Browsing by Author "Al-Shawabkeh M."
Now showing 1 - 3 of 3
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Computer security factors effects towards online usage of internet banking system(Asian Research Publishing Network, 2015) ;Al-Shawabkeh M. ;Saudi M.M. ;Najwa Hayaati Binti Mohd Alwi ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)International Islamic University Malaysia (IIUM)Given an apparent lack of coherence and a paucity of computer system field of studies, research imitates and demonstrates non consensus in how computer security fits into the satisfaction, success, usage, efficiency, and effectiveness of computer system field. This study is a part of research aims to extend the Technology to Performance Chain model by including and examining the Computer Security Self-Efficacy construct, as recommend by several computer system field researchers. This paper used the statistical technique structural equation modeling and the partial least squares regression for estimating causal relations between computer security self-efficacy and internet banking usage. Outcomes confirm that confidentiality and availability effects computer security self-efficacy while in turn computer security self-efficacy impacts on usage. Computer security self-efficacy also partially mediates the impact of confidentiality, integrity, and availability on usage. � 2006-2015 Asian Research Publishing Network (ARPN). - Some of the metrics are blocked by yourconsent settings
Publication Computer security self-efficacy effect: An extention of technology-to-performance chain model(2012) ;Al-Shawabkeh M. ;Mohd Saudi M. ;Mohd Alwi N.H. ;International Islamic University Malaysia (IIUM)Universiti Sains Islam Malaysia (USIM)Given a paucity of research and apparent lack of coherence in information system research, it seems that there is no consensus in the information system field as to how security fits into the information system acceptance, usage, success, utilization, and/or performance impact (effectiveness, efficiency, and satisfaction). This paper is part of an ongoing research project designed to extend the Technology-to-Performance Chain (TPC) model by including the Computer Security Self-Efficacy (CSSE) construct, a strategy of model extension suggested by several researchers. This project aims to examine the research conducted in the last decade in information system journals regarding security issues then based on social cognitive theory, to propose a construct to measure individuals' computer security self-efficacy. Based on the Technology-to- Performance Chain (TPC) model, this study design expected to models and tests relationship among computer security self-efficacy and secures online banking system performance impact. The study will try to answer the question "to what extent has the computer security self-efficacy affected user's perception of secure online banking system effectiveness". After this research finished, the researcher assume that this study findings will provides an initial step towards understanding of the applicability of social cognitive theory in information system security domain and helps information security professionals design information systems considering the effect of computer security self-efficacy on secure information system. � 2012 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication Information security management systems (ISMS) and computer security self-efficacy (CSSE) model comparison(American Scientific Publishers, 2017) ;Al-Shawabkeh M. ;Saudi M.M. ;Najwa Hayaati Mohd Alwi ;Azman N. ;Islamic Science Institute ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)International Islamic University Malaysia (IIUM)Information security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and growing. Financial organizations need to take protective measures by implementing security policies though effective resource allocation is very difficult. This situation is due to uncertainty about the nature and severity of the threats and vulnerabilities and the effectiveness of the mitigation measures. Varieties of security policy models have been proposed to the financial organizations. Therefore to overcome the stated issues, this paper presents an analysis of two commonly used models: the Information Security Management System ISO/IEC 27001:2015 and Computer Security Self-Efficacy (CSSE). Findings confirm the suitability of both models for e-Banking computer security policies. � 2017 American Scientific Publishers All rights reserved.