Exploring the Relationship Between Technology Adoption and Cyber Security Compliance: A Quantitative Study of UTAUT2 Model

Exploring the Relationship Between Technology Adoption and Cyber Security Compliance: A Quantitative Study of UTAUT2 Model

Mohammed Saeed A Alqahtani, Eila Erfani
Copyright: © 2021 |Pages: 23
DOI: 10.4018/IJEGR.2021100103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

IT infrastructure and systems are made up of technical and social systems that work together to ensure that organization's goals and objectives are met. Security controls and measures are developed and used to protect an organization's data and information systems. To improve cyber security, organizations focus most of their efforts on incorporating new technological approaches in products and processes, leaving out the most important and vulnerable factor. So this study intends to provide some practical implications to the technology developers and policymakers while identifying the factors that affect cyber security compliance in an organization or home environment for general users, HR, IT administrators, engineers, and others. It explored the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model and assessed the effect of its factors on cyber security compliance in organizations.
Article Preview
Top

Introduction

Organizations are vulnerable to cyber-attacks partially because people in the organization are unaware of or unprepared for cyber risks. People are one of the major causes of cyber security breaches (Avina et al., 2017; Huang and Pearlson, 2019). Organizations spend millions of dollars on their cyber security infrastructure that includes technical and non-technical measures, but most times leave the most important asset and vulnerability open ̶ the human. Therefore, despite their investments, companies are not able to reap the benefits of their security investments because of human/employee’s non-compliance with cyber security policies and measures. Cyber security non-compliance is a major concern for organizations (Alqahtani & Braun, 2021; Harris & Martin, 2019). For effective compliance and human acceptance of cyber security technology and compliance with cyber practices, it is crucial to identify, research, and analyse the factors that affect cyber security compliance and implementation. Furthermore, the users need to understand, take, and conform to the security measures of the organization’s information security so that companies can reap the benefits of their technology investments. In Donalds and Osei-Bryson (2020) and Li et al. (2019), the authors concluded that the behavior of employees has a direct relationship with effective information system security compliance. Many cyber security incidents have occurred due to the negligence of cyber security policies (Harris and Martin, 2019; Herath and Rao, 2009; Li et al., 2019). Institutionalization of security policies into practice makes the employees embrace the policies, which makes their behavior more complaint (Alqahtani & Braun, 2021; Harris & Martin, 2019; Li et al., 2019).

Different factors affect the behavior of employees towards cyber security compliance. For cyber security compliance, most of the times, certain new technologies also need to be adopted (Alqahtani & Braun, 2021; Baptista & Oliveira, 2015). Many theories and models are proposed in literature that affect human behavior towards technology adoption. One of the most widely accepted technology adoption models is Unified Theory of Acceptance, Use of Technology (UTAUT) (Venkatesh et al., 2003) and UTAUT2 (Venkatesh et al., 2012).

In this study, all the factors of UTUAT2 model have been explored for cyber security compliance. Limited literature is available that link constructs of UTAUT2 model with cyber security compliance. But there are several weaknesses in the previous studies. Most of the previous studies are biased towards a specific group of people and not applicable to general users or employees. For example, the detailed study conducted by Almaiah, Alamri, and Al-Rahmi (2019), Cuganesan, Steele, and Hart, (2018), D’Arcy and Greene (2014), Hu et al., (2012), Liu, Wang, and Liang (2020), S. Raschid Muller and Mary L. Lind (2020), and Simonova, (2020) is biased in several ways. They had focused on a very limited group of people with specialized professions. For example, in S. Raschid Muller and Mary L. Lind (2020), information security professionals are expected to have a better understanding of information security policies than regular employees (Ahlan, Lubis, and Lubis, 2015; Bauer, Bernroider, and Chudzikowski, 2017). Due to the limitations and bias in the previous studies related to technology adoption and security compliance, the results are very weak and difficult to digest. For example, S. Raschid Muller and Mary L. Lind (2020) suggested that UTAUT2 may not be a very good model for inspecting Information Security Policy (ISP) compliance amongst information security professionals. This may not be the case with the general public and employees of organizations because information assurance professionals usually have more knowledge and bias towards compliance. Therefore, this may not be the case for all employees. This study is performed on general users in organizations.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 1 Issue (2023)
Volume 18: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing