An assessment of critical success factors in information security implementation in organizations in Ghana

被引:0
作者
Nterful, Joshua [1 ]
Adam, Ibrahim Osman [2 ]
Alhassan, Muftawu Dzang [1 ]
Abdul-Salam, Abdallah [1 ]
Umar, Abubakar Gbambegu [1 ]
机构
[1] SD Dombo Univ Business & Integrated Dev Studies, Dept Accounting, Wa, Ghana
[2] Univ Dev Studies, Dept Business Analyt & MIS, Tamale, Ghana
关键词
Information systems; Information security; Organizations; PLS-SEM; Technology; Organization; And environment (TOE) framework; MODEL; DETERRENCE; RESISTANCE; ADOPTION; MAP;
D O I
10.1108/ICS-11-2022-0174
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
PurposeThis paper aims to identify the critical success factors in improving information security in Ghanaian firms.Design/methodology/approachThrough an exploratory study of both public and private Ghanaian organizations. The study relied on a research model based on the technology-organization-environment (TOE) framework and a survey instrument to collect data from 525 employees. The data was analyzed using partial least squares-structural equation modeling (PLS-SEM).FindingsThe findings confirm the role of the technological, organizational and environmental contexts as significant determinants in the implementation of information security in Ghanaian organizations. Results from PLS-SEM analysis demonstrated a positive correlation between the technology component of information security initiative, organization's internal efforts toward its acceptance and a successful implementation of information security in Ghanaian firms. Top management support and fund allocation among others will result in positive information security initiatives and positive attitudes toward securing the organization's information assets.Research limitations/implicationsThe authors discussed the implications of the authors' findings for research, practice and policy.Social implicationsThe results of this study will be useful for both governmental and non-governmental organizations in terms of best practices for increasing information security. Results from this study will aid organizations in developing countries to better understand their information security needs and identify the necessary procedures to address them.Originality/valueThis study contributes to filling the knowledge gap in organizational information security research and the TOE framework. Despite the TOE framework being one of the most influential theories in contemporary research of information system domains in an organizational context, there is not enough research linking the domains of information security and the TOE model.
引用
收藏
页码:573 / 597
页数:25
相关论文
共 83 条
[1]   Determinant factors in applying electronic medical records in health-care [J].
Abdekhoda, Mohammadinwa ;
Dehnad, Afsaneh ;
Zarei, Javad .
EASTERN MEDITERRANEAN HEALTH JOURNAL, 2019, 25 (01) :24-33
[2]  
Abegunrin O, 2020, POL DEVEL CONTEMP CH, P1, DOI 10.1007/978-3-030-21994-9
[3]  
Adam Ibrahim Osman, 2021, International Journal of Technology, Policy and Management, V21, P344, DOI 10.1504/IJTPM.2021.119703
[4]   The mediating role of ICT regulation on the effects of ICT access and ICT use on e-participation: Evidence from structural equation modelling and necessary condition analysis [J].
Adam, Ibrahim Osman ;
Alhassan, Muftawu Dzang .
AFRICAN JOURNAL OF SCIENCE TECHNOLOGY INNOVATION & DEVELOPMENT, 2022, 14 (05) :1161-1172
[5]   Africa and the Nexus of poverty, malnutrition and diseases [J].
Adeyeye, Samuel Ayofemi O. ;
Ashaolu, Tolulope J. ;
Bolaji, Olusola T. ;
Abegunde, Titilope A. ;
Omoyajowo, Adetola O. .
CRITICAL REVIEWS IN FOOD SCIENCE AND NUTRITION, 2023, 63 (05) :641-656
[6]  
Aguboshim FC., 2022, Managing organization information security systems, conflicts, and integrity for sustainable Africa transformation
[7]   AN ENTREPRENEURIAL SCIENCE THINKING MODULE BASED ON THE SOCIOSCIENTIFIC ISSUES APPROACH WITH THINKING WHEEL MAP FOR PRIMARY SCHOOL STUDENTS IN STEM EDUCATION [J].
Ahmad, Jamilah ;
Siew, Nyet Moi .
PROBLEMS OF EDUCATION IN THE 21ST CENTURY, 2022, 80 (01) :30-51
[8]  
Al-Awadi M., 2007, IADIS INT C E SOC, P169
[9]   Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance [J].
Ali, Rao Faizan ;
Dominic, P. D. D. ;
Ali, Syed Emad Azhar ;
Rehman, Mobashar ;
Sohail, Abid .
APPLIED SCIENCES-BASEL, 2021, 11 (08)
[10]   Information security awareness in a developing country context: insights from the government sector in Saudi Arabia [J].
AlMindeel, Raneem ;
Martins, Jorge Tiago .
INFORMATION TECHNOLOGY & PEOPLE, 2021, 34 (02) :770-788