Predicting information security culture among employees of telecommunication companies in an emerging market

PurposeThe purpose of this study is to examine factors, which influence information security culture among employees of telecommunications companies. The motivation for this study was the rise in the number of data breach incidents caused by the organizations’ own employees.Design/methodology/approa...

Full description

Saved in:
Bibliographic Details
Published inInformation and computer security Vol. 29; no. 5; pp. 866 - 882
Main Authors Md Azmi, Nurul Asmui Azmi, Teoh, Ai Ping, Vafaei-Zadeh, Ali, Hanifah, Haniruzila
Format Journal Article
LanguageEnglish
Published Bingley Emerald Group Publishing Limited 12.11.2021
Subjects
Online AccessGet full text
ISSN2056-4961
2056-497X
DOI10.1108/ICS-02-2021-0020

Cover

Abstract PurposeThe purpose of this study is to examine factors, which influence information security culture among employees of telecommunications companies. The motivation for this study was the rise in the number of data breach incidents caused by the organizations’ own employees.Design/methodology/approachA total of 139 usable responses were collected via a Web-based questionnaire survey from employees of Malaysian telecommunications companies. Data were analysed by using SmartPLS 3.FindingsSecurity education, training and awareness (SETA) programmes and information security awareness were found to have a positive and significant impact on Information Security Culture. Additionally, self-reported employees’ security behaviour was found to act as a partial mediator on the relationship between information security awareness and information security culture.Research limitations/implicationsThe study was cross-sectional in nature. Therefore, it could not measure changes in population over time.Practical implicationsThe empirical data provides a new perspective on significant elements that influence information security culture in an emerging market. Organizations in the telecommunications industry can now recognize that SETA programmes and information security awareness have a significant impact on information security culture. Employees’ security behaviour also mediates the relationship between information security awareness and information security culture.Originality/valueThis is the first study to analyse the mediating effect of employees’ security behaviour on the relationship between information security awareness and information security culture in the Malaysian telecommunications context.
AbstractList PurposeThe purpose of this study is to examine factors, which influence information security culture among employees of telecommunications companies. The motivation for this study was the rise in the number of data breach incidents caused by the organizations’ own employees.Design/methodology/approachA total of 139 usable responses were collected via a Web-based questionnaire survey from employees of Malaysian telecommunications companies. Data were analysed by using SmartPLS 3.FindingsSecurity education, training and awareness (SETA) programmes and information security awareness were found to have a positive and significant impact on Information Security Culture. Additionally, self-reported employees’ security behaviour was found to act as a partial mediator on the relationship between information security awareness and information security culture.Research limitations/implicationsThe study was cross-sectional in nature. Therefore, it could not measure changes in population over time.Practical implicationsThe empirical data provides a new perspective on significant elements that influence information security culture in an emerging market. Organizations in the telecommunications industry can now recognize that SETA programmes and information security awareness have a significant impact on information security culture. Employees’ security behaviour also mediates the relationship between information security awareness and information security culture.Originality/valueThis is the first study to analyse the mediating effect of employees’ security behaviour on the relationship between information security awareness and information security culture in the Malaysian telecommunications context.
