Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 16
Page No. 4150 - 4155

Security Compliance Behaviour of SaaS Cloud Users: A Pilot Study

Authors : Hanifah Abdul Hamid, Mokhtar Mohd Yusof and Nuradli Ridzwan Shah Mohd Dali

References

Abdul Hamid, H. and M.M. Yusof, 2015. State-of-the-art of cloud computing adoption in Malaysia: A review. J. Teknologi, 77: 131-136.
Direct Link  |  

Al-Hamar, M., R. Dawson and L. Guan, 2010. A culture of trust threatens security and privacy in Qatar. Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), June 29-July 1, 2010, IEEE, Bradford, UK, ISBN:978-1-4244-7547-6, pp: 991-995.

AlHogail, A., 2015. Design and validation of information security culture framework. Comput. Hum. Behav., 49: 567-575.
Direct Link  |  

Alfawaz, S., K. Nelson and K. Mohannak, 2010. Information security culture: A behaviour compliance conceptual framework. Proceedings of the 8th Australasian Conference on Information Security Vol. 105, January 1, 2010, Australian Computer Society, Brisbane, Australia, ISBN:978-1-920682-86-6, pp: 47-55.

Allen, S., 2011. The ten commandments of computer ethics. Computer Ethics Institute, Washington, D.C., USA. http://cpsr.org/issues/ethics/cei/

Alnatheer, M. and K. Nelson, 2009. A proposed framework for understanding information security culture and practices in the Saudi context. Proceedings of the 7th Australian Information Security Management Conference, December 1-3, 2009, Perth, Western Australia, pp: 6-17.

Alnatheer, M.A., 2015. Information security culture critical success factors. Proceedings of the 12th International Conference on Information Technology-New Generations, April 13-15, 2015, Las Vegas, NV., pp: 731-735.

Bandura, A., 1989. Social cognitive theory. Ann. Child Dev., 6: 1-60.

Bozic, G., 2012. The role of a stress model in the development of information security culture. Proceedings of the 35th International Convention on MIPRO, May 21-258, 2012, IEEE, Opatija, Croatia, ISBN:978-1-4673-2577-6, pp: 1555-1559.

Castro, D., 2013. How much will PRISM cost the US cloud computing industry?. Inf. Technol. Innov. Found., 2013: 1-9.
Direct Link  |  

Cohen, J., P. Cohen, S.G. West and L. Aiken, 2013. Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences. 3rd Edn., Lawrence Erlbaum Associates Inc, New Jersey, USA., ISBN:0-8058-2223-2,.

Colella, A., A. Castiglione and D.A. Santis, 2014. The role of trust and co-partnership in the societal digital security culture approach. Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems (INCoS), September 10-12, 2014, IEEE, Salerno, Italy, ISBN:978-1-4799-6388-1, pp: 350-355.

Connolly, L. and M. Lang, 2013. Information systems security: The role of cultural aspects in organizational settings. Proceedings of the Eighth Pre-ICIS Workshop on Information Security and Privacy, December 14, 2013, National University of Ireland, Milano, Italy, pp: 1-16.

Connolly, L., M. Lang and J.D. Tygar, 2015. Investigation of employee security behaviour: A grounded theory approach. Proceedings of the IFIP International Conference on Information Security, May 26-28, 2015, Springer, Berlin, Germany, pp: 283-296.

Coventry, L., P. Briggs, J. Blythe and M. Tran, 2014. Using behavioural insights to improve the public’s use of cyber security best practices improve the public’s use of cyber. Government Office for Science, UK.

D'Arcy, J., A. Hovav and D. Galletta, 2009. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Inf. Syst. Res., 20: 79-98.
Direct Link  |  

Da-Veiga, A. and J.H. Eloff, 2010. A framework and assessment instrument for information security culture. Comput. Secur., 29: 196-207.
Direct Link  |  

Donaldson, L., 1985. In Defence of Organisation Theory: A Reply to the Critics. Vol. 9, Cambridge University Press, Cambridge, UK., Pages: 193.

D’Arcy, J. and A. Hovav, 2009. Does one size fit all? Examining the differential effects of IS security countermeasures. J. Bus. Ethics, 89: 59-71.
CrossRef  |  Direct Link  |  

Flores, W.R., E. Antonsen and M. Ekstedt, 2014. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Comput. Secur., 43: 90-110.
CrossRef  |  Direct Link  |  

Gonzalez, N., C. Miers, F. Redigolo, M. Simplicio and T. Carvalho et al., 2012. A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl., 1: 1-18.
CrossRef  |  Direct Link  |  

Hamid, A.H. and M.M. Yusof, 2016. Conceptualizing global cloud landscape: A review of adoption issues and challenges. Res. J. Appl. Sci., 11: 333-339.
Direct Link  |  

Herath, T. and H.R. Rao, 2009. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decis. Support Syst., 47: 154-165.
CrossRef  |  Direct Link  |  

Hu, Q., T. Dinev, P. Hart and D. Cooke, 2012. Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decis. Sci., 43: 615-660.
CrossRef  |  

Kayworth, T. and D. Whitten, 2012. Effective information security requires a balance of social and technology factors. Mis Q. Executive, 9: 163-175.
Direct Link  |  

Koh, K., A.B. Ruighaver, S.B. Maynard and A. Ahmad, 2005. Security governance: Its impact on security culture. Proceedings of the 3rd Conference on Australian Information Security Management (AISM-2005), September 30, 2005, Edith Cowan University, Western Australia, pp: 1-12.

Kooper, M.N., R. Maes and E.R. Lindgreen, 2011. On the governance of information: Introducing a new concept of governance to support the management of information. Intl. J. Inf. Manage., 31: 195-200.
Direct Link  |  

Miller, A., R. Horne and C. Potter, 2015. Information security breaches survey. Department for Business Innovation & Skills, London.

Munteanu, A.B. and D. Fotache, 2015. Enablers of information security culture. Procedia Econ. Finance, 20: 414-422.
Direct Link  |  

Nunnally, J.C. Jr., 1970. Introduction to Psychological Measurement. McGraw-Hill, New York, USA., Pages: 572.

Parsons, K., A. McCormac, M. Butavicius, M. Pattinson and C. Jerram, 2014. Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Comput. Secur., 42: 165-176.
Direct Link  |  

Patnayakuni, R., 2014. Information security in value chains: A governance perspective. Proceedings of the 20th Americas Conference on Information Systems, August 7-9, 2014, Carnegie Mellon University, Pittsburgh, Pennsylvania, pp: 1-10.

Peterson, R.R., R. O'Callaghan and P. Ribbers, 2000. Information technology governance by design: Investigating hybrid configurations and integration mechanisms. Proceedings of the 21st International Conference on Information Systems, December 6-8, 2000, Association for Information Systems, Atlanta, Georgia, USA., pp: 435-452.

Posthumus, S. and R. Von Solms, 2004. A framework for the governance of information security. Comput. Secur., 23: 638-646.
Direct Link  |  

Safa, N.S., M. Sookhak, R.V. Solms, S. Furnell and N.A. Ghani et al., 2015. Information security conscious care behaviour formation in organizations. Comput. Secur., 53: 65-78.
Direct Link  |  

Safa, N.S., R. Von Solms and S. Furnell, 2016. Information security policy compliance model in organizations. Comput. Secur., 56: 70-82.
Direct Link  |  

Siponen, M., M.A. Mahmood and S. Pahnila, 2014. Employees’ adherence to information security policies: An exploratory field study. Inf. Manage., 51: 217-224.
Direct Link  |  

Soomro, Z.A., M.H. Shah and J. Ahmed, 2016. Information security management needs more holistic approach: A literature review. Intl. J. Inf. Manage., 36: 215-225.
Direct Link  |  

Sulaiman, H. and N. Jamil, 2014. Information security governance model to enhance zakat information management in Malaysian zakat institutions. Proceedings of the International Conference on Information Technology and Multimedia (ICIMU), November 18-20, 2014, IEEE, Putrajaya, Malaysia, ISBN:978-1-4799-5424-7, pp: 200-205.

Topa, I. and M. Karyda, 2015. Identifying factors that influence employees’ security behavior for enhancing ISP compliance. Proceedings of the 12th International Conference on Trust and Privacy in Digital Business, September 1-2, 2015, Springer, Valencia, Spain, pp: 169-179.

Van Niekerk, J.F. and R. Von Solms, 2010. Information security culture: A management perspective. Comput. Secur., 29: 476-486.
Direct Link  |  

Vance, A., M. Siponen and S. Pahnila, 2012. Motivating IS security compliance: Insights from habit and protection motivation theory. Inform. Manage., 49: 190-198.
CrossRef  |  Direct Link  |  

Wallach, E.J., 1983. Individuals and organizations: The cultural match. Train. Dev. J., 37: 28-36.
Direct Link  |  

Williams, P.A., 2008. When trust defies common security sense. Health Inf. J., 14: 211-221.
Direct Link  |  

Zakaria, O., 2006. Internalisation of information security culture amongst employees through basic security knowledge. Proceedings of the IFIP TC-11 21st International Information Security Conference, May 22-24, 2006, Karlstad, Sweden, pp: 437-441.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved