Skip to main content

Factors that Influence Workers’ Participation in Unhygienic Cyber Practices: A Pilot Study from Nigeria

  • Conference paper
  • First Online:
Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D (ICT4D 2019)

Abstract

Participation or engagement in unhygienic cyber practices could ultimately harm an organization’s information and communication technologies, if unchecked. This present study used concepts from the theory of planned behavior and organizational control theory to examine the effects of factors such as attitude, subjective norms, organizational facilitators, monitoring, and self-efficacy on workers’ participation in unhygienic cyber practices. A cross-sectional survey of Nigerian professionals was used to test the formulated hypotheses. Partial least squares technique of structural equation modeling (SEM) was used for data analysis. The results indicate that attitude toward cyber hygiene has a negative effect on worker’s participation in unhygienic cyber practices; similarly, subjective norms have a negative effect on engagement in such acts. The data did not show that organizational facilitators, self-efficacy, and monitoring had a meaningful impact on Nigerian workers’ participation in unhygienic cyber practices. Implications of the study were discussed and contribution to the extant literature noted.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Niebel, T.: ICT and economic growth – Comparing developing, emerging and developed countries. World Dev. 104, 197–211 (2018)

    Article  Google Scholar 

  2. Haftu, G.G.: Information communications technology and economic growth in Sub-Saharan Africa: A panel data approach. Telecommunications Policy (2018, in press)

    Google Scholar 

  3. Ifinedo, P.: Roles of organizational climate, social bonds, and perceptions of security threats on IS security policy compliance intentions. Inf. Resour. Manag. J. 31(1), 53–82 (2018)

    Article  Google Scholar 

  4. Hu, Q., Xu, Z., Dinev, T., Ling, H.: Does deterrence work in reducing information security policy abuse by employees? Commun. ACM 54(6), 54–60 (2011)

    Article  Google Scholar 

  5. D’Arcy, J.P., Devaraj, S.: Employee misuse of information technology resources: testing a contemporary deterrence model. Decis. Sci. 43(6), 1091–1124 (2012)

    Article  Google Scholar 

  6. Guo, K.H., Yufei, Y., Archer, N.P., Connelly, C.E.: Understanding nonmalicious security violations in the workplace: a composite behavior model. J. Manag. Inf. Syst. 28(2), 203–236 (2011)

    Article  Google Scholar 

  7. Ifinedo, P.: Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition. Inf. Manag. 51(1), 69–79 (2014)

    Article  Google Scholar 

  8. Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523–548 (2010)

    Article  Google Scholar 

  9. Aldorisio, J.: What is Cyber Hygiene? A Definition of Cyber Hygiene, Benefits, Best Practices, and More. https://digitalguardian.com/blog/what-cyber-hygiene-definition-cyber-hygiene-benefits-best-practices-and-more. Accessed 20 Aug 2018

  10. CITI: Clearswift Insider Threat Index (CITI). US Edition. http://pages.clearswift.com/rs/591-QHZ-135/images/Clearswift_Insider_Threat_Index_2015_US.pdf. Accessed 7 Jan 2017

  11. Njenga, K., Brown, I.: Conceptualising improvisation in information systems security. Eur. J. Inf. Syst. 21(6), 592–607 (2012)

    Article  Google Scholar 

  12. Ifinedo, P., Longe, O.B., Amaunam, I.: Top exemplars of non-malicious, counterproductive computer security behaviours (CCSB) engagements among employees in Nigeria: recommendations for management. In: The 8th iSTEAMS, Lagos, Nigeria, pp. 5–12 (2017)

    Google Scholar 

  13. Longe, O., Ngwa, O., Wada, F., Mbarika, V., Kvasny, L.: Criminal uses of information & communication technologies in sub-Saharan Africa: Trends, concerns and perspectives. J. Inf. Technol. Impact 9(3), 155–172 (2009)

