Abstract

User security behavior is all user actions related to computer system security. Previous studies have shown that user security behavior is one of the main causes of computer and information security problems in many organizations. In order to mitigate this problem, we need to find a solution to improve user security behavior in the organization. This process involves three steps. This study emphasizes the first step to address an organization's security behavior. Therefore, this study aims to determine the level of user security behavior for four service industries in West Sumatra in 2019. This study is carried out by using a survey research method. Questionnaires were distributed to 320 respondents from four service sectors: government, education, banking, and private services. The questionnaire consists of 30 questions comprising seven factors influencing user security behavior: the organization's values, co-workers' behavior, the ability to make decisions, the availability of supporting tools, individual values and standards, the employee-employer relationship, and the Effort required. The result shows that the level of user security behavior is reasonably high. This implies that service sector employees in Indonesia are aware of the threats in cyberspace and the importance of the security procedure at work. For further research, we plan to study some security problems in more detail to propose possible solutions or actions to improve user security behavior in the service industry, particularly in Indonesia.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.