Publication:
Computer security self-efficacy effect: An extention of technology-to-performance chain model

dc.Conferencecode93158
dc.Conferencedate16 July 2012 through 17 July 2012
dc.ConferencelocationShah Alam
dc.Conferencename2012 IEEE Control and System Graduate Research Colloquium, ICSGRC 2012
dc.citedby3
dc.contributor.affiliationsInternational Islamic University Malaysia (IIUM)
dc.contributor.affiliationsUniversiti Sains Islam Malaysia (USIM)
dc.contributor.authorAl-Shawabkeh M.en_US
dc.contributor.authorMohd Saudi M.en_US
dc.contributor.authorMohd Alwi N.H.en_US
dc.date.accessioned2024-05-29T01:55:05Z
dc.date.available2024-05-29T01:55:05Z
dc.date.issued2012
dc.description.abstractGiven a paucity of research and apparent lack of coherence in information system research, it seems that there is no consensus in the information system field as to how security fits into the information system acceptance, usage, success, utilization, and/or performance impact (effectiveness, efficiency, and satisfaction). This paper is part of an ongoing research project designed to extend the Technology-to-Performance Chain (TPC) model by including the Computer Security Self-Efficacy (CSSE) construct, a strategy of model extension suggested by several researchers. This project aims to examine the research conducted in the last decade in information system journals regarding security issues then based on social cognitive theory, to propose a construct to measure individuals' computer security self-efficacy. Based on the Technology-to- Performance Chain (TPC) model, this study design expected to models and tests relationship among computer security self-efficacy and secures online banking system performance impact. The study will try to answer the question "to what extent has the computer security self-efficacy affected user's perception of secure online banking system effectiveness". After this research finished, the researcher assume that this study findings will provides an initial step towards understanding of the applicability of social cognitive theory in information system security domain and helps information security professionals design information systems considering the effect of computer security self-efficacy on secure information system. � 2012 IEEE.
dc.description.natureFinalen_US
dc.identifier.ArtNo6287137
dc.identifier.doi10.1109/ICSGRC.2012.6287137
dc.identifier.epage69
dc.identifier.isbn9781470000000
dc.identifier.scopus2-s2.0-84867389804
dc.identifier.spage64
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84867389804&doi=10.1109%2fICSGRC.2012.6287137&partnerID=40&md5=cb2875926c76e25a9c96cd09e47b7da0
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/9626
dc.languageEnglish
dc.language.isoen_US
dc.relation.ispartofProceedings - 2012 IEEE Control and System Graduate Research Colloquium, ICSGRC 2012
dc.sourceScopus
dc.subjectcomputer security self-efficacyen_US
dc.subjecteffectivenessen_US
dc.subjectinformation systemen_US
dc.subjectonline bankingen_US
dc.subjectperformance impacten_US
dc.subjectself-efficacyen_US
dc.subjectsocial cognitive theoryen_US
dc.subjecttask-technology fiten_US
dc.subjectutilizationen_US
dc.subjecteffectivenessen_US
dc.subjectOn-line bankingen_US
dc.subjectPerformance impacten_US
dc.subjectSelf efficacyen_US
dc.subjectSocial cognitive theoryen_US
dc.subjectTask technology fiten_US
dc.subjectInformation systemsen_US
dc.subjectSecurity of dataen_US
dc.subjectSecurity systemsen_US
dc.subjectTechnologyen_US
dc.subjectWaste utilizationen_US
dc.titleComputer security self-efficacy effect: An extention of technology-to-performance chain model
dc.typeConference Paperen_US
dspace.entity.typePublication

Files

Collections