    Google Scholar 

  14. Technology Times, Nigeria adopts framework for national security policy. https://technologytimes.ng/nigeria-adopts-framework-national-cyber-security-policy/. Accessed 20 Aug 2018

  15. Magklaras, G.B., Furnell, S.M.: Insider threat prediction tool: evaluating the probability of IT misuse. Comput. Secur. 21(1), 62–73 (2002)

    Article  Google Scholar 

  16. Loch, K.D., Carr, H.H., Warkentin, M.E.: Threats to information systems: today’s reality, yesterday’s understanding. MIS Q. 16(2), 173–186 (1992)

    Article  Google Scholar 

  17. Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124–133 (2005)

    Article  Google Scholar 

  18. Ifinedo, P. and Cashin, J.: Using social cognitive theory to understand employees’ counterproductive computer security behaviors (CCSB): a pilot study. In: The 27th International Business Research Conference (IBRC), Toronto, Canada (2014)

    Google Scholar 

  19. Sommestad, T., Hallberg, J., Lundholm, K., Bengtsson, J.: Variables influencing information security policy compliance: a systematic review of quantitative studies. Inf. Manag. Comput. Secur. 22(1), 42–75 (2014)

    Article  Google Scholar 

  20. Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179–211 (1991)

    Article  Google Scholar 

  21. Eisenhardt, K.M.: Control: organizational and economic approaches. Manage. Sci. 31(2), 134–149 (1985)

    Article  Google Scholar 

  22. Bandura, A.: Social foundations of thought and action: A social cognitive theory. Prentice-Hall, Englewood Cliffs, NJ (1986)

    Google Scholar 

  23. Yazdanmehr, A., Wang, J.: Employees’ information security policy compliance: a norm activation perspective. Decis. Support Syst. 92, 36–46 (2016)

    Article  Google Scholar 

  24. Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y., Podsakoff, N.P.: Common method biases in behavioral research: a critical review of the literature and recommended remedies. J. Appl. Psychol. 88(5), 879–903 (2003)

    Article  Google Scholar 

  25. Pavlou, P.A., Liang, H., Xue, Y.: Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective. MIS Q. 31(1), 105–136 (2007)

    Article  Google Scholar 

  26. Hair, J.F., Tomas, G., Hult, M., Ringle, C.M., Sarstedt, M.: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage, Thousand Oaks (2014)

    MATH  Google Scholar 

  27. Kock, N.: WarpPLS 5.0 User Manual, ScriptWarp Systems, http://cits.tamiu.edu/WarpPLS/UserManual_v_5_0.pdf. Accessed 27 Feb 2017

  28. Petter, S., Straub, D., Rai, A.: Specifying formative constructs in information systems research. MIS Q. 31(4), 623–656 (2007)

    Article  Google Scholar 

  29. Tenenhaus, M., Vinzi, V.E., Chatelin, Y.-M., Lauro, C.: PLS path modeling. Comput. Stat. Data Anal. 48(1), 159–205 (2005)

    Article  MathSciNet  Google Scholar 

  30. Wetzels, M., Odekerken-Schröder, G., Van Oppen, C.: Using PLS path modeling for assessing hierarchical construct models: guidelines and empirical illustration. MIS Q. 33(1), 177–195 (2009)

    Article  Google Scholar 

  31. Siponen, M., Vance, A.: Neutralization: New insights into the problem of employee information systems security policy violations. MIS Q. 34(3), 487–502 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Princely Ifinedo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ifinedo, P., Mengesha, N., Longe, O. (2019). Factors that Influence Workers’ Participation in Unhygienic Cyber Practices: A Pilot Study from Nigeria. In: Nielsen, P., Kimaro, H. (eds) Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D. ICT4D 2019. IFIP Advances in Information and Communication Technology, vol 552. Springer, Cham. https://doi.org/10.1007/978-3-030-19115-3_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-19115-3_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-19114-6

  • Online ISBN: 978-3-030-19115-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics