Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia
-
Published:2023-03-30
Issue:7
Volume:15
Page:6019
-
ISSN:2071-1050
-
Container-title:Sustainability
-
language:en
-
Short-container-title:Sustainability
Affiliation:
1. Saudi Aramco Cybersecurity Chair, Department of Computer Information Systems, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia
Abstract
In the post pandemic era, the telecommuting of business employees has widely become acceptable in organizations, which demands extensive dependence on digital technologies. In addition, this poses additional security threats for business employees as well as organizations. In order to better respond to security threats, business employees must have a higher level of awareness of the potential threats that are relevant to digital infrastructure used within the workplace. In this paper, we present a quantitative study conducted in line with the theory of planned behavior to gain insight into employee behavior toward information security within different business sectors in Saudi Arabia. The key factors chosen for our model were password management, infrastructure security management, email management, organizational security policy, organizational support and training, and the perception of the level of security. We have applied structured equation modelling to identify most of the relevant factors based on the respondents’ feedback. The results based on the business employee behavior showed that they respondents did not perceive all of the constructs of our model as relevant security factors, which can potentially result in security lapses. This indicates that more security-related measures should be put in place and that business employees should be updated periodically about potential security threats. To this effect, we divided the studied security measures into those which should be implemented at organizational and individual levels. The results will potentially help business managers to design appropriate security trainings, guidelines, and policies for their employees to ensure more information security awareness and protect their technological infrastructure, especially within home office environments.
Funder
SAUDI ARAMCO Cybersecurity Chair, Imam Abdulrahman Bin Faisal University
Subject
Management, Monitoring, Policy and Law,Renewable Energy, Sustainability and the Environment,Geography, Planning and Development,Building and Construction
Reference73 articles.
1. (2022, November 10). ACM Cybersecurity Curricula 2017. Available online: https://dl.acm.org/doi/book/10.1145/3184594. 2. Gull, H., Alabbad, D.A., Saqib, M., Iqbal, S.Z., Nasir, T., Saeed, S., and Almuhaideb, A.M. (2023). Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications, IGI Global. 3. Saeed, S. (2023). A Customer-Centric View of E-Commerce Security and Privacy. Appl. Sci., 13. 4. Saeed, S., Bolívar MP, R., and Thurasamy, R. (2021). Pandemic, Lockdown, and Digital Transformation, Springer. 5. The theory of planned behavior;Ajzen;Organ. Behav. Hum. Decis. Process.,1991
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|