Abstract

ABSTRACT The purpose of this paper was to first examine the reliability, validity, and strength of a unified model for information security policy compliance that includes eight constructs explaining information security policy compliance. Second, seven hypotheses were developed and tested based on the constructs in the model. An instrument with eight constructs was used to reflect the traditional survey statements method that measures current or retrospective behavior for the items of each construct. A sample of 187 faculty and staff from a mid-sized university in the USA participated in the study. Data were collected electronically and analyzed through SmartPLS 3.0, a partial least square structural equation modeling software. The results indicated strong support for the models’ reliability, validity, and strength. The results also showed support for five hypotheses. Two hypotheses were rejected. The findings with implications are discussed. Recommendations for future research are made.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.