Information security culture concept towards information security compliance: A comparison between it and non-it professionals
This paper examines the factors determining a positive Information Security Culture (ISC) concept and the influence of ISC towards ISP compliance intention (INT) between IT and non-IT professionals in Malaysian public universities. Partial least square structural equation modelling, using PLS MGA, i...
| Main Authors: | Akhyari, Nasir, Ruzaini, Abdullah Arshah, Mohd Rashid, Ab Hamid, Syahrul, Fahmy |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTHM
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/34752/ http://umpir.ump.edu.my/id/eprint/34752/7/Information%20Security%20Culture%20Concept%20towards%20Information.pdf |
Similar Items
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Information security culture model for Malaysian organizations: A review
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016)
by: Nasir, Akhyari, et al.
Published: (2016)
The Significance of Main Constructs of Theory of Planned Behavior in Recent Information Security Policy Compliance Behavior Study: A Comparison among Top Three Behavioral Theories
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Assessment of employee’s knowledge and compliance on information security governance
by: Chow, Win Niy
Published: (2014)
by: Chow, Win Niy
Published: (2014)
How to Cultivate Cyber Security Culture? The Evidences from Literature
by: Akhyari, Nasir, et al.
Published: (2023)
by: Akhyari, Nasir, et al.
Published: (2023)
Potential Measures to Enhance Information Security Compliance in the Healthcare Internet of Things
by: Premylla, Jeremiah, et al.
Published: (2018)
by: Premylla, Jeremiah, et al.
Published: (2018)
Establishing a personalized information security culture
by: Talib, Shuhaili, et al.
Published: (2011)
by: Talib, Shuhaili, et al.
Published: (2011)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
National information infrastructure organisations and cyber security compliance in Malaysia / Maslina Daud
by: Maslina , Daud
Published: (2018)
by: Maslina , Daud
Published: (2018)
Cyber–information security compliance and violation behaviour in organisations: A systematic review
by: Sulaiman, Noor Suhani, et al.
Published: (2022)
by: Sulaiman, Noor Suhani, et al.
Published: (2022)
Conceptualizing a framework to enhance information security culture and compliance behavior in organizations through protection motivation theory
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
Uncovering Assumptions in Information Security
by: Armstrong, Helen, et al.
Published: (2005)
by: Armstrong, Helen, et al.
Published: (2005)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Use of security patterns for development of secure healthcare information system
by: Maher, Zulfikar Ahmed, et al.
Published: (2016)
by: Maher, Zulfikar Ahmed, et al.
Published: (2016)
Health Information Security Guidelines for Healthcare Information Systems
by: Narayanan Samy , Ganthan, et al.
Published: (2011)
by: Narayanan Samy , Ganthan, et al.
Published: (2011)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Evaluation model for knowledge sharing in information security professional virtual community / Alireza Tamjidyamcholo
by: Tamjidyamcholo, Alireza
Published: (2014)
by: Tamjidyamcholo, Alireza
Published: (2014)
Adopting Theories-Based Model Of Information Security Compliance Behaviour For Healthcare Employees In Kingdom Of Saudi Arabia
by: Tuwayrish S, Alanazi Sultan
Published: (2023)
by: Tuwayrish S, Alanazi Sultan
Published: (2023)
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
E-Government - an information security perspective
by: Hassan, Rasha G., et al.
Published: (2016)
by: Hassan, Rasha G., et al.
Published: (2016)
Information security challenge of QR codes
by: Thompson, Nik, et al.
Published: (2013)
by: Thompson, Nik, et al.
Published: (2013)
Coding, cryptography, information security and OFDM
Published: (2011)
Published: (2011)
Similar Items
-
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018) -
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019) -
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017) -
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020) -
Information security culture model for Malaysian organizations: A review
by: Akhyari, Nasir, et al.
Published: (2020)