IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v16y2024i8p294-d1456687.html
   My bibliography  Save this article

Establishing a Model for the User Acceptance of Cybersecurity Training

Author

Listed:
  • Wesam Fallatah

    (School of Computer Science, University of Nottingham, Nottingham NG8 1BB, UK)

  • Joakim Kävrestad

    (School of Engineering, Jönköping University, 551 11 Jönköping, Sweden)

  • Steven Furnell

    (School of Computer Science, University of Nottingham, Nottingham NG8 1BB, UK)

Abstract

Cybersecurity is established as fundamental for organisations and individuals engaging with digital technology. A central topic in cybersecurity is user behaviour, which has been shown to be the root cause or enabler in a majority of all cyber incidents with a resultant need to empower users to adopt secure behaviour. Researchers and practitioners agree that a crucial step in empowering users to adopt secure behaviour is training. Subsequently, there are many different methods for cybersecurity training discussed in the scientific literature and that are adopted in practise. However, research suggests that those training efforts are not effective enough, and one commonly mentioned reason is user adoption problems. In essence, users are not engaging with the provided training to the extent needed to benefit from the training as expected. While the perception and adoption of individual training methods are discussed in the scientific literature, cohesive studies on the factors that impact user adoption are few and far between. To that end, this paper focuses on the user acceptance of cybersecurity training using the technology acceptance model as a theory base. Based on 22 included publications, the research provides an overview of the cybersecurity training acceptance factors that have been discussed in the existing scientific literature. The main contributions are a cohesive compilation of existing knowledge about factors that impact the user acceptance of cybersecurity training and the introduction of the CTAM, a cybersecurity training acceptance model which pinpoints four factors—regulatory control, worry, apathy, and trust—that influence users’ intention to adopt cybersecurity training. The results can be used to guide future research as well as to guide practitioners implementing cybersecurity training.

Suggested Citation

  • Wesam Fallatah & Joakim Kävrestad & Steven Furnell, 2024. "Establishing a Model for the User Acceptance of Cybersecurity Training," Future Internet, MDPI, vol. 16(8), pages 1-12, August.
  • Handle: RePEc:gam:jftint:v:16:y:2024:i:8:p:294-:d:1456687
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/16/8/294/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/16/8/294/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Viswanath Venkatesh & Fred D. Davis, 2000. "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science, INFORMS, vol. 46(2), pages 186-204, February.
    2. Matthew J Page & Joanne E McKenzie & Patrick M Bossuyt & Isabelle Boutron & Tammy C Hoffmann & Cynthia D Mulrow & Larissa Shamseer & Jennifer M Tetzlaff & Elie A Akl & Sue E Brennan & Roger Chou & Jul, 2021. "The PRISMA 2020 statement: An updated guideline for reporting systematic reviews," PLOS Medicine, Public Library of Science, vol. 18(3), pages 1-15, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Deepa, R. & Sekar, Srinivasan & Malik, Ashish & Kumar, Jitender & Attri, Rekha, 2024. "Impact of AI-focussed technologies on social and technical competencies for HR managers – A systematic review and research agenda," Technological Forecasting and Social Change, Elsevier, vol. 202(C).
    2. Saeideh Sharifi fard & Ezhar Tamam & Md Salleh Hj Hassan & Moniza Waheed & Zeinab Zaremohzzabieh, 2016. "Factors affecting Malaysian university students’ purchase intention in social networking sites," Cogent Business & Management, Taylor & Francis Journals, vol. 3(1), pages 1182612-118, December.
    3. Chou, Jui-Sheng & Gusti Ayu Novi Yutami, I, 2014. "Smart meter adoption and deployment strategy for residential buildings in Indonesia," Applied Energy, Elsevier, vol. 128(C), pages 336-349.
    4. Philippe Cohard, 2020. "Information Systems Values: A Study of the Intranet in Three French Higher Education Institutions," Post-Print hal-02987225, HAL.
    5. Melih Engin & Fatih Gürses, 2019. "Adoption of Hospital Information Systems in Public Hospitals in Turkey: An Analysis with the Unified Theory of Acceptance and Use of Technology Model," International Journal of Innovation and Technology Management (IJITM), World Scientific Publishing Co. Pte. Ltd., vol. 16(06), pages 1-19, October.
    6. Morosan, Cristian, 2016. "An empirical examination of U.S. travelers’ intentions to use biometric e-gates in airports," Journal of Air Transport Management, Elsevier, vol. 55(C), pages 120-128.
    7. Tsung Teng Chen, 2012. "The development and empirical study of a literature review aiding system," Scientometrics, Springer;Akadémiai Kiadó, vol. 92(1), pages 105-116, July.
    8. Abdesamad Zouine & Pierre Fenies, 2014. "The Critical Success Factors Of The ERP System Project: A Meta-Analysis Methodology," Post-Print hal-01419785, HAL.
    9. Debora Bettiga & Lucio Lamberti & Emanuele Lettieri, 2020. "Individuals’ adoption of smart technologies for preventive health care: a structural equation modeling approach," Health Care Management Science, Springer, vol. 23(2), pages 203-214, June.
    10. Kertcher, Zack & Venkatraman, Rohan & Coslor, Erica, 2020. "Pleasingly parallel: Early cross-disciplinary work for innovation diffusion across boundaries in grid computing," Journal of Business Research, Elsevier, vol. 116(C), pages 581-594.
    11. Talukder, Md. Shamim & Sorwar, Golam & Bao, Yukun & Ahmed, Jashim Uddin & Palash, Md. Abu Saeed, 2020. "Predicting antecedents of wearable healthcare technology acceptance by elderly: A combined SEM-Neural Network approach," Technological Forecasting and Social Change, Elsevier, vol. 150(C).
    12. Rizkiana Sidqiyatul Hamdani & Sudharto Prawata Hadi & Iwan Rudiarto, 2021. "Progress or Regress? A Systematic Review on Two Decades of Monitoring and Addressing Land Subsidence Hazards in Semarang City," Sustainability, MDPI, vol. 13(24), pages 1-26, December.
    13. Fang Li & Sheng Zhang & Yuhuan Jin, 2018. "Sustainability of University Technology Transfer: Mediating Effect of Inventor’s Technology Service," Sustainability, MDPI, vol. 10(6), pages 1-17, June.
    14. Waqar Younas & K. Ramanathan Kalimuthu, 2021. "Telecom microfinance banking versus commercial banking: a battle in the financial services sector," Journal of Financial Services Marketing, Palgrave Macmillan, vol. 26(2), pages 67-80, June.
    15. Sarv Devaraj & Robert F. Easley & J. Michael Crant, 2008. "Research Note ---How Does Personality Matter? Relating the Five-Factor Model to Technology Acceptance and Use," Information Systems Research, INFORMS, vol. 19(1), pages 93-105, March.
    16. Boglárka Anna Éliás & Attila Jámbor, 2021. "Food Security and COVID-19: A Systematic Review of the First-Year Experience," Sustainability, MDPI, vol. 13(9), pages 1-18, May.
    17. Omoyele, Olalekan & Hoffmann, Maximilian & Koivisto, Matti & Larrañeta, Miguel & Weinand, Jann Michael & Linßen, Jochen & Stolten, Detlef, 2024. "Increasing the resolution of solar and wind time series for energy system modeling: A review," Renewable and Sustainable Energy Reviews, Elsevier, vol. 189(PB).
    18. Claudio Vitari & Elisabetta Raguseo, 2016. "Big data value and financial performance: an empirical investigation [Digital data, dynamic capability and financial performance: an empirical investigation in the era of Big Data]," Post-Print halshs-01923271, HAL.
    19. Yu Wang & Shanyong Wang & Jing Wang & Jiuchang Wei & Chenglin Wang, 2020. "An empirical study of consumers’ intention to use ride-sharing services: using an extended technology acceptance model," Transportation, Springer, vol. 47(1), pages 397-415, February.
    20. Proserpio, Luigi & Magni, Massimo, 2012. "Teaching without the teacher? Building a learning environment through computer simulations," International Journal of Information Management, Elsevier, vol. 32(2), pages 99-105.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:16:y:2024:i:8:p:294-:d:1456687. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.