IDEAS home Printed from https://ideas.repec.org/a/mth/bmsmti/v10y2019i2p64-81.html
   My bibliography  Save this article

Understanding Human Behaviour in Information Security Policy Compliance in a Malaysian Local Authority Organization

Author

Listed:
  • Norhayati Sarmoen
  • Haliyana Khalid
  • Siti Zaleha Abd Rasid
  • Shathees A L Baskaran
  • Rohaida Basiruddin

Abstract

The utilization of the Information and Communications Technology (ICT), such as the Internet and electronic mail (e-mail) has made communication nowadays easier, faster and has tremendously reduced the usage of paper. However, if the usage of internet is not properly managed, the possibility of confidential information leakage from the inside of the organization to other entities outside of the organization may occur. The impacts of this malicious activity are beyond the boundaries and cannot be controlled despite implementing various preventive steps and enforcing various regulations. Previous studies have outlined different factors in influencing information leakages in various organizations. However, none had really identified the severity of the factors up to this day. This research hopes to fill this gap, by focusing on staff in Majlis Perbandaran Pasir Gudang (MPPG), Johor, Malaysia. This study covers factors related to human behaviour which have led towards the cases of information breach. The factors include the lack of understanding of information policy, the lack of training, poor management support and the insensitivity of the staffs toward safeguarding the information from falling to the wrong hands. Thus, it is suggested that the ICT security protection needs to be robust, secure and reliable so that the use of the internet or social media will not only enhance the communication efficiency, but also to ensure that the information security in an organization is at the most optimum level.

Suggested Citation

  • Norhayati Sarmoen & Haliyana Khalid & Siti Zaleha Abd Rasid & Shathees A L Baskaran & Rohaida Basiruddin, 2019. "Understanding Human Behaviour in Information Security Policy Compliance in a Malaysian Local Authority Organization," Business Management and Strategy, Macrothink Institute, vol. 10(2), pages 64-81, December.
  • Handle: RePEc:mth:bmsmti:v:10:y:2019:i:2:p:64-81
    as

    Download full text from publisher

    File URL: http://www.macrothink.org/journal/index.php/bms/article/download/14909/11995
    Download Restriction: no

    File URL: http://www.macrothink.org/journal/index.php/bms/article/view/14909
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Neil F. Doherty & Heather Fulford, 2005. "Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis," Information Resources Management Journal (IRMJ), IGI Global, vol. 18(4), pages 21-39, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Sanghyun Kim & Bora Kim & Minsoo Seo, 2020. "Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance," Sustainability, MDPI, vol. 12(15), pages 1-24, July.
    2. Doherty, Neil Francis & Anastasakis, Leonidas & Fulford, Heather, 2011. "Reinforcing the security of corporate information resources: A critical review of the role of the acceptable use policy," International Journal of Information Management, Elsevier, vol. 31(3), pages 201-209.
    3. Doherty, Neil Francis & Anastasakis, Leonidas & Fulford, Heather, 2009. "The information security policy unpacked: A critical study of the content of university policies," International Journal of Information Management, Elsevier, vol. 29(6), pages 449-457.
    4. Myung Ko & Kweku-Muata & Carlos Dorantesa, 2008. "Planning Technology Investments For High Payoffs: A Rational Expectations Approach To Gauging Potential And Realized Value In A Changing Environment," Working Papers 0040, College of Business, University of Texas at San Antonio.
    5. Jeffrey Roberts & David Wasieleski, 2012. "Moral Reasoning in Computer-Based Task Environments: Exploring the Interplay between Cognitive and Technological Factors on Individuals’ Propensity to Break Rules," Journal of Business Ethics, Springer, vol. 110(3), pages 355-376, October.
    6. Karan Bhanot & Valeria Martinez & Zi Ning & Yiuman Tse, 2008. "Competition for Order Flow and Market Quality in the Gold and Silver Futures Markets," Working Papers 0036, College of Business, University of Texas at San Antonio.

    More about this item

    JEL classification:

    • R00 - Urban, Rural, Regional, Real Estate, and Transportation Economics - - General - - - General
    • Z0 - Other Special Topics - - General

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:mth:bmsmti:v:10:y:2019:i:2:p:64-81. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Technical Support Office (email available below). General contact details of provider: http://www.macrothink.org/journal/index.php/bms .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.