Author Hanifah, Haniruzila
Teoh, Ai Ping
Md Azmi, Nurul Asmui Azmi
Vafaei-Zadeh, Ali
Author_xml – sequence: 1
  givenname: Nurul Asmui Azmi
  surname: Md Azmi
  fullname: Md Azmi, Nurul Asmui Azmi
– sequence: 2
  givenname: Ai Ping
  surname: Teoh
  fullname: Teoh, Ai Ping
– sequence: 3
  givenname: Ali
  surname: Vafaei-Zadeh
  fullname: Vafaei-Zadeh, Ali
– sequence: 4
  givenname: Haniruzila
  surname: Hanifah
  fullname: Hanifah, Haniruzila
BookMark eNp1kE1LAzEQhoNUsNbePS54Xp0km3T3KMWPQkFBBW8hm86W1N1kzWYP_femVjwInmaGvM-Eec7JxHmHhFxSuKYUypvV8iUHljNgNAdgcEKmDITMi2rxPvntJT0j82HYAQCtqOSSTkn7HHBjTbRum1nX-NDpaL3LBjRjsHGfmbGNY8BMdz5FsOtbv0ccMt9kEVs0vutGZ82RSlOvnU3P1mXapTiG7WF1p8MHxgty2uh2wPlPnZG3-7vX5WO-fnpYLW_XueGUxrzAMjWG1XXFF3WzgYLxxlCEciO5llxIyZALAZxXWtaNqJluuCioKLneLJDPyNVxbx_854hDVDs_Bpe-VExUIpngCZ4ReUyZ4IchYKOMjd93xKBtqyiog1yV5Cpg6iBXHeQmEP6AfbDpwv3_yBcz4H-v
CitedBy_id crossref_primary_10_1016_j_trf_2024_11_007
crossref_primary_10_1108_APJML_05_2024_0570
crossref_primary_10_1016_j_cose_2024_104208
crossref_primary_10_1108_JSTPM_02_2024_0067
crossref_primary_10_1108_SRJ_02_2024_0109
crossref_primary_10_1108_APJML_07_2024_1008
crossref_primary_10_1108_K_01_2023_0133
crossref_primary_10_1016_j_sftr_2024_100386
crossref_primary_10_1080_19393555_2025_2457702
crossref_primary_10_1108_AJIM_10_2022_0475
crossref_primary_10_1080_10447318_2025_2464900
crossref_primary_10_1109_ACCESS_2024_3402341
Cites_doi 10.1108/ICS-04-2018-0042
10.3758/BRM.40.3.879
10.1007/s11747-014-0403-8
10.1016/S1361-3723(09)70019-3
10.1037/0003-066X.45.2.109
10.1016/S1361-3723(16)30017-3
10.1108/ICS-05-2014-0033
10.1108/09685220610648355
10.1108/IMCS-08-2013-0057
10.1109/WCCAIS.2014.6916579
10.1177/1043659609360849
10.1108/09576050210447037
10.1108/ICS-12-2016-0095
10.1016/j.cose.2009.09.002
10.7763/IJIET.2015.V5.522
10.1007/978-3-319-74817-7_6
10.1016/S0167-4048(00)08019-6
10.1016/j.cose.2017.01.004
10.1016/j.chb.2015.03.054
10.1016/j.jbusres.2019.11.069
10.1016/j.cose.2009.10.005
10.1016/j.cose.2012.10.003
10.1016/j.dss.2018.02.009
10.1177/0193841X09340214
10.1080/08874417.2015.11645767
10.1002/widm.1211.
10.1086/651257
10.3758/BRM.41.4.1149
10.1057/ejis.2009.6
10.1007/s00180-012-0317-1
ContentType Journal Article
Copyright Emerald Publishing Limited 2021
Copyright_xml – notice: Emerald Publishing Limited 2021
DBID AAYXX
CITATION
0-V
0U~
1-H
7SC
7WY
7WZ
7XB
8AO
8FD
8FE
8FG
8FI
ABUWG
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
CCPQU
CNYFK
DWQXO
E3H
F2A
FYUFA
F~G
GNUQQ
HCIFZ
JQ2
K6~
K7-
L.-
L.0
L7M
L~C
L~D
M0C
M0N
M0O
M0T
M1O
P5Z
P62
PHGZM
PHGZT
PJZUB
PKEHL
PPXIY
PQBIZ
PQEST
PQGLB
PQQKQ
PQUKI
PRQQA
PYYUZ
Q9U
DOI 10.1108/ICS-02-2021-0020
DatabaseName CrossRef
ProQuest Social Sciences Premium Collection【Remote access available】
Global News & ABI/Inform Professional
Trade PRO
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Hospital Premium Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Social Science Premium Collection
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
ProQuest Business Premium Collection
Technology Collection
ProQuest Criminology Collection
ProQuest One Community College
Library & Information Science Collection
ProQuest Central Korea
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
Health Research Premium Collection
ABI/INFORM Global (Corporate)
ProQuest Central Student
ProQuest SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
ABI/INFORM Professional Standard
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
ProQuest Criminal Justice Database (NC LIVE)
ProQuest Healthcare Administration Database (NC LIVE)
Library Science Database
ProQuest Advanced Technologies & Aerospace Database (NC LIVE)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Business (OCUL)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest One Social Sciences
ABI/INFORM Collection China
ProQuest Central Basic
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Library and Information Science Abstracts (LISA)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
Trade PRO
ABI/INFORM Complete
