Analysis of Factors Affecting Information System Security Behaviour in Employees at IT Company
Abstract
Abstract—Information is an essential element for organizations today. Confidentiality, integrity, and availability of information have a vital role in supporting organizational performance. Therefore, it is necessary to take information security measures so that the use of information can run effectively, efficiently, and integrated. The more valuable the information, the more security standards are needed to protect it. Among other things, the purpose of computer security is to protect information. The higher the security standards provided, the higher the protection of the privacy of that information. Protecting company employees' privacy is one factor that must be considered in the implementation of information systems. PT Telkomsel is one of the companies that experienced a data breach. This report will discuss nine hypotheses to determine the factors that affect Information System Security Behavior for employees of PT Telkomsel. Thus, validity, reliability, and hypothesis tests were carried out using the SmartPLS 3 software. The results showed a significant influence between the Security Education and Training variables on Information Security Awareness, Employee Accountability, and Employee Relationships.
Index Terms—Information System Security Behavior, Security Education & Training, Information Security Awareness, Employee Relationships, Employee Accountability, Organizational Culture, National Culture
Downloads
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike International License (CC-BY-SA 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Copyright without Restrictions
The journal allows the author(s) to hold the copyright without restrictions and will retain publishing rights without restrictions.
The submitted papers are assumed to contain no proprietary material unprotected by patent or patent application; responsibility for technical content and for protection of proprietary material rests solely with the author(s) and their organizations and is not the responsibility of the ULTIMA InfoSys or its Editorial Staff. The main (first/corresponding) author is responsible for ensuring that the article has been seen and approved by all the other authors. It is the responsibility of the author to obtain all necessary copyright release permissions for the use of any copyrighted materials in the manuscript prior to the submission.