The Moderating Role of Information Security Behaviour (ISB) on the Relationship between Digital Literacy (DL) and Information Security Culture (ISC): A Proposed Research Framework †
Abstract
:1. Introduction
2. Literature Review
3. Problem Statement
3.1. Vulnerability of Employee Behaviour
3.2. Remote Working and Safety Issue
3.3. Insufficient Digital Literacy Skill
3.4. Digital Literacy Skill Knowledge Gap and Scarcity of DL Studies on Employees in the Government Sector, Security Aspects, Information Security Behaviour and Information Security Culture
4. Proposed Framework
4.1. Digital Literacy
4.1.1. Cognitive Component
4.1.2. Technical Component
4.1.3. Social Emotional
4.2. Information Security Behaviour
4.3. Information Security Culture
5. Discussion and Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- AlHogail, A. Design and validation of information security culture framework. Comput. Hum. Behav. 2015, 49, 567–575. [Google Scholar] [CrossRef]
- Van Niekerk, J.F.; Von Solms, R. Information security culture: A management perspective. Comput. Secur. 2010, 94, 476–486. [Google Scholar] [CrossRef]
- Cheng, L.; Liu, F.; Yao, D. Enterprise data breach: Causes, challenges, prevention, and future directions Wiley interdisciplinary reviews. Data Min. Knowl. Discov. 2017, 7, e1211. [Google Scholar] [CrossRef]
- MyCert. 2017 Data Breaches Known So Far. Available online: www.mycert.org.my/data/content_files/27/831.pdf (accessed on 8 May 2020).
- PriceWaterhouseCoopers. The Global State of Infor—Mation Security® Survey 2018. Available online: https://www.pwc.com/us/en/services/consulting/cybersecurity/library/infor-mation-security-survey.html (accessed on 2 October 2019).
- AlHogail, A.; Mirza, A. Information security culture: A definition and a literature review. In Proceedings of the 2014 World Congress on Computer Applications and Information Systems (WCCAIS), Hammamet, Tunisia, 17–19 January 2014; IEEE: Hammamet, Tunisia, 2014. [Google Scholar]
- Masrek, M.N. Assessing information security culture: The case of Malaysia public organization’. In Proceedings of the 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), Semarang, Indonesia, 18–19 October 2017; IEEE: Hammamet, Tunisia, 2017. [Google Scholar]
- Malaysia Digital Economy Blueprint. Available online: https://www.epu.gov.my/sites/default/files/2021-02/malaysia-digital-economy-blueprint.pdf (accessed on 3 January 2022).
- Aziz, K.A.; Norhashim, M.; Halim, E.M. Information security and information technology governance: A Malaysian case study. Int. J. Manag. Pract. 2011, 4, 331. [Google Scholar] [CrossRef]
- Nel, F.; Drevin, L. Key elements of an information security culture in organisations. Inf. Comput. Secur. 2019, 27, 146–164. [Google Scholar] [CrossRef]
- Da Veiga, A.; Eloff, J.H.P. A framework and assessment instrument for information security culture. Comput. Secur. 2010, 29, 196–207. [Google Scholar] [CrossRef]
- Bulgurcu, B.; Cavusoglu, H.; Benbasat, I.I. Quarterly special issue information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Q. 2010, 34, 523–548. [Google Scholar] [CrossRef]
- Thomson, K.L.; Von Solms, R.; Louw, L. Cultivating an organizational information security culture. Comput. Fraud Secur. 2006, 10, 7–11. [Google Scholar] [CrossRef]
- Gordon, L.A.; Loeb, M.P. Managing Cybersecurity Resources: A Cost-Benefit Analysis; McGraw-Hill: New York, NY, USA, 2005. [Google Scholar]
- Orehek, Š.; Petrič, G. A Systematic Review of Scales for Measuring Information Security Culture. Inf. Comput. Secur. 2020, 29, 133–158. [Google Scholar] [CrossRef]
- Tsohou, A.; Karyda, M.; Kokolakis, S. Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. Comput. Secur. 2015, 52, 128–141. [Google Scholar] [CrossRef]
- Singh, N.; Gupta, A.M.; Ojha, A. Identifying factors of organizational information security management. J. Enterp. Inf. Manag. 2014, 27, 644–667. [Google Scholar] [CrossRef]
- Kontakte Klaus Julisch Managing Partner. Cybercrime—The Risks of Working from Home. Deloitte Switzerland. 2020. Available online: https://www2.deloitte.com/ch/en/pages/risk/articles/covid-19-cyber-crime-working-from-home.html (accessed on 16 March 2022).
- Information Security Behaviour Index. Perform Green; Perform Green Limited: Cheltenham, UK, 2019.
- Verizon. Data Breach Investigations Report. 2009. Available online: http://www.verizonbusiness.com/resources/security/reports/2009databreachrp.pdf (accessed on 7 June 2022).
- Andric, M. Fighting the enemy within. IT WEB Spec. Rep. 2007, 95, 54. [Google Scholar]
- Furnell, S.M.; Jusoh, A.; Katsabas, D. The challenges of understanding and using security: A survey of end-users. Comput. Secur. 2006, 25, 27–35. [Google Scholar] [CrossRef]
- Walton, C.B.R.; Limited, W.-M. Balancing the insider and outsider threat. Comput. Fraud. Secur. 2006, 11, 8–11. [Google Scholar] [CrossRef]
- Albrechtsen, E. A qualitative study of users’ views on information security. Comput. Secur. 2007, 26, 276–289. [Google Scholar] [CrossRef]
- Kraemer, S.; Carayon, P. Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists. Appl. Ergon. 2007, 38, 143–154. [Google Scholar] [CrossRef]
- Stanton, J.M. Analysis of end user security behaviours. Comput. Secur. 2005, 24, 124–133. [Google Scholar] [CrossRef]
- COBIT Security Baseline—An Information Security Survival Kit; IT Governance Institute: Schaumburg, IL, USA, 2004.
- Furnell, S.; Navin Shah, J. Home working and cyber security—An outbreak of unpreparedness? Comput. Fraud Secur. 2020, 2020, 6–12. [Google Scholar] [CrossRef]
- Mentsiev, A.U. The impact of digital technology on the study of languages and the development of digital education. J. Physics. Conf. Ser. 2019, 1399, 033085. [Google Scholar] [CrossRef]
- Mentsiev, A.U.; Chebieva, H.S. Modern internet security threats and countermeasures (overview). Eng. Her. Don. 2019, 3, 15. [Google Scholar]
- Pritam, S.N.; Vineeta, N.; Akhilesh, C.P. Impact of Information Technology on Learning, Teaching and Human Resource Management in Educational Sector. Int. J. Comput. Sci. Telecommun. 2011, 2, 66–72. [Google Scholar]
- Boss, S.R. If someone is watching, I’ll do what i’m asked: Mandatoriness, control, and information security. Eur. J. Inf. Syst. Off. J. Oper. Res. Soc. 2009, 18, 151–164. [Google Scholar] [CrossRef]
- Burkell, J.A.; Fortier, A.; Di Valentino, L.; Roberts, S. Enhancing key digital literacy skills: Information privacy, information security, and copyright/Intellectual Property. FIMS Publ. 2015, 35, 67. [Google Scholar]
- Ahsan, M.H.; Ayub, N.; Azman, N.S. Digital literacy in Malaysia: A systematic literature review on digital literacy in Malaysia: A systematic literature review on methodological approaches. Malays. J. Qual. Res. 2021, 7, 125. [Google Scholar]
- Nasir, A. Information security culture model for Malaysian organizations: A review. Int. J. Adv. Trends Comput. Sci. Eng. 2020, 9, 117–121. [Google Scholar] [CrossRef]
- Ng, W. Can we teach digital natives digital literacy? Comput. Educ. 2012, 59, 1065–1078. [Google Scholar] [CrossRef]
- Calvani, A.; Cartelli, A.; Fini, A.; Ranieri, M. Models and Instruments for Assessing Digital Competence at School. J. E-Learn. Knowl. Soc. 2008, 4, 183–193. [Google Scholar]
- Da Veiga, A.; Martins, N. Improving the information security culture through monitoring and implementation actions illustrated through a case study. Comput. Secur. 2015, 49, 162–176. [Google Scholar] [CrossRef]
- Martin, A.; Grudziecki, J. DigEuLit: Concepts and tools for digital literacy development. Innov. Teach. Learn. Inf. Comput. Sci. 2006, 5, 249–267. [Google Scholar] [CrossRef]
- Lion, R.; Meertens, R.M. Security or opportunity: The influence of risk-taking tendency on risk information preference. J. Risk Res. 2005, 8, 283–294. [Google Scholar] [CrossRef]
- Parsons, K.; Mccormac, A.; Butavicius, M.; Ferguson, L. Human Factors and Information Security: Individual, Culture and Security Environment. Science and Technology, (DSTO-TR-2484). 2010. Available online: http://www.dtic.mil/dtic/tr/fulltext/u2/a535944.pdf (accessed on 7 June 2022).
