<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Factors influencing the adoption of awareness-raising activities in SMEs</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Erik</forename><surname>Bergström</surname></persName>
							<email>erik.bergstrom@ju.se</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Department of Computer Science and Informatics</orgName>
								<orgName type="department" key="dep2">School of Engineering</orgName>
								<orgName type="institution">Jönköping University</orgName>
								<address>
									<settlement>Jönköping</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Joakim</forename><surname>Kävrestad</surname></persName>
							<email>joakim.kavrestad@ju.se</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Department of Computer Science and Informatics</orgName>
								<orgName type="department" key="dep2">School of Engineering</orgName>
								<orgName type="institution">Jönköping University</orgName>
								<address>
									<settlement>Jönköping</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Johannes</forename><forename type="middle">Hou</forename><surname>Gustafsson</surname></persName>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Department of Computer Science and Informatics</orgName>
								<orgName type="department" key="dep2">School of Engineering</orgName>
								<orgName type="institution">Jönköping University</orgName>
								<address>
									<settlement>Jönköping</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hannes</forename><surname>Jonsson</surname></persName>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Department of Computer Science and Informatics</orgName>
								<orgName type="department" key="dep2">School of Engineering</orgName>
								<orgName type="institution">Jönköping University</orgName>
								<address>
									<settlement>Jönköping</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Factors influencing the adoption of awareness-raising activities in SMEs</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">101B90088E86C13F8F1BC2A0EC90A03B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:45+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Information security awareness</term>
					<term>adoption factors</term>
					<term>small and medium-sized enterprises</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Information security incidents are most commonly caused by user behaviour, placing the user in focus. In order to mitigate information security threats and thereby protect the organisation, more and more are adopting a socio-technical viewpoint, which implies adopting the belief that information security cannot be solved with technology alone. A common way to address the user is by adopting awareness-raising activities. All types of organisations struggle to raise awareness. Several studies have pointed out small and medium-sized enterprises (SMEs) as being extra vulnerable and, in addition, having more issues adopting awareness-raising activities. There are few studies investigating factors influencing the adoption of awareness-raising activities in general, and the body of literature is even more scarce when focusing on the factors from an SME perspective. This study targets the gap by investigating what factors influence the adoption of awareness-raising activities in SMEs. We did this by conducting a semi-structured interview study in 10 organisations. Five factors with a total of seven sub-factors were found: Resources (with the sub-factors time and cost), implementation, content (with the sub-factors quality, adaptability, and comprehensibility), compliance, management (with the sub-factors management support and motivation of the employees).</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>It is estimated that a cyberattack occurs somewhere in the world every 39 seconds and costs businesses an average of $4.45 million in 2023 <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>. Most of these attacks directly or indirectly target small and medium-sized enterprises (SMEs). SMEs are particularly vulnerable as they often do not have the capabilities or resources that larger companies have to secure their environment and train their employees to be more aware of information security <ref type="bibr" target="#b2">[3]</ref>. Furthermore, ENISA (European Union Agency for Cybersecurity) describes that SMEs often work with critical information. Consequently, severe consequences could result if SMEs are compromised <ref type="bibr" target="#b3">[4]</ref>. ENISA also shows that SMEs struggle to maintain sufficient information security awareness and establish a high level of protection for sensitive information <ref type="bibr" target="#b3">[4]</ref>.</p><p>The problem of low information security awareness was addressed in, for example, Erdogan et al. 's <ref type="bibr" target="#b4">[5]</ref> paper on SME awareness and capabilities, where only 50% of the respondents rated their awareness as moderate or higher. The human factor plays a major role in a company's information security, as it is becoming increasingly popular to carry out cyber attacks by exploiting employees. A report by Verizon Business <ref type="bibr" target="#b5">[6]</ref> showed that 74% of data breaches were due to a lack of knowledge among employees. These breaches occur when employees lack the knowledge and security awareness to make the correct decisions when faced with a cyber threat <ref type="bibr" target="#b2">[3]</ref>. To prevent social engineering, i.e. attacks that focus on tricking people into either giving out information or performing certain actions for malicious purposes, companies should adopt awareness-raising training and build a robust information security culture among employees <ref type="bibr" target="#b6">[7]</ref>.</p><p>The problems for SMEs lie in adopting awareness-raising activities and motivating employees to comply with company security policies. By creating a solid security culture among the company's employees and choosing the activities that best suit the company, companies can increase their information security and minimise the risk of data breaches <ref type="bibr" target="#b7">[8]</ref>. Previous studies have focused on problems SMEs encounter when adopting awareness-raising activities to raise employee awareness, where employee motivation is often highlighted. SMEs need to choose the most suitable activity, where several options are available, such as text-based and instructor-based learning activities <ref type="bibr" target="#b8">[9]</ref>.</p><p>When adopting awareness-raising activities, SMEs face several factors influencing their choice and the extent to which they can adopt them. Heidt et al. <ref type="bibr" target="#b9">[10]</ref> highlight that SMEs must consider financial, time and skill constraints when adopting activities. SMEs, compared to larger companies, do not have the same budget and, therefore, do not have the same opportunity to adopt awareness-raising activities to the extent that large companies can. This is worrying since studies show that the majority of SMEs close down after a major attack <ref type="bibr" target="#b0">[1]</ref>. SME employees do not always have just one role. Someone who is a financial manager may also be in charge of IT, which means that the person in question does not have the time needed to investigate which solution is best for the company or to adopt activities correctly. This also affects competence, as SMEs do not always have dedicated IT staff; if they do, the IT staff often has sole responsibility for their environment. Therefore, managers must have the time and the skills to identify their business needs to adopt the most relevant activities <ref type="bibr" target="#b9">[10]</ref>.