Information security policy compliance model for government agency

Aspects of information security is not sufficient to ensure a high level of information security policies of the organization are met. Behavior of non-compliance with an organization's information security policy is not perfect if they are unable to establish the proper conduct of compliance wi...

Full description

Bibliographic Details
Main Author: Ramli, Muhamad Amirnazmi
Format: Thesis
Language:English
Published: 2018
Subjects:
Online Access:http://psasir.upm.edu.my/id/eprint/69020/1/FSKTM%202018%2050%20-%20IR.pdf
_version_ 1825933641058877440
author Ramli, Muhamad Amirnazmi
author_facet Ramli, Muhamad Amirnazmi
author_sort Ramli, Muhamad Amirnazmi
collection UPM
description Aspects of information security is not sufficient to ensure a high level of information security policies of the organization are met. Behavior of non-compliance with an organization's information security policy is not perfect if they are unable to establish the proper conduct of compliance with existing policies. Human attitude and behavior are the major contributing factors in every information security incident. Therefore, factors affecting their intentions on compliance behavior need to be identified. The purpose of this study is to identify the factors that use the most commonly used modeling elements in the field of psychology and social technology on information security. These factors will form the proposed model that will be validated with the results of a survey from the Information Management Division staff consisting of administrative staff and information technology officers. This study uses a quantitative approach because the most commonly used model design is used in the same field. Statistical software will also be used for analysis purposes in determining the frequency, reliability, and correlation of each factor against compliance in information security policy. A total of 142 respondents gave feedback and showed positive results on 11 factors which is 'Perceived Severity', 'Perceived Vulnerability', 'Response Efficacy', 'Self-Efficacy', 'Perceived Usefulness', 'Perceived Ease of Use', 'Attitude' 'Subjective Norms', 'Awareness', 'Reward' and 'Punishment'. Only one factor gives a negative response to 'Maladaptive Rewards'. The findings of this study will support the proposed compliance model and will guide each government agency in solving the problem of employee behavior in turn will affect the safety of organizational information.
first_indexed 2024-03-06T10:00:28Z
format Thesis
id upm.eprints-69020
institution Universiti Putra Malaysia
language English
last_indexed 2024-03-06T10:00:28Z
publishDate 2018
record_format dspace
spelling upm.eprints-690202019-06-17T01:49:24Z http://psasir.upm.edu.my/id/eprint/69020/ Information security policy compliance model for government agency Ramli, Muhamad Amirnazmi Aspects of information security is not sufficient to ensure a high level of information security policies of the organization are met. Behavior of non-compliance with an organization's information security policy is not perfect if they are unable to establish the proper conduct of compliance with existing policies. Human attitude and behavior are the major contributing factors in every information security incident. Therefore, factors affecting their intentions on compliance behavior need to be identified. The purpose of this study is to identify the factors that use the most commonly used modeling elements in the field of psychology and social technology on information security. These factors will form the proposed model that will be validated with the results of a survey from the Information Management Division staff consisting of administrative staff and information technology officers. This study uses a quantitative approach because the most commonly used model design is used in the same field. Statistical software will also be used for analysis purposes in determining the frequency, reliability, and correlation of each factor against compliance in information security policy. A total of 142 respondents gave feedback and showed positive results on 11 factors which is 'Perceived Severity', 'Perceived Vulnerability', 'Response Efficacy', 'Self-Efficacy', 'Perceived Usefulness', 'Perceived Ease of Use', 'Attitude' 'Subjective Norms', 'Awareness', 'Reward' and 'Punishment'. Only one factor gives a negative response to 'Maladaptive Rewards'. The findings of this study will support the proposed compliance model and will guide each government agency in solving the problem of employee behavior in turn will affect the safety of organizational information. 2018-06 Thesis NonPeerReviewed text en http://psasir.upm.edu.my/id/eprint/69020/1/FSKTM%202018%2050%20-%20IR.pdf Ramli, Muhamad Amirnazmi (2018) Information security policy compliance model for government agency. Masters thesis, Universiti Putra Malaysia. Computer security Data protection Information technology - Security measures
spellingShingle Computer security
Data protection
Information technology - Security measures
Ramli, Muhamad Amirnazmi
Information security policy compliance model for government agency
title Information security policy compliance model for government agency
title_full Information security policy compliance model for government agency
title_fullStr Information security policy compliance model for government agency
title_full_unstemmed Information security policy compliance model for government agency
title_short Information security policy compliance model for government agency
title_sort information security policy compliance model for government agency
topic Computer security
Data protection
Information technology - Security measures
url http://psasir.upm.edu.my/id/eprint/69020/1/FSKTM%202018%2050%20-%20IR.pdf
work_keys_str_mv AT ramlimuhamadamirnazmi informationsecuritypolicycompliancemodelforgovernmentagency