The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
Few studies have shown there is significant relationship between Information Security Culture (ISC) and Information Security Policy (ISP) compliance behaviour. However, these findings still could not conclude the actual effect of ISC towards employees’ ISP compliance. There are issues of consistency...
| Main Authors: | Nasir, Akhyari, Ruzaini, Abdullah Arshah, Ab Hamid, Mohd Rashid |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publisher
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/19243/ http://umpir.ump.edu.my/id/eprint/19243/1/The%20Formulation%20of%20Comprehensive%20Information%20Security%20Culture1.pdf |
Similar Items
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016)
by: Nasir, Akhyari, et al.
Published: (2016)
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022)
by: Akhyari, Nasir, et al.
Published: (2022)
A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Information security culture model for Malaysian organizations: A review
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
The Significance of Main Constructs of Theory of Planned Behavior in Recent Information Security Policy Compliance Behavior Study: A Comparison among Top Three Behavioral Theories
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
Conceptualizing a framework to enhance information security culture and compliance behavior in organizations through protection motivation theory
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2025)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2025)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Integrating Strategic Information Security with Strategic Information Systems Planning (SISP)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
CST233 – Information Security & Assurance June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CST233- Information Security and Assurance June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
Establishing Important Criteria and Factors for Successful Integrated Information System
by: Ruzaini, Abdullah Arshah, et al.
Published: (2012)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2012)
Instrument for Integrated Information System Assessment in Higher Learning Institutions
by: Ruzaini, Abdullah Arshah, et al.
Published: (2017)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2017)
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
Development of computer ethical framework for information security (educational context)
by: Namayander, Meysam
Published: (2009)
by: Namayander, Meysam
Published: (2009)
A Review of Data Quality Assessment: Data Quality Dimensions from User’s Perspective
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
The Effect of Security and Privacy Perceptions on Customers’ Trust to Accept Internet Banking Services: An Extension of TAM
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
Online banking information systems acceptance: an empirical examination of system characteristics and web security
by: Chandio, Fida Hussain, et al.
Published: (2017)
by: Chandio, Fida Hussain, et al.
Published: (2017)
Information security behaviour : a descriptive analysis on a Malaysian public university
by: Ramlah Hussein, *, et al.
Published: (2011)
by: Ramlah Hussein, *, et al.
Published: (2011)
CCS528 – Information Security And
Cryptography
(Keselamatan Maklumat Dan
Kriptografi
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CCS528 – Information Security and Cryptography
(Keselamatan Maklumat dan Kriptografi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Assessment of employee’s knowledge and compliance on information security governance
by: Chow, Win Niy
Published: (2014)
by: Chow, Win Niy
Published: (2014)
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
CST233 – INFORMATION SECURITY & ASSURANCE [KESELAMATAN & JAMINAN MAKLUMAT] JUN 2016
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
CST233 – INFORMATION SECURITY & ASSURANCE
[KESELAMATAN & JAMINAN MAKLUMAT] JUN 2017
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
Similar Items
-
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017) -
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019) -
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019) -
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020) -
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016)