</p><p>We posit that information security is a socio-technical system (STS) where the interplay between technology, user and the organisation at large is paramount for the effectiveness of the system, in this case, the level of information security. Furthermore, the system entities are co-dependant and heavily influenced by each other <ref type="bibr" target="#b10">[11]</ref>. Consider, for example, passwordbased authentication <ref type="bibr" target="#b11">[12]</ref>. Technological rules will dictate what passwords users can create, policies establish rules for handling the passwords and users are ultimately responsible for creating the passwords and correctly handling them. Empowering the users will increase their ability to comply with technical and organisational rules. Likewise, adapting the technical implementation to the abilities of the users will make the users more able to comply <ref type="bibr" target="#b12">[13]</ref>.</p><p>This research explores SME adoption of awareness-raising activities through a socio-technical lens. How and why SMEs adopt different awareness-raising activities has not been extensively researched but is fundamental in understanding the motivations and obstacles SMEs face when adopting awareness-raising activities <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b9">10]</ref>. This research takes its starting point in this problem and has focused on the following research question: "What factors influence the adoption of awareness-raising activities in SMEs?"</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Awareness-raising activities</head><p>Information security awareness can be defined as an employee's general awareness of information security and knowledge of the company's information security policies <ref type="bibr" target="#b14">[15]</ref>. The role of information security awareness in an organisation, according to Khan et al. <ref type="bibr" target="#b15">[16]</ref>, is to ensure that employees are aware of applicable rules, regulations and policies. Through this awareness, employees can make informed decisions about information security.</p><p>Companies increasingly use different activities to raise employee awareness of security threats <ref type="bibr" target="#b2">[3]</ref>. Employees in organisations need the right behaviours, knowledge, and attitudes to make the right decisions when technological protections cannot filter out the threats, which often occur via social engineering attacks. Organisations can minimise the risk of data breaches or other incidents by educating and preparing employees for the threats. Several methods exist to train employees, including instructor-based, text-based, and video-based training <ref type="bibr" target="#b8">[9]</ref>. Instructor-based training is performed for a specific amount of time in a room with an instructor and is often perceived by employees as time-consuming <ref type="bibr" target="#b16">[17]</ref>. Text-based interventions include information provided through emails or newsletters at regular intervals. Text-based training allows the user to read at their own pace and enables them to re-read if the information is difficult to understand. Still, it is difficult to force employees to consume the material. Videobased training uses videos, like text-based measures, allowing employees to revisit if something is unclear <ref type="bibr" target="#b8">[9]</ref>.</p><p>Organisations have many security awareness-raising activities to choose from, but a common problem is motivating employees to participate in and absorb information from the different activities. Previous publications show that employees feel bored with many types of activities, where, for example, instructor-led elements were highlighted as "boring statement of policies and procedures" <ref type="bibr">[18, p. 250</ref>]. In addition, employees often lack motivation to participate in organisations' training programs as they feel they are not rewarded for the time spent on these activities. It is not enough for companies to only implement awareness-raising training; they must also adapt it to fit the employees. According to a study by Kävrestad et al. <ref type="bibr" target="#b18">[19]</ref>, the preferred delivery method for training is relevant and short sequences, such as password hints, when creating passwords. Their study also showed that the least preferred delivery method for training was through physical sessions attended at a specific time. Similarly, Johansson et al. <ref type="bibr" target="#b19">[20]</ref> found that small, focused, and contained modules were preferred among SMEs in the manufacturing sector.</p><p>Chaudhary et al. <ref type="bibr" target="#b2">[3]</ref> describes SMEs as companies with limited resources and with employees who fill more than one role in the organisation. Recommendations and frameworks exist to support SMEs in raising awareness of the company and employees by helping them prioritise what should be adopted based on their resources and making the whole adoption process more straightforward and easier to understand. However, studies show that the frameworks and models available to SMEs do not provide the support they need. For instance, there are no frameworks tailored to all the sectors in which SMEs are active <ref type="bibr" target="#b2">[3]</ref>. Supporting SMEs in the domain of awareness-increasing activities is a goal of several authorities. ENISA, for instance, provide a tool called awareness-raising in a box (AR-in-a-box) to help SMEs work with awareness-raising techniques <ref type="bibr" target="#b20">[21]</ref>. Also, various national initiatives (such as The Swedish Civil Contingencies Agency <ref type="bibr" target="#b21">[22]</ref>) offer information security training, guidance, templates, and advice for organisations regarding information security. In addition, there are directives aimed at creating a high level of readiness among companies and helping them prepare to defend against current and future threats. For example, the NIS2 directive will affect several sectors, including chemical manufacturing, food production and digital infrastructure in Europe <ref type="bibr" target="#b21">[22]</ref>.</p><p>SMEs need to choose the training that best suits the company and its employees and ensure the training is tailored to the needs of the company and its employees. Employees are more likely to absorb the presented information if they can relate it to their role within the organisation or the company's needs <ref type="bibr" target="#b17">[18]</ref>. Furthermore, it is highlighted that if the information is related to employees' personal lives and how it can improve their safety at home and work, employees are more motivated to receive and apply the information <ref type="bibr" target="#b17">[18]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Factors influencing the introduction of awareness-raising activities</head><p>While it is important to adopt awareness-raising activities, the organisation must strive for an activity that suits them, as one of the most critical factors in raising security awareness is the choice of activities. In a study by <ref type="bibr">Dahabiyeh [9]</ref>, the Technology-Organisation-Environment (TOE) (developed by Tornatzky et al. <ref type="bibr" target="#b22">[23]</ref>) highlighted factors that influence organisations' adoption of new technologies. Dahabiyeh <ref type="bibr" target="#b8">[9]</ref> used TOE to discuss the factors that influenced organisations' choice of information security awareness-raising measures, where the focus was computer-based tools. The technology aspect highlighted the factors of how easy the activity is to use and implement, the quality of the content, the integration and how easy it is for the organisation to adapt the content to their needs. From an organisational point of view, the support of the management team, the employees' commitment, and a dedicated IT security team were considered the most important factors. From the environmental point of view, two factors were considered to be most important, with the support of those delivering activities being considered important, including customer care and their technical competence. In addition, compliance was highlighted as an important factor <ref type="bibr" target="#b8">[9]</ref>.