-title>Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective</article-title>
          ,
          <source>SIGMIS Database 49</source>
          (
          <year>2018</year>
          )
          <fpage>33</fpage>
          -
          <lpage>52</lpage>
          . doi:
          <volume>10</volume>
          .1145/3184444.3184448.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>K.</given-names>
            <surname>Bernsmed</surname>
          </string-name>
          , G. Bour,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lundgren</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Bergström,</surname>
          </string-name>
          <article-title>An evaluation of practitioners' perceptions of a security risk assessment methodology in air trafic management projects</article-title>
          ,
          <source>Journal of Air Transport Management</source>
          <volume>102</volume>
          (
          <year>2022</year>
          )
          <article-title>102223</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.jairtraman.
          <year>2022</year>
          .
          <volume>102223</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>W. A.</given-names>
            <surname>Cram</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. D'Arcy</surname>
            ,
            <given-names>J. G.</given-names>
          </string-name>
          <article-title>Proudfoot, Seeing the forest and the trees: A meta-analysis of the antecedents to information security policy compliance</article-title>
          ,
          <source>MIS Quarterly 43</source>
          (
          <year>2019</year>
          )
          <fpage>525</fpage>
          -
          <lpage>554</lpage>
          . doi:
          <volume>10</volume>
          .25300/MISQ/
          <year>2019</year>
          /15117.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>V.</given-names>
            <surname>Braun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Clarke</surname>
          </string-name>
          ,
          <article-title>Using thematic analysis in psychology, Qualitative Research in Psychology 3 (</article-title>
          <year>2006</year>
          )
          <fpage>77</fpage>
          -
          <lpage>101</lpage>
          . doi:
          <volume>10</volume>
          .1191/1478088706qp063oa.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>J.</given-names>
            <surname>Saldaña</surname>
          </string-name>
          ,
          <article-title>The coding manual for qualitative researchers</article-title>
          , 4th ed., SAGE Publications Inc., Thousand Oaks, CA, USA,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [37]
          <string-name>
            <surname>K. M. MacQueen</surname>
          </string-name>
          , E.
          <string-name>
            <surname>McLellan-Lemal</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Bartholow</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Milstein</surname>
          </string-name>
          ,
          <article-title>Team-based codebook development: Structure, process, and agreement</article-title>
          , AltaMira Press, Lanham,
          <string-name>
            <surname>MD</surname>
          </string-name>
          , USA,
          <year>2008</year>
          , pp.
          <fpage>119</fpage>
          -
          <lpage>135</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>K.</given-names>
            <surname>Renaud</surname>
          </string-name>
          ,
          <article-title>How smaller businesses struggle with security advice</article-title>
          ,
          <source>Computer Fraud Security</source>
          <year>2016</year>
          (
          <year>2016</year>
          )
          <fpage>10</fpage>
          -
          <lpage>18</lpage>
          . doi:https://doi.org/10.1016/S1361-
          <volume>3723</volume>
          (
          <issue>16</issue>
          )
          <fpage>30062</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>R.</given-names>
            <surname>Groner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Brune</surname>
          </string-name>
          ,
          <article-title>Towards an empirical examination of it security infrastructures in sme</article-title>
          ,
          <source>in: Secure IT Systems: 17th Nordic Conference, NordSec</source>
          <year>2012</year>
          , Karlskrona, Sweden,
          <source>October 31-November 2</source>
          ,
          <year>2012</year>
          . Proceedings 17, Springer,
          <year>2012</year>
          , pp.
          <fpage>73</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>T.</given-names>
            <surname>Gundu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Flowerday</surname>
          </string-name>
          ,
          <article-title>Ignorance to awareness: Towards an information security awareness process</article-title>
          ,
          <source>SAIEE Africa Research Journal</source>
          <volume>104</volume>
          (
          <year>2013</year>
          )
          <fpage>69</fpage>
          -
          <lpage>79</lpage>
          . doi:
          <volume>10</volume>
          .23919/SAIEE.
          <year>2013</year>
          .
          <volume>8531867</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>S.</given-names>
            <surname>Dojkovski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lichtenstein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Warren</surname>
          </string-name>
          ,
          <article-title>Challenges in fostering an information security culture in australian small and medium sized enterprises</article-title>
          ,
          <source>in: 5th European conference on Information Warfare and Security</source>
          ,
          <year>2006</year>
          , pp.
          <fpage>31</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>M.</given-names>
            <surname>Eminağaoğlu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Uçar</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. Eren,</surname>
          </string-name>
          <article-title>The positive outcomes of information security awareness training in companies - a case study</article-title>
          ,
          <source>Information Security Technical Report 14</source>
          (
          <year>2009</year>
          )
          <fpage>223</fpage>
          -
          <lpage>229</lpage>
          . doi:https://doi.org/10.1016/j.istr.
          <year>2010</year>
          .
          <volume>05</volume>
          .002.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>C.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Liang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xue</surname>
          </string-name>
          ,
          <article-title>Ensuring employees' information security policy compli-</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>