The ideal or strong information security culture can aid in minimising the threat of humans to information protection and thereby aid in reducing data breaches or incidents in organisations. This research sets out to understand how information security culture is defined from an academic and industry perspective using a mixed-method approach. The definition, factors necessary to instil the ideal information security culture and the potential impact of the ideal information security culture were investigated from both perspectives. A survey approach was implemented to obtain the views from industry and 512 respondents from organisations, many of which operate at an international level, participated in the survey. The research presents a description of information security culture, integrating the existing literature and expanding on it with the views of industry, thereby giving clarity to the concept. The ideal information security culture was identified with the top traits relating to aspects such as an aware and knowledgeable workforce implementing conscientious, caring behaviour to comply with policies as guided by management. The factors that could positively influence an information security culture were identified, consolidated and expanded to five external factors and twenty internal factors. Organisations that have a strong information security culture were identified as achieving mutual trust and integrity through the protection of their information. The description of an information security culture can be used as a baseline to define and understand the concept, identify a single, comprehensive set of factors to be implemented, comprehend the traits of such a culture, as well as what an organisation can achieve by having a strong information security culture. The analysis showed that scientific interpretations of the definitions and factors of information security culture are much wider than their understanding of the industry. Both the results from the scoping review of papers and the feedback from the industry experts are synthesised visually to provide an organisational information security culture model (OISCM). The definition, factors, and model that influence the organisational culture of information security, have prognostic value for industry. For scientists, this is an important topic of research on methods and forms of increasing the level of this knowledge.
The study explored the cultural care beliefs, values and attitudes of Shangaans patients’ and traditional healers’ management strategies of hypertension in the Limpopo Province. The study aimed to describe the cultural values, beliefs and practices including taboos, rituals and religion within the world-view of the Shangaans. The study was undertaken in the Mopani region of the Greater Giyani area, with the purpose of recommending improvements to patient care in this area
The Task-Technology Fit (TTF) theory provides a means of quantifying the effectiveness of technology in a system by assessing the relationship between the technology and the tasks the technology aims to support. The theory is widely recognized and has been applied in various ways, but little work has been done to summarize and synthesize the application of TTF in literature. The aim of this study is to identify and summarize the focus areas of studies that applied TTF, the environment in which it was applied, and the technologies which were considered by conducting a scoping review. It was found that applied studies focused primarily on generating theory or assessing certain realworld phenomena; was applied in a wide range of environments with the majority being in healthcare; and considered various technologies, with an increasing number of studies focusing on mobile technology. The findings of this study contribute to the understanding of TTF applications and assists in framing future research to further analyze TTF studies.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.