Global News & ABI/Inform Professional
ProQuest One Applied & Life Sciences
Health Research Premium Collection
Health & Medical Research Collection
Library & Information Science Collection
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
ProQuest Technology Collection
ProQuest Business Collection
Criminology Collection
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Library Science
ProQuest Criminal Justice
ABI/INFORM Professional Standard
ProQuest Central Korea
Advanced Technologies Database with Aerospace
ProQuest Computing
ProQuest One Social Sciences
ProQuest Central Basic
ProQuest Health Management
ABI/INFORM China
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
DatabaseTitleList Computer Science Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Library & Information Science
Business
EISSN 2056-497X
EndPage 882
ExternalDocumentID 10_1108_ICS_02_2021_0020
GeographicLocations Malaysia
GeographicLocations_xml – name: Malaysia
GroupedDBID .WU
0-V
3FY
5VS
7WY
8AO
8FE
8FG
8FI
8FW
9F-
AAGBP
AAKOT
AAMCF
AAUDR
AAXBI
AAYXX
ABIJV
ABJNI
ABSDC
ABUWG
ABXQL
ABYQI
ACGFS
ACTSA
ACZKX
ADBBV
ADOMW
ADQHX
ADWNT
AFKRA
AFNTC
AFZLO
AGTVX
AHMHQ
AILOG
AJEBP
ALIPV
ALMA_UNASSIGNED_HOLDINGS
ALSLI
AODMV
AQUVI
ARALO
ARAPS
AUCOK
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
BPHCQ
BVXVI
CCPQU
CITATION
CNYFK
DWQXO
EBS
ECCUG
FNNZZ
FYUFA
GEA
GEI
GMX
GNUQQ
GQ.
H13
HCIFZ
K6V
K6~
K7-
KBGRL
M0C
M0O
M0T
M1O
M42
P62
PHGZM
PHGZT
PJZUB
PPXIY
PQBIZ
PQGLB
PQQKQ
PROAC
PRQQA
SCAQC
SDURG
SLOBJ
TEM
TGG
TMF
TMI
TMT
UKHRP
Z11
Z12
Z21
ZYZAG
.DC
0U~
1-H
29I
4.4
5GY
70U
77K
7SC
7XB
8FD
8R4
8R5
9E0
AAPSD
ABEAN
ACGFO
AEBZA
AEDOK
AEMMR
AETHF
AFNZV
AIAFM
AJFKA
APPLU
ATGMP
CS3
DU5
E3H
F2A
GEB
GEC
GMM
GMN
J1Y
JI-
JL0
JQ2
L.-
L.0
L7M
L~C
L~D
M0N
P2P
PKEHL
PQEST
PQUKI
Q2X
Q3A
Q9U
RWL
TAE
TDQ
TET
TMD
TMK
TMX
Z22
ID FETCH-LOGICAL-c311t-4e8c31c2bb937bfd0423fc1e08d63a635662e3550339a6bf5b2af3541583ad7e3
IEDL.DBID GEI
ISSN 2056-4961
IngestDate Mon Jun 30 14:38:08 EDT 2025
Thu Apr 24 23:12:56 EDT 2025
Thu Jul 31 00:36:09 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
License https://www.emerald.com/insight/site-policies
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c311t-4e8c31c2bb937bfd0423fc1e08d63a635662e3550339a6bf5b2af3541583ad7e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2595496350
PQPubID 31135
PageCount 17
ParticipantIDs proquest_journals_2595496350
crossref_citationtrail_10_1108_ICS_02_2021_0020
crossref_primary_10_1108_ICS_02_2021_0020
PublicationCentury 2000
PublicationDate 2021-11-12
PublicationDateYYYYMMDD 2021-11-12
PublicationDate_xml – month: 11
  year: 2021
  text: 2021-11-12
  day: 12
PublicationDecade 2020
PublicationPlace Bingley
PublicationPlace_xml – name: Bingley
PublicationTitle Information and computer security
PublicationYear 2021
Publisher Emerald Group Publishing Limited
Publisher_xml – name: Emerald Group Publishing Limited
References (key2021111012415961200_ref058) 2014
(key2021111012415961200_ref008) 2018; 26
(key2021111012415961200_ref015) 2018
(key2021111012415961200_ref029) 2013; 28
(key2021111012415961200_ref017) 2020; 92
(key2021111012415961200_ref033) 2017; 47
(key2021111012415961200_ref004) 2015; 49
(key2021111012415961200_ref012) 2015; 55
(key2021111012415961200_ref014) 1998
(key2021111012415961200_ref047) 1990; 45
(key2021111012415961200_ref053) 2010; 29
(key2021111012415961200_ref001) 2015
(key2021111012415961200_ref024) 2009; 33
key2021111012415961200_ref055
(key2021111012415961200_ref031) 2009; 18
(key2021111012415961200_ref019) 2000; 19
(key2021111012415961200_ref011) 2015
key2021111012415961200_ref057
(key2021111012415961200_ref005) 2016; 15
(key2021111012415961200_ref042) 2017; 66
(key2021111012415961200_ref013) 2017; 7
(key2021111012415961200_ref030) 2015; 43
(key2021111012415961200_ref046) 2016; 2016
(key2021111012415961200_ref049) 2015
(key2021111012415961200_ref054) 2018; 108
(key2021111012415961200_ref034) 2006; 14
(key2021111012415961200_ref025) 2013; 32
key2021111012415961200_ref051
key2021111012415961200_ref052
key2021111012415961200_ref050
key2021111012415961200_ref044
key2021111012415961200_ref003
(key2021111012415961200_ref010) 2012; 2
(key2021111012415961200_ref043) 2008; 40
key2021111012415961200_ref009
(key2021111012415961200_ref022) 2002; 15
(key2021111012415961200_ref002) 2010
key2021111012415961200_ref006
(key2021111012415961200_ref035) 2011; 1
(key2021111012415961200_ref020) 2009; 41
(key2021111012415961200_ref023) 2018
(key2021111012415961200_ref027) 2020; 109
(key2021111012415961200_ref007) 2015; 22
key2021111012415961200_ref040
key2021111012415961200_ref037
(key2021111012415961200_ref038) 2018; 9
(key2021111012415961200_ref045) 2008
key2021111012415961200_ref039
(key2021111012415961200_ref026) 2017
(key2021111012415961200_ref036) 2017
(key2021111012415961200_ref018) 2014; 22
(key2021111012415961200_ref016) 2010; 29
(key2021111012415961200_ref059) 2015; 23
(key2021111012415961200_ref041) 2019; 27
(key2021111012415961200_ref021) 2009; 2009
(key2021111012415961200_ref048) 2003; 2003
(key2021111012415961200_ref032) 2015; 5
key2021111012415961200_ref028
(key2021111012415961200_ref056) 2010; 37
References_xml – volume: 26
  start-page: 327
  issue: 3
  year: 2018
  ident: key2021111012415961200_ref008
  article-title: In their own words: employee attitudes towards information security
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-04-2018-0042
– volume-title: ICT Systems Security and Privacy Protection, SEC 2014, IFIP Advances in Information and Communication Technology
  year: 2014
  ident: key2021111012415961200_ref058
  article-title: Managing employee security behaviour in organisations: the role of cultural factors and individual values
– ident: key2021111012415961200_ref057
– volume: 40
  start-page: 879
  issue: 3
  year: 2008
  ident: key2021111012415961200_ref043
  article-title: Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models
  publication-title: Behavior Research Methods
  doi: 10.3758/BRM.40.3.879
– volume: 43
  start-page: 115
  issue: 1
  year: 2015
  ident: key2021111012415961200_ref030
  article-title: A new criterion for assessing discriminant validity in variance-based structural equation modelling
  publication-title: Journal of the Academy of Marketing Science
  doi: 10.1007/s11747-014-0403-8
– volume-title: 5-10 June
  year: 2017
  ident: key2021111012415961200_ref026
  article-title: ‘Antecedents of employees' information security awareness-review’, synthesis, and directions for future research
– start-page: 269
  volume-title: Advances in Human Factors in Cybersecurity
  year: 2018
  ident: key2021111012415961200_ref023
  article-title: Human factors in information security culture: a literature review
– ident: key2021111012415961200_ref009
– year: 2008
  ident: key2021111012415961200_ref045
  article-title: Information security cultures of four professions: a comparative study
– ident: key2021111012415961200_ref028
– volume: 15
  start-page: 1
  issue: 01
  year: 2016
  ident: key2021111012415961200_ref005
  article-title: A study of cyber security awareness in educational environment in the Middle East
  publication-title: Journal of Information and Knowledge Management
– volume: 2009
  start-page: 5
  issue: 2
  year: 2009
  ident: key2021111012415961200_ref021
  article-title: From culture to disobedience: recognising the varying user acceptance of IT security
  publication-title: Computer Fraud and Security
  doi: 10.1016/S1361-3723(09)70019-3
– volume: 45
  start-page: 109
  issue: 2
  year: 1990
  ident: key2021111012415961200_ref047
  article-title: Organisational culture
  publication-title: American Psychologist
  doi: 10.1037/0003-066X.45.2.109
– volume: 2016
  start-page: 15
  issue: 2
  year: 2016
  ident: key2021111012415961200_ref046
  article-title: Human aspects of information security in organisations
  publication-title: Computer Fraud and Security
  doi: 10.1016/S1361-3723(16)30017-3
– ident: key2021111012415961200_ref052
– volume: 23
  start-page: 246
  issue: 3
  year: 2015
  ident: key2021111012415961200_ref059
  article-title: Information security culture – state-of-the art review between 2000 and 2013
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-05-2014-0033
– volume: 14
  start-page: 24
  issue: 1
  year: 2006
  ident: key2021111012415961200_ref034
  article-title: Information security: management's effect on culture and policy
  publication-title: Information Management and Computer Security
  doi: 10.1108/09685220610648355
– volume: 2003
  start-page: 46
  issue: 31
  year: 2003
  ident: key2021111012415961200_ref048
  article-title: Information security culture – from analysis to change
  publication-title: South African Computer Journal
– volume: 92
  start-page: 1
  issue: 101713
  year: 2020
  ident: key2021111012415961200_ref017
  article-title: Defining organisational information security culture – perspectives from academia and industry
  publication-title: Computers and Security
– volume: 22
  start-page: 474
  issue: 5
  year: 2014
  ident: key2021111012415961200_ref018
  article-title: Security culture and the employment relationship as drivers of employees’ security compliance
  publication-title: Information Management and Computer Security
  doi: 10.1108/IMCS-08-2013-0057
– ident: key2021111012415961200_ref003
  doi: 10.1109/WCCAIS.2014.6916579
– volume: 22
  start-page: 22
  issue: 1
  year: 2015
  ident: key2021111012415961200_ref007
  article-title: Organizational culture, quality of work life, and organizational effectiveness in Korean university hospitals
  publication-title: Journal of Transcultural Nursing
  doi: 10.1177/1043659609360849
– start-page: 3939
  volume-title: 48th HI International Conference on System Sciences
  year: 2015
  ident: key2021111012415961200_ref011
  article-title: Assessing the role of security education, training, and awareness on insiders’ security-related behavior: an expectancy theory approach
– start-page: 124
  year: 2015
  ident: key2021111012415961200_ref001
  article-title: Security challenges to telecommunications networks: an overview of threats and preventive strategies
– start-page: 90
  volume-title: the 10th International Conference for Internet Technology and Secured Transactions (ICITST)
  year: 2015
  ident: key2021111012415961200_ref049
  article-title: Awareness, behaviour and culture: the ABC in cultivating security compliance
– volume: 9
  start-page: 96
  issue: 8
  year: 2018
  ident: key2021111012415961200_ref038
  article-title: Assessing the information security culture in a government context: the case of a developing country
  publication-title: International Journal of Civil Engineering and Technology
– ident: key2021111012415961200_ref055
– volume: 15
  start-page: 352
  issue: 5/6
  year: 2002
  ident: key2021111012415961200_ref022
  article-title: A prototype tool for information security awareness and training
  publication-title: Logistics Information Management
  doi: 10.1108/09576050210447037
– volume: 27
  start-page: 146
  issue: 2
  year: 2019
  ident: key2021111012415961200_ref041
  article-title: Key elements of an information security culture in organisations
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-12-2016-0095
– volume: 29
  start-page: 196
  issue: 2
  year: 2010
  ident: key2021111012415961200_ref016
  article-title: A framework and assessment instrument for information security culture
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2009.09.002
– ident: key2021111012415961200_ref039
– ident: key2021111012415961200_ref051
– volume: 47
  start-page: 17
  issue: 1
  year: 2017
  ident: key2021111012415961200_ref033
  article-title: Indirect effect of management support on users’ compliance behaviour towards information security policies
  publication-title: Health Information Management Journal
– volume: 5
  start-page: 311
  issue: 4
  year: 2015
  ident: key2021111012415961200_ref032
  article-title: Leadership styles and information security compliance behavior: the mediator effect of information security awareness
  publication-title: International Journal of Information and Education Technology
  doi: 10.7763/IJIET.2015.V5.522
– volume-title: Advances in Information Systems Development. Lecture Notes in Information Systems and Organisation
  year: 2018
  ident: key2021111012415961200_ref015
  article-title: Employee security behaviour: the importance of education and policies in organisational
  doi: 10.1007/978-3-319-74817-7_6
– volume: 2
  start-page: 9331
  issue: 9
  year: 2012
  ident: key2021111012415961200_ref010
  article-title: A new evaluation criteria for effective security awareness in computer risk management based on AHP
  publication-title: Journal of Basic and Applied Scientific Research
– volume: 19
  start-page: 698
  issue: 8
  year: 2000
  ident: key2021111012415961200_ref019
  article-title: Information security management: an approach to combine process certification and product evaluation
  publication-title: Computers and Security
  doi: 10.1016/S0167-4048(00)08019-6
– volume: 66
  start-page: 40
  year: 2017
  ident: key2021111012415961200_ref042
  article-title: The human aspects of information security questionnaire (HAIS-Q): two further validation studies
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2017.01.004
– volume: 49
  start-page: 567
  year: 2015
  ident: key2021111012415961200_ref004
  article-title: Design and validation of information security culture framework
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2015.03.054
– volume: 1
  start-page: 192
  issue: 3
  year: 2011
  ident: key2021111012415961200_ref035
  article-title: Information security: corporate culture and organisational commitment
  publication-title: International Journal of Humanities and Social Science
– ident: key2021111012415961200_ref050
– volume: 109
  start-page: 101
  year: 2020
  ident: key2021111012415961200_ref027
  article-title: Assessing measurement model quality in PLS-SEM using confirmatory composite analysis
  publication-title: Journal of Business Research
  doi: 10.1016/j.jbusres.2019.11.069
– volume: 29
  start-page: 476
  issue: 4
  year: 2010
  ident: key2021111012415961200_ref053
  article-title: Information security culture: a management perspective
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2009.10.005
– volume: 32
  start-page: 242
  year: 2013
  ident: key2021111012415961200_ref025
  article-title: Security-related behavior in using information systems in the workplace: a review and synthesis
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2012.10.003
– volume-title: 5th International Conference on Research and Innovation in Information Systems: Social Transformation through Data Science, ICRIIS 2017 [8002442] (International Conference on Research and Innovation in Information Systems, ICRIIS)
  year: 2017
  ident: key2021111012415961200_ref036
  article-title: A systematic literature review: information security culture
– volume: 108
  start-page: 107
  year: 2018
  ident: key2021111012415961200_ref054
  article-title: Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2018.02.009
– start-page: 1
  volume-title: Australasian Information Security Conference (AISC)
  year: 2010
  ident: key2021111012415961200_ref002
  article-title: Information security culture: a behaviour compliance conceptual framework
– volume: 33
  start-page: 464
  issue: 5
  year: 2009
  ident: key2021111012415961200_ref024
  article-title: A comparison of web-based and paper-based survey methods: testing assumptions of survey mode and response cost
  publication-title: Evaluation Review
  doi: 10.1177/0193841X09340214
– volume: 55
  start-page: 11
  issue: 3
  year: 2015
  ident: key2021111012415961200_ref012
  article-title: Impacts of comprehensive information security programmes on information security culture
  publication-title: Journal of Computer Information Systems
  doi: 10.1080/08874417.2015.11645767
– ident: key2021111012415961200_ref037
– volume: 7
  start-page: e1211
  issue: 5
  year: 2017
  ident: key2021111012415961200_ref013
  article-title: Enterprise data breach: causes, challenges, prevention, and future directions
  publication-title: Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery
  doi: 10.1002/widm.1211.
– start-page: 295
  volume-title: Modern Methods for Business Research
  year: 1998
  ident: key2021111012415961200_ref014
  article-title: The partial least squares approach to structural modelling
– volume: 37
  start-page: 197
  issue: 2
  year: 2010
  ident: key2021111012415961200_ref056
  article-title: Reconsidering Baron and Kenny: myths and truths about mediation analysis
  publication-title: Journal of Consumer Research
  doi: 10.1086/651257
– volume: 41
  start-page: 1149
  issue: 4
  year: 2009
  ident: key2021111012415961200_ref020
  article-title: Statistical power analyses using G*power 3.1: tests for correlation and regression analyses
  publication-title: Behavior Research Methods
  doi: 10.3758/BRM.41.4.1149
– volume: 18
  start-page: 106
  issue: 2
  year: 2009
  ident: key2021111012415961200_ref031
  article-title: Protection motivation and deterrence: a framework for security policy compliance in organisations
  publication-title: European Journal of Information Systems
  doi: 10.1057/ejis.2009.6
– ident: key2021111012415961200_ref006
– volume: 28
  start-page: 565
  issue: 2
  year: 2013
  ident: key2021111012415961200_ref029
  article-title: Goodness-of-fit indices for partial least squares path modelling
  publication-title: Computational Statistics
  doi: 10.1007/s00180-012-0317-1
– ident: key2021111012415961200_ref040
– ident: key2021111012415961200_ref044
SSID ssj0001916361
ssj0004345
Score 2.3605645
Snippet PurposeThe purpose of this study is to examine factors, which influence information security culture among employees of telecommunications companies. The...
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 866
SubjectTerms Access to information
Corporate culture
Data integrity
Empirical analysis
Employees
Hypotheses
Literature reviews
Motivation
Multimedia
Organizations
Research methodology
Security
Security management
Subscriptions
Telecommunications
Telecommunications industry
SummonAdditionalLinks – databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1BS8MwFA46QbyITsXpJjmI4CGsbdouPYkM5_Qggg52K0magDC7udb_73tZ6rbLboUmOeQled9Lvvc-Qm4HNss01ynDYuwsLoxiIhYJi6UUNpZxklnH8n1Lx5P4dZpM_YVb5WmVzZnoDupirvGOvA8wHUIZcI_Bw-KHoWoUvq56CY19chCCp8F1LkbP67xI7kSKI3DyDPqGzTNlIPovww-XmIwMBYRM225p-1R2rmZ0Qo49RqSPK6Oekj1TtslhQ1Fvk55PNqB31GcT4exSv03PyOx9ic8vSGimXxsNKq9VR1flNgx1SkPUeNHfis4trVEXZzNphDqWegkBNYxFZUkxoxiVjei3S5g-J5PR0-dwzLyqAtM8DGsWGwEfOlIKkImyBRJjrA5NIIqUSyxXl0YGUEjAeSZTZRMVScsTcPSCy2Jg-AVplfPSXBKqJARE0IYnRRjbCJCDtiIbKK1CDTiYd0i_mdRc-5LjqHwxy13oEYgczJAHUY5myNEMHXL_32OxKrexo223sVPuN16Vr5fJ1e7f1-TIGR8ZfVGXtOrlr-kBvqjVjVtEf-Jdzpc
  priority: 102
  providerName: ProQuest
Title Predicting information security culture among employees of telecommunication companies in an emerging market
URI https://www.proquest.com/docview/2595496350
Volume 29
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PT9swFH4CduECGzCt_Kh84MIhbRI7qXNkqAUmratgSIxLZDu2QJQUtellf_3ec5IKpmkSEpcoihIr_hH7e873vg_geOCyzHCTBiTGHojC6kAKmQRCKemEEknmPMt3nF7ciG-3ye0ajNtcGE-rrLdj_Dz9UC4oSO0TcRtn4ZXgALnXXJ5d--RiYhkQ7OnTjnX_vnqaruNIT9I29bfdcUEkxL2AaoyrfiCyNGr_W_6jsNfr1Otp2q89o22YtW9dU04ee8tK98zvvwQd369aH2GrganstB5Xn2DNljuw3VpAsGZG2IXpZE5_eog7zRoNVupptmhs8Vit7GGZNzVitvEXXrCZYxVZ8LzMT2GeEF9i7I5lMVUyqguZKLEnn5u9Bzej4c-zi6AxcAgMj6IqEFbiiYm1RhCkXUEcHGciG8oi5YqU8dLYIuAJOc9Uql2iY-V4gphCclUMLP8MG-WstF-AaYWxF97DkyISLkaQYpzMBtroyCDk5h3ot92Vm0bdnEw2prmPckKZY7PmYZxTs-bUrB04WT3xXCt7_Ofew3YE5M03vsgxcMTgGmsR7r-hqAPY9D1LTML4EDaq-dIeIa6pdBfW5ei8Cx--DseTq64fvHj8Hv3Aa3e_7k7P_wBONvhk
linkProvider Emerald
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9QwEB2VrQRcEBQQhbb4AEgcrE1sJ-scKgSl1S4tqwpaqTdjO7aEVLKluwjxp_iNnfE6_bj01lukOFbkmXhm4vfmAbwZxabx0tecmrFz1QbHtdIVV9bqqKyqmphQvtN6fKy-nFQnK_C_58IQrLLfE9NG3c48_SMfYpqOpQyGx-LD2W9OqlF0utpLaCzdYj_8-4sl23x78hnt-1aIvd2jnTHPqgLcy7JccBU0XnjhHEZmF1sChkRfhkK3tbTUrq0WAaNwIWVjaxcrJ2yUFQY6LW07ChLnvQerihitA1j9tDs9_HbFxJRJFllgWsHxbcv-YLTQw8nO90SFJkwEJWk3A-HNOJCC295jeJSzUvZx6UZPYCV0a3C_B8WvwWamN7B3LPOXyJ4sbwxP4fTwnA58CELNfl4bMM_qeGzZ4COwpG3EQpYZnrNZZAtS4rlOU2EJF99hCY9zMdsx4jCTlhL7lSjaz-D4Tlb8OQy6WRdeAHMWSzAcI6u2VFFgruKjbkbOu9Jj5i3XYdgvqvG5yTlpbZyaVOwU2qAZTCEMmcGQGdbh_eUTZ8sGH7eM3ejtZPKnPjdXjvny9tuv4cH46OuBOZhM91_Bw-QIhCcUGzBYnP8Jm5jdLNxWdikGP-7aiy8AjbYMNw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Predicting+information+security+culture+among+employees+of+telecommunication+companies+in+an+emerging+market&rft.jtitle=Information+and+computer+security&rft.au=Md+Azmi%2C+Nurul+Asmui+Azmi&rft.au=Teoh%2C+Ai+Ping&rft.au=Vafaei-Zadeh%2C+Ali&rft.au=Hanifah%2C+Haniruzila&rft.date=2021-11-12&rft.issn=2056-4961&rft.volume=29&rft.issue=5&rft.spage=866&rft.epage=882&rft_id=info:doi/10.1108%2FICS-02-2021-0020&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_02_2021_0020
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon