Conclusion
This article proposed an alternate view to information security awareness, a view that takes into consideration the reasons behind the need for awareness, and discussed the role of the individuals in relation to information technology. It then proposed to focus awareness effort into IT and security stakeholders instead of moving the responsibility to the end users and to work on the fundamentals instead of adding layer of tools. Finally, it gave you some less-common smart factors on which to base good information security communication.