AHP-based Security Decision Making: How Intention and Intrinsic Motivation Affect Policy Compliance
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 6
Abstract
Analytic hierarchy process is a multiple-criteria tool used in applications related to decision-making. In this paper, analytic hierarchy process is used as guidance in information security policy decision-making by identifying influencing factors and their weights for information security policy compliance. The weights for intrinsic motivators are identified based on self-determination theory as essential criteria, namely, autonomy, competence, relatedness, along with behavioural intention towards compliance; and use four awareness focus areas. A survey of cyber-security decision-makers at a Fortune 600 organisation provided data. The results suggest that behavioural intention (52% of the weight of influencing factors) is more important than autonomy (21%), competence (21%) or relatedness (6%) in influencing behaviour towards information security policy compliance. Determining weights of intrinsic motivation, intention, and awareness focus areas can help security decision-making and compliance with policy, and support design of effective security awareness programmes. However, these weights may in turn be affected by local organisational and cultural factors.
Authors and Affiliations
Ahmed Alzahrani, Christopher Johnson
Edge Detection with Neuro-Fuzzy Approach in Digital Synthesis Images
This paper presents an enhanced Neuro-Fuzzy (NF) Approach of edge detection with an analysis of the characteristic of the method. The specificity of our method is an enhancement of the learning database of the diagonal e...
Unsupervised Ads Detection in TV Transmissions
A novel framework is presented that can segment semantic videos and detect commercials (ads) in a broadcasted TV transmission. The proposed technique combines SURF features and color Histogram in a weighted combination f...
A Model of an E-Learning Web Site for Teaching and Evaluating Online.
This research is endeavoring to design an e-learning web site on the internet having the course name as "Object Oriented Programming" (OOP) for the students of level four at Computer Science Department (CSD). This course...
HIDING AN IMAGE INSIDE ANOTHER IMAGE USING VARIABLE-RATE STEGANOGRAPHY
A new algorithm is presented for hiding a secret image in the least significant bits of a cover image. The images used may be color or grayscale images. The number of bits used for hiding changes according to pixel neigh...
Prediction of Stroke using Data Mining Classification Techniques
Stroke is a neurological disease that occurs when a brain cells die as a result of oxygen and nutrient deficiency. Stroke detection within the first few hours improves the chances to prevent complications and improve hea...