</p><p>SMEs often do not have the resources to adopt awareness-raising activities, as a study by Heidt et al. <ref type="bibr" target="#b9">[10]</ref> showed. All those who participated in their study highlighted the lack of resources as an obstacle, where budget, time and workforce took up most of them. The budget was the main factor highlighted by management, and they did not have the finances to invest in activities but instead had to spend it on investments to increase the company's financial profit. Heidt et al. <ref type="bibr" target="#b9">[10]</ref> found that the most commonly raised factor, regardless of the role in the company, was time constraints. Employees felt there was no time to adopt awareness-raising activities <ref type="bibr" target="#b9">[10]</ref>. SMEs usually have employees with more than one role in the company and, therefore, do not have the time to read up and educate themselves on the best options for the company. Without dedicated information security staff, it is possible that SMEs do not have the skills and knowledge to understand why awareness-raising training is needed or how to implement it, and it is likely they end up choosing and prioritising the economic growth of the company <ref type="bibr" target="#b9">[10]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Research approach</head><p>To be able to investigate what factors influence SMEs when adopting awareness-raising measures, we opted for a qualitative research approach. The study has been conducted by collecting data using semi-structured interviews and analysing that data thematically. Recent studies on awareness in SMEs have successfully used a similar approach with semi-structured interviews as a basis (e.g. <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b23">24,</ref><ref type="bibr" target="#b24">25]</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Data collection</head><p>Interviews are widely used for gathering data in qualitative research and can be performed in various ways <ref type="bibr" target="#b25">[26]</ref>. As the aim of the study is exploratory, semi-structured interviews were selected as they allow the respondent to elaborate on their answers <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b27">28]</ref>, and because the interviewer can raise ideas and questions that emerge during the interview <ref type="bibr" target="#b28">[29]</ref>. Thornhill et al. <ref type="bibr" target="#b29">[30]</ref> highlight that semi-structured interviews allow, for example, the exploration of the ideas and word choices of the respondents, which in turn can lead to more in-depth answers and a deeper understanding. Qualitative interviews are designed to generate more detailed and in-depth data, which is useful when studying "why" factors <ref type="bibr" target="#b30">[31]</ref>.</p><p>Semi-structured interviews are characterized by open-ended questions and an interview guide where a broader theme is developed <ref type="bibr" target="#b27">[28]</ref>. In this research, an interview guide was created and revised after the first interview. The guide consisted of three parts: an introductory part aimed at collecting background data on the respondent, a part that aimed at collecting more general data on how they work with awareness-raising activities, and the main part of the guide focusing on eliciting the adoption of awareness-raising activities. In the first part, a typical question was, "How long have you been doing this?" In the second part, "How are you currently working on raising information security awareness?" Finally, in the last part, we used questions like "What factors limited the adoption of that specific activity?"</p><p>Respondents were recruited through various channels, such as, emails available on company websites and via LinkedIn's message function. Around 60 company representatives were asked for an interview, but unfortunately, the majority of them did not respond to the request. Some respondents declined because they did not feel confident in their knowledge of the subject or because they did not have time, but we also know that security-related topics generally have issues finding participants <ref type="bibr" target="#b31">[32,</ref><ref type="bibr" target="#b32">33,</ref><ref type="bibr" target="#b33">34]</ref>. In total, ten respondents who work at SMEs in different types of industries were interviewed. Table <ref type="table" target="#tab_0">1</ref> shows an overview of the respondents and their experience of their current role.</p><p>The interviews were conducted using online conferencing software that allowed for the recording of the interviews. All interviews were recorded and transcribed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Analysis</head><p>Thematic analysis was chosen to analyse the data from the semi-structured interviews. The thematic analysis focuses on identifying, analysing and interpreting themes from qualitative data <ref type="bibr" target="#b34">[35]</ref>. When applying thematic analysis and identifying themes, looking for repetition, differences, and similarities is important <ref type="bibr" target="#b35">[36]</ref>. The coding guidelines from Saldaña <ref type="bibr" target="#b35">[36]</ref> were followed. More specifically, a two-cycle coding procedure was adopted. The first cycle used structural coding, which is especially suitable when the data comes from semi-structured interviews <ref type="bibr" target="#b35">[36]</ref>. In structural coding, large segments of text form the basis for in-depth analysis <ref type="bibr" target="#b36">[37]</ref>. After this step, codes are developed that are categorised based on similarities, differences, and repetition <ref type="bibr" target="#b35">[36]</ref>. Busetto et al. <ref type="bibr" target="#b27">[28]</ref> highlight that it is important that at least two researchers are involved during the coding process, especially at the beginning, so it is possible to compare the coding to ensure that coding is applied consistently to the data <ref type="bibr" target="#b27">[28]</ref>. Therefore, the data coding was first carried out individually by two authors, and then the categories identified were compared and consolidated jointly. The final process of deriving the themes was a joint effort. In this case, the themes were the factors found to influence the adoption of awareness-raising activities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Results</head><p>The thematic analysis resulted in the identification of 5 factors with a total of 7 sub-factors.</p><p>The following factors were found: Resources (with the sub-factors time and cost), implementation, content (with the sub-factors quality, adaptability, and comprehensibility), compliance, management (with the sub-factors management support and motivation of the employees).