Please use this identifier to cite or link to this item: http://studentrepo.iium.edu.my/handle/123456789/11052
Title: An integrated persuasive technology model for information security awareness
Authors: Bawazir, Mohammed Abdullah Saeed
Supervisor: Murni Mahmud, Ph.D
Nurul Nuha Abdul Molok, Ph.D
Akram M Zeki, Ph.D
Year: 2021
Publisher: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2021
Abstract in English: In this digital era, information assets are becoming increasingly important, thereby necessitating measures to ensure information security. Globally, end-users are also struggling to ensure the security of their information. In the domain of information security, it is the human factor that constitutes the greatest vulnerability. While security education, training, and awareness programmes are evolving as valuable approaches to increasing awareness and behaviour intention to information security, changing security awareness and behaviour by end-users remains the most complex and challenging aspect of information security. Furthermore, the conventional methods for influencing information security awareness are still very expensive, time-consuming, and require regular repeating. Given such challenges, this research introduces persuasive technology to improve users’ awareness and behaviour intention. Persuasive technology has proved to be successful in improving the end-users’ attitudes and behaviour. In this context, this research establishes an integrated model of improving end-users’ security awareness by incorporating relevant literature and multiple empirically verified theories, including the Fogg behaviour model (FBM), Protection Motivation Theory (PMT), Theory of Planned Behaviour (TPB), and Technology Acceptance Model (TAM). A multidimensional research model has been proposed based on the main categories of FBM (motivation, ability, and trigger) to identify the effects of key factors in the persuasive technology context for influencing end-users’ security awareness and behaviour intention. The prototype has been developed in order to implement the factors of the proposed model and measure the effectiveness of persuasive technology to enhance information security awareness. This research adopts a mixed-methods approach to evaluate the proposed model and prototype. The proposed research model was validated through paired sample T-test and partial least squares (PLS), which were administered to 100 participants to measure security awareness in the light of persuasive technology. Furthermore, content analysis was performed using NVivo software for 45 semi-structured interviews to collect qualitative data on the end-users’ perception of the prototype. The collection of data is based on secondary and primary data. In order to improve primary information, secondary data references were collected from publications, journals, and books. The data for this study was acquired through the use of a quasi-experiment. The experiment began with a pre-prototype questionnaire, followed by the use of the prototype, followed by a post-prototype questionnaire, and finally, a short interview. The results validate the effectiveness of the prototype utilising the factors of the research model, specifically FBM attributes. Moreover, the results indicate that the research model significantly predicts the key factors affecting security awareness and behaviour intention in respect of persuasive technology. This study contributes to the body of knowledge by providing empirical results for the key factors that affect security awareness and intention of security behaviour in a persuasive technology context. The findings provide organisations and security practitioners with a model for the creation and development of a proactive and customised security awareness system. This research has contributed significantly to Human-Computer Interaction (HCI), specifically in the design and content of persuasive technology to influence security awareness and intention of security behaviour in the safe and secure use of information technology.
Kullliyah: Kulliyyah of Information and Communication Technology
Programme: Doctor of Philosophy in Information Technology
URI: http://studentrepo.iium.edu.my/handle/123456789/11052
Appears in Collections:KICT Thesis

Files in This Item:
File Description SizeFormat 
t11100429243MohammedAbdullahSaeedBawazir_24.pdf24 pages file454.33 kBAdobe PDFView/Open
t11100429243MohammedAbdullahSaeedBawazir_SEC.pdf
  Restricted Access
Full text secured file6.45 MBAdobe PDFView/Open    Request a copy
Show full item record

Google ScholarTM

Check


Items in this repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please give due acknowledgement and credits to the original authors and IIUM where applicable. No items shall be used for commercialization purposes except with written consent from the author.