Abstract
Purpose
– The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to conventional terrorism. So it aims to identify the theoretical framework that best explains the threat of cyberterrorism and conventional terrorism to national security derived from empirical data, using grounded theory, and to validate the developed grounded theory statistically by quantitative data.
Design/methodology/approach
– This paper presents the results of the quantitative study survey. It provides in the beginning basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA), were performed. Then, structural equation modelling was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.
Findings
– The first study, as a qualitative exploratory study, gives a rich data set that provides the foundation of the development of the second study, as a quantitative confirmatory study. In the researcher’s previous qualitative study, it provides a better theoretical understanding of the potential threat of cyber and conventional terrorism to Saudi national security. Also, it provides the development of the grounded theory of the study (Figure 1). It also has led to the development of the conceptual framework and the hypotheses for the second phase of the study (i.e. survey).
Originality/value
– It is original study based on empirical data collected from Saudi military and security officials and experts in the critical infrastructures.
Subject
Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Software,Management Information Systems
Reference47 articles.
1. Akter, S.
,
D’Ambra, J.
and
Ray, P.
(2011), “An evaluation of PLS based complex models: the roles of power analysis, predictive relevance and GOF index”, Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit, MI, 4-7 August.
2. Anderson, J.C.
and
Gerbing, D.W.
(1982), “Some methods for respecifying measurement models to obtain unidimensional construct measurement”,
Journal of Marketing Research
, Vol. 19 No. 4, pp. 453-460.
3. Anderson, J.C.
,
Gerbing, D.W.
and
Hunter, J.E.
(1987), “On the assessment of unidimensional measurement: internal and external consistency, and overall consistency criteria”,
Journal of Marketing Research
, Vol. 24 No. 4, pp. 432-437.
4. Bagozzi, R.P.
,
Yi, Y.
and
Phillips, L.W.
(1991), “Assessing construct validity in organizational research”,
Administrative Science Quarterly
, Vol. 36 No. 3, pp. 421-458.
5. Bartlett, M.S.
(1954), “A note on the multiplying factors for various X 2 approximations”,
Journal of the Royal Statistical Society. Series B (Methodological
), Vol. 16 No. 2, pp. 296-298.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献