John Agyekum Addae, Grace Simpson, George Oppong Appiagyei Ampong
{"title":"影响信息安全策略遵从行为的因素","authors":"John Agyekum Addae, Grace Simpson, George Oppong Appiagyei Ampong","doi":"10.1109/ICSIoT47925.2019.00015","DOIUrl":null,"url":null,"abstract":"Globally, banks are deploying reliant data protection technologies to secure business continuity. However, information security attackers leverage on employees seldom predisposition to compromise firms' assets. The study therefore examines attributing factors influencing information security compliance behavior in the Ghanaian banking sector. A survey design approach was adopted to validate the research model. Partial Least Square Structural Equation Modeling (PLS-SEM) were used to analyze 329 valid data. The model results showed that perceived threat, vulnerability, response cost, and efficiency had a significant effect on compliance but interestingly not for Self-Efficacy. Perceived threat severity had the most significant effect on IS compliance behavior. Overall, our model accounted for 60% of the variation in IS compliance","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Factors Influencing Information Security Policy Compliance Behavior\",\"authors\":\"John Agyekum Addae, Grace Simpson, George Oppong Appiagyei Ampong\",\"doi\":\"10.1109/ICSIoT47925.2019.00015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Globally, banks are deploying reliant data protection technologies to secure business continuity. However, information security attackers leverage on employees seldom predisposition to compromise firms' assets. The study therefore examines attributing factors influencing information security compliance behavior in the Ghanaian banking sector. A survey design approach was adopted to validate the research model. Partial Least Square Structural Equation Modeling (PLS-SEM) were used to analyze 329 valid data. The model results showed that perceived threat, vulnerability, response cost, and efficiency had a significant effect on compliance but interestingly not for Self-Efficacy. Perceived threat severity had the most significant effect on IS compliance behavior. Overall, our model accounted for 60% of the variation in IS compliance\",\"PeriodicalId\":226799,\"journal\":{\"name\":\"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSIoT47925.2019.00015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIoT47925.2019.00015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Factors Influencing Information Security Policy Compliance Behavior
Globally, banks are deploying reliant data protection technologies to secure business continuity. However, information security attackers leverage on employees seldom predisposition to compromise firms' assets. The study therefore examines attributing factors influencing information security compliance behavior in the Ghanaian banking sector. A survey design approach was adopted to validate the research model. Partial Least Square Structural Equation Modeling (PLS-SEM) were used to analyze 329 valid data. The model results showed that perceived threat, vulnerability, response cost, and efficiency had a significant effect on compliance but interestingly not for Self-Efficacy. Perceived threat severity had the most significant effect on IS compliance behavior. Overall, our model accounted for 60% of the variation in IS compliance