Zauwiyah Ahmad, Thian Song Ong, Tze Hui Liew and Mariati Norhashim
The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security…
Abstract
Purpose
The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security assurance behaviour represents employees’ intentional and effortful actions aimed towards protecting information systems. The behaviour is highly desired as it tackles the human factor within the information security framework. The authors posited that security assurance behaviour is a learned behaviour that can be enhanced by the implementation of information security monitoring.
Design/methodology/approach
Theoretical framework underlying this study with six constructs, namely, subjective norm, outcome expectation, information security monitoring, information security policy, self-efficacy and perceived inconvenience, were identified as significant in determining employees’ security assurance behaviour (SAB). The influence of these constructs on SAB could be explained by social cognitive theory and is empirically supported by past studies. An online questionnaire survey as the main research instrument is adopted to elicit information on the six constructs tested in this study. Opinion from industry and academic expert panels on the relevance and face validity of the questionnaire were obtained prior to the survey administration.
Findings
Findings from this research indicate that organisations will benefit from information security monitoring by encouraging security behaviours that extend beyond the security policy. This study also demonstrates that employees tend to abandon security behaviour when the behaviour is perceived as inconvenient. Hence, organisations must find ways to reduce the perceived inconvenience using various security automation methods and specialised security training. Reducing perceived inconvenience is a challenge to information security practitioners.
Research limitations/implications
There are some limitations in the existing work that could be addressed in future studies. One of them is the possible social desirability bias due to the self-reported measure adopted in the study. Even though the authors have made every effort possible to collect representative responses via anonymous survey, it is still possible that the respondents may not reveal true behaviour as good conduct is generally desired. This may lead to a bias towards favourable behaviour.
Practical implications
In general, the present research provides a number of significant insights and valuable information related to security assurance behaviour among employees. The major findings could assist security experts and organisations to develop better strategies and policies for information security protection. Findings of this research also indicate that organisations will benefit from information security monitoring by encouraging security behaviours that extend beyond the security policy.
Social implications
In this research, the social cognitive learning theory is used to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour; the finding implies that monitoring emphases expected behaviours and helps to reinforce organisational norms. Monitoring may also accelerate learning when employees become strongly mindful of their behaviours. Hence, it is important for organisations to communicate the monitoring practices implemented, even more imperative whenever security monitoring employed is unobtrusive in nature. Nonetheless, care must be taken in this communication to avoid resentment and mistrust among employees.
Originality/value
This study is significant in a number of ways. First, this study highlights significant antecedents of security assurance behaviour, which helps organisations to assess their current practices, which may nurture or suppress information security. Second, using users’ perspective, this study provides recommendations pertaining to monitoring as a form of information security measure. Third, this study provides theoretical contribution to the existing information security literature via the application of the social cognitive learning theory.
Details
Keywords
Yang Tian, Tak Jie Chan, Tze Wei Liew, Ming Hui Chen and Huan Na Liu
Social media usage has been documented to affect the psychological well-being of its users. This study aims to examine how social media overload influences cognitive fatigue among…
Abstract
Purpose
Social media usage has been documented to affect the psychological well-being of its users. This study aims to examine how social media overload influences cognitive fatigue among individuals in Malaysia.
Design/methodology/approach
This study employed a comprehensive research framework based on the stressor-strain-outcome (SSO) model to examine how perceived overload affects social media cognitive fatigue through emotional exhaustion and anxiety. Survey data were gathered from 451 social media users in Malaysia, and data analysis was performed using PLS-SEM.
Findings
The findings revealed that information overload, communication overload and interruption overload are antecedents of emotional exhaustion. Communication overload, interruption overload and cognitive overload were identified as antecedents of anxiety, while emotional exhaustion and anxiety were confirmed as predictors of social media cognitive fatigue. However, pathway analysis indicated no relationship between emotional exhaustion and anxiety.
Originality/value
Our study contributes to the literature on media technology and media psychology by examining the psychological mechanisms (emotional exhaustion and anxiety). The findings offer implications for service providers, practitioners and social media users, as they facilitate measures and strategies to mitigate the adverse effects of social media while elevating psychological well-being.
Details
Keywords
Yang Tian, Tak Jie Chan, Tze Wei Liew, Ming Hui Chen and Huan Na Liu
Electronic wallets (e-wallet) systems have revolutionized transactional activities, prompting individuals to adopt digital payment methods. This study investigates the…
Abstract
Purpose
Electronic wallets (e-wallet) systems have revolutionized transactional activities, prompting individuals to adopt digital payment methods. This study investigates the determinants of the continuance intention of the e-wallet system Touch 'n Go in Malaysia. We propose a framework integrating the diffusion of innovation theory (DOI) and mental accounting theory, thereby assessing the impacts of product-related factors (convenience, compatibility, perceived risk and perceived compatibility) and the moderating role of personal-related factors [personal innovativeness (PI) and personal anxiety].
Design/methodology/approach
Data were collected involving 381 Malaysian Touch 'n Go users. The partial least squares structural equation modeling (PLS-SEM) was applied as a data analysis technique.
Findings
As demonstrated by the results, convenience serves as a facilitator, while perceived risk acts as an inhibitor, influencing the continuance intention of the application. Compatibility and perceived complexity are found to be insignificant antecedents. However, neither PI nor personal anxiety was found as moderators.
Originality/value
This research brings contributions to the electronic commerce literature by extending the understanding of the predictors and moderators of the continuance intention of Touch 'n Go users in Malaysia. We discuss how these findings implicate the two theories and offer insights for service providers and policymakers to promote the post-adoption intentions of Touch 'n Go.