Predicting information security culture among employees of telecommunication companies in an emerging market
PurposeThe purpose of this study is to examine factors, which influence information security culture among employees of telecommunications companies. The motivation for this study was the rise in the number of data breach incidents caused by the organizations’ own employees.Design/methodology/approa...
Saved in:
Published in | Information and computer security Vol. 29; no. 5; pp. 866 - 882 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Bingley
Emerald Group Publishing Limited
12.11.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 2056-4961 2056-497X |
DOI | 10.1108/ICS-02-2021-0020 |
Cover
Abstract | PurposeThe purpose of this study is to examine factors, which influence information security culture among employees of telecommunications companies. The motivation for this study was the rise in the number of data breach incidents caused by the organizations’ own employees.Design/methodology/approachA total of 139 usable responses were collected via a Web-based questionnaire survey from employees of Malaysian telecommunications companies. Data were analysed by using SmartPLS 3.FindingsSecurity education, training and awareness (SETA) programmes and information security awareness were found to have a positive and significant impact on Information Security Culture. Additionally, self-reported employees’ security behaviour was found to act as a partial mediator on the relationship between information security awareness and information security culture.Research limitations/implicationsThe study was cross-sectional in nature. Therefore, it could not measure changes in population over time.Practical implicationsThe empirical data provides a new perspective on significant elements that influence information security culture in an emerging market. Organizations in the telecommunications industry can now recognize that SETA programmes and information security awareness have a significant impact on information security culture. Employees’ security behaviour also mediates the relationship between information security awareness and information security culture.Originality/valueThis is the first study to analyse the mediating effect of employees’ security behaviour on the relationship between information security awareness and information security culture in the Malaysian telecommunications context. |
---|---|
AbstractList | PurposeThe purpose of this study is to examine factors, which influence information security culture among employees of telecommunications companies. The motivation for this study was the rise in the number of data breach incidents caused by the organizations’ own employees.Design/methodology/approachA total of 139 usable responses were collected via a Web-based questionnaire survey from employees of Malaysian telecommunications companies. Data were analysed by using SmartPLS 3.FindingsSecurity education, training and awareness (SETA) programmes and information security awareness were found to have a positive and significant impact on Information Security Culture. Additionally, self-reported employees’ security behaviour was found to act as a partial mediator on the relationship between information security awareness and information security culture.Research limitations/implicationsThe study was cross-sectional in nature. Therefore, it could not measure changes in population over time.Practical implicationsThe empirical data provides a new perspective on significant elements that influence information security culture in an emerging market. Organizations in the telecommunications industry can now recognize that SETA programmes and information security awareness have a significant impact on information security culture. Employees’ security behaviour also mediates the relationship between information security awareness and information security culture.Originality/valueThis is the first study to analyse the mediating effect of employees’ security behaviour on the relationship between information security awareness and information security culture in the Malaysian telecommunications context. |
