Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/26492
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAlraja, MN-
dc.contributor.authorButt, UJ-
dc.contributor.authorAbbod, M-
dc.date.accessioned2023-05-22T19:33:44Z-
dc.date.available2023-05-22T19:33:44Z-
dc.date.issued2023-03-29-
dc.identifierORCID iDs: Mansour Naser Alraja https://orcid.org/0000-0003-3492-8838; Usman Javed Butt https://orcid.org/0000-0002-1703-8756; Maysam Abbod https://orcid.org/0000-0002-8515-7933.-
dc.identifier103208-
dc.identifier.citationAlraja, M.N., Butt, U.J. and Abbod, M. (2023) 'Information security policies compliance in a global setting: An employee's perspective', Computers and Security, 129, 103208, pp. 1 - 16. doi: 10.1016/j.cose.2023.103208.en_US
dc.identifier.issn0167-4048-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/26492-
dc.descriptionData availability: The data that has been used is confidential.en_US
dc.description.abstractInformation security threats have a severe negative impact on enterprises. Organizations rely on employee compliance with information security policies to eliminate or reduce these hazards. The Unified Model of Information Security Policies Compliance (UMISPC) is employed to identify the factors that may affect employees' intention towards compliance with information systems security policy and reactance in a global setting. The study was assessed in two phases. The model's validity and measurement reliability were evaluated in the first phase, while in the second phase, all preliminary model relationships were appraised. This was achieved utilizing structural equation modelling to establish whether the proposed constructs, i.e. neutralization, response efficacy, fear, threat, habit and role values were good predictors for intention or reactance towards compliance with information systems security policy. Participants included 348 employees from 7 nations, i.e. the USA, the UK, Oman, India, Pakistan, Malaysia, and the Philippines. SmartPLS v. 3.3.9 was used for data analysis. The models' measurement reliability and validity were affirmed. Fear and role values have a significant influence on intention toward ISPC. RE significantly predicted threat which in turn significantly predicted fear, and the latter demonstrated a significant effect on reactance as well as Neutralization predicted reactance. In contrast, habit failed to reach a significant influence on intention towards ISPC. The implications are presented, together with proposals for further studies. Our findings are helpful for ISS literature and application by supporting the crucial functions of role values in encouraging employees to behave in a compliant manner. Additionally, it is regarded as the first empirical attempt to estimate intended compliance concerning ISPs in higher education from a worldwide viewpoint.en_US
dc.description.sponsorshipThe Research Council (TRC), Sultanate of Oman (Block Fund-Research Grant), BFP/RGP/ICT/21/132.en_US
dc.format.extent1 - 16-
dc.format.mediumPrint-Electronic-
dc.languageEnglish-
dc.language.isoen_USen_US
dc.publisherElsevieren_US
dc.rightsCrown Copyright © 2023 Published by Elsevier Ltd. This is an open access article under the CC BY license ( https://creativecommons.org/licenses/by/4.0/ )-
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/-
dc.subjectinformation security policies complianceen_US
dc.subjectUMISPCen_US
dc.subjectneutralizationen_US
dc.subjectfearen_US
dc.subjecthabit and role valuesen_US
dc.subjectreactanceen_US
dc.titleInformation security policies compliance in a global setting: An employee's perspectiveen_US
dc.typeArticleen_US
dc.identifier.doihttps://doi.org/10.1016/j.cose.2023.103208-
dc.relation.isPartOfComputers and Security-
pubs.publication-statusPublished-
pubs.volume129-
dc.identifier.eissn1872-6208-
dc.rights.holderCrown Copyright / The Author(s)-
Appears in Collections:Dept of Electronic and Electrical Engineering Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCrown Copyright © 2023 Published by Elsevier Ltd. This is an open access article under the CC BY license ( https://creativecommons.org/licenses/by/4.0/ )1.95 MBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons