Loading...

Media is loading
 

Paper Number

2655

Paper Type

Completed

Description

This study investigates the impact of employees' temporal focus on the effectiveness of Security Education, Training, and Awareness (SETA) programs in organizations. Drawing on Construal Level Theory, the research examines the relationship between temporal focus, level of abstraction in information processing, and preferences for tactical or strategic cybersecurity training. Findings confirm that employees with a present temporal focus prefer tactical training, while those with a future temporal focus prefer strategic training. Concrete cybersecurity cognition mediates the relationship between present temporal focus and tactical training preference, while abstract cybersecurity cognition mediates the relationship between future temporal focus and strategic training preference. Results emphasize the importance of understanding individual preferences when designing and delivering cybersecurity training programs to maximize engagement. The study contributes to the SETA literature.

Comments

06-Security

Share

COinS
 
Dec 11th, 12:00 AM

The Influence of Temporal Focus on Employee Preferences in Cybersecurity Training

This study investigates the impact of employees' temporal focus on the effectiveness of Security Education, Training, and Awareness (SETA) programs in organizations. Drawing on Construal Level Theory, the research examines the relationship between temporal focus, level of abstraction in information processing, and preferences for tactical or strategic cybersecurity training. Findings confirm that employees with a present temporal focus prefer tactical training, while those with a future temporal focus prefer strategic training. Concrete cybersecurity cognition mediates the relationship between present temporal focus and tactical training preference, while abstract cybersecurity cognition mediates the relationship between future temporal focus and strategic training preference. Results emphasize the importance of understanding individual preferences when designing and delivering cybersecurity training programs to maximize engagement. The study contributes to the SETA literature.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.