Reference Hub3
Understanding Information Security Behaviours of Tanzanian Government Employees: A Health Belief Model Perspective

Understanding Information Security Behaviours of Tanzanian Government Employees: A Health Belief Model Perspective

Daniel Ntabagi Koloseni, Chong Yee Lee, Ming-Lee Gan
Copyright: © 2019 |Volume: 15 |Issue: 1 |Pages: 18
ISSN: 1548-3908|EISSN: 1548-3916|EISBN13: 9781522564140|DOI: 10.4018/IJTHI.2019010102
Cite Article Cite Article

MLA

Koloseni, Daniel Ntabagi, et al. "Understanding Information Security Behaviours of Tanzanian Government Employees: A Health Belief Model Perspective." IJTHI vol.15, no.1 2019: pp.15-32. http://doi.org/10.4018/IJTHI.2019010102

APA

Koloseni, D. N., Lee, C. Y., & Gan, M. (2019). Understanding Information Security Behaviours of Tanzanian Government Employees: A Health Belief Model Perspective. International Journal of Technology and Human Interaction (IJTHI), 15(1), 15-32. http://doi.org/10.4018/IJTHI.2019010102

Chicago

Koloseni, Daniel Ntabagi, Chong Yee Lee, and Ming-Lee Gan. "Understanding Information Security Behaviours of Tanzanian Government Employees: A Health Belief Model Perspective," International Journal of Technology and Human Interaction (IJTHI) 15, no.1: 15-32. http://doi.org/10.4018/IJTHI.2019010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article investigates security behaviours of employees using the Health Belief Model (HBM) as a theoretical lens. Given the fact that previous studies on security behaviours paid much attention to conscious information security behaviours; this article extends the HBM to study both habitual or automatic security behaviours (security habit) and conscious security behaviours of Tanzanian government employees. A structural equation modelling (SEM) technique was used for data analysis. The study found that, the intentions of government employees to practice information security behaviour is influenced by perceived severity, perceived susceptibility, perceived barriers, and cues to action and security habits. Their intentions, however, is not affected by perceived benefits and self-efficacy. Further, an employee's intentions and security habits has a significant effect on actual security practice. Generally, the extended research model enriches the understanding of the role played by both conscious and habitual security behaviours on information security behaviours of employees.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.