Assignment 01
Assignment 01
STUDENT NO # 34548635
5. CONCLUSION
In this literature review, we have explored the psychological, organizational, and
technological factors that influence user security behaviour. Non-compliance, human error,
and reluctance to change and new security procedures are user security behaviour issues.
We also recommend security awareness and training programs, user-centred security
design, a strong organizational security culture, and security technologies. All these
variables must be considered to establish a secure and user-friendly computer environment.
Protection motivation and planned behaviour theories can explain security behaviour's
cognitive processes. Security rules, training, awareness initiatives, and repercussions for
non-compliance can affect how important security is and how well recommended
behaviours work. Security tool usability and system vulnerabilities can affect security
practice adoption and compliance. This literature analysis revealed various ways to improve
user security behaviour, however good security practices require continual work and
commitment. Organizations must employ user-centred security design, frequent security
training and awareness campaigns, and developing security technologies. Such tactics can
boost security and lower security breaches.
7. REFERENCES
Mou, J., Cohen, J. F., Bhattacherjee, A., & Kim, J. (2022). A test of protection motivation
theory in the information security literature: A meta-analytic structural equation modeling
approach. Journal of the Association for Information Systems, 23(1), 196-236.
Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the
effectiveness of cybersecurity awareness program. Journal of Cybersecurity, 8(1), tyac006.
Ali, R. F., Dominic, P. D. D., Ali, S. E. A., Rehman, M., & Sohail, A. (2021). Information security
behaviour and information security policy compliance: A systematic literature review for
identifying the transformation process from noncompliance to compliance. Applied
Sciences, 11(8), 3383.
Hong, Y., & Furnell, S. (2021). Understanding cybersecurity behavioural habits: Insights from
situational support. Journal of Information Security and Applications, 57, 102710.
Giwah, A. D., Wang, L., Levy, Y., & Hur, I. (2020). Empirical assessment of mobile device
users’ information security behaviour towards data breach: Leveraging protection
motivation theory. Journal of Intellectual Capital, 21(2), 215-233.
Grobler, M., Gaire, R., & Nepal, S. (2021). User, usage and usability: Redefining human
centric cyber security. Frontiers in big Data, 4, 583723.
Ameen, N., Tarhini, A., Shah, M. H., & Madichie, N. O. (2020). Employees’ behavioural
intention to smartphone security: A gender-based, cross-national study. Computers in
Human Behaviour, 104, 106184.
Haag, S., Siponen, M., & Liu, F. (2021). Protection motivation theory in information systems
security research: A review of the past and a road map for the future. ACM SIGMIS
Database: the DATABASE for Advances in Information Systems, 52(2), 25-67.
Ou, C. X., Zhang, X., Angelopoulos, S., Davison, R. M., & Janse, N. (2022). Security breaches
and organization response strategy: Exploring consumers’ threat and coping appraisals.
International Journal of Information Management, 65, 102498.
Shahbaznezhad, H., Kolini, F., & Rashidirad, M. (2021). Employees’ behaviour in phishing
attacks: what individual, organizational, and technological factors matter?. Journal of
Computer Information Systems, 61(6), 539-550.
Moustafa, A. A., Bello, A., & Maurushat, A. (2021). The role of user behaviour in improving
cyber security management. Frontiers in Psychology, 12, 561011.
Koohang, A., Anderson, J., Nord, J. H., & Paliszkiewicz, J. (2020). Building an awareness-
centered information security policy compliance model. Industrial Management & Data
Systems.
Vance, A., Siponen, M. T., & Straub, D. W. (2020). Effects of sanctions, moral beliefs, and
neutralization on information security policy violations across cultures. Information &
Management, 57(4), 103212.
Ali, R. F., Dominic, P. D. D., Ali, S. E. A., Rehman, M., & Sohail, A. (2021). Information security
behaviour and information security policy compliance: A systematic literature review for
identifying the transformation process from noncompliance to compliance. Applied
Sciences, 11(8), 3383.
Gwebu, K. L., Wang, J., & Hu, M. Y. (2020). Information security policy noncompliance: An
integrative social influence model. Information Systems Journal, 30(2), 220-269.
Hadlington, L., Binder, J., & Stanulewicz, N. (2021). Exploring role of moral disengagement
and counterproductive work behaviours in information security awareness. Computers in
Human Behaviour, 114, 106557.