Abstract
ABSTRACT The purpose of this paper was to first examine the reliability, validity, and strength of a unified model for information security policy compliance that includes eight constructs explaining information security policy compliance. Second, seven hypotheses were developed and tested based on the constructs in the model. An instrument with eight constructs was used to reflect the traditional survey statements method that measures current or retrospective behavior for the items of each construct. A sample of 187 faculty and staff from a mid-sized university in the USA participated in the study. Data were collected electronically and analyzed through SmartPLS 3.0, a partial least square structural equation modeling software. The results indicated strong support for the models’ reliability, validity, and strength. The results also showed support for five hypotheses. Two hypotheses were rejected. The findings with implications are discussed. Recommendations for future research are made.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.