Identify of Factors Affecting Information Security Awareness and Weight Analysis Process
Issam Al-Shanfari1, Warusia Yassin2, Raihana Abdullah3
1Issam Al-Shanfari*, PhD student, Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM) Durian Tunggal, Melaka.
2Dr. Warusia Yassin, Senior lecturer, Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka.
3Dr. Raihana Abdullah, Senior lecturer, Center for Advanced Computing Technology (C-ACT), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka.
Manuscript received on February 01, 2020. | Revised Manuscript received on February 05, 2020. | Manuscript published on February 30, 2020. | PP: 534-542 | Volume-9 Issue-3, February, 2020. | Retrieval Number: C4775029320/2020©BEIESP | DOI: 10.35940/ijeat.C4775.029320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Information exchange is a key aspect of using technology in everyday life. Crimes associated with the lack of information security awareness (ISA), misuse and carelessness are on the increase and often result in heavy losses and serious consequences. In order for ISA campaigns and programmes to be effective, the most successful and influential factors must be employed in the human component of the security awareness process. The purpose of this study is to investigate the causes of human breaches to information security and undertake a weight analysis of the models’ predictors’ relationships utilised in ISA literature from the current decade. Usable data were collected from twenty-one empirical studies related to ISA research in order to obtain the correlations required to perform a weight analysis process for a predictor’s relationships. The relationships examined in all studies used in this research (significant–non-significant) are presented in a diagram. Findings show that six independent variables were found to be classified as ‘well-utilised’ variables, and the rest of the independent variables converge at the ‘Promising’ classification level. Contributions, limitations and directions of future work are presented.
Keywords: Information Security awareness, ISA Success Factors, ISA Predictors, ISA Constructs, Weight Analysis.