Cracking the Code: A Comprehensive Analysis of Information Security Strategies Among Professionals

Cracking the Code: A Comprehensive Analysis of Information Security Strategies Among Professionals

Abdullah Almuqrin, Ibrahim Mutambik, Justin Zuopeng Zhang, Hashem Farahat, Zahyah H. Alharbi
Copyright: © 2024 |Pages: 21
DOI: 10.4018/JOEUC.345933
Article PDF Download
Open access articles are freely available for download

Abstract

With the expanding reach of the Internet of Things, information security threats are increasing, including from the very professionals tasked with defending against these threats. This study identified factors impacting information security behavior among these individuals. Protection motivation theory and the theory of planned behavior were employed along with work-related organizational factors as a theoretical framework. Data were collected through a survey of 595 information security professionals working in Saudi information technology companies. Structural equational modeling was used to analyze the data. Threat susceptibility, threat severity, self-efficacy, response cost, fear attitude, behavioral control, subjective norms, and organizational commitment were found to play a significant role in information security protection motivation and behavior, while job satisfaction did not.
Article Preview
Top

Theoretical Framework And Literature Review

This study proposes a theoretical framework based on the constructs of protection-motivation theory, the theory of planned behavior, and two organizational factors to analyze their impact on the information-security behavior of experts. The framework and its associated hypotheses are present in Fig. 1 and explored in the following subsections. This approach was tested in a Saudi organizational setting to answer two research questions:

  • 1.

    What factors significantly influence the behavior of Saudi information-security experts?

  • 2.

    To what degree do these factors influence the behavior of Saudi information-security experts?

Figure 1.

Proposed Framework

JOEUC.345933.f01

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing