Information security policy perceived compliance model for staff in Palestine Universities /

Information security policies play a significant role in securing university information assets. There should be clear information security policies in place to ensure effective staff compliance—policy perceptibility has a positive impact on employee adherence. The focus of the research is staff com...

Full description

Saved in:
Bibliographic Details
Main Author: Iriqat, Yousef Mohammad Mousa (Author)
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2020
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/10424
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 052250000a22004210004500
008 210205s2020 my a f m 000 0 eng d
040 |a UIAM  |b eng  |e rda 
041 |a eng 
043 |a a-my--- 
050 4 |a TK5105.59 
100 1 |a Iriqat, Yousef Mohammad Mousa,  |e author 
245 1 0 |a Information security policy perceived compliance model for staff in Palestine Universities /  |c by Yousef Mohammad Mousa Iriqat 
264 1 |a Kuala Lumpur :  |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,  |c 2020 
300 |a xvi, 276 leaves :  |b illustrations ;  |c 30cm. 
336 |2 rdacontent  |a text 
337 |2 rdamedia  |a unmediated 
338 |2 rdacarrier  |a volume 
338 |2 rdacarrier  |a online resource 
347 |2 rdaft  |a text file  |b PDF 
500 |a Abstracts in English and Arabic. 
500 |a "A thesis submitted in fulfilment of the requirement for the degree of Doctor of Philosophy in Information Technology." --On title page. 
502 |a Thesis (Ph.D)--International Islamic University Malaysia, 2020. 
504 |a Includes bibliographical references (leaves 234-255). 
520 |a Information security policies play a significant role in securing university information assets. There should be clear information security policies in place to ensure effective staff compliance—policy perceptibility has a positive impact on employee adherence. The focus of the research is staff compliance intention of information security policies in Palestine universities. There is a need for empirical analysis on staff perception of information security policies compliance based on the intersection and combination of factors adopted from research on multiple information security theories that could have a direct/ indirect effect on staff compliance intention. Therefore, this study seeks to understand and explore staff compliance intention of information security policies based on how they perceive several factors such as perceived sanction from general deterrence theory, perceived rewards as extrinsic motivation, perceived coping appraisal from protection motivation theory, and, information quality, information privacy and facilitating conditions perceived factors from information reinforcement. Therefore, we propose a theoretical novel model built around the perception core model and the Palestinian context. The core model constitutes the perception factors, that is, how “perceived” factors directly affect “perceived” intention to comply. Our model is suited for the Palestinian context, as it works to understand staff compliance of information security policies based on staff perception of policy focused areas and staff security education and training awareness. To significantly implement the theoretical research model, the population of the study covers a wide area of Palestine form several universities to validate and confirm the model empirically using structural equation modelling. The study research design is an empirical, quantitative, exploratory (and descriptive), in addition to the developed research instrument incorporated to achieve the research methods and objectives specifically. The study objective was achieved by carefully reviewing the most appropriate potential approaches to the problem. The researcher sought a model that could find and explain any gaps in staff perception of information security policies and model factors. Thus, a novel model was designed, validated and tested. This study made a theoretical contribution through its novel model. The use of policy focused areas made the model incorporate elements from the Palestinian context directly. This is important, as current staff perceptions of information security policies play a significant role in studying them and discussing potential future policies. In this sense, it provides a methodological contribution. Furthermore, the use of data on security education and training awareness enabled us to provide potential solutions to existing problems more effectively. Security education and training awareness programs demonstrably enhance compliance intention and unify efforts between universities and their employees to mitigate security threats from insiders, be they intentional or unintentional. This constitutes a practical contribution. 
596 |a 1 
650 0 |a Computer networks  |x Security measures  |z Palestine 
650 0 |a Internet  |x Security measures  |z Palestine 
650 0 |a Electronic data processing  |x Security measures  |z Palestine 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Kulliyyah of Information and Communication Technology  |z IIUM 
700 0 |a Abd. Rahman Ahlan,  |e degree supervisor 
700 0 |a Nurul Nuha Abdul Molok,  |e degree supervisor 
700 0 |a Noor Hayani Abd Rahim,  |e degree supervisor 
710 2 |a International Islamic University Malaysia.  |b Kulliyyah of Information and Communication Technology 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/10424 
900 |a sz-nbm-sar 
999 |c 441790  |d 472166 
952 |0 0  |6 T TK 005105.59 I68I 2020  |7 0  |8 THESES  |9 761839  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t TK 5105.59 I68I 2020  |p 11100424723  |r 1900-01-02  |t 1  |v 0.00  |y THESIS