Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA

被引:0
作者
Alrawhani, Ebrahim Mohammed [1 ]
Romli, Awanis Binti [1 ]
Al-Sharafi, Mohammed A. [2 ]
Alkawsi, Gamal [3 ]
机构
[1] Univ Malaysia Pahang Al Sultan Abdullah, Fac Comp, Pekan, Malaysia
[2] King Fahd Univ Petr & Minerals, KFUPM Business Sch, IRC Finance & Digital Econ, Dhahran, Saudi Arabia
[3] Univ Tenaga Nas, Inst Informat & Comp Energy, Kajang, Malaysia
关键词
Information security culture; protection motivation theory; employee compliance; information security policies; PLS-SEM; fsQCA; FEAR APPEALS; BEHAVIOR; EMPLOYEES; INTENTION; DESIGN; MODELS; ANTECEDENTS; CONSTRUCTS; GUIDELINES; FRAMEWORK;
D O I
10.1080/10447318.2025.2464900
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Information security culture (ISC) is critical for fostering employees' compliance with security policies, yet consensus on ISC criteria remains limited. This study proposes a comprehensive ISC model, analyzing its direct relationships with Protection Motivation Theory (PMT) factors and their collective impact on compliance intentions in Yemen's banking sector. Data from 210 bank employees, analyzed using PLS-SEM and fsQCA, demonstrate that ISC significantly influences perceived self-efficacy (PSE), response efficacy (PRE), response cost (PRC), vulnerability (PV), and severity (PSF). PSE, PRE, and PSF notably drive compliance intentions, while PRC and PV show no significant effect. The findings highlight ISC's role in shaping security behaviors and emphasize PSE as a key motivator. This study advances ISC theory by integrating organizational culture with PMT, offering practical insights for banks in developing countries to strengthen compliance through targeted cultural and motivational interventions.
引用
收藏
页数:22
相关论文
共 121 条
[1]  
Ab Hamid M. R., 2017, Discriminant validity assessment: Use of Fornell & Larcker criterion versus HTMT criterion, V890, p12163 12163
[2]   Exploring eustress and fear: A new perspective on protection motivation in information security policy compliance within the financial sector [J].
Aggarwal, Akshay ;
Srivastava, Shashi Kant .
COMPUTERS & SECURITY, 2024, 142
[3]   Security monitoring and information security assurance behaviour among employees An empirical analysis [J].
Ahmad, Zauwiyah ;
Ong, Thian Song ;
Liew, Tze Hui ;
Norhashim, Mariati .
INFORMATION AND COMPUTER SECURITY, 2019, 27 (02) :165-188
[4]  
Al Hogail A, 2015, INT J SECUR APPL, V9, P163
[5]  
Al Natheer M., 2012, P 16 PAC AS C INF SY, P1
[6]   Evaluating the barriers affecting cybersecurity behavior in the Metaverse using PLS-SEM and fuzzy sets (fsQCA) [J].
Al-Emran, Mostafa ;
Al-Sharafi, Mohammed A. ;
Foroughi, Behzad ;
Iranmanesh, Mohammad ;
Alsharida, Rawan A. ;
Al-Qaysi, Noor ;
Ali, Norashikin .
COMPUTERS IN HUMAN BEHAVIOR, 2024, 159
[7]   Determinants of Using AI-Based Chatbots for Knowledge Sharing: Evidence From PLS-SEM and Fuzzy Sets (fsQCA) [J].
Al-Emran, Mostafa ;
AlQudah, Adi Ahmad ;
Abbasi, Ghazanfar Ali ;
Al-Sharafi, Mohammed A. ;
Iranmanesh, Mohammad .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, 71 :4985-4999
[8]  
Al-Khulaidi A. A. G., 2023, International Journal of Engineering Trends and Technology, V71, P225, DOI [https://doi.org/10.14445/22315381/IJETT-V71I4P220, DOI 10.14445/22315381/IJETT-V71I4P220]
[9]   Exploring the impact of cybersecurity on using electronic health records and their performance among healthcare professionals: A multi-analytical SEM-ANN approach [J].
Al-Momani, Ala 'a M. ;
Ramayah, T. ;
Al-Sharafi, Mohammed A. .
TECHNOLOGY IN SOCIETY, 2024, 77
[10]   Questionnaire Development Process to Measure the SMEs' Continuous Use behavior towards Cloud Computing Services [J].
Al-Sharafi, Mohammed A. ;
Arshah, Ruzaini Abdullah ;
Abu-Shanab, Emad A. .
2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019), 2019, :50-55