There is no doubt that the world of Cybersecurity is changing on an everyday basis. This is especially true when it comes to the information and data that is being released, whether it is to the IT Security teams or from the CISOs themselves.
But no matter where it comes from, the need for reliable, believable, and useful information is now a must.
Therefore, at AST Cybersecurity, we have a proposed a new model called the “Cyber Information Acceptance Model”, where the acceptability of Cyber information is dependent upon two key variables:
*The Perceived Believability of the Cyber Information and Data.
*The Perceived Usefulness of the Cyber Information and Data.
Our model is deeply rooted in the Technology Acceptance Model. In this eBook, we go more into the theoretical constructs of our new model and propose a new type of research methodology. Specifically, the following topics are covered:
*An Introduction to the Technology Acceptance Model
*The Definition of Technological Acceptance
*The Theoretical Formulations For the Technology Acceptance Model
*The Technology Acceptance Models
*A Cross Comparison Of The Models
*The Measurement Scales For The Technology Acceptance Model
*The Scientific Limitations Presented By The Technology Acceptance Model
*The Cybersecurity Information Acceptance Model
*A Tentative Survey
*The Next Steps
Click here to get this eBook!!!
In terms if using the TAM model, there are not a lot of studies that have been done in Cybersecurity, thus giving scientific merit to what we are proposing here. Here is a sampling of the current research using TAM in Information Security::
TAM & Information Security In Malaysia
TAM & Information Security Strategies
TAM & Information Security Measures
TAM & Investments In Information Security
Copyright © 2024 Cadmium Advanced Technologies, Inc. DBA The AST Cybersecurity Group, Inc. - All Rights Reserved.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.