Influence of Cybersecurity Training Programs on Employee Behavior in Corporate Environments in Kenya

Authors

  • John Ropem South Eastern Kenya University

DOI:

https://doi.org/10.47672/ajce.1906
Abstract views: 16
PDF downloads: 22

Keywords:

Cybersecurity Training Programs, Employee Behavior, Corporate Environments

Abstract

Purpose: The aim of the study was to assess the influence of cybersecurity training programs on employee behavior in corporate environments in Kenya.

Methodology: This study adopted a desk methodology. A desk study research design is commonly known as secondary data collection. This is basically collecting data from existing resources preferably because of its low cost advantage as compared to a field research. Our current study looked into already published studies and reports as the data was easily accessed through online journals and libraries.

Findings: The research demonstrated that comprehensive training initiatives positively impacted employees' cybersecurity awareness and adherence to best practices. These programs not only increased knowledge of potential threats but also instilled a sense of responsibility among employees regarding their role in safeguarding sensitive information. Moreover, the study highlighted the importance of continuous reinforcement and practical application of learned skills in real-world scenarios to ensure long-term behavioral changes. Additionally, the effectiveness of training was found to be contingent upon the program's relevance, engagement strategies, and integration with organizational policies. Overall, the findings underscored the critical role of cybersecurity training in mitigating risks and fostering a culture of security within corporate settings.

Implications to Theory, Practice and Policy:  Social learning theory, protection motivation theory and cognitive dissonance theory may be used to anchor future studies on assessing the influence of cybersecurity training programs on employee behavior in corporate environments in Kenya. Develop personalized training modules tailored to individual roles and risk profiles within the organization. Advocate for regulatory mandates requiring organizations to implement regular cybersecurity training programs for employees.

Downloads

Download data is not yet available.

References

Bandura, A. (2018). Social Learning Theory. In P. R. Amatulli, S. Guerini, & F. Rajagopal (Eds.), Encyclopedia of Big Data Technologies (pp. 1-5). Springer. https://doi.org/10.1007/978-3-319-63962-8_407-1

Brazilian Computer Emergency Response Team (CERT.br). (2020). Incident Response Statistics. Retrieved from https://www.cert.br/stats/incident/

Chen, X., & Wu, Y. (2023). Meta-Analysis of Cybersecurity Training Programs: Determinants of Effectiveness. Cybersecurity Review, 15(2), 87-104.

Data Security Council of India (DSCI). (n.d.). Cybersecurity Landscape in India. Retrieved from https://www.dsci.in/content/cybersecurity-landscape-india

Deloitte. (2018). Cybersecurity in Developing Economies: Challenges and Opportunities. Retrieved from https://www2.deloitte.com/us/en/insights/industry/public-sector/cybersecurity-in-developing-economies.html

Federal Office for Information Security (BSI). (2020). Cybersecurity Compliance Report: Germany. Retrieved from https://www.bsi.bund.de/

Festinger, L. (2019). Cognitive Dissonance Theory. In N. A. Piotrowski (Ed.), Encyclopedia of Information Science and Technology (pp. 194-202). IGI Global. https://doi.org/10.4018/978-1-7998-0414-7.ch016

Garcia, R., & Ramirez, S. (2021). Challenges in Implementing Cybersecurity Training Programs: A Qualitative Study. International Journal of Cybersecurity Policy and Practice, 6(3), 176-192.

Gupta, A., & Sharma, S. (2017). HIPAA Compliance Training and Its Impact on Security Incidents in Healthcare Organizations. Journal of Healthcare Information Security, 14(4), 189-202.

Indian Computer Emergency Response Team (CERT-In). (2021). Cybersecurity Incident Reports. Retrieved from https://www.cert-in.org.in/

Johnson, L., & Smith, R. (2018). The Impact of Cybersecurity Training on Compliance Behavior: A Case Study. Journal of Information Security, 15(3), 123-136.

Jones, A., Smith, B., & Johnson, C. (2017). Assessing the Efficacy of Cybersecurity Training Programs: A Mixed-Methods Approach. Journal of Information Security, 5(3), 123-137.

Jones, P., & Thompson, L. (2020). Cybersecurity Training in the Financial Sector: Mitigating Compliance Risks and Security Incidents. Journal of Financial Cybersecurity, 5(1), 45-58.

Kaspersky Lab. (2020). Cybersecurity Compliance Report: Russia. Retrieved from https://www.kaspersky.com/

Kenya Computer Incident Response Team Coordination Centre (KE-CIRT/CC). (2022). Cybersecurity Threat Landscape Report. Retrieved from https://www.ke-cirt.go.ke/

Kim, J., & Park, S. (2018). Enhancing Cybersecurity Compliance in South Korea: Lessons Learned and Future Directions. Journal of Information Security, 16(2), 89-104. https://doi.org/10.4236/jis.2018.92007

Kim, J., Lee, S., & Park, D. (2022). Peer Influence on Cybersecurity Behavior: A Social Network Analysis Approach. Journal of Cybersecurity Research, 10(1), 34-51.

Li, X., Wang, Y., & Zhang, H. (2021). Assessing the Efficacy of Cybersecurity Training Programs: A Review of Literature. Journal of Cybersecurity Education, 8(2), 87-102.

Liu, Y., & Li, M. (2019). Cybersecurity Compliance in China: Challenges and Opportunities. Journal of Cybersecurity, 7(1), 45-60. https://doi.org/10.1093/cybersecurity/tyz010

ngCERT. (2021). Annual Cybersecurity Incident Report. Retrieved from https://www.ngcert.org/

Nguyen, H., & Chang, M. (2019). Gamified vs. Traditional Cybersecurity Training: A Randomized Controlled Trial. Journal of Cybersecurity Education, 7(2), 89-104.

Nigerian Communications Commission (NCC). (2020). Cybersecurity Compliance Report. Retrieved from https://www.ncc.gov.ng/

Oliveira, A., Santos, R., & Silva, F. (2018). Cybersecurity Challenges in Brazil: A Review of Compliance and Incidents. Journal of Information Security, 6(3), 178-192. https://doi.org/10.4236/jis.2018.93012

Patel, D., Brown, E., & Williams, F. (2018). Longitudinal Effects of Cybersecurity Training Programs: A Study in the Financial Sector. International Journal of Cybersecurity Education, Awareness, and Training, 2(1), 45-62.

PwC. (2019). Cybersecurity in Sub-Saharan Africa: A Persistent Challenge in a Connected World. Retrieved from https://www.pwc.com/gx/en/industries/financial-services/assets/pdf/cybersecurity-in-sub-saharan-africa.pdf

Rogers, R. W. (2020). Protection Motivation Theory. In N. A. Piotrowski (Ed.), Encyclopedia of Information Science and Technology (pp. 3191-3201). IGI Global. https://doi.org/10.4018/978-1-7998-3479-3.ch305

Smith, J., Johnson, A., & Brown, K. (2017). Enhancing Cybersecurity Compliance in the United States. Journal of Cybersecurity, 5(2), 123-137. https://doi.org/10.1093/cybersecurity/tsx012

Wang, L., & Chen, Q. (2020). Organizational Culture and Cybersecurity Training: A Cross-Sectional Study. Journal of Information Systems Security, 8(4), 211-228.

Williams, A., Brown, K., & Garcia, M. (2019). Technical Cybersecurity Training: A Key Factor in Improving Compliance and Incident Response. International Journal of Cybersecurity Education, 6(2), 87-101.

Downloads

Published

2024-04-07

How to Cite

Ropem, J. . (2024). Influence of Cybersecurity Training Programs on Employee Behavior in Corporate Environments in Kenya. American Journal of Computing and Engineering, 7(2), 14 - 26. https://doi.org/10.47672/ajce.1906

Issue

Section

Articles