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Resources</head><p>Resources was found to contain two sub-factors: time and cost. Several respondents mentioned that time is a factor that affects them greatly, both when introducing and investigating new activities. Respondent 1 explains that the reason why they have not introduced even more awareness-raising activities is that "we are a small company with few employees, and it's really only me who works with this ... and I have other things to do. " Several of the respondents raise similar arguments as to why they have not adopted more activities. Some respondents also expressed the time it takes to carry out the training, with staff feeling that they do not have time to, for example, do micro-training or attend lectures on information security because they are already too busy. The cost was a well-discussed factor. The respondents were split into two groups: those who felt constrained by the costs and those who saw the costs as secondary to the potential benefit of raising awareness in the organisation. This can be exemplified by Respondent 1, who said: "that it shouldn't cost too much is quite important because as we are a small company… [where] costs are a big issue, " whereas Respondent 2 puts less emphasis on cost: "money is secondary in the context of security. "</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Implementation</head><p>Being able to implement an awareness-raising activity easily is considered an important factor by the respondents. Some respondents wanted measures that come pre-packaged by an external party so they don't have to spend too much time on them. Preferably, the activity should also be easy to manage after the implementation. This can be exemplified by Respondent 2: "It is easier when you get it served by an external party so you do not have to sit and work on the issue yourself. "</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Content</head><p>The content contained three sub-factors: quality, adaptability and comprehensibility. The respondents emphasise that the quality of the activity's content is important. What constitutes higher-quality material is, of course, something subjective. Here, it can be summarised from the respondents' descriptions as material that is not substandard and that the employees would not understand or consider when exposed to it. Interesting to note is that none of the respondents worked with the content quality actively to try to raise the level. Some respondents also address why they consider the information in awareness-raising activities should be comprehensible. For example, Respondent 5 explained that the quality of the content can be very high, but what is important is that employees can easily absorb the information: "in the end, you can have the world's most high-quality material that does no good if no one reads it, so comprehensibility, there should be a very low threshold there, to absorb the information, so people actually do it. " Furthermore, it was explained that content needs to be adapted to the company's lowest level and that there are often very different digital maturity levels. That is to say, that content needs to be adapted in various ways, but most respondents did not adapt their awarenessraising activities. Especially the ones using micro-training did not adapt the content to fit the organisation. Respondents that used newsletters customised them for the threats they considered relevant at the moment, but other than that, they did not adapt them to fit the organisation either.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4.">Compliance</head><p>Compliance is a factor that can potentially positively impact awareness-raising activities. As discussed previously, there is no guarantee that employees will remember the information in the awareness-raising activity. Depending on the type of awareness-raising activity, there are different possibilities from a compliance perspective. For example, newsletters and lectures were seen as difficult activities from a compliance perspective, i.e., the respondents had difficulties knowing if their employees actively read or absorbed the information. On the other hand, activities like micro-training and simulated phishing attacks were seen as compliance enablers as they came with a built-in option to track statistics on completion rates and how many employees clicked on phishing emails. I.e., it allows the manager to measure the awareness temperature in the organisation or, as Respondent 9 phrased it: "There [in our micro-training system] we have continuous monitoring and measurement. "</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.5.">Management</head><p>Finally, management is a factor that contains two sub-factors: management support and how the management works with the motivation of the employees. Most respondents considered the support of management crucial. There was a belief in a need for management support for information security in general, but also that the management showed its commitment to the activities selected. By actively showing support, preferably repeatedly over time, the employees understand the importance of the activities. It was emphasised that management support should come not only from the highest level but also from other managers, such as IT managers. IT managers also explained that they needed support from upper management in terms of time, in this case, so that they could spend the necessary time to research possible future activities, properly implement activities, and to be able to follow up on the results. Motivating employees to take part in the awareness-raising activities was seen as a difficulty, or as it was described by Respondent 4: "The first difficulty that I see is that people should understand that they should do it and then actually do it. " How the organisation worked to motivate employees differed. Several respondents talked directly to the employees since the investigated organisations were SMEs and hence had smaller organisations. The managers tried to explain why they had chosen their activities and why it was important that they take part in them. All respondents except one used a normative approach (i.e., moral reasoning and the values behind it). One respondent used a coercive approach (i.e., threats and punishments) by employing scare tactics. The normative group tried to highlight why taking part was good for the organisation and what could happen if there was an attack. The motivation of the employees to actively participate in an awarenessraising activity was seen as a very important factor, as without active participation, it doesn't matter what activities to adopt; the employee would not be actively involved anyway. I.e., employee motivation is crucial for the adoption of awareness-raising activities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Discussion</head><p>This paper has investigated factors influencing the adoption of awareness-raising activities in SMEs. A number of factors were found, and a summary of these factors can be found in Table <ref type="table" target="#tab_1">2</ref>.</p><p>A recurring theme that emerged from the interviews was that management needs to be more engaged in awareness-raising activities. This is achieved by giving those responsible more time to work on these issues and by being involved in the adoption process to show employees that this is an important issue. These results are in line with, for example, Renaud <ref type="bibr" target="#b37">[38]</ref> and Chaudhary et al. <ref type="bibr" target="#b2">[3]</ref>. Management involvement in awareness-raising activities is crucial, and we know that awareness-raising activities are most effective when management fully supports them, as employees are more likely to participate more actively in these activities if they can see that management is dedicated to the issue. Much literature on the topic is getting somewhat old, and the advice for engaging management (e.g. by explaining the cost-benefit of awareness-raising activities <ref type="bibr" target="#b38">[39]</ref>, to design and utilise low-cost awareness-raising activities <ref type="bibr" target="#b39">[40,</ref><ref type="bibr" target="#b40">41]</ref>, and to show that awareness-raising activities are effective <ref type="bibr" target="#b41">[42]</ref>) does not seem to work, at least not for SMEs. Some newer suggestions could be interesting to pursue to see if they could affect SME management, for example, to utilise peer comparisons through benchmarking, illustrating to leadership the investments competitors are doing <ref type="bibr" target="#b2">[3]</ref>. Our study also arrives at a slightly different conclusion than Dahabiyeh's <ref type="bibr" target="#b8">[9]</ref> study that found management not as important a factor as we do in this study. Perhaps this can be explained by our respondents' perceptions of the limitations regarding available resources. There is also how management works to motivate the employees to partake in awareness-raising activities. Here, we found that all except one used a normative approach, which is an interesting find since previous literature has shown inconsistent findings <ref type="bibr" target="#b42">[43]</ref>, and there are many calls for more research on this aspect <ref type="bibr" target="#b42">[43,</ref><ref type="bibr" target="#b43">44]</ref>. Related to management is resources, as management can affect time constraints and costs. The respondents highlighted that IT managers need more time to implement and maintain awareness-raising activities. Also, the cost was found to be an obstacle, which has been observed as a general SME problem <ref type="bibr" target="#b17">[18]</ref> as fewer financial resources imply having to choose between awareness-raising activities or economic growth. As this is such a big issue where the majority of companies are struggling, we recommend numerous national and international initiatives, such as AR-in-a-box <ref type="bibr" target="#b20">[21]</ref>, to ramp up their marketing as the awareness of the initiatives is low. Another way to increase such initiatives' usage is to (further) adapt them to various sectors (e.g. manufacturing, healthcare, etc.) to make them more relevant for the target groups. It is also interesting to study in future research as little is known about the adaptation to different user groups or, for that matter, what types of user groups exist.</p><p>Several of the respondents thought that the quality of the content of the awareness-raising activity was the most important aspect. Previous research, such as He and Zhang <ref type="bibr" target="#b17">[18]</ref>, has discussed the importance of activities that should be adapted to the level of the employee so that the content is comprehensible. Here, we found that the respondents acknowledged this, but very few of them worked with this type of adaptation due to resource limitations. In general, adaptability was considered important, which is consistent with Dahabiyeh <ref type="bibr" target="#b8">[9]</ref>, but again, the respondents did not do it in practice. This further strengthens the argument above about the necessity to adapt awareness-raising activities sectorally and to different user groups so that the ones implementing them in the organisation can easily push out suitable content on the correct level to their colleagues. Especially since we know that the quality of the content is highlighted as a critical factor in successful awareness-raising activities <ref type="bibr" target="#b2">[3]</ref>.</p><p>Related to implementation is integration, which was raised in Dahabiyeh's <ref type="bibr" target="#b8">[9]</ref> study as a factor, but this study showed that integration was not something respondents considered important. This may be due to the fact that SMEs rarely have systems that can be regarded as necessary for integrating awareness-raising activities. Regarding implementation, we found that prepackaged content by an external provider was favoured among the respondents. Similarly, it should be easy to manage after the implementation. So, yet again, we find a gap between content providers and their users.</p><p>Finally, compliance was found to be a factor that ultimately can affect the type of activities to be adopted. Depending on the type of activity, there are different possibilities for tracking completion and absorption rates among employees. We found that activities that include such functionality (e.g. micro-training and simulated phishing emails) were seen positively. Being able to track performance, of course, also influences motivation as tracking enables finding those who do not participate in training or those who are performing poorly. With a normative approach, one can also possibly find the underlying reasons why someone is not participating. Is it too hard, or is there perhaps a problem with time?</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>The research question, What factors influence the adoption of awareness-raising activities in SMEs?, was addressed using semi-structured interviews with ten participants who are responsible for awareness-raising within their respective organisations. Adopting a socio-technical lens, this research confirms that awareness-raising is dependent on the interplay between management, technology and system users. The results show five main factors that are of importance for the organisational adoption of awareness-raising activities, which span the entire socio-technical spectrum. The perhaps most notable conclusion is that management is an enabler which can both provide resources and lead by example. Lack of resources is constantly mentioned as an obstacle by the participants who, for instance, describe a need for ready-to-use solutions to save time or not being able to modify activities due to a lack of time. A second notable finding is that this research confirms the importance of activities that are adapted to the organisation where they are used. The respondents describe adaption as important to raise employee motivation and increase relevance. However, while the respondents emphasise the importance of adaptation, they do not work with it in practice. While this conclusion appears to be a conundrum, it is well aligned with the fact that SMEs are struggling to find resources for awareness-raising activities.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Overview of the respondents and their level of experience.</figDesc><table><row><cell cols="2">Respondent Title</cell><cell>Experience</cell></row><row><cell>1</cell><cell>Operations engineer/IT architect</cell><cell>&lt;5 years</cell></row><row><cell>2</cell><cell cols="2">Chief financial officer/Chief information officer &gt;5 years</cell></row><row><cell>3</cell><cell>IT manager</cell><cell>&gt;5 years</cell></row><row><cell>4</cell><cell>System developer</cell><cell>&gt;5 years</cell></row><row><cell>5</cell><cell>IT security engineer</cell><cell>&lt;5 years</cell></row><row><cell>6</cell><cell>IT technician</cell><cell>&gt;5 years</cell></row><row><cell>7</cell><cell>IT manager</cell><cell>&lt;5 years</cell></row><row><cell>8</cell><cell>IT manager</cell><cell>&lt;5 years</cell></row><row><cell>9</cell><cell>Chief information security officer</cell><cell>&lt;5 years</cell></row><row><cell>10</cell><cell>IT operations manager</cell><cell>&lt;5 years</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Summary of the factors found that influence the adoption of awareness-raising activities, including a description of the factors.</figDesc><table><row><cell>Factor</cell><cell>Description</cell></row><row><cell>Resources</cell><cell></cell></row><row><cell>Time</cell><cell>There is a lack of time for introducing and investigating new</cell></row><row><cell></cell><cell>activities and carrying out the training.</cell></row><row><cell>Cost</cell><cell>Split into two groups: the ones feeling constrained by costs and</cell></row><row><cell></cell><cell>the ones who perceive the cost to be secondary to the benefit.</cell></row><row><cell>Implementation</cell><cell>Implementation and maintenance should be easy. They should</cell></row><row><cell></cell><cell>preferably come as pre-packaged solutions.</cell></row><row><cell>Content</cell><cell></cell></row><row><cell>Quality</cell><cell>Content should be of a high standard, and users should under-</cell></row><row><cell></cell><cell>stand and consider it when exposed.</cell></row><row><cell>Comprehensibility</cell><cell>Users should easily be able to absorb the content.</cell></row><row><cell>Adaptability</cell><cell>It should be possible to adapt the content to organisational</cell></row><row><cell></cell><cell>needs and for users on different levels.</cell></row><row><cell>Compliance</cell><cell>Depending on the awareness-raising activity, there are different</cell></row><row><cell></cell><cell>possibilities for tracking completion and absorption rates.</cell></row><row><cell>Management</cell><cell></cell></row><row><cell>Management support</cell><cell>Show support by giving more time to work on awareness-raising</cell></row><row><cell></cell><cell>activities and be active in the adoption process.</cell></row><row><cell cols="2">Motivation of the employees Employee motivation for actively participating in awareness-</cell></row><row><cell></cell><cell>raising activities.</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>We gratefully acknowledge the grants from the Swedish Civil Contingencies Agency (MSB), projects VISKA (MSB 2021-14650) and ICANP (MSB 2023-10887).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="https://thrivedx.com/resources/article/cyber-security-facts-statistics" />
		<title level="m">ThriveDX, 15 alarming cybersecurity facts and statistics</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">I</forename><surname>Security</surname></persName>
		</author>
		<ptr target="https://www.ibm.com/reports/data-breach" />
		<title level="m">Cost of a data breach report 2023</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises</title>
		<author>
			<persName><forename type="first">S</forename><surname>Chaudhary</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gkioulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Katsikas</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cosrev.2023.100592</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1016/j.cosrev.2023.100592" />
	</analytic>
	<monogr>
		<title level="j">Computer Science Review</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="page">100592</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Sarri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Paggio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Bafoutsou</surname></persName>
		</author>
		<ptr target="https://www.enisa.europa.eu/publications/enisa-report-cybersecurity-for-smes" />
		<title level="m">Cybersecurity for smes-challenges and recommendations</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Cybersecurity awareness and capacities of smes</title>
		<author>
			<persName><forename type="first">G</forename><surname>Erdogan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Halvorsrud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Boletsis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tverdal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">Brian</forename><surname>Pickering</surname></persName>
		</author>
		<idno type="DOI">10.5220/0011609600003405</idno>
	</analytic>
	<monogr>
		<title level="m">9th International Conference on Information Systems Security and Privacy -ICISSP</title>
				<imprint>
			<publisher>SciTePress</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="296" to="304" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Business</surname></persName>
		</author>
		<ptr target="https://www.verizon.com/business/resources/reports/dbir/2023/summary-of-findings/" />
		<title level="m">data breach investigations report</title>
				<imprint>
			<date type="published" when="2024">2024. 2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Social engineering attacks: A survey</title>
		<author>
			<persName><forename type="first">F</forename><surname>Salahdine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kaabouch</surname></persName>
		</author>
		<ptr target="https://www.mdpi.com/1999-5903/11/4/89" />
	</analytic>
	<monogr>
		<title level="j">Future Internet</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page">89</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Developing cybersecurity education and awareness programmes for small-and medium-sized enterprises (smes)</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R C</forename><surname>Nurse</surname></persName>
		</author>
		<idno type="DOI">10.1108/ICS-07-2018-0080</idno>
	</analytic>
	<monogr>
		<title level="j">Information Computer Security</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page" from="393" to="410" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Factors affecting organizational adoption and acceptance of computer-based security awareness training tools</title>
		<author>
			<persName><forename type="first">L</forename><surname>Dahabiyeh</surname></persName>
		</author>
		<idno type="DOI">10.1108/ICS-12-2020-0200</idno>
	</analytic>
	<monogr>
		<title level="j">Information Computer Security</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="836" to="849" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Investigating the security divide between sme and large companies: How sme characteristics influence organizational it security investments</title>
		<author>
			<persName><forename type="first">M</forename><surname>Heidt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Gerlach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Buxmann</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10796-019-09959-1</idno>
	</analytic>
	<monogr>
		<title level="j">Information Systems Frontiers</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="1285" to="1305" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">The story of socio-technical design: Reflections on its successes, failures and potential</title>
		<author>
			<persName><forename type="first">E</forename><surname>Mumford</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information systems journal</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="317" to="342" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">P</forename><surname>Pfleeger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">L</forename><surname>Pfleeger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Margulies</surname></persName>
		</author>
		<title level="m">Security in computing</title>
				<meeting><address><addrLine>Upper Saddle River, NJ</addrLine></address></meeting>
		<imprint>
			<publisher>Prentice Hall</publisher>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note>fifth edition ed</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">i added&apos;!&apos;at the end to make it secure&quot;: Observing password creation in the lab</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Noma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bees</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename><surname>Segreti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Shay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Bauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Christin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Cranor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Eleventh symposium on usable privacy and security (SOUPS 2015)</title>
				<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="123" to="140" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Exploring experiences of using seta in nordic municipalities</title>
		<author>
			<persName><forename type="first">A</forename><surname>Al-Salek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kävrestad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nohlberg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Human Aspects of Information Security and Assurance</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Furnell</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Clarke</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="22" to="31" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness</title>
		<author>