Author | Hanifah, Haniruzila Teoh, Ai Ping Md Azmi, Nurul Asmui Azmi Vafaei-Zadeh, Ali |
Author_xml | – sequence: 1 givenname: Nurul Asmui Azmi surname: Md Azmi fullname: Md Azmi, Nurul Asmui Azmi – sequence: 2 givenname: Ai Ping surname: Teoh fullname: Teoh, Ai Ping – sequence: 3 givenname: Ali surname: Vafaei-Zadeh fullname: Vafaei-Zadeh, Ali – sequence: 4 givenname: Haniruzila surname: Hanifah fullname: Hanifah, Haniruzila |
BookMark | eNp1kE1LAzEQhoNUsNbePS54Xp0km3T3KMWPQkFBBW8hm86W1N1kzWYP_femVjwInmaGvM-Eec7JxHmHhFxSuKYUypvV8iUHljNgNAdgcEKmDITMi2rxPvntJT0j82HYAQCtqOSSTkn7HHBjTbRum1nX-NDpaL3LBjRjsHGfmbGNY8BMdz5FsOtbv0ccMt9kEVs0vutGZ82RSlOvnU3P1mXapTiG7WF1p8MHxgty2uh2wPlPnZG3-7vX5WO-fnpYLW_XueGUxrzAMjWG1XXFF3WzgYLxxlCEciO5llxIyZALAZxXWtaNqJluuCioKLneLJDPyNVxbx_854hDVDs_Bpe-VExUIpngCZ4ReUyZ4IchYKOMjd93xKBtqyiog1yV5Cpg6iBXHeQmEP6AfbDpwv3_yBcz4H-v |
CitedBy_id | crossref_primary_10_1016_j_trf_2024_11_007 crossref_primary_10_1108_APJML_05_2024_0570 crossref_primary_10_1016_j_cose_2024_104208 crossref_primary_10_1108_JSTPM_02_2024_0067 crossref_primary_10_1108_SRJ_02_2024_0109 crossref_primary_10_1108_APJML_07_2024_1008 crossref_primary_10_1108_K_01_2023_0133 crossref_primary_10_1016_j_sftr_2024_100386 crossref_primary_10_1080_19393555_2025_2457702 crossref_primary_10_1108_AJIM_10_2022_0475 crossref_primary_10_1080_10447318_2025_2464900 crossref_primary_10_1109_ACCESS_2024_3402341 |
Cites_doi | 10.1108/ICS-04-2018-0042 10.3758/BRM.40.3.879 10.1007/s11747-014-0403-8 10.1016/S1361-3723(09)70019-3 10.1037/0003-066X.45.2.109 10.1016/S1361-3723(16)30017-3 10.1108/ICS-05-2014-0033 10.1108/09685220610648355 10.1108/IMCS-08-2013-0057 10.1109/WCCAIS.2014.6916579 10.1177/1043659609360849 10.1108/09576050210447037 10.1108/ICS-12-2016-0095 10.1016/j.cose.2009.09.002 10.7763/IJIET.2015.V5.522 10.1007/978-3-319-74817-7_6 10.1016/S0167-4048(00)08019-6 10.1016/j.cose.2017.01.004 10.1016/j.chb.2015.03.054 10.1016/j.jbusres.2019.11.069 10.1016/j.cose.2009.10.005 10.1016/j.cose.2012.10.003 10.1016/j.dss.2018.02.009 10.1177/0193841X09340214 10.1080/08874417.2015.11645767 10.1002/widm.1211. 10.1086/651257 10.3758/BRM.41.4.1149 10.1057/ejis.2009.6 10.1007/s00180-012-0317-1 |
ContentType | Journal Article |
Copyright | Emerald Publishing Limited 2021 |
Copyright_xml | – notice: Emerald Publishing Limited 2021 |
DBID | AAYXX CITATION 0-V 0U~ 1-H 7SC 7WY 7WZ 7XB 8AO 8FD 8FE 8FG 8FI ABUWG AFKRA ALSLI ARAPS AZQEC BENPR BEZIV BGLVJ BGRYB CCPQU CNYFK DWQXO E3H F2A FYUFA F~G GNUQQ HCIFZ JQ2 K6~ K7- L.- L.0 L7M L~C L~D M0C M0N M0O M0T M1O P5Z P62 PHGZM PHGZT PJZUB PKEHL PPXIY PQBIZ PQEST PQGLB PQQKQ PQUKI PRQQA PYYUZ Q9U |
DOI | 10.1108/ICS-02-2021-0020 |
