Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria
Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availab...
Saved in:
Main Author | |
---|---|
Format | Dissertation |
Language | English |
Published |
ProQuest LLC
2016
ProQuest Dissertations & Theses |
Subjects | |
Online Access | Get full text |
ISBN | 9781339509044 1339509040 |
Cover
Abstract | Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent information, achieving adequate organizational goals, utilizing resources efficiently, and implementing effective internal control measures that provide reasonable assurance that control objectives developed by management are effective enough to thwart, detect, prevent or correct any undesired events in a timely manner. Traditionally, technology has been the focus on securing information systems; more research is needed to investigate the non-technical aspect of information security. Information security policy is a major prerequisite for effective information security program. For a security program to be effective, management must create awareness of the policy, enforce the policy and frequently maintain the policy. Without security awareness and training, information security and privacy techniques instituted by management would become ineffective. Policy awareness is a vital ingredient necessary to establish information security culture. The subject of this study is the mitigation of information security challenges using non-technical approach, focusing on awareness, enforcement, and maintenance of established information security policies. This study focused specifically on the critical elements of information security policy management and their relationships with organizations information security effectiveness. This quantitative non-experimental survey research investigated the effectiveness of information security programs in Nigerian organizations. This study utilized a structured survey instrument to gather data from a population of Nigeria's information security professionals. There were 72 respondents with complete response out of the 275 survey that were distributed in this study. Survey data were analyzed using correlation and regression analyses. The result indicates that (A) there is a high and positive relationship between security policy awareness and security program effectiveness in Nigeria; (B) there is a moderate and positive relationship between security policy enforcement and security program effectiveness in Nigeria; and (C) there is a high and positive relationship between security policy maintenance and security program effectiveness in Nigeria. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page: http://www.proquest.com/en-US/products/dissertations/individuals.shtml.] |
---|---|
AbstractList | Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent information, achieving adequate organizational goals, utilizing resources efficiently, and implementing effective internal control measures that provide reasonable assurance that control objectives developed by management are effective enough to thwart, detect, prevent or correct any undesired events in a timely manner. Traditionally, technology has been the focus on securing information systems; more research is needed to investigate the non-technical aspect of information security. Information security policy is a major prerequisite for effective information security program. For a security program to be effective, management must create awareness of the policy, enforce the policy and frequently maintain the policy. Without security awareness and training, information security and privacy techniques instituted by management would become ineffective. Policy awareness is a vital ingredient necessary to establish information security culture. The subject of this study is the mitigation of information security challenges using non-technical approach, focusing on awareness, enforcement, and maintenance of established information security policies. This study focused specifically on the critical elements of information security policy management and their relationships with organizations information security effectiveness. This quantitative non-experimental survey research investigated the effectiveness of information security programs in Nigerian organizations. This study utilized a structured survey instrument to gather data from a population of Nigeria's information security professionals. There were 72 respondents with complete response out of the 275 survey that were distributed in this study. Survey data were analyzed using correlation and regression analyses. The result indicates that (A) there is a high and positive relationship between security policy awareness and security program effectiveness in Nigeria; (B) there is a moderate and positive relationship between security policy enforcement and security program effectiveness in Nigeria; and (C) there is a high and positive relationship between security policy maintenance and security program effectiveness in Nigeria. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page: http://www.proquest.com/en-US/products/dissertations/individuals.shtml.] Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users’ disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent information, achieving adequate organizational goals, utilizing resources efficiently, and implementing effective internal control measures that provide reasonable assurance that control objectives developed by management are effective enough to thwart, detect, prevent or correct any undesired events in a timely manner. Traditionally, technology has been the focus on securing information systems; more research is needed to investigate the non-technical aspect of information security. Information security policy is a major prerequisite for effective information security program. For a security program to be effective, management must create awareness of the policy, enforce the policy and frequently maintain the policy. Without security awareness and training, information security and privacy techniques instituted by management would become ineffective. Policy awareness is a vital ingredient necessary to establish information security culture. The subject of this study is the mitigation of information security challenges using non-technical approach, focusing on awareness, enforcement, and maintenance of established information security policies. This study focused specifically on the critical elements of information security policy management and their relationships with organizations information security effectiveness. This quantitative non-experimental survey research investigated the effectiveness of information security programs in Nigerian organizations. This study utilized a structured survey instrument to gather data from a population of Nigeria's information security professionals. There were 72 respondents with complete response out of the 275 survey that were distributed in this study. Survey data were analyzed using correlation and regression analyses. The result indicates that (A) there is a high and positive relationship between security policy awareness and security program effectiveness in Nigeria. (B) there is a moderate and positive relationship between security policy enforcement and security program effectiveness in Nigeria. (C) there is a high and positive relationship between security policy maintenance and security program effectiveness in Nigeria. |
Author | Okolo, Nkiru Benjamin |
Author_xml | – sequence: 1 fullname: Okolo, Nkiru Benjamin |
BackLink | http://eric.ed.gov/ERICWebPortal/detail?accno=ED567648$$DView record in ERIC |
BookMark | eNo9jk1LAzEURQdUUGv_gYuA60Iy-Zq4K-1UC6UKdj9kkpcSmSY1mSn03ztacfUu3MO57764DjHAVTFVsiKUKo4VZuy2mObsW4yxohSz8q7o65PuBt37sEcrbfqYMooOfYAZku_P6D123pxRDGgdXEyHkRzzf107B6b3JwiQM_IBLeEEXTz-6La_bH5Gc7TQGX60W7-H5PVDceN0l2H6dyfFblXvFq-zzdvLejHfzIApPhNaMC6tsFiABgLGYksoKZUsBVctE9i2lRTSGYWtaUtMQGLqiKJgqXKYToqni_aY4tcAuW8-45DCuNgQKSrMmeB8pB4v1PiZaY7JH3Q6N_WSCylYRb8Bc0FjHg |
ContentType | Dissertation |
Copyright | Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works. |
Copyright_xml | – notice: Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works. |
DBID | 7SW BJH BNH BNI BNJ BNO ERI PET REK WWN 04Z 053 054 0BH 0IZ 3V. 7WY 7WZ 7XB 87Z 8FK 8FL AAFGM ABLUL ABPUF ABSSA ABUWG ACIOU ADZZV AFKRA AGAJT AGSBL AJNOY AMEAF AQTIP BENPR BEZIV BOUDT CBHQV CCPQU DWQXO EU9 FRNLG F~G G20 K60 K6~ M0C P6D PHGZM PHGZT PKEHL PQBIZ PQBZA PQCXX PQEST PQQKQ PQUKI PRINS Q9U |
DatabaseName | ERIC ERIC (Ovid) ERIC ERIC ERIC (Legacy Platform) ERIC( SilverPlatter ) ERIC ERIC PlusText (Legacy Platform) Education Resources Information Center (ERIC) ERIC Dissertations & Theses Europe Full Text: Business Dissertations & Theses Europe Full Text: Science & Technology Dissertations & Theses Europe Full Text: Social Sciences ProQuest Dissertations and Theses Professional Dissertations & Theses @ Northcentral University ProQuest Central (Corporate) ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) ProQuest Central Korea - hybrid linking Business Premium Collection - hybrid linking ABI/INFORM Collection (Alumni) - hybrid linking ABI/INFORM Collection - hybrid linking ProQuest Central (Alumni) ABI/INFORM Global - hybrid linking ProQuest Central (Alumni) - hybrid linking ProQuest Central UK/Ireland ProQuest Central Essentials - hybrid linking ABI/INFORM Global (Alumni) - hybrid linking Business Premium Collection (Alumni) - hybrid linking ProQuest Dissertations & Theses Global: The Humanities and Social Sciences Collection ProQuest Women's & Gender Studies - hybrid linking ProQuest Central Business Premium Collection ProQuest One Business - hybrid linking ProQuest One Business (Alumni) - hybrid linking ProQuest One Community College ProQuest Central ProQuest Dissertations & Theses A&I Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Dissertations & Theses Global ProQuest Business Collection (Alumni Edition) ProQuest Business Collection ABI/INFORM Global ProQuest Dissertations and Theses A&I: The Humanities and Social Sciences Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business (OCUL) ProQuest One Business (Alumni) ProQuest Central - hybrid linking ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
DatabaseTitle | ERIC ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Central China ABI/INFORM Complete ProQuest Central ProQuest Central Korea Dissertations & Theses Europe Full Text: Business ProQuest Central (New) ABI/INFORM Complete (Alumni Edition) Business Premium Collection ABI/INFORM Global ProQuest Dissertations & Theses Global: The Humanities and Social Sciences Collection ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest One Academic Eastern Edition ProQuest Business Collection ProQuest Dissertations and Theses Professional ProQuest Dissertations & Theses Global Dissertations & Theses Europe Full Text: Science & Technology Dissertations & Theses Europe Full Text: Social Sciences ProQuest One Academic UKI Edition ProQuest Dissertations and Theses A&I: The Humanities and Social Sciences Collection ProQuest One Business (Alumni) Dissertations & Theses @ Northcentral University ProQuest One Academic ProQuest Dissertations & Theses A&I ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
DatabaseTitleList | ERIC ABI/INFORM Global (Corporate) |
Database_xml | – sequence: 1 dbid: ERI name: ERIC url: https://eric.ed.gov/ sourceTypes: Index Database – sequence: 2 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
ERIC | ED567648 |
ExternalDocumentID | 3963669331 ED567648 |
Genre | Dissertation/Thesis |
GeographicLocations | Nigeria |
GeographicLocations_xml | – name: Nigeria |
GroupedDBID | 7SW BJH BNH BNI BNJ BNO ERI PET REK WWN 04Z 053 054 0BH 0IZ 3V. 7WY 7XB 8FK 8FL 8R4 8R5 ABUWG AFKRA AMEAF AZQEC BENPR BEZIV CCPQU DWQXO EU9 FRNLG G20 K60 K6~ M0C P6D PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQQKQ PQUKI PRINS Q2X Q9U |
ID | FETCH-LOGICAL-e495-6a6457d6d06eae1ecd0d1312972659b460db8767fc90dcb201e703f193ed39f03 |
IEDL.DBID | BENPR |
ISBN | 9781339509044 1339509040 |
IngestDate | Mon Jun 30 06:34:05 EDT 2025 Tue Sep 02 19:21:52 EDT 2025 |
IsOpenAccess | false |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-e495-6a6457d6d06eae1ecd0d1312972659b460db8767fc90dcb201e703f193ed39f03 |
Notes | SourceType-Dissertations & Theses-1 ObjectType-Dissertation/Thesis-1 content type line 12 |
PQID | 1768054655 |
PQPubID | 18750 |
PageCount | 148 |
ParticipantIDs | proquest_journals_1768054655 eric_primary_ED567648 |
PublicationCentury | 2000 |
PublicationDate | 2016-00-00 20160101 |
PublicationDateYYYYMMDD | 2016-01-01 |
PublicationDate_xml | – year: 2016 text: 2016-00-00 |
PublicationDecade | 2010 |
PublicationYear | 2016 |
Publisher | ProQuest LLC ProQuest Dissertations & Theses |
Publisher_xml | – name: ProQuest LLC – name: ProQuest Dissertations & Theses |
SSID | ssib000933042 |
Score | 1.7126741 |
Snippet | Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of... |
SourceID | proquest eric |
SourceType | Aggregation Database Index Database |
SubjectTerms | Business administration Confidentiality Correlation Developing Nations Foreign Countries Information science Information Security Information Systems Knowledge Level Maintenance Nigeria Organizational behavior Organizations (Groups) Policy Analysis Privacy Professional Personnel Program Effectiveness Regression (Statistics) |
Title | Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria |
URI | http://eric.ed.gov/ERICWebPortal/detail?accno=ED567648 https://www.proquest.com/docview/1768054655 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1BS8MwFA66XcSL4sTplBy8BtMteVm9iG4dQ3CITtitNE0ydmmnm__flzZ1IuKxpCklL_le3kve9xFybUXOnTaa4WoyTEAELJP5kEmrMpVBX-mqtuppBtM38biQi5Bw24RrlQ0mVkBtytznyG8i3Bdzr9wt79bvzKtG-dPVIKGxT9oIwUOc5-2HZPb88ke8jrFYjM4R52wgemqexe-bzg0YVx5mckQOxz9Oxo_Jni1OyDYJXNzFkk5qYRxaOvoaNOdoTepLy4KGqiLfd9dcMxMHOKOrgo6_K6RozYe9uaX3dISOzH92tlr66dgh80kyH01ZkElgFqMbBhkIqQwYDjazkc0NN9EA3bjqg4y1AG40Qp5yecxNrtHhW1zlDjdu1gxixwenpFWUhT0j1HONZQ4Mvu688px2Hg8MYLAKGi3aJR0_Uum6JsJIk7EEBWLYJb1m6NKwBDbpzmDn_zdfkAP8qZDX6JHW9uPTXqKn3-qrYM6rKqr9AqqFqg4 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NT8IwGH6DcNB40YjxA7UHPS5uY-uYiTHKRkBgMYoJt2VdW8JlQ8EYf5T_0besE2OMN45Lt2Zp3-_2fR6Ac-GkpmScGahN3HCoRY3ETVuGK7zES6jtsWVv1TCi3WfnfuyOK_BZ9sKoa5WlTVwaap6nqkZ-aWFcbCrmbvdm9mIo1ih1ulpSaBRi0Rcf75iyza97Ae7vhW13wlG7a2hWAUNgMmDQhDquxyk3qUiEJVJucquJXs-zqeszh5qcoYXwZOqbPGXoHwUqhcQ4R_CmL80mTrsBNUc1tFahdhdGD49_lAcw9fPRF6OKaFyp8tn5fbG6tP1Lh9bZge3gx0H8LlREtgeLUEN_ZxPSKXh4SC7Jk6a4IwWGMMkzopuY1Ler4QIIWVtPMs1I8N2QRQr47fkVuSVt9Jtq2mg6UdJfh9E61m8fqlmeiQMgCtoskZTj61IR3TGpzA-nmBtThgJ0CHW1UvGswN2Iw8ClHnVah9Aoly7WGjePV_Jx9P_wGWx2R8NBPOhF_WPYwh_UJZUGVBevb-IEg4wFO9VbSyBeszB9ASkd5II |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3PS8MwFH7MDUS8KE78MTUHPZa1XZtugoiuLZvTMnTCbqVpkrFLO91E_NP873xZUyci3nYsaUNJ3ntfXpL3fQDnwklNyTgz0Ju44VCLGombtg1XeImXUNtjy9qqh4j2np27sTuuwGdZC6OuVZYxcRmoeZ6qPfKmhetiUyl3u02pr0UM_fB69mIoBSl10lrKaRQmMhAf75i-za_6Ps71hW2HwajbM7TCgCEwMTBoQh3X45SbVCTCEik3udVCBPRs6naYQ03OMFp4Mu2YPGWIlQIdROKaR_BWR5ot7HYDah6ColOF2m0QDR__2CrANLCDuIzuojmmymfn9yXrEgeW4BbuwLb_41B-Fyoi24NFoGnAswkJC00ekkvypOXuSMEnTPKM6IIm9e2quSBF1pGUTDPifxdnkYKKe35JbkgXMVR1G00nyhPqMFrH-O1DNcszcQBE0ZwlknJ8XSrROyZVKOIU82TK0JgOoa5GKp4VHBxx4LvUo077EBrl0MXa--bxylaO_m8-g000ovi-Hw2OYQv_T--uNKC6eH0TJ7jeWLBTPbME4jXb0hdeDuiu |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&rft.genre=dissertation&rft.title=Evaluating+Factors+of+Security+Policy+on+Information+Security+Effectiveness+in+Developing+Nations%3A+A+Case+of+Nigeria&rft.DBID=04Z%3B053%3B054%3B0BH%3B0IZ%3B3V.%3B7WY%3B7WZ%3B7XB%3B87Z%3B8FK%3B8FL%3BAAFGM%3BABLUL%3BABPUF%3BABSSA%3BABUWG%3BACIOU%3BADZZV%3BAFKRA%3BAGAJT%3BAGSBL%3BAJNOY%3BAMEAF%3BAQTIP%3BBENPR%3BBEZIV%3BBOUDT%3BCBHQV%3BCCPQU%3BDWQXO%3BEU9%3BFRNLG%3BF%7EG%3BG20%3BK60%3BK6%7E%3BM0C%3BP6D%3BPHGZM%3BPHGZT%3BPKEHL%3BPQBIZ%3BPQBZA%3BPQCXX%3BPQEST%3BPQQKQ%3BPQUKI%3BPRINS%3BQ9U&rft.PQPubID=18750&rft.au=Okolo%2C+Nkiru+Benjamin&rft.date=2016-01-01&rft.pub=ProQuest+Dissertations+%26+Theses&rft.isbn=9781339509044&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=3963669331 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781339509044/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781339509044/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781339509044/sc.gif&client=summon&freeimage=true |