Journal Screenshot

International Journal of Academic Research in Business and Social Sciences

Open Access Journal

ISSN: 2222-6990

Information Security Behaviors among Employees

Nor Natasha Ashira Shamsudin, Saiful Farik Mat Yatin, Nurul Fadhlin Mohd Nazim, Amie Witiza Talib, Mohammad Afiq Mohamed Sopiee, Fifi Natasya Shaari

http://dx.doi.org/10.6007/IJARBSS/v9-i6/5972

Open access

Information Security is crucial to organization especially to financial and industrial when dealing with company information and data. Information Security is defined as protecting the information and information system from unauthorized access, use, disruption, modification, disclosure, or also the destruction which to provide the confidentiality, availability, and integrity of the information. Information Security role as protecting the information and systems that covers compliance which involves data protection and publication scheme, and Information Management for Corporate Records, Copyrights and Intellectual Property. In this fast-changing world today, mobile technologies in information age nowadays have the ability and advance functions of computers and connectivity. In everyone’s daily life, technologies have become integral and ubiquitous without their realization and user is vulnerable to the cyber-attack. Criminal hackers are attracted to steal personal and organization information. Thus, corporate data must be prevented from being transferred to personal application whether it is on personal devices or computer networks. As for organization, information and data are crucial for their organization plan, business conducts and future successfulness. This article will discuss issues, awareness, types of behavior, compliance and policies regarding information security.

Abraham, S. (2011). Information security behavior: Factors and research directions. 17th Americas Conference on Information Systems 2011, AMCIS 2011, 5, 4050–4062.
Alshare, K., Lane, P. L., & Lane, M. R. (2018). Information security policy compliance: a higher education case study. Information and Computer Security, 00–00. https://doi.org/10.1108/ICS-09-2016-0073
Hall, J. H., Sarkani, S., & Mazzuchi, T. A. (2011). Impacts of organizational capabilities in information security. Information Management & Computer Security, 19(3), 155–176. https://doi.org/10.1108/09685221111153546
Jones, B. H., & Chin, A. G. (2015). On the efficacy of smartphone security: A critical analysis Of modifications in business students’ practices over time. International Journal of Information Management, 561-571.
Kim, B. E. (2014). Recommendations for information security awareness training for college students. Information Management & Computer Security, 115-126.
Kraus, L., Wechsung, I., & Moller, S. (2017). Psychological needs as motivators for security and privacy actions on smartphones. Journal of Information Security and Applications, 34-45.
Li, Y. (2015). Users’ information systems (IS) security behavior in different contexts.
Pattinson, M., Parsons, K., Butavicius, M., McCormac, A., & Calic, D. (2016). Assessing information security attitudes: a comparison of two studies. Information and Computer Security, 24(2), 228–240. https://doi.org/10.1108/ICS-01-2016-0009
Roman, U. (2017). Mobile malware evolution 2016. Retrieved from secure list: https://securelist.com/mobile-malware-evolution-2016/77681/
Stewart, H., & Jurjens, J. (2017). Information security management and the human aspect in organizations. Information and Computer Security, 25(5), 494–534. https://doi.org/10.1108/ICS-07-2016-0054
Sharma, K., & Gupta, B. (2016). Multi-layer Defense against Malware Attacks on Smartphone Wi-Fi Access Channel. Procedia Computer Science, 19-25.
Theoharidou, M., Mylonas, A., & Gritzalis, D. (2012). A Risk Assessment Method for Smartphones. Information Security and Privacy Research, 443-456.
Yazdanmehr, A., & Wang, J. (2016). Employees’ information security policy compliance: A norm activation perspective. Decision Support Systems, 92, 36–46.
https://doi.org/10.1016/j.dss.2016.09.009

In-Text Citation: (Shamsudin et al., 2019)
To Cite this Article: Shamsudin, N. N. A., Yatin, S. F. M., Nazim, N. F. M., Talib, A. W., Sopiee, M. A. M., & Shaari, F. N. (2019). Information Security Behaviors among Employees. International Journal of Academic Research in Business and Social Sciences, 9(6), 560–571.