Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
This paper discusses a pilot study on conceptualization and validation of Information Security Culture (ISC) as a multidimensional second-order formative construct. The concept was developed in our previous works, and is based on widely accepted concepts of Organizational Culture and ISC. The model...
| Main Authors: | Nasir, Akhyari, Ruzaini, Abdullah Arshah, Mohd Rashid, Ab Hamid |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IARIA
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/22039/ http://umpir.ump.edu.my/id/eprint/22039/1/Conceptualizing%20and%20Validating%20Information%20Security%20Culture.pdf |
Similar Items
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016)
by: Nasir, Akhyari, et al.
Published: (2016)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
Information security culture model for Malaysian organizations: A review
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022)
by: Akhyari, Nasir, et al.
Published: (2022)
The Significance of Main Constructs of Theory of Planned Behavior in Recent Information Security Policy Compliance Behavior Study: A Comparison among Top Three Behavioral Theories
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Conceptualizing a Model for the Effect of Information Culture on Electronic Commerce Adoption
by: Herzallah, Fadi A. T., et al.
Published: (2018)
by: Herzallah, Fadi A. T., et al.
Published: (2018)
Conceptualizing a model for the effect of information culture on electronic commerce adoption
by: Herzallah, Fadi A. T., et al.
Published: (2019)
by: Herzallah, Fadi A. T., et al.
Published: (2019)
Measuring Website Usability Construct as Second Order Construct in Website Usability Model
by: Nur Sukinah, Aziz, et al.
Published: (2018)
by: Nur Sukinah, Aziz, et al.
Published: (2018)
Software visual specification for requirement specification validation
by: Fauziah, Zainuddin, et al.
Published: (2018)
by: Fauziah, Zainuddin, et al.
Published: (2018)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Validation of a Proposed Dashboard Model for Researchers In Social Research Network Sites
by: Siti Hawa, Apandi, et al.
Published: (2015)
by: Siti Hawa, Apandi, et al.
Published: (2015)
Conceptualizing a framework to enhance information security culture and compliance behavior in organizations through protection motivation theory
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
Reviewing the Challenge and Practices of Human Factor Involvement in Requirement Specification Validation
by: Fauziah, Zainuddin, et al.
Published: (2018)
by: Fauziah, Zainuddin, et al.
Published: (2018)
Human Factor of Formal Engineering Methods in Validating Requirement Specification
by: Fauziah, Zainuddin, et al.
Published: (2017)
by: Fauziah, Zainuddin, et al.
Published: (2017)
Establishing Important Criteria and Factors for Successful Integrated Information System
by: Ruzaini, Abdullah Arshah, et al.
Published: (2012)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2012)
Instrument for Integrated Information System Assessment in Higher Learning Institutions
by: Ruzaini, Abdullah Arshah, et al.
Published: (2017)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2017)
A conceptual model of e-learning based on cloud computing adoption in higher education institutions
by: Alajmi, Qasim, et al.
Published: (2018)
by: Alajmi, Qasim, et al.
Published: (2018)
The Effect of Security and Privacy Perceptions on Customers’ Trust to Accept Internet Banking Services: An Extension of TAM
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
Performance And Precision Evaluation of Multidimensional Databases
by: ONG, Janson Luke
Published: (2010)
by: ONG, Janson Luke
Published: (2010)
The Impact of Customer Trust and Perception of Security and Privacy on the Acceptance of Online Banking Services: Structural Equation Modeling Approach
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
A Multidimensional Search Space Using Interactive Genetic Algorithm
by: Farooq, H., et al.
Published: (2010)
by: Farooq, H., et al.
Published: (2010)
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
The Design of Pre-Processing Multidimensional Data Based on
Component Analysis
by: Jasni, Mohamad Zain, et al.
Published: (2011)
by: Jasni, Mohamad Zain, et al.
Published: (2011)
The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services An Extension of TAM
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
Alternative Model for Extracting Multidimensional Data Based-on Comparative Dimension Reduction
by: Sembiring, Rahmat Widia, et al.
Published: (2011)
by: Sembiring, Rahmat Widia, et al.
Published: (2011)
An Alternative Algorithm for Soft Set Parameter Selection using Special Order
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2015)
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2015)
Performance And Precision Evaluation Of Multidimensional Databases
by: Ong Wai Kit, Janson Luke
Published: (2010)
by: Ong Wai Kit, Janson Luke
Published: (2010)
Multidimensional Task Engagement and Second Language Lexical Learning
by: Wullur, Bill Glenny
Published: (2021)
by: Wullur, Bill Glenny
Published: (2021)
Conceptual Information System Success Model for
Small and Medium Enterprise Clinic Information
System
by: Aliza, sarlan, et al.
Published: (2010)
by: Aliza, sarlan, et al.
Published: (2010)
Classifying Domains for Criteria and Factors of Successful Integrated Information System
by: Ruzaini, Abdullah Arshah, et al.
Published: (2012)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2012)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
A review of the parallel algorithms for solving multidimensional PDE problems
by: Alias, Norma, et al.
Published: (2010)
by: Alias, Norma, et al.
Published: (2010)
Multidimensional indicator for data quality assessment in wireless sensor networks: challenges and opportunities
by: Nurul Aqilah, Zamri, et al.
Published: (2024)
by: Nurul Aqilah, Zamri, et al.
Published: (2024)
Similar Items
-
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017) -
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018) -
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020) -
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016) -
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)