Dr Sadaf Hina S.Hina@salford.ac.uk
Lecturer in Computer Sci Cyber Security
Institutional governance and protection motivation: theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world
Hina, S; Dominic, PDD; Lowry, PB
Authors
PDD Dominic
PB Lowry
Abstract
Higher education institutions (HEIs) are progressively computerized to deal with substantial academic and operational information. With the increase in enriched information systems (IS) comes the potential hazard of malicious exposure to internal and external threats. This academic sector is advancing in the implementation of technical security controls; however, behavioral influence is still a challenge in the information security domain. Information security policies (ISPs) are generally designed and developed to control employees’ working behavior, yet compliance with these documents is near to non-existent. This research paper describes an empirical test of the influence of institutional governance (IG) on protection motivation and planned behavior of employees in HEIs. Results were analyzed using structural equation modeling (SEM) techniques. Our findings confirm the significant contribution of IG in motivating protection behavior among employees of HEIs. This cultivated motivation encourages positive conduct in information security policy compliance (ISPC).
Citation
Hina, S., Dominic, P., & Lowry, P. (2019). Institutional governance and protection motivation: theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world. Computers and Security, 87, https://doi.org/10.1016/j.cose.2019.101594
Journal Article Type | Article |
---|---|
Acceptance Date | Aug 14, 2019 |
Online Publication Date | Aug 26, 2019 |
Publication Date | Aug 26, 2019 |
Deposit Date | Nov 14, 2022 |
Journal | Computers & Security |
Print ISSN | 0167-4048 |
Publisher | Elsevier |
Volume | 87 |
DOI | https://doi.org/10.1016/j.cose.2019.101594 |
Publisher URL | http://doi.org/10.1016/j.cose.2019.101594 |
You might also like
CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning
(2023)
Journal Article
Agentless approach for security information and event management in industrial IoT
(2023)
Journal Article
An automated context-aware IoT vulnerability assessment rule-set generator
(2022)
Journal Article
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search