DatabaseName | CrossRef ProQuest Social Sciences Premium Collection【Remote access available】 Global News & ABI/Inform Professional Trade PRO Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Hospital Premium Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Social Science Premium Collection ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central ProQuest Business Premium Collection Technology Collection ProQuest Criminology Collection ProQuest One Community College Library & Information Science Collection ProQuest Central Korea Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) Health Research Premium Collection ABI/INFORM Global (Corporate) ProQuest Central Student ProQuest SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced ABI/INFORM Professional Standard Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database ProQuest Criminal Justice Database (NC LIVE) ProQuest Healthcare Administration Database (NC LIVE) Library Science Database ProQuest Advanced Technologies & Aerospace Database (NC LIVE) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Business (OCUL) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest One Social Sciences ABI/INFORM Collection China ProQuest Central Basic |
DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Library and Information Science Abstracts (LISA) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection Trade PRO ABI/INFORM Complete Global News & ABI/Inform Professional ProQuest One Applied & Life Sciences Health Research Premium Collection Health & Medical Research Collection Library & Information Science Collection ProQuest Central (New) Advanced Technologies & Aerospace Collection Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest One Academic Eastern Edition ProQuest Hospital Collection ProQuest Technology Collection ProQuest Business Collection Criminology Collection ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Pharma Collection ProQuest Central ABI/INFORM Professional Advanced ProQuest Library Science ProQuest Criminal Justice ABI/INFORM Professional Standard ProQuest Central Korea Advanced Technologies Database with Aerospace ProQuest Computing ProQuest One Social Sciences ProQuest Central Basic ProQuest Health Management ABI/INFORM China ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database |
DatabaseTitleList | Computer Science Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science Library & Information Science Business |
EISSN | 2056-497X |
EndPage | 882 |
ExternalDocumentID | 10_1108_ICS_02_2021_0020 |
GeographicLocations | Malaysia |
GeographicLocations_xml | – name: Malaysia |
GroupedDBID | .WU 0-V 3FY 5VS 7WY 8AO 8FE 8FG 8FI 8FW 9F- AAGBP AAKOT AAMCF AAUDR AAXBI AAYXX ABIJV ABJNI ABSDC ABUWG ABXQL ABYQI ACGFS ACTSA ACZKX ADBBV ADOMW ADQHX ADWNT AFKRA AFNTC AFZLO AGTVX AHMHQ AILOG AJEBP ALIPV ALMA_UNASSIGNED_HOLDINGS ALSLI AODMV AQUVI ARALO ARAPS AUCOK AZQEC BENPR BEZIV BGLVJ BGRYB BPHCQ BVXVI CCPQU CITATION CNYFK DWQXO EBS ECCUG FNNZZ FYUFA GEA GEI GMX GNUQQ GQ. H13 HCIFZ K6V K6~ K7- KBGRL M0C M0O M0T M1O M42 P62 PHGZM PHGZT PJZUB PPXIY PQBIZ PQGLB PQQKQ PROAC PRQQA SCAQC SDURG SLOBJ TEM TGG TMF TMI TMT UKHRP Z11 Z12 Z21 ZYZAG .DC 0U~ 1-H 29I 4.4 5GY 70U 77K 7SC 7XB 8FD 8R4 8R5 9E0 AAPSD ABEAN ACGFO AEBZA AEDOK AEMMR AETHF AFNZV AIAFM AJFKA APPLU ATGMP CS3 DU5 E3H F2A GEB GEC GMM GMN J1Y JI- JL0 JQ2 L.- L.0 L7M L~C L~D M0N P2P PKEHL PQEST PQUKI Q2X Q3A Q9U RWL TAE TDQ TET TMD TMK TMX Z22 |
ID | FETCH-LOGICAL-c311t-4e8c31c2bb937bfd0423fc1e08d63a635662e3550339a6bf5b2af3541583ad7e3 |
IEDL.DBID | GEI |
ISSN | 2056-4961 |
IngestDate | Mon Jun 30 14:38:08 EDT 2025 Thu Apr 24 23:12:56 EDT 2025 Thu Jul 31 00:36:09 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Language | English |
License | https://www.emerald.com/insight/site-policies |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c311t-4e8c31c2bb937bfd0423fc1e08d63a635662e3550339a6bf5b2af3541583ad7e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2595496350 |
PQPubID | 31135 |
PageCount | 17 |
ParticipantIDs | proquest_journals_2595496350 crossref_citationtrail_10_1108_ICS_02_2021_0020 crossref_primary_10_1108_ICS_02_2021_0020 |
PublicationCentury | 2000 |
