Please use this identifier to cite or link to this item: http://studentrepo.iium.edu.my/handle/123456789/10435
Title: Information security behavior in organizations : influencing factors and management strategies
Authors: Barzak, Omar
Supervisor: Nurul Nuha Abdul Molok, Ph.D
Murni Mahmud, Ph.D
Shuhaili Talib, Ph.D
Subject: Computer networks -- Security measures
Year: 2020
Publisher: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2020
Abstract in English: Employees security behavior is a challenge to the confidentiality, integrity, and availability (CIA) of organizational information. This is because there have been cases of employees compromising organizational information systems (IS) through their behavior whether it is performed with or without intention. Although information security studies are now focusing on insiders’ security behaviors and their impacts on IS, they do not effectively differentiate between security behavior that is intentional or unintentional, and compliant or non-compliant to information security policies. While many studies focus on controlling and preventing unacceptable security behavior, studies that focus on factors encouraging good and desired security behavior are limited. Hence, this research aims are twofold: firstly, to identify different types of intentional and unintentional information security behavior, for both compliant and non-compliant, and; secondly, to examine their influencing factors in order to suggest a taxonomy of information security behavior. By understanding the different categories and influencing factors of employee’s security behavior, organizations may be able to address such behavior in order to protect organizational IS. Security literature has shown that organizations can reduce information security incidents and the cost of technical countermeasures by managing their employees’ security behavior. A recent report from security industry reveals that organizations in the Middle East are being targeted by cyber attackers due to the wealth of the countries and information security practices that are below par in the region. Additionally, security studies suggest examining employees’ security behavior in different cultures and regions, as the majority of the previous studies were conducted in Western culture. Conceptual security behavioral model is proposed based on contemporary information security studies inspired by Islamic principles. Following this, qualitative research approach and multiple-case study on four organizations in Gulf Countries was conducted by interviewing both employees and managers. Moreover, document reviews and participant observation were applied to validate feedback from the participants. The findings indicated that employees’ security culture played an essential role in information security behavioral compliance. Although employees showed their interest to comply with information security policies, non-compliant security behavior was still prevalent since they were lacking in security literacy and awareness. Furthermore, the case organizations’ security countermeasures need to be improved by developing, implementing and enforcing information security policies which are clearly communicated to and understood by all employees. Similarly, the organizations too, need to understand their employees’ behavior. The research findings are corroborated into a proposed model called Integrated Security Behavioral Model (ISBM). ISBM may benefit organizations since the model can be used in assessing, planning and managing their employees’ security behavior and improve their security strategies. The thesis contributes to both research and practice; by fulfilling the research gaps stated above and improve organizations’ best practices through the understanding of employees’ different types of security behavior.
Call Number: t TK 5105.59 B296I 2020
Kullliyah: Kulliyyah of Information and Communication Technology
Programme: Doctor of Philosophy in Information Technology
URI: http://studentrepo.iium.edu.my/handle/123456789/10435
Appears in Collections:KICT Thesis

Files in This Item:
File Description SizeFormat 
t11100424831OmarBarzak_24.pdf24 pages file1.18 MBAdobe PDFView/Open
t11100424831OmarBarzak_SEC.pdf
  Restricted Access
Full text secured file5.1 MBAdobe PDFView/Open    Request a copy
Show full item record

Page view(s)

20
checked on May 17, 2021

Download(s)

36
checked on May 17, 2021

Google ScholarTM

Check


Items in this repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please give due acknowledgement and credits to the original authors and IIUM where applicable. No items shall be used for commercialization purposes except with written consent from the author.