Start/Continue
Stop/Avoid
Compliance ≠ Violation
Customize for Context
Wildcard
100

Qualities to prioritise when hiring for better compliance include ______.

Positive security attitude and strong ethical orientation.

100

Rewards have ______ influence on policy compliance.

Weak.

100

Why can't one technique both improve compliance and reduce violations?

Because they stem from different factors, such as ethics and fairness vs fear of sanctions and ease-of-use.

100

Why should cybersecurity policies be tailored to employee context?

Uniform policies ignore cultural, regional and role differences, reducing effectiveness.

100

What proportion of data breaches stems from employee non-compliance?

More than half (over 50% of breaches).

200

Managers demonstrating commitment and allocating resources influence compliance through ______.

Leadership modelling and support.

200

Punishments often backfire because they ______.

Damage morale and foster an 'us vs them' culture.

200

What drives employees to comply with security policies?

Personal ethics, perceptions of fairness, and self-efficacy.

200

Name one contextual factor that influences policy compliance.

Regional culture, job type, or generational norms.

200

What is the average cost of a data breach (IBM, 2019)?

$3.92 million.

300

Beyond awareness, effective training should build ______.

Skills and confidence.

300

This design priority often backfires because it ignores context.

Efficiency or one-size-fits-all policies.

300

What motivates employees to avoid policy violations?

Fear of sanctions, the ease-of-use of policies, and job efficiency.

300

How does customization improve policy compliance?

Aligning policies with employees' environment increases buy-in.

300

Name an intangible benefit employees gain from complying with cybersecurity policies.

A sense of accomplishment and helping protect organisational resources.

400

Making compliance practical and providing quick support helps employees ______.

Follow through on intentions.

400

One technique cannot both improve compliance and reduce violations because ______.

They stem from different factors.

400

Why is it wrong to treat compliance and violation as the same behaviour?

Employees can be non-compliant without violating rules; strategies must separately address promoting compliance and reducing violations.

400

What evidence from the article supports customizing policies?

Interviews noted that policies are often seen as hindering productivity when not adapted to context.

400

Describe one real-world complaint about cybersecurity policies from the article.

Employees complained about too many password requirements and burdensome web filters slowing them down.

M
e
n
u