Information Security Culture Concept towards Information Security Compliance: A Comparison between IT and Non-IT Professionals
This paper examines the factors determining a positive Information Security Culture (ISC) concept and the influence of ISC towards ISP compliance intention (INT) between IT and non-IT professionals in Malaysian public universities. Partial least square structural equation modelling, using PLS MGA,...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UTHM
2022
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/34752/7/Information%20Security%20Culture%20Concept%20towards%20Information.pdf http://umpir.ump.edu.my/id/eprint/34752/ https://publisher.uthm.edu.my/ojs/index.php/ijie/article/view/10747 https://doi.org/10.30880/ijie.2022.14.03.017 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | This paper examines the factors determining a positive Information Security Culture (ISC) concept and
the influence of ISC towards ISP compliance intention (INT) between IT and non-IT professionals in Malaysian
public universities. Partial least square structural equation modelling, using PLS MGA, is used to assess the
measurement and structural models, and to compare the results between the two groups. Results indicate all factors
have significant contribution towards ISC in both groups, with two out of seven ISC factors have significant
differences. This study has revealed that although both groups have the same ISC factors, IT and non-IT professionals
have significant difference in terms of believe that Top Management Commitment and Information Security
Knowledge are required for implementing a positive ISC. In addition, there is a significant difference between these
two groups in terms of the influence of ISC towards ISP compliance intention. ISC has less influence towards INT
for Non-IT professionals compared to IT professionals within the same ISC. These empirical findings would benefit
in formulating better security strategies by providing appropriate efforts for different groups of employees in the
organizations. This study also provides a total cyber security solution for improving information security culture and
employees’ compliance towards Information Security Policy. |
---|