Journal Screenshot

International Journal of Academic Research in Business and Social Sciences

Open Access Journal

ISSN: 2222-6990

Exploring User’s Experience using E-Notification Management System

Norshima Humaidi, Vimala Balakrishnan, Melissa Shahrom

http://dx.doi.org/10.6007/IJARBSS/v8-i11/5282

Open access

Technology is believed to give an impact on user’s behaviour. Thus, e-notification management system prototype was developed to improve user’s compliance behaviour towards Information Security Policies (ISPs). The purpose of this study was to evaluate how this prototype can be used to improve the security compliance behaviour among users through their experience of using the propose system. Eighteen (18) users from selected local hospitals in Malaysia were interviewed and the qualitative analysis found that Management Support, Information Security Awareness, Self-Efficacy, Security Barrier and Trust contributed to ISPs compliance behaviour. Furthermore, most of the participants were satisfied with the prototype system. The prototype is hoped to give benefits to organizations in implementing and distributing ISPs systematically, especially in healthcare sector.

Bauer, S., Bernroider, E. W. N., & Chudzikowski, K. (2017). Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks, In Computers & Security, 68, 145-159.

Bélanger, F., Collignon, S., Enget, K., Negangard, E. (2017). Determinants of early conformance with information security policies, In Information & Management, 54(7), 887-901.

Brady, J. W. (2011, 4-7 Jan. 2011). Securing Health Care: Assessing Factors That Affect HIPAA Security Compliance in Academic Medical Centers. Paper presented at the System Sciences (HICSS), 2011 44th Hawaii International Conference.

Guo, K. H. (2012). Security-related behavior in using information systems in the workplace: A review and synthesis. Computers & Security, 3 (1), 242-251.


Höne, K., & Eloff, J. H. P. (2002). What Makes an Effective Information Security Policy?. Network Security, 2002(6), 14-16.

Johnston, A. C., & Warkentin, M. (2008). Information privacy compliance in the healthcare industry. Information Management & Computer Security, 16(1), 5-19.

Ng, B.-Y., Atreyi, K., & Yunjie, X. (2009). Studying users' computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815-825.

Padayachee, K. (2012). Taxonomy of compliant information security behavior. Computers & Security, 31(5), 673-680.

Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., & Jerram, C. (2014). Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Computers & Security, 42(0), 165-176.

Rocha Flores, W., Antonsen, E., & Ekstedt, M. (2014). Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Computers & Security, 43(0), 90-110.

Waly, N., Tassabehji, R., & Kamala, M. (2012, 25-27 June 2012). Improving Organisational Information Security Management: The Impact of Training and Awareness. Paper presented at the High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS).

In-Text Citation: (Humaidi, Balakrishnan, & Shahrom, 2018)
To Cite this Article: Humaidi, N., Balakrishnan, V., & Shahrom, M. (2018). Exploring User’s Experience using E-Notification Management System. International Journal of Academic Research in Business and Social Sciences, 8(11), 1589–1602.