PublicationDate | 2021-11-12 |
PublicationDateYYYYMMDD | 2021-11-12 |
PublicationDate_xml | – month: 11 year: 2021 text: 2021-11-12 day: 12 |
PublicationDecade | 2020 |
PublicationPlace | Bingley |
PublicationPlace_xml | – name: Bingley |
PublicationTitle | Information and computer security |
PublicationYear | 2021 |
Publisher | Emerald Group Publishing Limited |
Publisher_xml | – name: Emerald Group Publishing Limited |
References | (key2021111012415961200_ref058) 2014 (key2021111012415961200_ref008) 2018; 26 (key2021111012415961200_ref015) 2018 (key2021111012415961200_ref029) 2013; 28 (key2021111012415961200_ref017) 2020; 92 (key2021111012415961200_ref033) 2017; 47 (key2021111012415961200_ref004) 2015; 49 (key2021111012415961200_ref012) 2015; 55 (key2021111012415961200_ref014) 1998 (key2021111012415961200_ref047) 1990; 45 (key2021111012415961200_ref053) 2010; 29 (key2021111012415961200_ref001) 2015 (key2021111012415961200_ref024) 2009; 33 key2021111012415961200_ref055 (key2021111012415961200_ref031) 2009; 18 (key2021111012415961200_ref019) 2000; 19 (key2021111012415961200_ref011) 2015 key2021111012415961200_ref057 (key2021111012415961200_ref005) 2016; 15 (key2021111012415961200_ref042) 2017; 66 (key2021111012415961200_ref013) 2017; 7 (key2021111012415961200_ref030) 2015; 43 (key2021111012415961200_ref046) 2016; 2016 (key2021111012415961200_ref049) 2015 (key2021111012415961200_ref054) 2018; 108 (key2021111012415961200_ref034) 2006; 14 (key2021111012415961200_ref025) 2013; 32 key2021111012415961200_ref051 key2021111012415961200_ref052 key2021111012415961200_ref050 key2021111012415961200_ref044 key2021111012415961200_ref003 (key2021111012415961200_ref010) 2012; 2 (key2021111012415961200_ref043) 2008; 40 key2021111012415961200_ref009 (key2021111012415961200_ref022) 2002; 15 (key2021111012415961200_ref002) 2010 key2021111012415961200_ref006 (key2021111012415961200_ref035) 2011; 1 (key2021111012415961200_ref020) 2009; 41 (key2021111012415961200_ref023) 2018 (key2021111012415961200_ref027) 2020; 109 (key2021111012415961200_ref007) 2015; 22 key2021111012415961200_ref040 key2021111012415961200_ref037 (key2021111012415961200_ref038) 2018; 9 (key2021111012415961200_ref045) 2008 key2021111012415961200_ref039 (key2021111012415961200_ref026) 2017 (key2021111012415961200_ref036) 2017 (key2021111012415961200_ref018) 2014; 22 (key2021111012415961200_ref016) 2010; 29 (key2021111012415961200_ref059) 2015; 23 (key2021111012415961200_ref041) 2019; 27 (key2021111012415961200_ref021) 2009; 2009 (key2021111012415961200_ref048) 2003; 2003 (key2021111012415961200_ref032) 2015; 5 key2021111012415961200_ref028 (key2021111012415961200_ref056) 2010; 37 |
References_xml | – volume: 26 start-page: 327 issue: 3 year: 2018 ident: key2021111012415961200_ref008 article-title: In their own words: employee attitudes towards information security publication-title: Information and Computer Security doi: 10.1108/ICS-04-2018-0042 – volume-title: ICT Systems Security and Privacy Protection, SEC 2014, IFIP Advances in Information and Communication Technology year: 2014 ident: key2021111012415961200_ref058 article-title: Managing employee security behaviour in organisations: the role of cultural factors and individual values – ident: key2021111012415961200_ref057 – volume: 40 start-page: 879 issue: 3 year: 2008 ident: key2021111012415961200_ref043 article-title: Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models publication-title: Behavior Research Methods doi: 10.3758/BRM.40.3.879 – volume: 43 start-page: 115 issue: 1 year: 2015 ident: key2021111012415961200_ref030 article-title: A new criterion for assessing discriminant validity in