Abstract
Participation or engagement in unhygienic cyber practices could ultimately harm an organization’s information and communication technologies, if unchecked. This present study used concepts from the theory of planned behavior and organizational control theory to examine the effects of factors such as attitude, subjective norms, organizational facilitators, monitoring, and self-efficacy on workers’ participation in unhygienic cyber practices. A cross-sectional survey of Nigerian professionals was used to test the formulated hypotheses. Partial least squares technique of structural equation modeling (SEM) was used for data analysis. The results indicate that attitude toward cyber hygiene has a negative effect on worker’s participation in unhygienic cyber practices; similarly, subjective norms have a negative effect on engagement in such acts. The data did not show that organizational facilitators, self-efficacy, and monitoring had a meaningful impact on Nigerian workers’ participation in unhygienic cyber practices. Implications of the study were discussed and contribution to the extant literature noted.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Niebel, T.: ICT and economic growth – Comparing developing, emerging and developed countries. World Dev. 104, 197–211 (2018)
Haftu, G.G.: Information communications technology and economic growth in Sub-Saharan Africa: A panel data approach. Telecommunications Policy (2018, in press)
Ifinedo, P.: Roles of organizational climate, social bonds, and perceptions of security threats on IS security policy compliance intentions. Inf. Resour. Manag. J. 31(1), 53–82 (2018)
Hu, Q., Xu, Z., Dinev, T., Ling, H.: Does deterrence work in reducing information security policy abuse by employees? Commun. ACM 54(6), 54–60 (2011)
D’Arcy, J.P., Devaraj, S.: Employee misuse of information technology resources: testing a contemporary deterrence model. Decis. Sci. 43(6), 1091–1124 (2012)
Guo, K.H., Yufei, Y., Archer, N.P., Connelly, C.E.: Understanding nonmalicious security violations in the workplace: a composite behavior model. J. Manag. Inf. Syst. 28(2), 203–236 (2011)
Ifinedo, P.: Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition. Inf. Manag. 51(1), 69–79 (2014)
Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523–548 (2010)
Aldorisio, J.: What is Cyber Hygiene? A Definition of Cyber Hygiene, Benefits, Best Practices, and More. https://digitalguardian.com/blog/what-cyber-hygiene-definition-cyber-hygiene-benefits-best-practices-and-more. Accessed 20 Aug 2018
CITI: Clearswift Insider Threat Index (CITI). US Edition. http://pages.clearswift.com/rs/591-QHZ-135/images/Clearswift_Insider_Threat_Index_2015_US.pdf. Accessed 7 Jan 2017
Njenga, K., Brown, I.: Conceptualising improvisation in information systems security. Eur. J. Inf. Syst. 21(6), 592–607 (2012)
Ifinedo, P., Longe, O.B., Amaunam, I.: Top exemplars of non-malicious, counterproductive computer security behaviours (CCSB) engagements among employees in Nigeria: recommendations for management. In: The 8th iSTEAMS, Lagos, Nigeria, pp. 5–12 (2017)
Longe, O., Ngwa, O., Wada, F., Mbarika, V., Kvasny, L.: Criminal uses of information & communication technologies in sub-Saharan Africa: Trends, concerns and perspectives. J. Inf. Technol. Impact 9(3), 155–172 (2009)
Technology Times, Nigeria adopts framework for national security policy. https://technologytimes.ng/nigeria-adopts-framework-national-cyber-security-policy/. Accessed 20 Aug 2018
Magklaras, G.B., Furnell, S.M.: Insider threat prediction tool: evaluating the probability of IT misuse. Comput. Secur. 21(1), 62–73 (2002)
Loch, K.D., Carr, H.H., Warkentin, M.E.: Threats to information systems: today’s reality, yesterday’s understanding. MIS Q. 16(2), 173–186 (1992)
Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124–133 (2005)
Ifinedo, P. and Cashin, J.: Using social cognitive theory to understand employees’ counterproductive computer security behaviors (CCSB): a pilot study. In: The 27th International Business Research Conference (IBRC), Toronto, Canada (2014)
Sommestad, T., Hallberg, J., Lundholm, K., Bengtsson, J.: Variables influencing information security policy compliance: a systematic review of quantitative studies. Inf. Manag. Comput. Secur. 22(1), 42–75 (2014)
Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179–211 (1991)
Eisenhardt, K.M.: Control: organizational and economic approaches. Manage. Sci. 31(2), 134–149 (1985)
Bandura, A.: Social foundations of thought and action: A social cognitive theory. Prentice-Hall, Englewood Cliffs, NJ (1986)
Yazdanmehr, A., Wang, J.: Employees’ information security policy compliance: a norm activation perspective. Decis. Support Syst. 92, 36–46 (2016)
Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y., Podsakoff, N.P.: Common method biases in behavioral research: a critical review of the literature and recommended remedies. J. Appl. Psychol. 88(5), 879–903 (2003)
Pavlou, P.A., Liang, H., Xue, Y.: Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective. MIS Q. 31(1), 105–136 (2007)
Hair, J.F., Tomas, G., Hult, M., Ringle, C.M., Sarstedt, M.: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage, Thousand Oaks (2014)
Kock, N.: WarpPLS 5.0 User Manual, ScriptWarp Systems, http://cits.tamiu.edu/WarpPLS/UserManual_v_5_0.pdf. Accessed 27 Feb 2017
Petter, S., Straub, D., Rai, A.: Specifying formative constructs in information systems research. MIS Q. 31(4), 623–656 (2007)
Tenenhaus, M., Vinzi, V.E., Chatelin, Y.-M., Lauro, C.: PLS path modeling. Comput. Stat. Data Anal. 48(1), 159–205 (2005)
Wetzels, M., Odekerken-Schröder, G., Van Oppen, C.: Using PLS path modeling for assessing hierarchical construct models: guidelines and empirical illustration. MIS Q. 33(1), 177–195 (2009)
Siponen, M., Vance, A.: Neutralization: New insights into the problem of employee information systems security policy violations. MIS Q. 34(3), 487–502 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 IFIP International Federation for Information Processing
About this paper
Cite this paper
Ifinedo, P., Mengesha, N., Longe, O. (2019). Factors that Influence Workers’ Participation in Unhygienic Cyber Practices: A Pilot Study from Nigeria. In: Nielsen, P., Kimaro, H. (eds) Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D. ICT4D 2019. IFIP Advances in Information and Communication Technology, vol 552. Springer, Cham. https://doi.org/10.1007/978-3-030-19115-3_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-19115-3_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19114-6
Online ISBN: 978-3-030-19115-3
eBook Packages: Computer ScienceComputer Science (R0)