Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
The adherence of employees towards Information Security Policy (ISP) established in the organization is crucial in reducing information security risks. Some scholars have suggested that employees’ compliance to ISP could be influenced by Information Security Culture (ISC) cultivated in the organizat...
| Main Authors: | Nasir, Akhyari, Ruzaini, Abdullah Arshah, M. R., Abdul Hamid |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
ACM New York, NY, USA
2017
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/18165/ http://umpir.ump.edu.my/id/eprint/18165/1/fskkp-2017-Nasir-Information%20security%20policy%20compliance%20behavior1.pdf |
Similar Items
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016)
by: Nasir, Akhyari, et al.
Published: (2016)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022)
by: Akhyari, Nasir, et al.
Published: (2022)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
Conceptualizing a framework to enhance information security culture and compliance behavior in organizations through protection motivation theory
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
The Significance of Main Constructs of Theory of Planned Behavior in Recent Information Security Policy Compliance Behavior Study: A Comparison among Top Three Behavioral Theories
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information security culture model for Malaysian organizations: A review
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2025)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2025)
Conceptualizing a Model for the Effect of Information Culture on Electronic Commerce Adoption
by: Herzallah, Fadi A. T., et al.
Published: (2018)
by: Herzallah, Fadi A. T., et al.
Published: (2018)
Conceptualizing a model for the effect of information culture on electronic commerce adoption
by: Herzallah, Fadi A. T., et al.
Published: (2019)
by: Herzallah, Fadi A. T., et al.
Published: (2019)
Development of computer ethical framework for information security (educational context)
by: Namayander, Meysam
Published: (2009)
by: Namayander, Meysam
Published: (2009)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Development of data quality dimensions from user’s perspective framework
by: Mohd Zafrol, Abdullah, et al.
Published: (2018)
by: Mohd Zafrol, Abdullah, et al.
Published: (2018)
Assessment of employee’s knowledge and compliance on information security governance
by: Chow, Win Niy
Published: (2014)
by: Chow, Win Niy
Published: (2014)
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
Integrating Strategic Information Security with Strategic Information Systems Planning (SISP)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
A conceptual framework of info structure for
information security risk assessment (ISRA)
by: Shamala, Palaniappan, et al.
Published: (2013)
by: Shamala, Palaniappan, et al.
Published: (2013)
Social cognitive framework for secure information sharing on Islamic NGO social media / Nurul’Adilah Nazri
by: Nurul’Adilah , Nazri
Published: (2022)
by: Nurul’Adilah , Nazri
Published: (2022)
CST233 – Information Security & Assurance June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CST233- Information Security and Assurance June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
Potential Measures to Enhance Information Security Compliance in the Healthcare Internet of Things
by: Premylla, Jeremiah, et al.
Published: (2018)
by: Premylla, Jeremiah, et al.
Published: (2018)
Similar Items
-
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018) -
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019) -
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019) -
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018) -
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)