Al-Shanfari, IssamIssamAl-ShanfariYassin, WarusiaWarusiaYassinAbdullah, Raihana SyahirahaRaihana SyahirahaAbdullahAl-Fahim, Nabil HusseinNabil HusseinAl-FahimIsmail, RoesnitaRoesnitaIsmail2024-05-282024-05-2820212022-1-251817-3195822-22-http://www.jatit.org/volumes/Vol99No12/17Vol99No12.pdfhttps://www.scopus.com/record/display.uri?eid=2-s2.0-85109141827&origin=resultslist&sort=plf-f&src=s&st1=Introducing+A+Novel+Integrated+Model+For+The+Adoption+Of+Information+Security+Awareness+Through+Control%2c+Prediction%2c+Motivation%2c+And+Deterrence+Factors%3a+A+Pilot+Study&sid=3efcbb412709d53092e92aa75084c04e&sot=b&sdt=b&sl=181&s=TITLE-ABS-KEY%28Introducing+A+Novel+Integrated+Model+For+The+Adoption+Of+Information+Security+Awareness+Through+Control%2c+Prediction%2c+Motivation%2c+And+Deterrence+Factors%3a+A+Pilot+Study%29&relpos=0&citeCnt=0&searchTerm=&featureToggles=FEATURE_NEW_DOC_DETAILS_EXPORT:1https://oarep.usim.edu.my/handle/123456789/4803Journal of Theoretical and Applied Information TechnologyVolume 99, Issue 12, Pages 2991 - 3003Information security (IS) violations have a negative impact at both organisational and individual levels. Information security awareness (ISA) therefore plays a positive role in ensuring employees adhere to an organisation's security policies. The challenges that arise in protecting the information infrastructure in the Omani public sector are increasing because of a rise in cases of piracy and phishing attempts as well as a lack of adequate ISA among employees. This paper discusses a pilot study from our ongoing research that proposes an integrated model for adopting ISA as an effective method to improve the security behaviour of employees in Omani institutions. This study aims to validate the reliability of research instrument items prior to conducting a main survey on the adoption of the ISA model in Oman. PLS-SEM and SPSS software were used to conduct statistical analyses, which included a skewness test, a correlation analysis, a Cronbach's alpha test, and tests for composite reliability (CR), average variance extracted (AVE), and discriminant validity. Three main theories were utilised in the formation of the integrated ISA model: the theory of planned behaviour (TPB), protection motivation theory (PMT), and general deterrence theory (GDT) - along with two facilitating condition-related constructs: organisational support and communication. The findings indicated that all construct items for all variables have acceptable Cronbach's alpha values, composites reliability, AVE, and discriminant validity. The results of this study reveal that the questions were applicable, subject to one interpretation, to all participants. Hence, this study contributes to the body of ISA literature by discussing ISA in terms of the bases of control, prediction, motivation, and deterrence. This synthesis constitutes a new perspective that enables organisations to better manage the ISA process, particularly in Oman.enEnhancing security awareness; Information security awareness; Pilot study; PLS-SEM; SurveyIntroducing a novel integrated model for the adoption of information security awareness through control, prediction, motivation, and deterrence factors: A pilot studyArticle299129939912