Please use this identifier to cite or link to this item: http://studentrepo.iium.edu.my/handle/123456789/10424
Title: Information security policy perceived compliance model for staff in Palestine Universities
Authors: Iriqat, Yousef Mohammad Mousa
Supervisor: Abd. Rahman Ahlan, Ph.D
Nurul Nuha Abdul Molok, Ph.D
Noor Hayani Abd Rahim, Ph.D
Subject: Computer networks -- Security measures -- Palestine
Internet|xSecurity measures -- Palestine
Electronic data processing -- Security measures -- Palestine
Year: 2020
Publisher: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2020
Abstract in English: Information security policies play a significant role in securing university information assets. There should be clear information security policies in place to ensure effective staff compliance—policy perceptibility has a positive impact on employee adherence. The focus of the research is staff compliance intention of information security policies in Palestine universities. There is a need for empirical analysis on staff perception of information security policies compliance based on the intersection and combination of factors adopted from research on multiple information security theories that could have a direct/ indirect effect on staff compliance intention. Therefore, this study seeks to understand and explore staff compliance intention of information security policies based on how they perceive several factors such as perceived sanction from general deterrence theory, perceived rewards as extrinsic motivation, perceived coping appraisal from protection motivation theory, and, information quality, information privacy and facilitating conditions perceived factors from information reinforcement. Therefore, we propose a theoretical novel model built around the perception core model and the Palestinian context. The core model constitutes the perception factors, that is, how “perceived” factors directly affect “perceived” intention to comply. Our model is suited for the Palestinian context, as it works to understand staff compliance of information security policies based on staff perception of policy focused areas and staff security education and training awareness. To significantly implement the theoretical research model, the population of the study covers a wide area of Palestine form several universities to validate and confirm the model empirically using structural equation modelling. The study research design is an empirical, quantitative, exploratory (and descriptive), in addition to the developed research instrument incorporated to achieve the research methods and objectives specifically. The study objective was achieved by carefully reviewing the most appropriate potential approaches to the problem. The researcher sought a model that could find and explain any gaps in staff perception of information security policies and model factors. Thus, a novel model was designed, validated and tested. This study made a theoretical contribution through its novel model. The use of policy focused areas made the model incorporate elements from the Palestinian context directly. This is important, as current staff perceptions of information security policies play a significant role in studying them and discussing potential future policies. In this sense, it provides a methodological contribution. Furthermore, the use of data on security education and training awareness enabled us to provide potential solutions to existing problems more effectively. Security education and training awareness programs demonstrably enhance compliance intention and unify efforts between universities and their employees to mitigate security threats from insiders, be they intentional or unintentional. This constitutes a practical contribution.
Call Number: t TK 5105.59 I68I 2020
Kullliyah: Kulliyyah of Information and Communication Technology
Programme: Doctor of Philosophy in Information Technology
URI: http://studentrepo.iium.edu.my/handle/123456789/10424
Appears in Collections:KICT Thesis

Files in This Item:
File Description SizeFormat 
t11100424723YousefMohammadMousaIriqat_24.pdf24 pages file739.67 kBAdobe PDFView/Open
t11100424723YousefMohammadMousaIriqat_SEC.pdf
  Restricted Access
Full text secured file3.96 MBAdobe PDFView/Open    Request a copy
Show full item record

Page view(s)

18
checked on May 17, 2021

Download(s)

4
checked on May 17, 2021

Google ScholarTM

Check


Items in this repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please give due acknowledgement and credits to the original authors and IIUM where applicable. No items shall be used for commercialization purposes except with written consent from the author.