			<persName><forename type="first">B</forename><surname>Bulgurcu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Cavusoglu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Benbasat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS quarterly</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page" from="523" to="548" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Effectiveness of information security awareness methods based on psychological theories</title>
		<author>
			<persName><forename type="first">B</forename><surname>Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Alghathbar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">I</forename><surname>Nabi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Khan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">African journal of business management</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page">10862</biblScope>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Effectiveness of and user preferences for security awareness training methodologies</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">F</forename><surname>Tschakert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ngamsuriyaroj</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.heliyon.2019.e02010</idno>
		<idno>doi</idno>
		<ptr target=":10.1016/j.heliyon.2019.e02010" />
	</analytic>
	<monogr>
		<title level="j">Heliyon</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Enterprise cybersecurity training and awareness programs: Recommendations for success</title>
		<author>
			<persName><forename type="first">W</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Zhang</surname></persName>
		</author>
		<idno type="DOI">10.1080/10919392.2019.1611528</idno>
		<idno>doi:10. 1080/10919392.2019.1611528</idno>
		<ptr target="https://doi.org/10.1080/10919392.2019.1611528" />
	</analytic>
	<monogr>
		<title level="j">Journal of Organizational Computing and Electronic Commerce</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="249" to="257" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A taxonomy of seta methods and linkage to delivery preferences</title>
		<author>
			<persName><forename type="first">J</forename><surname>Kävrestad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nohlberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Furnell</surname></persName>
		</author>
		<idno type="DOI">10.1145/3631341.3631348</idno>
	</analytic>
	<monogr>
		<title level="j">SIGMIS Database</title>
		<imprint>
			<biblScope unit="volume">54</biblScope>
			<biblScope unit="page" from="107" to="133" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Improving cybersecurity awareness among smes in the manufacturing industry</title>
		<author>
			<persName><forename type="first">K</forename><surname>Johansson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Paulsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bergström</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Seigerroth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SPS2022: Proceedings of the 10th Swedish production symposium</title>
				<editor>
			<persName><forename type="first">A</forename><forename type="middle">H C</forename><surname>Ng</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Syberfelt</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Högberg</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Holm</surname></persName>
		</editor>
		<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="209" to="220" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<author>
			<persName><surname>Enisa</surname></persName>
		</author>
		<ptr target="https://www.enisa.europa.eu/news/custom-made-awareness-raising-to-enhance-cybersecurity-culture" />
		<title level="m">Custom-made awareness raising to enhance cybersecurity culture</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<ptr target="https://www.msb.se/sv/amnesomraden/informationssakerhet-cybersakerhet-och-sakra-kommunikationer/arbeta-systematiskt-informationssakerhet-och-cybersakerhet/informationssakerhet-for-sma-och-medelstora-organisationer/" />
		<title level="m">The Swedish Civil Contingencies Agency, Informationssäkerhet för små och medelstora organisationer [information security for small and medium-sized organisations</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">G</forename><surname>Tornatzky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fleischer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Chakrabarti</surname></persName>
		</author>
		<title level="m">The processes of technological innovation</title>
				<meeting><address><addrLine>Lexington, MA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Lexington Books</publisher>
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">It is not my job: exploring the disconnect between corporate security policies and actual security practices in smes</title>
		<author>
			<persName><forename type="first">M</forename><surname>Sadok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Alter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Bednar</surname></persName>
		</author>
		<idno type="DOI">10.1108/ICS-01-2019-0010</idno>
	</analytic>
	<monogr>
		<title level="j">Information Computer Security</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="467" to="483" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Exploration of the impact of cybersecurity awareness on small and medium enterprises (smes) in wales using intelligent software to combat cybercrime</title>
		<author>
			<persName><forename type="first">N</forename><surname>Rawindaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Jayal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Prakash</surname></persName>
		</author>
		<ptr target="https://www.mdpi.com/2073-431X/11/12/174" />
	</analytic>
	<monogr>
		<title level="j">Computers</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page">174</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<title level="m" type="main">Researching Information Systems and Computing</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">J</forename><surname>Oates</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>Sage</publisher>
			<pubPlace>London</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m" type="main">Conducting Semi-Structured Interviews</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">C</forename><surname>Adams</surname></persName>
		</author>
		<idno type="DOI">10.1002/9781119171386.ch19</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1002/9781119171386.ch19" />
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="492" to="505" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">How to use and assess qualitative research methods</title>
		<author>
			<persName><forename type="first">L</forename><surname>Busetto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Wick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gumbinger</surname></persName>
		</author>
		<idno type="DOI">10.1186/s42466-020-00059-z</idno>
	</analytic>
	<monogr>
		<title level="j">Neurological Research and Practice</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page">14</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Research and scholarly methods: Semi-structured interviews</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">A</forename><surname>Adeoye-Olatunde</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">L</forename><surname>Olenik</surname></persName>
		</author>
		<idno type="DOI">10.1002/jac5.1441</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1002/jac5.1441" />
	</analytic>
	<monogr>
		<title level="j">JACCP: JOURNAL OF THE AMERICAN COLLEGE OF CLINICAL PHARMACY</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="1358" to="1367" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<title level="m" type="main">Research methods for business students</title>
		<author>
			<persName><forename type="first">A</forename><surname>Thornhill</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Saunders</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Lewis</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
			<pubPlace>Prentice Hall; London</pubPlace>
		</imprint>
	</monogr>
	<note>seventh edition ed</note>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title level="m" type="main">Principles of sociological inquiry: Qualitative and quantitative methods</title>
		<author>
			<persName><forename type="first">A</forename><surname>Blackstone</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
			<publisher>Saylor Academy Open Textbooks</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective</title>
		<author>
			<persName><forename type="first">R</forename><surname>Baskerville</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Rowe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F.-C</forename><surname>Wolff</surname></persName>
		</author>
		<idno type="DOI">10.1145/3184444.3184448</idno>
	</analytic>
	<monogr>
		<title level="j">SIGMIS Database</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="page" from="33" to="52" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">An evaluation of practitioners&apos; perceptions of a security risk assessment methodology in air traffic management projects</title>
		<author>
			<persName><forename type="first">K</forename><surname>Bernsmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Bour</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lundgren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bergström</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jairtraman.2022.102223</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Air Transport Management</title>
		<imprint>
			<biblScope unit="volume">102</biblScope>
			<biblScope unit="page">102223</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Seeing the forest and the trees: A meta-analysis of the antecedents to information security policy compliance</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">A</forename><surname>Cram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>D'arcy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">G</forename><surname>Proudfoot</surname></persName>
		</author>
		<idno type="DOI">10.25300/MISQ/2019/15117</idno>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="525" to="554" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Using thematic analysis in psychology</title>
		<author>
			<persName><forename type="first">V</forename><surname>Braun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Clarke</surname></persName>
		</author>
		<idno type="DOI">10.1191/1478088706qp063oa</idno>
	</analytic>
	<monogr>
		<title level="j">Qualitative Research in Psychology</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="77" to="101" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<monogr>
		<title level="m" type="main">The coding manual for qualitative researchers</title>
		<author>
			<persName><forename type="first">J</forename><surname>Saldaña</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
			<publisher>SAGE Publications Inc</publisher>
			<pubPlace>Thousand Oaks, CA, USA</pubPlace>
		</imprint>
	</monogr>
	<note>4th ed</note>
</biblStruct>

<biblStruct xml:id="b36">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">M</forename><surname>Macqueen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Mclellan-Lemal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Bartholow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Milstein</surname></persName>
		</author>
		<title level="m">Team-based codebook development: Structure, process, and agreement</title>
				<meeting><address><addrLine>Lanham, MD, USA</addrLine></address></meeting>
		<imprint>
			<publisher>AltaMira Press</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="119" to="135" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">How smaller businesses struggle with security advice</title>
		<author>
			<persName><forename type="first">K</forename><surname>Renaud</surname></persName>
		</author>
		<idno type="DOI">10.1016/S1361-3723(16)30062-8</idno>
		<idno>)30062-8</idno>
		<ptr target="https://doi.org/10.1016/S1361-3723(16" />
	</analytic>
	<monogr>
		<title level="j">Computer Fraud Security</title>
		<imprint>
			<biblScope unit="volume">2016</biblScope>
			<biblScope unit="page" from="10" to="18" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">Towards an empirical examination of it security infrastructures in sme</title>
		<author>
			<persName><forename type="first">R</forename><surname>Groner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Brune</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Secure IT Systems: 17th Nordic Conference, NordSec 2012</title>
				<meeting><address><addrLine>Karlskrona, Sweden</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012-11-02">October 31-November 2, 2012. 2012</date>
			<biblScope unit="page" from="73" to="88" />
		</imprint>
	</monogr>
	<note>Proceedings 17</note>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Ignorance to awareness: Towards an information security awareness process</title>
		<author>
			<persName><forename type="first">T</forename><surname>Gundu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Flowerday</surname></persName>
		</author>
		<idno type="DOI">10.23919/SAIEE.2013.8531867</idno>
	</analytic>
	<monogr>
		<title level="j">SAIEE Africa Research Journal</title>
		<imprint>
			<biblScope unit="volume">104</biblScope>
			<biblScope unit="page" from="69" to="79" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Challenges in fostering an information security culture in australian small and medium sized enterprises</title>
		<author>
			<persName><forename type="first">S</forename><surname>Dojkovski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lichtenstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Warren</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">5th European conference on Information Warfare and Security</title>
				<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="31" to="40" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">The positive outcomes of information security awareness training in companies -a case study</title>
		<author>
			<persName><forename type="first">M</forename><surname>Eminağaoğlu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Uçar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Eren</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.istr.2010.05.002</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1016/j.istr.2010.05.002" />
	</analytic>
	<monogr>
		<title level="j">Information Security Technical Report</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="223" to="229" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Ensuring employees&apos; information security policy compliance by carrot and stick: the moderating roles of organizational commitment and gender</title>
		<author>
			<persName><forename type="first">C</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Liang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Xue</surname></persName>
		</author>
		<idno type="DOI">10.1108/ITP-09-2019-0452</idno>
	</analytic>
	<monogr>
		<title level="j">Information Technology People</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="802" to="834" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">Examining the impact of deterrence factors and norms on resistance to information systems security</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Merhi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Ahluwalia</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.chb.2018.10.031</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1016/j.chb.2018.10.031" />
	</analytic>
	<monogr>
		<title level="j">Computers in Human Behavior</title>
		<imprint>
			<biblScope unit="volume">92</biblScope>
			<biblScope unit="page" from="37" to="46" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
