A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions
Despite strong recommendations by scholars to establish Information Security Culture (ISC), the lack of ISC guidelines persists, particularly in aspects that could effectively improve employees’ security behavior in an organization. This study proposes an ISC model based on seven new formulated dime...
| Main Authors: | Akhyari, Nasir, Ruzaini, Abdullah Arshah, Ab Hamid, Mohd Rashid |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Taylor and Francis Inc.
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/30435/ http://umpir.ump.edu.my/id/eprint/30435/1/A%20dimension-based%20information%20security%20culture%20model%20.pdf |
Similar Items
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016)
by: Nasir, Akhyari, et al.
Published: (2016)
Information security culture model for Malaysian organizations: A review
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022)
by: Akhyari, Nasir, et al.
Published: (2022)
The Significance of Main Constructs of Theory of Planned Behavior in Recent Information Security Policy Compliance Behavior Study: A Comparison among Top Three Behavioral Theories
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Instrument for Integrated Information System Assessment in Higher Learning Institutions
by: Ruzaini, Abdullah Arshah, et al.
Published: (2017)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2017)
Assessment instrument for integrated information system success in institution of higher learning
by: Ruzaini, Abdullah Arshah
Published: (2012)
by: Ruzaini, Abdullah Arshah
Published: (2012)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Conceptualizing a framework to enhance information security culture and compliance behavior in organizations through protection motivation theory
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
Development of data quality dimensions from user’s perspective framework
by: Mohd Zafrol, Abdullah, et al.
Published: (2018)
by: Mohd Zafrol, Abdullah, et al.
Published: (2018)
Information security behavior among employees from the Islamic perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
Investigation of Security Awareness on e-Learning System Among Lecturers and Students in Higher Education Institution
by: Hasmanizam, Abdul Majid, et al.
Published: (2015)
by: Hasmanizam, Abdul Majid, et al.
Published: (2015)
A Review of Data Quality Assessment: Data Quality Dimensions from User’s Perspective
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
The Impact of Customer Trust and Perception of Security and Privacy on the Acceptance of Online Banking Services: Structural Equation Modeling Approach
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services An Extension of TAM
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
The practice of information security: An analysis of government employees in Tanzania using the Health Belief Model (HBM)
by: Koloseni, Daniel Ntabagi
Published: (2017)
by: Koloseni, Daniel Ntabagi
Published: (2017)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
The Effect of Security and Privacy Perceptions on Customers’ Trust to Accept Internet Banking Services: An Extension of TAM
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
Establishing a personalized information security culture
by: Talib, Shuhaili, et al.
Published: (2011)
by: Talib, Shuhaili, et al.
Published: (2011)
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
The Impacts Of Social Networking Sites In Higher Learning
by: Mohd Ishak, Ismail, et al.
Published: (2016)
by: Mohd Ishak, Ismail, et al.
Published: (2016)
A conceptual model of e-learning based on cloud computing adoption in higher education institutions
by: Alajmi, Qasim, et al.
Published: (2018)
by: Alajmi, Qasim, et al.
Published: (2018)
Conceptualizing a Model for the Effect of Information Culture on Electronic Commerce Adoption
by: Herzallah, Fadi A. T., et al.
Published: (2018)
by: Herzallah, Fadi A. T., et al.
Published: (2018)
Conceptualizing a model for the effect of information culture on electronic commerce adoption
by: Herzallah, Fadi A. T., et al.
Published: (2019)
by: Herzallah, Fadi A. T., et al.
Published: (2019)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Information security behaviour : a descriptive analysis on a Malaysian public university
by: Ramlah Hussein, *, et al.
Published: (2011)
by: Ramlah Hussein, *, et al.
Published: (2011)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
How to Cultivate Cyber Security Culture? The Evidences from Literature
by: Akhyari, Nasir, et al.
Published: (2023)
by: Akhyari, Nasir, et al.
Published: (2023)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
A behavior of a class of \xi(s)-QSO in dimension 2
by: Mukhamedov, Farrukh, et al.
Published: (2012)
by: Mukhamedov, Farrukh, et al.
Published: (2012)
Review on the effect of student learning outcome and teaching technology in Omani's higher education institution's academic accreditation process
by: Tawafak, Ragad M., et al.
Published: (2018)
by: Tawafak, Ragad M., et al.
Published: (2018)
Similar Items
-
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017) -
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018) -
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020) -
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019) -
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)