Determinants of Information Security Awareness and Behaviour Strategies in Public Sector Organizations among Employees

被引:0
作者
Al-Shanfari, I [1 ]
Yassin, Warusia [1 ]
Tabook, Nasser [2 ]
Ismail, Roesnita [3 ]
Ismail, Anuar [4 ]
机构
[1] Univ Teknikal Malaysia Melaka, Dept Comp Syst & Commun, Melaka, Malaysia
[2] Dhofar Univ, Coll Arts & Appl Sci, Comp Sci Dept, Salalah, Oman
[3] Univ Sains Islam Malaysia, Fac Sci & Technol, Nilai, Negeri Sembilan, Malaysia
[4] Ask Pentest Sdn Bhd, Kuala Lumpur, Malaysia
关键词
Information security awareness; behaviour strategies; self-administered questionnaire; structural equation modelling (SEM); PROTECTION MOTIVATION THEORY; FEAR APPEALS; INTENTION; IMPACT; MODEL; FIT; POLICIES; THREATS; INDEX; USERS;
D O I
10.14569/IJACSA.2022.0130855
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this digital era, protecting an organisation's sensitive information system assets against cyberattacks is challenging. Globally, organisations spend heavily on information security (InfoSec) technological countermeasures. Public and private sectors often fail to secure their information assets because they depend primarily on technical solutions. Human components create the bulk of cybersecurity incidents directly or indirectly, causing many organisational information security breaches. Employees' information security awareness (ISA) is crucial to preventing poor information security behaviours. Until recently, there was little combined information on how to improve ISA and how investigated factors influencing employees' ISA levels were. This paper proposed a comprehensive theoretical model based on the Protection Motivation Theory, the Theory of Planned Behaviour, the General Deterrence Theory, and Facilitating Conditions for assessing public sector employees' ISA intentions for information security behaviour. Using a survey and the structural equation modelling (SEM) method, this research reveals that the utilised factors are positively associated with actual information security behaviour adoption, except for perceived sanction certainty. The findings suggest that the three theories and facilitating conditions provide the most influential theoretical framework for explaining public sector employees' information security adoption behaviour. These findings support previous empirical research on why employees' information on security behaviours vary. Consistent with earlier research, these psychological factors are just as critical as facilitating conditions in ensuring more significant behavioural intention to engage in ISA activities, ensuring information security behaviour. The study recommends that public-sector organisations invest in their employees' applied information security training.
引用
收藏
页码:479 / 490
页数:12
相关论文
共 67 条
  • [1] User preference of cyber security awareness delivery methods
    Abawajy, Jemal
    [J]. BEHAVIOUR & INFORMATION TECHNOLOGY, 2014, 33 (03) : 236 - 247
  • [2] Information Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures
    Ahlan, Abdul Rahman
    Lubis, Muharman
    Lubis, Arif Ridho
    [J]. THIRD INFORMATION SYSTEMS INTERNATIONAL CONFERENCE 2015, 2015, 72 : 361 - 373
  • [3] THE THEORY OF PLANNED BEHAVIOR
    AJZEN, I
    [J]. ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) : 179 - 211
  • [4] Al-Shanfari I., 2021, J THEORETICAL APPL I, V99, P2991
  • [5] Al-Shanfari I., 2020, International Journal of Engineering and Advanced Technology (IJEAT), V9, P534, DOI [DOI 10.35940/IJEAT.C4775, 10.35940/ijeat.C4775]
  • [6] Alkhalifah A., 2021, IEEE ACCESS
  • [7] Employees' behavioural intention to smartphone security: A gender-based, cross-national study
    Ameen, Nisreen
    Tarhini, Ali
    Shah, Mahmood Hussain
    Madichie, Nnamdi O.
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2020, 104
  • [8] [Anonymous], 2017, INF I C
  • [9] Bada M. A. M., 2019, INT C CYB SEC SUST S
  • [10] Determinants of early conformance with information security policies
    Belanger, France
    Collignon, Stephane
    Enget, Kathryn
    Negangard, Eric
    [J]. INFORMATION & MANAGEMENT, 2017, 54 (07) : 887 - 901