Authors can submit their research articles to editor@ijsea.com  

Processing Charges

IJSEA is index with

 

 

 

 

 

 

 

IJSEA Archive (Volume 4, Issue 6)

International Journal of Science and Engineering Applications (IJSEA)  (Volume 4, Issue 6 November-December 2015)

Mediating role of Information System Security Awareness in the relationship between Self-Efficacy, Security Practice and Information System Security Behavior

Hanieh Yaghoobi Bojmaeh

10.7753/IJSEA0406.1006




 PDF 



Keywords: Self-Efficacy, Security Practice, Information System Security Behavior, Information System Security Awareness

Abstract References BibText


        Through reviewing the previous conducted studies, we can find enough evidence in order to support the relationship between self-efficacy and security practice with information system security behavior. The main issue which is discussed in this research is the key role of information system security awareness. According to the data analysis results on 230 collected data from 10 universities in Iran, located in Tehran, it was revealed that the relationship between mentioned factors with information system security can be mediated by information system security awareness


[1] BERR (2008), “Information Security Breaches Survey”, technical report, PricewaterhouseCoopers, in association with Symantec, HP and The Security Company, available at: www.pwc.co.uk/pdf/BERR_ISBS_2008(sml).pdf (accessed October 10, 2010).
[2] Computer Security Institute (CSI) (2008), “Computer Crime and Security Survey 2008”, Computer Security Institute, available at: http://www.cse.msstate.edu/Bcse6243/readings/CSIsurvey2008.pdf (accessed July 5, 2012).
[3] D’Archy, J., Hovav, A. and Galletta, D. (2009), “User awareness of security countermeasures and its impact on information security misuse: a deterrence approach”, Information Systems Research, Vol. 20 No. 1, pp. 79-98.
[4] Ernst & Young (2008), “Annual Global Information Security Survey”, available at: www.arc-tc. com/pages/documents/ErnstandYoung2008.pdf (accessed February 9, 2011).
[5] Ernst & Young (2010), “12th Annual Global Information Security Survey: outpacing change”, available at: www.ey.com/Publication/vwLUAssets/12th_annual_GISS_pub/$FILE/ 12th_annual_GISS_AU0383.pdf (accessed February 9, 2011).
[6] European Network and Information Security Agency (ENISA) (2008), “A new users’ guide: how to raise information security awareness”, ENISA, Heraklion, available at: www.enisa.europa.eu/doc/pdf/deliverables/new_ar_users_guide.pdf (accessed October 10, 2010).
[7] ISO (2005), Information Technology – Security Techniques – Information Security Management Systems – Requirements, ISO/IEC 27001, ISO, Geneva.
[8] Karamizadeh, S., Shayan, J., Alizadeh, M., &Kheirkhah, A. (2013). Information Security Awareness Behavior: A Conceptual Model ForCloud.International Journal Of Computers & Technology, 10(1), 1186-1191.
[9] Lee, Y., and Kozar, K. A. (2005). Investigating factors affecting the adoption of anti-spyware systems.Communications of the ACM.
[10] Peltier, T.R. (2005), “Implementing an information security awareness program”, Information Systems Security, Vol. 14 No. 2, pp. 37-48.
[11] Proctor, R.W and Proctor, J.D. (2006). Handbook of Human Factors and Ergonomics 3rd ed., John Wiley and Sons, New York
[12] Puhakainen, P. (2006), “A design theory for information security awareness”, doctoral dissertation, Department of Information Processing Science, University of Oulu, Oulu, available at: http://herkules.oulu.fi/isbn9514281144/ (accessed January 10, 2010).
[13] Qing, H., Hart, P. and Cooke, D. (2007), “The role of external and internal influences on information systems security a neo institutional perspective”, Strategic Information System, Vol. 16 No. 2, pp. 153-72.
[14] Rhee, H. S., Kim, C., &Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users' information security practice behavior. Computers & Security, 28(8), 816-826.
[15] Richardson, R. (2007). CSI Computer Crime and Security Survey. Computer Security Institute. From: retrieved November 16, 2007.
[16] Siponen, M. and Willison, R. (2007), “A critical assessment of IS security research between 1990-2004”, in O ¨ sterle, H., Schelp, J. and Winter, R. (Eds), Proceedings of the Fifteenth European Conference on Information Systems, University of St Gallen, St Gallen, pp. 1551-9.
[17] Siponen, M.T. (2000), “A conceptual foundation for organizational information security awareness”, Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
[18] Spears, J. and Barki, H. (2010), “User participation in information systems security risk management”, MIS Quarterly, Vol. 34 No. 3, pp. 503-22.
[19] Tsohou, A., Kokolakis, S., Karyda, M. and Kiountouzis, E. (2008), “Investigating information security awareness: research and practice gaps”, Information Security Journal: A Global Perspective, Vol. 17 Nos 5-6, pp. 207-27.
[20] Tsohou, A., Karyda, M., Kokolakis, S., &Kiountouzis, E. (2012). Analyzing trajectories of information security awareness. Information Technology & People, 25(3), 327-352.


@article{Hanieh04061006,
title = " Mediating role of Information System Security Awareness in the relationship between Self-Efficacy, Security Practice and Information System Security Behavior ",
journal = "International Journal of Science and Engineering Applications (IJSEA)",
volume = "4",
number = "6",
pages = "361 - 365",
year = "2015",
author = " Hanieh Yaghoobi Bojmaeh ",
}