語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The Relevance of Social and Behavior...
~
Eastern Michigan University., Technology Studies.
FindBook
Google Book
Amazon
博客來
The Relevance of Social and Behavioral Models in Determining Intention to Comply with Information Security Policy in Higher Education Environments.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
The Relevance of Social and Behavioral Models in Determining Intention to Comply with Information Security Policy in Higher Education Environments./
作者:
Rajab, Majed.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2019,
面頁冊數:
138 p.
附註:
Source: Dissertations Abstracts International, Volume: 80-12, Section: B.
Contained By:
Dissertations Abstracts International80-12B.
標題:
Information Technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13810002
ISBN:
9781392153024
The Relevance of Social and Behavioral Models in Determining Intention to Comply with Information Security Policy in Higher Education Environments.
Rajab, Majed.
The Relevance of Social and Behavioral Models in Determining Intention to Comply with Information Security Policy in Higher Education Environments.
- Ann Arbor : ProQuest Dissertations & Theses, 2019 - 138 p.
Source: Dissertations Abstracts International, Volume: 80-12, Section: B.
Thesis (Ph.D.)--Eastern Michigan University, 2019.
This item must not be sold to any third party vendors.
The study of employees' intention to comply with information security policies in higher education is limited. This research thus embarks on an empirical analysis of the factors predicting employees' intention to comply or the lack thereof with respect to their institutions' policies. The theoretical frameworks utilized by the study's model for this analysis are outlined. Details regarding data collection and analysis are also provided to answer the crucial question: What are the best predictors of employees' intention to comply with information security policies within the higher education community? This benefits colleges and universities in better designing preventive solutions, thereby saving potential financial and reputational losses.Using data collected from a sample of employees at Eastern Michigan University, the proposed model was fitted based on four theoretical frameworks: theory of planned behavior, protection motivation theory, deterrence theory and organizational theory. This model is the first to integrate all relevant theories cited as influencing intention to comply with information security policies. Partial least squares structural equation modeling (PLS-SEM) is utilized to develop a deeper understanding of the factors leading higher education employees to comply with policies. Choice of this technique is both informed by the widespread usage of PLS-SEM in the information security compliance intention literature as well as its exploratory orientation, suiting the purposes of this research.Findings suggest that the protection motivation model serves as the most appropriate behavioral theory for understanding employees' intention to comply with information security policies in higher education. Perceived vulnerability to information breaches, perceived response efficacy, and perceived response cost were found to be significant in predicting intended compliance. This finding is significant in many respects. First, universities need to develop workshops aimed towards training staff on how to effectively respond to IT risks. Further, the majority of staff is not aware of the dangers and complexities of IT attacks; therefore, universities need to provide comprehensive guides or training sessions on the breadth, width, and magnitude of IT risks to increase levels of Information Security Policy (ISP) compliance intention. Finally, future studies of ISP intention to comply should incorporate vulnerability and response efficacy as main elements of their models.
ISBN: 9781392153024Subjects--Topical Terms:
1030799
Information Technology.
Subjects--Index Terms:
Compliance
The Relevance of Social and Behavioral Models in Determining Intention to Comply with Information Security Policy in Higher Education Environments.
LDR
:03859nmm a2200397 4500
001
2268105
005
20200810100541.5
008
220629s2019 ||||||||||||||||| ||eng d
020
$a
9781392153024
035
$a
(MiAaPQ)AAI13810002
035
$a
(MiAaPQ)emich:10659
035
$a
AAI13810002
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Rajab, Majed.
$3
3545362
245
1 4
$a
The Relevance of Social and Behavioral Models in Determining Intention to Comply with Information Security Policy in Higher Education Environments.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2019
300
$a
138 p.
500
$a
Source: Dissertations Abstracts International, Volume: 80-12, Section: B.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Advisor: Eydgahi, Ali.
502
$a
Thesis (Ph.D.)--Eastern Michigan University, 2019.
506
$a
This item must not be sold to any third party vendors.
520
$a
The study of employees' intention to comply with information security policies in higher education is limited. This research thus embarks on an empirical analysis of the factors predicting employees' intention to comply or the lack thereof with respect to their institutions' policies. The theoretical frameworks utilized by the study's model for this analysis are outlined. Details regarding data collection and analysis are also provided to answer the crucial question: What are the best predictors of employees' intention to comply with information security policies within the higher education community? This benefits colleges and universities in better designing preventive solutions, thereby saving potential financial and reputational losses.Using data collected from a sample of employees at Eastern Michigan University, the proposed model was fitted based on four theoretical frameworks: theory of planned behavior, protection motivation theory, deterrence theory and organizational theory. This model is the first to integrate all relevant theories cited as influencing intention to comply with information security policies. Partial least squares structural equation modeling (PLS-SEM) is utilized to develop a deeper understanding of the factors leading higher education employees to comply with policies. Choice of this technique is both informed by the widespread usage of PLS-SEM in the information security compliance intention literature as well as its exploratory orientation, suiting the purposes of this research.Findings suggest that the protection motivation model serves as the most appropriate behavioral theory for understanding employees' intention to comply with information security policies in higher education. Perceived vulnerability to information breaches, perceived response efficacy, and perceived response cost were found to be significant in predicting intended compliance. This finding is significant in many respects. First, universities need to develop workshops aimed towards training staff on how to effectively respond to IT risks. Further, the majority of staff is not aware of the dangers and complexities of IT attacks; therefore, universities need to provide comprehensive guides or training sessions on the breadth, width, and magnitude of IT risks to increase levels of Information Security Policy (ISP) compliance intention. Finally, future studies of ISP intention to comply should incorporate vulnerability and response efficacy as main elements of their models.
590
$a
School code: 6456.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Information science.
$3
554358
653
$a
Compliance
653
$a
Eastern Michigan University
653
$a
Higher education
653
$a
Information policy
653
$a
PLS
653
$a
Protection motivation theory
690
$a
0489
690
$a
0723
710
2
$a
Eastern Michigan University.
$b
Technology Studies.
$3
2095790
773
0
$t
Dissertations Abstracts International
$g
80-12B.
790
$a
6456
791
$a
Ph.D.
792
$a
2019
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13810002
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9420339
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入