1

Information Security: Cost and Individuals’ Habit

International Journal of Science and Management Studies (IJSMS)
© 2018 by IJSMS Journal
Volume-1 Issue-3
Year of Publication : 2018
Authors : Lubna Sulaiman
DOI: 10.51386/25815946/ijsms-v1i3p103
Citation:
MLA Style: Lubna Sulaiman "Information Security: Cost and Individuals’ Habit" International Journal of Science and Management Studies (IJSMS) V1.I3 (2018): 12-16.

APA Style: Lubna Sulaiman, Information Security: Cost and Individuals’ Habit, International Journal of Science and Management Studies (IJSMS), v1(i3), 12-16.
Abstract:
The aim of this research is to identify the availability levels of cost, habit, and Information Security (IS) and determining the impacts of cost, and habit on IS. The primary data of the study collected using manual distributed questionnaire. By using appropriate statistical test, the collected data has been analyzed. The reliability and hypotheses tested using several statistical methods such as multiple and linear regression test. While validity tested using Cronbach's alpha. The findings of the study proved that cost and habits has an effect on information security as they explained (18.5%) of the variation in IS. However, implications have discussed.
Keywords: cost, habit, Information Security (IS).
References:
[1] M. Siponen, M. Adam Mahmood, and S. Pahnila, “Employees’ adherence to information security policies: An exploratory field study,” Inf. Manag., vol. 51, no. 2, pp. 217–224, Mar. 2014, doi: 10.1016/j.im.2013.08.006.
[2] J. D’Arcy and T. Herath, “A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings,” European Journal of Information Systems, vol. 20, no. 6. Palgrave Macmillan Ltd., pp. 643–658, 14-Jun-2011, doi: 10.1057/ejis.2011.23.
[3] M. N. Alraja, S. Hammami, and T. Alhousary, “Factors affecting e-government services adoption: Field study,” J. Theor. Appl. Inf. Technol., vol. 78, no. 1, 2015.
[4] M. N. Alraja, S. Hammami, B. Chikhi, and S. Fekir, “The influence of effort and performance expectancy on employees to adopt E-government: Evidence from Oman,” Int. Rev. Manag. Mark., vol. 6, no. 4, 2016.
[5] M. N. Alraja, “The effect of social influence and facilitating conditions on e-government acceptance from the individual employees’ perspective | Efekt Wpływu Społecznego Oraz Warunków Ułatwiających Akceptację E-Administracji Z Punktu Widzenia Indywidualnych Pracowników,” Polish J. Manag. Stud., vol. 14, no. 2, 2016, doi: 10.17512/pjms.2016.14.2.02.
[6] R. Mourtada, F. Salem, and S. Alshaer, “Citizen Engagement and Public Services in the Arab World: The Potential of Social Media,” Jun. 2014.
[7] M. N. Alraja, “User Acceptance of Information Technology: A Field Study of an E-Mail System Adoption from the Individual Students’ Perspective,” Mediterr. J. Soc. Sci., vol. 6, no. 6 s1, pp. 19–25, Nov. 2015, doi: 10.5901/mjss.2015.v6n6s1p19.
[8] M. N. Alraja, B. F. Salim, M. A. Uddin, and M. Yousoof, “The adoption of internet banking: Clients’ perspective in Oman,” Int. Rev. Manag. Mark., vol. 6, no. 4, 2016.
[9] A. Shatat, “FACTORS AFFECTING THE ADOPTION AND USAGE OF ONLINE SERVICES IN OMAN,” J. Internet Bank. Commer., vol. 22, no. S7, 2017, Accessed: 23-Dec-2018. [Online]. Available: http://www.icommercecentral.com.
[10] M. A. Hussein, H. Ahmed, and M. N. Alraja, “The adoption of information and communication technology by small and medium enterprises in Oman: Case of Dhofar region,” J. Bus. Retail Manag. Res. www.jbrmr.com A J. Acad. Bus. Retail Manag., vol. 11, no. 3, pp. 64–71, 2017, Accessed: 02-May-2017. [Online]. Available: http://www.jbrmr.com/admin/content/pdf/content_65013_17-04-22-11-45-45.pdf.
[11] M. N. Alraja and B. Chikhi, “Perceived Factors affecting Customers Attitudes toward Electronic Shopping: an Empirical Study,” Int. J. Econ. Res., vol. 12, no. 3, pp. 815–823, 2015, Accessed: 17-May-2019. [Online]. Available: http://serialsjournals.com/abstract/51627_17.pdf.
[12] K. Hassanein and M. Head, “The Impact of Infusing Social Presence in the Web Interface: An Investigation Across Product Types,” Int. J. Electron. Commer., vol. 10, no. 2, pp. 31–55, Dec. 2005, doi: 10.2753/JEC1086-4415100202.
[13] M. A. Uddin, F. Ahmar, and M. N. Alraja, “E-examinations for management students in Oman,” Int. J. Appl. Bus. Econ. Res., vol. 14, no. 1, 2016.
[14] J. C. Sánchez-Prieto, S. Olmos-Migueláñez, and F. J. García-Peñalvo, “Informal tools in formal contexts: Development of a model to assess the acceptance of mobile technologies among teachers,” Comput. Human Behav., vol. 55, pp. 519–528, Feb. 2016, doi: 10.1016/j.chb.2015.07.002.
[15] J. D’Arcy, T. Herath, and M. K. Shoss, “Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective,” J. Manag. Inf. Syst., vol. 31, no. 2, pp. 285–318, Oct. 2014, doi: 10.2753/MIS0742-1222310210.
[16] J. D’Arcy, A. Hovav, and D. Galletta, “User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach,” Inf. Syst. Res., vol. 20, no. 1, pp. 79–98, 2009, doi: 10.1287/isre.1070.0160.
[17] M. A. hamdan, “The reality of safe practices in the main library of SQU, and its compatibility with the International Information Security Standard.,” Qscienve Proc., p. 1, 2007, Accessed: 02-Aug-2020. [Online]. Available: https://www.google.com/search?ei=xOUmX8jMEcHbgwfdn464Dw
[18] F. M. Alkhaldi, S. M. Hammami, S. Kasem, A. Rashed, and M. N. Alraja, “Enterprise System as Business Intelligence and Knowledge Capabilities for Enhancing Applications and Practices of IT Governance,” Int. J. Organ. Collect. Intell., vol. 7, no. 2, pp. 63–77, 2017, doi: 10.4018/IJOCI.2017040105.
[19] A. Vance, M. Siponen, and S. Pahnila, “Motivating IS security compliance: Insights from Habit and Protection Motivation Theory,” 2012, doi: 10.1016/j.im.2012.04.002.
[20] J. D’Arcy and A. Hovav, “Deterring internal information systems misuse,” Commun. ACM, vol. 50, no. 10, pp. 113–117, Oct. 2007, doi: 10.1145/1290958.1290971.
[21] M. Siponen and A. Vance, “Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations,” MIS Q., vol. 34, no. 3, p. 487, 2010, doi: 10.2307/25750688.
[22] M. Siponen, M. Karjalainen, and uprateek Sarker, “Unearthing Social Mechanisms that Lead Employees to Violate IS Security Procedures: An Inductive Study,” in IFIP TC 8 International Workshop on Information Systems Security Research, 2010, Accessed: 02-Aug-2020. [Online]. Available: https://ifip.byu.edu/ifip2010.html.
[23] M. T. Siponen, “Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods,” Inf. Organ., vol. 15, no. 4, pp. 339–375, Oct. 2005, doi: 10.1016/J.INFOANDORG.2004.11.001.
[24] J. E. Maddux and R. W. Rogers, “Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change,” J. Exp. Soc. Psychol., vol. 19, no. 5, pp. 469–479, Sep. 1983, doi: 10.1016/0022-1031(83)90023-9.
[25] G. D. Moody, M. Siponen, and S. Pahnila, “Toward a Unified Model of Information Security Policy Compliance,” MIS Q., vol. 42, no. 1, pp. 285–311, Jan. 2018, doi: 10.25300/MISQ/2018/13853.
[26] M. N. Alraja and N. R. Alomian, “THE EFFECT OF INFORMATION TECHNOLOGY IN EMPOWERMENT PUBLIC SECTOR EMPLOYEES: A FIELD STUDY,” Interdiscip. J. Contemp. Res. Bus., vol. 5, no. 1, pp. 805–815, 2013, Accessed: 17-May-2019. [Online]. Available: https://journal-archieves32.webs.com/805-815.pdf.
[27] M. N. Alraja and N. M. M. Malkawi, “E-Business Adoption in Banking Sector: Empirical Study,” Indian J. Sci. Technol., vol. 8, no. 27, Oct. 2015, doi: 10.17485/ijst/2015/v8i27/70739.
[28] S. Hammami, H. Al Samman, and M. Alraja, “The role of CRM systems in consolidating the strategic position of the organization,” Int. J. Appl. Bus. Econ. Res., vol. 13, no. 4, 2015.