Security Awareness as a Secret Intelligence Function
Based on International Examples
Copyright (c) 2026 Drusza Tamás, Mezei József, Solti István, Regényi Kund Miklós

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
According to some experts, the basic functions of intelligence services are: information gathering; information management, counter-intelligence and covert operations. This may be accepted, although specialised services with different systems of tasks are an exception, not all elements of this list can be interpreted in their case. However, it is clear that there are an increasing number of services that perform counter-intelligence tasks and that are running awareness programmes to ensure the effectiveness of their tasks. The aim is to raise the security awareness of members of society. Citizens who may be affected by national security risks. The importance of this activity is unquestionable, so much so that today it can even be seen, as the title suggests, as a function in its own right, which should and must be examined and adapted to the constantly changing operational environment. The purpose of this paper is to provide an overview of the theoretical background and to give an insight into the security awareness programmes of some European and US intelligence agencies.
Keywords:
References
BURNS, A. J. et al. (2018): Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts. Decision Sciences, 49(6), 1187–1228. Online: https://doi.org/10.1111/deci.12304
D’ARCY, John – HOVAV, Anat – GALLETTA, Dennis (2009): User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. Information Systems Research, 20(1), 79–98. Online: https://doi.org/10.1287/isre.1070.0160
DOBÁK Imre – BABOS Sándor (2021): A biztonságtudatosítás lehetőségei a 21. századi platformok fényében. Nemzetbiztonsági Szemle, 9(4), 18–34. Online: https://doi.org/10.32561/nsz.2021.4.2
HERATH, Tejaswini et al. (2018): Examining Employee Security Violations: Moral Disengagement and Its Environmental Influences. Information Technology & People, 31(6), 1135–1162. Online: https://doi.org/10.1108/ITP-10-2017-0322
HINA, Sadaf – SELVAM, Dhanapal Durai Dominic Panneer – LOWRY, Paul Benjamin (2019): Institutional Governance and Protection Motivation: Theoretical Insights Into Shaping Employees’ Security Compliance Behavior in Higher Education Institutions in the Developing World. Computers & Security, 87, 101594. Online: https://doi.org/10.1016/j.cose.2019.101594
HOVAV, Anat – PUTRI, Frida Ferdani (2016): This Is My Device! Why Should I Follow Your Rules? Employees’ Compliance with BYOD Security Policy. Pervasive and Mobile Computing, 32, 35–49. Online: https://doi.org/10.1016/j.pmcj.2016.06.007
HU, Siqi – HSU, Carol – ZHOU, Zhongyun (2022): Security Education, Training, and Awareness Programs: Literature Review. Journal of Computer Information Systems, 62(4), 752–764. Online: https://doi.org/10.1080/08874417.2021.1913671
JENKINS, Jeffrey – DURCIKOVA, Alexandra (2013): What, I Shouldn’t Have Done That? The Influence of Training and Just-In-Time Reminders on Secure Behavior. In Proceedings of 34th International Conference on Information Systems. Milánó.
LOWRY, Paul Benjamin et al. (2015): Leveraging Fairness and Reactance Theories to Deter Reactive Computer Abuse Following Enhanced Organisational Information Security Policies: An Empirical Study of the Influence of Counterfactual Reasoning and Organisational Trust. Information Systems Journal, 25(3), 193–273. Online: https://doi.org/10.1111/isj.12063
MASLOW, Abraham H. (1943): A Theory of Human Motivation. Psychological Review, 50(4), 370–396. Online: https://doi.org/10.1037/h0054346
MERRITT, Marian et al. (2024): Building a Cybersecurity and Privacy Learning Program. Gaithersburg: National Institute of Standards and Technology. Online: https://doi.org/10.6028/NIST.SP.800-50r1
POSEY, Clay – ROBERTS, Tom L. – LOWRY, Paul Benjamin (2015): The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets. Journal of Management Information Systems, 32(4), 179–214. Online: https://doi.org/10.1080/07421222.2015.1138374
REGÉNYI, Kund – JASENSZKY, Nándor – LIPPAI, Zsolt (2022): The Concept of Security Awareness, Its Development From the Point of View of National Security, Counter-Terrorism, and Private Security. Belügyi Szemle, 70(1. ksz.), 123–137. Online: https://doi.org/10.38146/BSZ.SPEC.2022.1.7
ROSENBERG, Milton J. – HOVLAND, Carl I. (1960): Cognitive, Affective and Behavioral Components of Attitude. In ROSENBERG, Milton J. – HOVLAND, Carl I. (szerk.): Attitude Organization and Change: An Analysis of Consistency among Attitude Components. New Haven: Yale University Press, 1–14.
YAOKUMAH, Winfred – WALKER, Daniel Okyere – KUMAH, Peace (2019): SETA and Security Behavior: Mediating Role of Employee Relations, Monitoring, and Accountability. Journal of Global Information Management, 27(2), 102–121. Online: https://doi.org/10.4018/JGIM.2019040106