Need for Information Security Policies Compliance: A Perspective in Higher Education Institutions

被引:0
作者
Hina, Sadaf [1 ]
Dominic, Dhanapal Durai [1 ]
机构
[1] Univ Teknol PETRONAS, Comp & Informat Sci Dept, Bandar Seri Iskandar, Malaysia
来源
2017 5TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS 2017): SOCIAL TRANSFORMATION THROUGH DATA SCIENCE | 2017年
关键词
institutional governance; negative experience; protection motivation; information security policy compliance; PROTECTION MOTIVATION; AWARENESS; BEHAVIOR;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations profoundly rely on contemporary information systems as they store essential business and resources data. Security of these information systems is critically handled by applying both technical and behavioral controls. However, security culture in certain organizations such as Higher Education Institutions (HEI) is questionable due to the lax attitude of employees towards the institutional resources. This research intends to examine the effect of institutional governance (IG) factors security awareness programs, establishment of security policies and periodic monitoring in enhancing the protection motivation among employees. It is believed that employees motivated, through various sources of information, towards the protection of resources intend to comply with organizational Information Security Policies (ISP) documented to disseminate the roles and responsibilities of employees. The two relevant theories i.e. Protection Motivation Theory (PMT) and Theory of Planned Behavior (TPB) are integrated for this research. The effect of IG and negative experience, as external sources of information, is investigated on the integrated theories. Relevant hypotheses are formulated in the proposed hybrid research model. To pilot test the survey questionnaire, data collection was done among the employees within the HEI of Malaysia. Results were derived using IBM SPSS 23. Pilot study shows reliable measurement scales, suitable for final data collection and analysis to validate the research model.
引用
收藏
页数:6
相关论文
共 41 条
[1]  
Ahlan A. R., 2011, 2011 7th International Conference on Information Assurance and Security (IAS), P246, DOI 10.1109/ISIAS.2011.6122827
[2]   THE THEORY OF PLANNED BEHAVIOR [J].
AJZEN, I .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) :179-211
[3]  
Al-Omari Ahmad, 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P3317, DOI 10.1109/HICSS.2012.516
[4]  
Aloul Fadi A., 2012, Journal of Advances in Information Technology, V3, P176, DOI 10.4304/jait.3.3.176-183
[5]  
Amankwa E, 2014, INT CONF INTERNET, P248, DOI 10.1109/ICITST.2014.7038814
[6]  
[Anonymous], P 2015 ACM SIGMIS C
[7]  
[Anonymous], 2010, J INF ASSUR CYBERSEC, DOI DOI 10.5171/2010.305412
[8]  
[Anonymous], 2012, COMPUT FRAUD SEC MAR
[9]  
[Anonymous], 2006, INNOVATIONS INFORM T
[10]  
[Anonymous], DTIC DOCUMENT