variance-based structural equation modelling publication-title: Journal of the Academy of Marketing Science doi: 10.1007/s11747-014-0403-8 – volume-title: 5-10 June year: 2017 ident: key2021111012415961200_ref026 article-title: ‘Antecedents of employees' information security awareness-review’, synthesis, and directions for future research – start-page: 269 volume-title: Advances in Human Factors in Cybersecurity year: 2018 ident: key2021111012415961200_ref023 article-title: Human factors in information security culture: a literature review – ident: key2021111012415961200_ref009 – year: 2008 ident: key2021111012415961200_ref045 article-title: Information security cultures of four professions: a comparative study – ident: key2021111012415961200_ref028 – volume: 15 start-page: 1 issue: 01 year: 2016 ident: key2021111012415961200_ref005 article-title: A study of cyber security awareness in educational environment in the Middle East publication-title: Journal of Information and Knowledge Management – volume: 2009 start-page: 5 issue: 2 year: 2009 ident: key2021111012415961200_ref021 article-title: From culture to disobedience: recognising the varying user acceptance of IT security publication-title: Computer Fraud and Security doi: 10.1016/S1361-3723(09)70019-3 – volume: 45 start-page: 109 issue: 2 year: 1990 ident: key2021111012415961200_ref047 article-title: Organisational culture publication-title: American Psychologist doi: 10.1037/0003-066X.45.2.109 – volume: 2016 start-page: 15 issue: 2 year: 2016 ident: key2021111012415961200_ref046 article-title: Human aspects of information security in organisations publication-title: Computer Fraud and Security doi: 10.1016/S1361-3723(16)30017-3 – ident: key2021111012415961200_ref052 – volume: 23 start-page: 246 issue: 3 year: 2015 ident: key2021111012415961200_ref059 article-title: Information security culture – state-of-the art review between 2000 and 2013 publication-title: Information and Computer Security doi: 10.1108/ICS-05-2014-0033 – volume: 14 start-page: 24 issue: 1 year: 2006 ident: key2021111012415961200_ref034 article-title: Information security: management's effect on culture and policy publication-title: Information Management and Computer Security doi: 10.1108/09685220610648355 – volume: 2003 start-page: 46 issue: 31 year: 2003 ident: key2021111012415961200_ref048 article-title: Information security culture – from analysis to change publication-title: South African Computer Journal – volume: 92 start-page: 1 issue: 101713 year: 2020 ident: key2021111012415961200_ref017 article-title: Defining organisational information security culture – perspectives from academia and industry publication-title: Computers and Security – volume: 22 start-page: 474 issue: 5 year: 2014 ident: key2021111012415961200_ref018 article-title: Security culture and the employment relationship as drivers of employees’ security compliance publication-title: Information Management and Computer Security doi: 10.1108/IMCS-08-2013-0057 – ident: key2021111012415961200_ref003 doi: 10.1109/WCCAIS.2014.6916579 – volume: 22 start-page: 22 issue: 1 year: 2015 ident: key2021111012415961200_ref007 article-title: Organizational culture, quality of work life, and organizational effectiveness in Korean university hospitals publication-title: Journal of Transcultural Nursing doi: 10.1177/1043659609360849 – start-page: 3939 volume-title: 48th HI International Conference on System Sciences year: 2015 ident: key2021111012415961200_ref011 article-title: Assessing the role of security education, training, and awareness on insiders’ security-related behavior: an expectancy theory approach – start-page: 124 year: 2015 