AHP-based Security Decision Making: How Intention and Intrinsic Motivation Affect Policy Compliance
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 6
Abstract
Analytic hierarchy process is a multiple-criteria tool used in applications related to decision-making. In this paper, analytic hierarchy process is used as guidance in information security policy decision-making by identifying influencing factors and their weights for information security policy compliance. The weights for intrinsic motivators are identified based on self-determination theory as essential criteria, namely, autonomy, competence, relatedness, along with behavioural intention towards compliance; and use four awareness focus areas. A survey of cyber-security decision-makers at a Fortune 600 organisation provided data. The results suggest that behavioural intention (52% of the weight of influencing factors) is more important than autonomy (21%), competence (21%) or relatedness (6%) in influencing behaviour towards information security policy compliance. Determining weights of intrinsic motivation, intention, and awareness focus areas can help security decision-making and compliance with policy, and support design of effective security awareness programmes. However, these weights may in turn be affected by local organisational and cultural factors.
Authors and Affiliations
Ahmed Alzahrani, Christopher Johnson
Investigating Technologies in Decision based Internet of Things, Internet of Everythings and Cloud Computing for Smart City
The idea of a Smart City features the need to upgrade quality, interconnection and execution of different urban administrations with the utilization of data and correspondence advances (ICT). Smart City advances cloud-ba...
Recognition and Classification of Power Quality Disturbances by DWT-MRA and SVM Classifier
Electrical power system is a large and complex network, where power quality disturbances (PQDs) must be monitored, analyzed and mitigated continuously in order to preserve and to re-establish the normal power supply with...
Negotiation as a Collaborative Tool for Determining Permissions and Detection of Malicious Applications
In Android OS users find it very difficult to understand and comprehend its permission mechanism. Frequently, users tend to ignore permission negotiations dialogs during installation of an application. Users, who pay att...
ComEx Miner: Expert Mining in Virtual Communities
The utilization of Web 2.0 as a platform to comprehend the arduous task of expert identification is an upcoming trend. An open problem is to assess the level of expertise objectively in the web 2.0 communities formed. We...
Texture Analysis on Image Motif of Endek Bali using K-Nearest Neighbor Classification Method
Endek fabric Bali is one form of craft woven fabric of Balinese society. Endek fabric has a variety of motifs or designs, a lot of people does not know that Endek have the type based on the design motif. In this research...