Universiti Teknologi Malaysia Institutional Repository

Understanding human behaviour in information security policy compliance in a Malaysian local authority organization

Sarmoen, Norhayati and Khalid, Haliyana and Abd. Rasid, Siti Zaleha and Baskaran, Shathees and Basiruddin, Rohaida (2019) Understanding human behaviour in information security policy compliance in a Malaysian local authority organization. Business Managementand Strategy, 10 (2). pp. 64-81. ISSN 2157-6068

Full text not available from this repository.

Official URL: http://dx.doi.org/10.5296/bms.v10i2.14909


The utilization of the Information and Communications Technology (ICT), such as the Internet and electronic mail (e-mail) has made communication nowadays easier, faster and has tremendously reduced the usage of paper. However, if the usage of internet is not properly managed, the possibility of confidential information leakage from the inside of the organization to other entities outside of the organization may occur. The impacts of this malicious activity are beyond the boundaries and cannot be controlled despite implementing various preventive steps and enforcing various regulations. Previous studies have outlined different factors in influencing information leakages in various organizations. However, none had really identified the severity of the factors up to this day. This research hopes to fill this gap, by focusing on staff in Majlis Perbandaran Pasir Gudang (MPPG), Johor, Malaysia. This study covers factors related to human behaviour which have led towards the cases of information breach. The factors include the lack of understanding of information policy, the lack of training, poor management support and the insensitivity of the staffs toward safeguarding the information from falling to the wrong hands. Thus, it is suggested that the ICT security protection needs to be robust, secure and reliable so that the use of the internet or social media will not only enhance the communication efficiency, but also to ensure that the information security in an organization is at the most optimum level.

Item Type:Article
Uncontrolled Keywords:information technology management, information security policy
Subjects:H Social Sciences > HC Economic History and Conditions
Divisions:International Business School
ID Code:89774
Deposited By: Widya Wahid
Deposited On:04 Mar 2021 10:45
Last Modified:04 Mar 2021 10:45

Repository Staff Only: item control page