Information Security Awareness Campaign: An Alternate Approach

  • Bilal Khan
  • Khaled S. Alghathbar
  • Muhammad Khurram Khan
Part of the Communications in Computer and Information Science book series (CCIS, volume 200)


The destruction due to computer security incidents warns organizations to adopt security measures. In addition to technological measures, individual’s information security awareness is also necessary. Different psychological theories have been proposed to make an effective information security awareness campaign. These information security awareness campaigns are limited in their ability in raising awareness of the participants of the campaign. Although much research has been done in the area of information security awareness, however, this paper considers the applications of healthcare awareness and environmental awareness strategies to make an effective information security awareness campaign. In this paper, we study some of the useful research work conducted in the healthcare and environmental safety awareness domains. These researches have been carried out by well-known researchers in the field of psychology. Finally, we apply these healthcare and environmental awareness best practices to propose an effective information security awareness campaign.


information security awareness healthcare environmental effective 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kruger, H.A., Kearney, W.D.: A prototype for assessing information security awareness. Journal of Computer and Security 25(4), 289–296 (2006)CrossRefGoogle Scholar
  2. 2.
    Schultz, E.: Security training and awareness-fitting a square peg in a round hole. Computers & Security 23, 1–2 (2004)CrossRefGoogle Scholar
  3. 3.
    Tay, R.: Mass media campaigns reduce the incidence of drinking and driving. Evidence-Based Healthcare and Public Health 9(1), 26–29 (2005)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Ng, B.Y., Kankanhallia, A., Xu, Y.: Studying Users’ Computer Security Behavior: A Health Belief Perspective. Decision Support Systems 46(4), 815–825 (2009)CrossRefGoogle Scholar
  5. 5.
    Yeo, A.C., Rahim, M.M., Ren, Y.Y.: Use of Persuasive technology to change end user’s IT security aware behavior: a pilot study. International Journal of Psychological and Behavioral Sciences 1(1), 48–54 (2009)Google Scholar
  6. 6.
    Niekerk, J.V., Solms, R.V.: A web-based portal for information security education (2007)Google Scholar
  7. 7.
    Schultz, W.P., Khaziana, A.M., Zaleskia, A.C.: Using normative social influence to promote conservation among hotel guests. Social Influence 3(1), 4–23 (2008)CrossRefGoogle Scholar
  8. 8.
    Schultz, P.W., Nolan, J.M., Cialdini, R.B., Goldstein, N.J., Griskevicius, V.: The constructive, destructive, and reconstructive power of social norms. Psychological Science 18(5), 429–434 (2007)CrossRefGoogle Scholar
  9. 9.
    Information security forum. The standard of good practice for information security (March 2003),
  10. 10.
    Wakefield, M.A., Loken, B., Hornik, R.C.: Use of mass media campaigns to change health behavior. The Lancet 376(9748), 1261–1271 (2010)CrossRefGoogle Scholar
  11. 11.
    Fisher, J.D., Fisher, W.A., Bryanc, A.D., Misovichd, S.J.: Information-Motivation-Behavioral Skills Model–Based HIV Risk Behavior Change Intervention for Inner-City High School Youth. Health Psychology 21(2), 177–186 (2002)CrossRefGoogle Scholar
  12. 12.
    Schultz, P.W., Oskamp, S., Mainieri, T.: Who recycles and when: A review of personal and situational factors. Journal of Environmental Psychology 15(2), 105–121 (1995)CrossRefGoogle Scholar
  13. 13.
    Schultz, P.W.: Knowledge, education, and household recycling: Examining the knowledge-deficit model of behavior change. In: Dietz, T., Stern, P. (eds.) New Tools for Environmental Protection, pp. 67–82. National Academy of Sciences, Washington DC (2002)Google Scholar
  14. 14.
    Schultz, P.W.: Changing behavior with normative feedback interventions: A field experiment of curbside recycling. Basic and Applied Social Psychology 21, 25–36 (1999)CrossRefGoogle Scholar
  15. 15.
    Nolan, J., Schultz, P.W., Knowles, E.: Using public service announcements to change behavior: No more money and oil down the drain. Journal of Applied Social Psychology 39, 1035–1056 (2009)CrossRefGoogle Scholar
  16. 16.
    Baranowski, T., Cullen, K.W., Nicklas, T., Thompson, D., Baranowski, J.: Are current health behavioral change models helpful in guiding prevention of weight gain efforts? Obesity Research 11(10), 23–43 (2003)CrossRefGoogle Scholar
  17. 17.
    Osborne, Edgede: Validation of an Information–Motivation–Behavioral Skills model of diabetes self-care (IMB-DSC). Patient Education & Counseling 79(1), 49–54 (2010)CrossRefGoogle Scholar
  18. 18.
    Albrechsten, E., Hovden, J.: Improving information security awareness and behavior through dialogue, participation, and collective reflection. An intervention study. Journal of Computer & Security 29(4), 432–445 (2010)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Bilal Khan
    • 1
  • Khaled S. Alghathbar
    • 1
    • 2
  • Muhammad Khurram Khan
    • 1
  1. 1.Center of Excellence in Information AssuranceKing Saud UniversityKingdom of Saudi Arabia
  2. 2.Department of Information System, CCISKing Saud UniversityKingdom of Saudi Arabia

Personalised recommendations