ident: key2021111012415961200_ref001 article-title: Security challenges to telecommunications networks: an overview of threats and preventive strategies – start-page: 90 volume-title: the 10th International Conference for Internet Technology and Secured Transactions (ICITST) year: 2015 ident: key2021111012415961200_ref049 article-title: Awareness, behaviour and culture: the ABC in cultivating security compliance – volume: 9 start-page: 96 issue: 8 year: 2018 ident: key2021111012415961200_ref038 article-title: Assessing the information security culture in a government context: the case of a developing country publication-title: International Journal of Civil Engineering and Technology – ident: key2021111012415961200_ref055 – volume: 15 start-page: 352 issue: 5/6 year: 2002 ident: key2021111012415961200_ref022 article-title: A prototype tool for information security awareness and training publication-title: Logistics Information Management doi: 10.1108/09576050210447037 – volume: 27 start-page: 146 issue: 2 year: 2019 ident: key2021111012415961200_ref041 article-title: Key elements of an information security culture in organisations publication-title: Information and Computer Security doi: 10.1108/ICS-12-2016-0095 – volume: 29 start-page: 196 issue: 2 year: 2010 ident: key2021111012415961200_ref016 article-title: A framework and assessment instrument for information security culture publication-title: Computers and Security doi: 10.1016/j.cose.2009.09.002 – ident: key2021111012415961200_ref039 – ident: key2021111012415961200_ref051 – volume: 47 start-page: 17 issue: 1 year: 2017 ident: key2021111012415961200_ref033 article-title: Indirect effect of management support on users’ compliance behaviour towards information security policies publication-title: Health Information Management Journal – volume: 5 start-page: 311 issue: 4 year: 2015 ident: key2021111012415961200_ref032 article-title: Leadership styles and information security compliance behavior: the mediator effect of information security awareness publication-title: International Journal of Information and Education Technology doi: 10.7763/IJIET.2015.V5.522 – volume-title: Advances in Information Systems Development. Lecture Notes in Information Systems and Organisation year: 2018 ident: key2021111012415961200_ref015 article-title: Employee security behaviour: the importance of education and policies in organisational doi: 10.1007/978-3-319-74817-7_6 – volume: 2 start-page: 9331 issue: 9 year: 2012 ident: key2021111012415961200_ref010 article-title: A new evaluation criteria for effective security awareness in computer risk management based on AHP publication-title: Journal of Basic and Applied Scientific Research – volume: 19 start-page: 698 issue: 8 year: 2000 ident: key2021111012415961200_ref019 article-title: Information security management: an approach to combine process certification and product evaluation publication-title: Computers and Security doi: 10.1016/S0167-4048(00)08019-6 – volume: 66 start-page: 40 year: 2017 ident: key2021111012415961200_ref042 article-title: The human aspects of information security questionnaire (HAIS-Q): two further validation studies publication-title: Computers and Security doi: 10.1016/j.cose.2017.01.004 – volume: 49 start-page: 567 year: 2015 ident: key2021111012415961200_ref004 article-title: Design and validation of information security culture framework publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2015.03.054 – volume: 1 start-page: 192 issue: 3 year: 2011 ident: key2021111012415961200_ref035 article-title: Information security: corporate culture and organisational commitment publication-title: International