Journal Screenshot

International Journal of Academic Research in Business and Social Sciences

Open Access Journal

ISSN: 2222-6990

Factors That Influence Information Security Behaviour of Home User

Mohd Sharulnizam Kamarulzaman, Shamila Mohamed Shuhidan, Abdul Jalil Toha

http://dx.doi.org/10.6007/IJARBSS/v12-i12/16055

Open access

Pandemic Covid-19 situation has enforced most companies imposes their staff to work from home basis as mode of operational. Due to that the number of home computer users is increasing faster than ever. This scenario indirectly highlighted home users' information security as an important field to be investigated. This is not only a matter of securing home users' personal and work information, but also because internet users who access from home provide an ideal breeding ground for security hackers targeting organisations and individuals. Therefore, this paper aims to investigate the factors that influence the information security behaviour of home user. As for this study, 201 respondents among employees in an ICT agency are being analyzed using quantitative approach through the online survey questionnaires. From the findings, it has been concluded that the perceived severity, perceived susceptibility, response efficacy, cues to action and perceived benefit has been identified as the factors that influenced the information security behaviour of home users. Perceived severity was found to be the factor that influenced how users react to implement or not the security safety measures while accessing information. Although respondents do not feel they are possible targets for security threats, they recognize that the result of a security breach would have a significant impact on them. It might be irrational to suppose, that any security experience, knowledge or history background by individuals is the way they act at home. It is therefore hoped to see policy makers or authorised bodies design and implement security awareness campaigns and programs so that users are effectively informed about threats and the skills they can use to mitigate security threats and thereby improve the security climate of users. Where the majority of IS research based on behavioral IS within an organizational framework, "security of home users" demands greater attention from researchers in order to provide an improve analysis and proper practice on home user’s security behavior.

Anderson & Agarwal. (2010). Practicing safe computing: A multimethod empirical examination of Home Computer User Security Behavioral Intentions. MIS Quarterly, 34(3), 613. https://doi.org/10.2307/25750694
Cilliers, L. (2019). Wearable devices in Healthcare: Privacy and Information Security issues. Health Information Management Journal, 49(2-3), 150-156.
doi:10.1177/1833358319851684
Creswell, J. W., & Sinley, R. C. (2017). Developing a culturally-specific mixed methods approach to Global Research. KZfSS Kölner Zeitschrift Für Soziologie Und Sozialpsychologie, 69(S2), 87-105. doi:10.1007/s11577-017-0453-2
Gundu, T. (2019). Acknowledging and reducing the knowing and doing gap in employee cybersecurity compliance. 14th International Conference on Cyber Warfare and Security, ICCWS 2019, 94–102.
Hooper, V., & Blunt, C. (2019). Factors influencing the information security behaviour of it employees. Behaviour & Information Technology, 39(8), 862-874.
doi:10.1080/0144929x.2019.1623322
Johnston & Warkentin. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549. https://doi.org/10.2307/25750691
McGill, T., & Thompson, N. (2017). Old risks, new challenges: Exploring differences in security between home computer and mobile device use. Behaviour & Information Technology, 36(11), 1111-1124. doi:10.1080/0144929x.2017.1352028
Ng, B., Kankanhalli, A., & Xu, Y. (. (2009). Studying users' computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815-825.
doi:10.1016/j.dss.2008.11.010
Ng, B.-Y., & Rahim, M. (2005). A socio-behavioral study of home computer users’ intention to practice security. In In Proceedings of the Ninth Pacific Asia Conference on Information Systems (pp. 7–10). Retrieved from
http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1132&context=pacis2005
Sekaran, U., & Bougie, R. (2010). Research method for business: A skill building approach, 5th edition. In United States: John Wiley & Sons Inc.
Tsai, H. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 59, 138-150. doi:10.1016/j.cose.2016.02.009
Vance, A., Lowry, P. B., & Eggett, D. (2013). Using accountability to reduce access policy violations in Information Systems. Journal of Management Information Systems, 29(4), 263-290. doi:10.2753/mis0742-1222290410
Woon, I. M. Y., Tan, G. W., & Low, R. T. (2005). A protection motivation theory approach to home wireless security. Association for Information Systems - 26th International Conference on Information Systems, ICIS 2005: Forever New Frontiers, 367–380.
Williams, K. C. (2012). Fear appeal theory. Research in Business and Economics Journal, 5, 1- 21.
Zhang, S., Grenhart, W. C., McLaughlin, A. C., & Allaire, J. C. (2017). Predicting computer proficiency in older adults. Computers in Human Behavior, 67, 106-112. doi:10.1016/j.chb.2016.11.006

In-Text Citation: (Kamarulzaman et al., 2022)
To Cite this Article: Kamarulzaman, M. S., Shuhidan, S. M., & Toha, A. J. (2022). Factors That Influence Information Security Behaviour of Home User. International Journal of Academic Research in Business and Social Sciences, 12(12), 2617 – 2626.