- van Laar, E. The relation between 21st-century skills and digital skills: A systematic literature review. Comput. Hum. Behav. 2017, 72, 577–588. [Google Scholar] [CrossRef]
- Iordache, C.; Mariën, I.; Baelden, D. Developing digital skills and competences: A quick-scan analysis of 13 digital literacy models. Ital. J. Sociol. Educ. 2017, 9, 6–30. [Google Scholar]
- Noh, Y. A study on the effect of digital literacy on information use behavior. J. Librariansh. Inf. Sci. 2017, 49, 26–56. [Google Scholar] [CrossRef]
- Quaicoe, J.S.; Pata, K. The teachers’ digital literacy: Determining digital divide in public basic schools in Ghana. Commun. Comput. Inf. Sci 2015, 552, 154–162. [Google Scholar] [CrossRef]
- Arbanas, K.; Spremic, M.; Hrustek, N.Z. Holistic framework for evaluating and improving information security culture. ASLIB J. Inf. Manag. 2021, 73, 699–719. [Google Scholar] [CrossRef]
- Ala-Mutka, K. Mapping Digital Competence: Towards a Conceptual Understanding (Technical Note No.” JRC67075-2011); European Commission Joint Research Centre: Seville, Spain, 2011. [Google Scholar]
- Mioduser, D.; Nachmias, R. WWW in Education’. Handbook on Information Technologies for Education and Training; Springer: Berlin/Heidelberg, Germany, 2002; pp. 23–43. [Google Scholar]
- Scardamalia, M.; Bereiter, C. Engaging students in a knowledge society. Educ. Leadersh. 1996, 54, 6–10. [Google Scholar]
- Wallace, P. The Psychology of the Internet; University Press: Cambridge, UK, 1999. [Google Scholar]
- Da Veiga, A.; Martins, N.; Eloff, J.H.P. Information security culture—Validation of an assessment instrument. Afr. J. 2007, 11, 147–166. [Google Scholar]
- Gray, G.M.; David, P.R. Dealing with the dangers of fear: The role of risk communication. Health Aff. (Proj. Hope) 2002, 21, 106–116. [Google Scholar] [CrossRef]
- Lawrence, P.S.; Deanna, D.C. Leveraging Behavioral Science to Mitigate Cyber Security Risk. Comput. Secur. 2012, 31, 597–611. [Google Scholar] [CrossRef]
No | Digital Literacy (DL) | |
---|---|---|
Main Component | Sub-Components | |
1 | Cognitive |
|
No | Digital Literacy (DL) | |
---|---|---|
Main Component | Sub-Components | |
2 | Technical |
|
No | Digital Literacy (DL) | |
---|---|---|
Main Component | Sub-Components | |
3 | Social Emotional |
|
No | Information Security Culture (ISC) | |
---|---|---|
Main Component | Components | |
4 | Information Security Culture (ISC) |
|
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kamarulzaman, M.S.; Shuhidan, S.M.; Wahid, K.A. The Moderating Role of Information Security Behaviour (ISB) on the Relationship between Digital Literacy (DL) and Information Security Culture (ISC): A Proposed Research Framework. Proceedings 2022, 82, 35. https://doi.org/10.3390/proceedings2022082035
Kamarulzaman MS, Shuhidan SM, Wahid KA. The Moderating Role of Information Security Behaviour (ISB) on the Relationship between Digital Literacy (DL) and Information Security Culture (ISC): A Proposed Research Framework. Proceedings. 2022; 82(1):35. https://doi.org/10.3390/proceedings2022082035
Chicago/Turabian StyleKamarulzaman, Mohd Sharulnizam, Shamila Mohamed Shuhidan, and Khalid Abdul Wahid. 2022. "The Moderating Role of Information Security Behaviour (ISB) on the Relationship between Digital Literacy (DL) and Information Security Culture (ISC): A Proposed Research Framework" Proceedings 82, no. 1: 35. https://doi.org/10.3390/proceedings2022082035
APA StyleKamarulzaman, M. S., Shuhidan, S. M., & Wahid, K. A. (2022). The Moderating Role of Information Security Behaviour (ISB) on the Relationship between Digital Literacy (DL) and Information Security Culture (ISC): A Proposed Research Framework. Proceedings, 82(1), 35. https://doi.org/10.3390/proceedings2022082035