Journal of Humanities and Social Science – ident: key2021111012415961200_ref050 – volume: 109 start-page: 101 year: 2020 ident: key2021111012415961200_ref027 article-title: Assessing measurement model quality in PLS-SEM using confirmatory composite analysis publication-title: Journal of Business Research doi: 10.1016/j.jbusres.2019.11.069 – volume: 29 start-page: 476 issue: 4 year: 2010 ident: key2021111012415961200_ref053 article-title: Information security culture: a management perspective publication-title: Computers and Security doi: 10.1016/j.cose.2009.10.005 – volume: 32 start-page: 242 year: 2013 ident: key2021111012415961200_ref025 article-title: Security-related behavior in using information systems in the workplace: a review and synthesis publication-title: Computers and Security doi: 10.1016/j.cose.2012.10.003 – volume-title: 5th International Conference on Research and Innovation in Information Systems: Social Transformation through Data Science, ICRIIS 2017 [8002442] (International Conference on Research and Innovation in Information Systems, ICRIIS) year: 2017 ident: key2021111012415961200_ref036 article-title: A systematic literature review: information security culture – volume: 108 start-page: 107 year: 2018 ident: key2021111012415961200_ref054 article-title: Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance publication-title: Decision Support Systems doi: 10.1016/j.dss.2018.02.009 – start-page: 1 volume-title: Australasian Information Security Conference (AISC) year: 2010 ident: key2021111012415961200_ref002 article-title: Information security culture: a behaviour compliance conceptual framework – volume: 33 start-page: 464 issue: 5 year: 2009 ident: key2021111012415961200_ref024 article-title: A comparison of web-based and paper-based survey methods: testing assumptions of survey mode and response cost publication-title: Evaluation Review doi: 10.1177/0193841X09340214 – volume: 55 start-page: 11 issue: 3 year: 2015 ident: key2021111012415961200_ref012 article-title: Impacts of comprehensive information security programmes on information security culture publication-title: Journal of Computer Information Systems doi: 10.1080/08874417.2015.11645767 – ident: key2021111012415961200_ref037 – volume: 7 start-page: e1211 issue: 5 year: 2017 ident: key2021111012415961200_ref013 article-title: Enterprise data breach: causes, challenges, prevention, and future directions publication-title: Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery doi: 10.1002/widm.1211. – start-page: 295 volume-title: Modern Methods for Business Research year: 1998 ident: key2021111012415961200_ref014 article-title: The partial least squares approach to structural modelling – volume: 37 start-page: 197 issue: 2 year: 2010 ident: key2021111012415961200_ref056 article-title: Reconsidering Baron and Kenny: myths and truths about mediation analysis publication-title: Journal of Consumer Research doi: 10.1086/651257 – volume: 41 start-page: 1149 issue: 4 year: 2009 ident: key2021111012415961200_ref020 article-title: Statistical power analyses using G*power 3.1: tests for correlation and regression analyses publication-title: Behavior Research Methods doi: 10.3758/BRM.41.4.1149 – volume: 18 start-page: 106 issue: 2 year: 2009 ident: key2021111012415961200_ref031 article-title: Protection motivation and deterrence: a framework for security policy compliance in organisations publication-title: European Journal of Information Systems doi: 10.1057/ejis.2009.6 – ident: key2021111012415961200_ref006 – volume: 28 start-page: 565 issue: 2 year: 2013 ident: key2021111012415961200_ref029 article-title: Goodness-of-fit indices for partial least squares path modelling publication-title: Computational Statistics doi: 10.1007/s00180-012-0317-1 – ident: key2021111012415961200_ref040 – ident: key2021111012415961200_ref044 |
SSID | ssj0001916361 ssj0004345 |
Score | 2.3605645 |
Snippet | PurposeThe purpose of this study is to examine factors, which influence information security culture among employees of telecommunications companies. The... |
SourceID | proquest crossref |
SourceType | Aggregation Database Enrichment Source Index Database |
StartPage | 866 |
SubjectTerms | Access to information Corporate culture Data integrity Empirical analysis Employees Hypotheses Literature reviews Motivation Multimedia Organizations Research methodology Security Security management Subscriptions Telecommunications Telecommunications industry |
SummonAdditionalLinks | – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1BS8MwFA46QbyITsXpJjmI4CGsbdouPYkM5_Qggg52K0magDC7udb_73tZ6rbLboUmOeQled9Lvvc-Qm4HNss01ynDYuwsLoxiIhYJi6UUNpZxklnH8n1Lx5P4dZpM_YVb5WmVzZnoDupirvGOvA8wHUIZcI_Bw-KHoWoUvq56CY19chCCp8F1LkbP67xI7kSKI3DyDPqGzTNlIPovww-XmIwMBYRM225p-1R2rmZ0Qo49RqSPK6Oekj1TtslhQ1Fvk55PNqB31GcT4exSv03PyOx9ic8vSGimXxsNKq9VR1flNgx1SkPUeNHfis4trVEXZzNphDqWegkBNYxFZUkxoxiVjei3S5g-J5PR0-dwzLyqAtM8DGsWGwEfOlIKkImyBRJjrA5NIIqUSyxXl0YGUEjAeSZTZRMVScsTcPSCy2Jg-AVplfPSXBKqJARE0IYnRRjbCJCDtiIbKK1CDTiYd0i_mdRc-5LjqHwxy13oEYgczJAHUY5myNEMHXL_32OxKrexo223sVPuN16Vr5fJ1e7f1-TIGR8ZfVGXtOrlr-kBvqjVjVtEf-Jdzpc priority: 102 providerName: ProQuest |
Title | Predicting information security culture among employees of telecommunication companies in an emerging market |
URI | https://www.proquest.com/docview/2595496350 |
Volume | 29 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PT9swFH4CduECGzCt_Kh84MIhbRI7qXNkqAUmratgSIxLZDu2QJQUtellf_3ec5IKpmkSEpcoihIr_hH7e873vg_geOCyzHCTBiTGHojC6kAKmQRCKemEEknmPMt3nF7ciG-3ye0ajNtcGE-rrLdj_Dz9UC4oSO0TcRtn4ZXgALnXXJ5d--RiYhkQ7OnTjnX_vnqaruNIT9I29bfdcUEkxL2AaoyrfiCyNGr_W_6jsNfr1Otp2q89o22YtW9dU04ee8tK98zvvwQd369aH2GrganstB5Xn2DNljuw3VpAsGZG2IXpZE5_eog7zRoNVupptmhs8Vit7GGZNzVitvEXXrCZYxVZ8LzMT2GeEF9i7I5lMVUyqguZKLEnn5u9Bzej4c-zi6AxcAgMj6IqEFbiiYm1RhCkXUEcHGciG8oi5YqU8dLYIuAJOc9Uql2iY-V4gphCclUMLP8MG-WstF-AaYWxF97DkyISLkaQYpzMBtroyCDk5h3ot92Vm0bdnEw2prmPckKZY7PmYZxTs-bUrB04WT3xXCt7_Ofew3YE5M03vsgxcMTgGmsR7r-hqAPY9D1LTML4EDaq-dIeIa6pdBfW5ei8Cx--DseTq64fvHj8Hv3Aa3e_7k7P_wBONvhk |
linkProvider | Emerald |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9QwEB2VrQRcEBQQhbb4AEgcrE1sJ-scKgSl1S4tqwpaqTdjO7aEVLKluwjxp_iNnfE6_bj01lukOFbkmXhm4vfmAbwZxabx0tecmrFz1QbHtdIVV9bqqKyqmphQvtN6fKy-nFQnK_C_58IQrLLfE9NG3c48_SMfYpqOpQyGx-LD2W9OqlF0utpLaCzdYj_8-4sl23x78hnt-1aIvd2jnTHPqgLcy7JccBU0XnjhHEZmF1sChkRfhkK3tbTUrq0WAaNwIWVjaxcrJ2yUFQY6LW07ChLnvQerihitA1j9tDs9_HbFxJRJFllgWsHxbcv-YLTQw8nO90SFJkwEJWk3A-HNOJCC295jeJSzUvZx6UZPYCV0a3C_B8WvwWamN7B3LPOXyJ4sbwxP4fTwnA58CELNfl4bMM_qeGzZ4COwpG3EQpYZnrNZZAtS4rlOU2EJF99hCY9zMdsx4jCTlhL7lSjaz-D4Tlb8OQy6WRdeAHMWSzAcI6u2VFFgruKjbkbOu9Jj5i3XYdgvqvG5yTlpbZyaVOwU2qAZTCEMmcGQGdbh_eUTZ8sGH7eM3ejtZPKnPjdXjvny9tuv4cH46OuBOZhM91_Bw-QIhCcUGzBYnP8Jm5jdLNxWdikGP-7aiy8AjbYMNw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Predicting+information+security+culture+among+employees+of+telecommunication+companies+in+an+emerging+market&rft.jtitle=Information+and+computer+security&rft.au=Md+Azmi%2C+Nurul+Asmui+Azmi&rft.au=Teoh%2C+Ai+Ping&rft.au=Vafaei-Zadeh%2C+Ali&rft.au=Hanifah%2C+Haniruzila&rft.date=2021-11-12&rft.issn=2056-4961&rft.volume=29&rft.issue=5&rft.spage=866&rft.epage=882&rft_id=info:doi/10.1108%2FICS-02-2021-0020&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_02_2021_0020 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon |