IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v15y2023i17p12669-d1221970.html
   My bibliography  Save this article

An Empirical Study of SETA Program Sustaining Educational Sector’s Information Security vs. Information Systems Misuse

Author

Listed:
  • Binglong Zheng

    (College of Business, City University of Hong Kong, Kowloon, Hong Kong, China)

  • Daniel Tse

    (College of Business, City University of Hong Kong, Kowloon, Hong Kong, China)

  • Jiajing Ma

    (College of Business, City University of Hong Kong, Kowloon, Hong Kong, China)

  • Xuanyi Lang

    (College of Business, City University of Hong Kong, Kowloon, Hong Kong, China)

  • Yinli Lu

    (College of Business, City University of Hong Kong, Kowloon, Hong Kong, China)

Abstract

Information systems misuse and data breaches are among the most common information security threats at the organisational and individual levels. Security, Education, Training and Awareness (SETA) program can be effective tools in addressing and preventing such risks for sustaining the educational sector’s information security, although it is costly to implement and achieves limited results. Several studies have shown that SETA implementation can improve corporate employees’ information security protection behaviours. This study adopts the method of quantitative research, deterrence theory with selected perceived cost and information security awareness (ISA) as intermediate variables and explores how SETA programs affect information system abuse on campuses. The results show that implementing the SETA program positively impacts perceived cost and ISA; perceived cost and information security positively impact reducing misuse behaviour of information systems. At last, we provide rationalisation suggestions for individual students and schools to help SETA programs to be better implemented.

