There is no doubt that the world of Cybersecurity is changing on an everyday basis. This is especially true when it comes to the information and data that is being released, whether it is to the IT Security teams or from the CISOs themselves.
But no matter where it comes from, the need for reliable, believable, and useful information is now a must.
Therefore, at AST Cybersecurity, we have a proposed a new model called the “Cyber Information Acceptance Model”, where the acceptability of Cyber information is dependent upon two key variables:
*The Perceived Believability of the Cyber Information and Data.
*The Perceived Usefulness of the Cyber Information and Data.
Our model is deeply rooted in the Technology Acceptance Model. In this eBook, we go more into the theoretical constructs of our new model and propose a new type of research methodology. Specifically, the following topics are covered:
*An Introduction to the Technology Acceptance Model
*The Definition of Technological Acceptance
*The Theoretical Formulations For the Technology Acceptance Model
*The Technology Acceptance Models
*A Cross Comparison Of The Models
*The Measurement Scales For The Technology Acceptance Model
*The Scientific Limitations Presented By The Technology Acceptance Model
*The Cybersecurity Information Acceptance Model
*A Tentative Survey
*The Next Steps
Click here to get this eBook!!!
The CIA Model can also be applied to other areas of Cyber, such as the adoption of Microsoft Sentinel and the AWS Control Tower. Click here to find out more.