Suggested Citation

  • Binglong Zheng & Daniel Tse & Jiajing Ma & Xuanyi Lang & Yinli Lu, 2023. "An Empirical Study of SETA Program Sustaining Educational Sector’s Information Security vs. Information Systems Misuse," Sustainability, MDPI, vol. 15(17), pages 1-17, August.
  • Handle: RePEc:gam:jsusta:v:15:y:2023:i:17:p:12669-:d:1221970
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/15/17/12669/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/15/17/12669/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Wissal Ben Arfi & Imed Ben Nasr & Tatiana Khvatova & Younes Ben Zaied, 2021. "Understanding acceptance of eHealthcare by IoT natives and IoT immigrants : An integrated model of UTAUT, perceived risk, and financial cost," Post-Print hal-03188218, HAL.
    2. John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
    3. Ben Arfi, Wissal & Ben Nasr, Imed & Khvatova, Tatiana & Ben Zaied, Younes, 2021. "Understanding acceptance of eHealthcare by IoT natives and IoT immigrants: An integrated model of UTAUT, perceived risk, and financial cost," Technological Forecasting and Social Change, Elsevier, vol. 163(C).
    4. Guangxu Wang & Daniel Tse & Yuanshuo Cui & Hantao Jiang, 2022. "An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation," Sustainability, MDPI, vol. 14(14), pages 1-13, July.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Hsing-Chun Hung & Yuh-Wen Chen, 2023. "Striving to Achieve United Nations Sustainable Development Goals of Taiwanese SMEs by Adopting Industry 4.0," Sustainability, MDPI, vol. 15(3), pages 1-18, January.
    2. Frishammar, Johan & Essén, Anna & Bergström, Frida & Ekman, Tilda, 2023. "Digital health platforms for the elderly? Key adoption and usage barriers and ways to address them," Technological Forecasting and Social Change, Elsevier, vol. 189(C).
    3. Ponzoa, José M. & Gómez, Andrés & Villaverde, Silvia & Díaz, Vicente, 2021. "Technologically empowered? perception and acceptance of AR glasses and 3D printers in new generations of consumers," Technological Forecasting and Social Change, Elsevier, vol. 173(C).
    4. Kraus, Sascha & Kumar, Satish & Lim, Weng Marc & Kaur, Jaspreet & Sharma, Anuj & Schiavone, Francesco, 2023. "From moon landing to metaverse: Tracing the evolution of Technological Forecasting and Social Change," Technological Forecasting and Social Change, Elsevier, vol. 189(C).
    5. Arfi, Wissal Ben & Nasr, Imed Ben & Kondrateva, Galina & Hikkerova, Lubica, 2021. "The role of trust in intention to use the IoT in eHealth: Application of the modified UTAUT in a consumer context," Technological Forecasting and Social Change, Elsevier, vol. 167(C).
    6. Naeini, Ali Bonyadi & Zamani, Mehdi & Daim, Tugrul U. & Sharma, Mahak & Yalcin, Haydar, 2022. "Conceptual structure and perspectives on “innovation management”: A bibliometric review," Technological Forecasting and Social Change, Elsevier, vol. 185(C).
    7. Xiong, Jie & Zuo, Meiyun, 2022. "Understanding factors influencing the adoption of a mobile platform of medical and senior care in China," Technological Forecasting and Social Change, Elsevier, vol. 179(C).
    8. Balakrishnan, Janarthanan & Abed, Salma S. & Jones, Paul, 2022. "The role of meta-UTAUT factors, perceived anthropomorphism, perceived intelligence, and social self-efficacy in chatbot-based services?," Technological Forecasting and Social Change, Elsevier, vol. 180(C).
    9. Chang, Mona & Walimuni, Arachchilage C.S.M. & Kim, Min-cheol & Lim, Hwa-soon, 2022. "Acceptance of tourism blockchain based on UTAUT and connectivism theory," Technology in Society, Elsevier, vol. 71(C).
    10. Kumju Hwang & Hyemi Um, 2021. "Social Controls and Bonds of Public Information Consumer on Sustainable Utilization and Provision for Computing," Sustainability, MDPI, vol. 13(9), pages 1-20, May.
    11. Jae Kyu Lee & Younghoon Chang & Hun Yeong Kwon & Beopyeon Kim, 2020. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach," Information Systems Frontiers, Springer, vol. 22(1), pages 45-57, February.
    12. Eric Jardine, 2020. "The Case against Commercial Antivirus Software: Risk Homeostasis and Information Problems in Cybersecurity," Risk Analysis, John Wiley & Sons, vol. 40(8), pages 1571-1588, August.
    13. Silva, Leiser & Hsu, Carol & Backhouse, James & McDonnell, Aidan, 2016. "Resistance and power in a security certification scheme: the case of c:cure," LSE Research Online Documents on Economics 68348, London School of Economics and Political Science, LSE Library.
    14. Sumantra Sarkar & Anthony Vance & Balasubramaniam Ramesh & Menelaos Demestihas & Daniel Thomas Wu, 2020. "The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context," Information Systems Research, INFORMS, vol. 31(4), pages 1240-1259, December.
    15. Mengmeng Song & Joseph Ugrin & Man Li & Jinnan Wu & Shanshan Guo & Wenpei Zhang, 2021. "Do Deterrence Mechanisms Reduce Cyberloafing When It Is an Observed Workplace Norm? A Moderated Mediation Model," IJERPH, MDPI, vol. 18(13), pages 1-16, June.
    16. Chang-Gyu Yang & Hee-Jun Lee, 2016. "A study on the antecedents of healthcare information protection intention," Information Systems Frontiers, Springer, vol. 18(2), pages 253-263, April.
    17. Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
    18. Yan Chen & Dennis F. Galletta & Paul Benjamin Lowry & Xin (Robert) Luo & Gregory D. Moody & Robert Willison, 2021. "Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model," Information Systems Research, INFORMS, vol. 32(3), pages 1043-1065, September.
    19. Dang, Ngoc Bich & Bertrandias, Laurent, 2023. "Social robots as healing aids: How and why powerlessness influences the intention to adopt social robots," Technological Forecasting and Social Change, Elsevier, vol. 196(C).
    20. A. J. Burns & Clay Posey & James F. Courtney & Tom L. Roberts & Prabhashi Nanayakkara, 0. "Organizational information security as a complex adaptive system: insights from three agent-based models," Information Systems Frontiers, Springer, vol. 0, pages 1-16.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:15:y:2023:i:17:p:12669-:d:1221970. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.