![]() |
||
Welcome to International Journal of Research in Social Sciences & HumanitiesE-ISSN : 2249 - 4642 | P-ISSN: 2454 - 4671 IMPACT FACTOR: 8.561 |
Abstract
Evaluation of Cyber Security Management in Light of the Technology Acceptance Model
Rafid Abdulwahid Mhawi, Prof. Dr. Ali Hasson Fandi
Volume: 11 Issue: 3 2021
Abstract:
The main objective of the research is to investigate the correlation and influence between cyber security management and the technology acceptance model in the Iraqi Ministry of Interior. The data was collected from (150) respondents represented by an intentional sample of the Directorate of Systems and Informatics and the Information Technology Department in the General Directorate of Human Resources Management and for data analysis, statistical programs (AMOS, SPSS) were employed. By adopting appropriate statistical methods, the results of the research showed that the Ministry of Interior, whenever it tries to pay attention to cyber security management, the more it is reflected in the level of technology acceptance. In other words, cyber security management has a fundamental and influential role in the extent of acceptance of the technology that will be adopted within the ministry.
References
- Ablon , L., Libicki, M., & Golay, A. (2014). Markets for cybercrime tools and stolen data. Santa Monica: RAND Corporation.
- AlGahtani, Said S. (2011) 'Modeling the electronic transaction's acceptance using an extended technology acceptance model.' Applied computing and informatics 9.1, pp. 47- 77.
- Al-Sabawi, Dr. Ahmed Younis and Muhammad, Syed Salem Ali (2018), Using the TAM model to measure the acceptance of the electronic distribution system for petroleum products in the northern region, Proceedings of the Fourth Specialized Scientific Conference of the Administrative Technical College / Baghdad, Volume One / Deposit No. (641).
- Bada, Dr. Maria & Sasse, Professor Angela (2014). Global Cyber Security Capacity Centre: Draft Working Paper Cyber Security Awareness Campaigns Why do they fail to change behavior?.
- Bara ,Danijel ,Ćorić ,Sanja & Jurišić ,Goran (2015). The Role of Cyber Insurance in Managing and Mitigating Cyber Security Risk with Special Emphasis on the Potential of Croatia and Serbia Cyber Insurance Market.
- Beglaryan, Mher&Varduhi Petrosyan, & Edward Bunker. (2017)'Development of a tripolar model of technology acceptance: Hospital-based physicians’ perspective on EHR.' International journal of medical informatics 102, pp. 50-61.
- BURRELL, Darrell Norman (2018). Exploring leadership coaching as a tool to improve the people management skills of information technology and cyber security project managers. The Florida Institute of Technology, Melbourne, Australia. HOLISTIC Vol 9, Issue 2, 2018, pp. 107-126 DOI: 10.
- Carlton, Melissa (2016).Development of a Cyber security Skills Index: A ScenariosBased, Hands-On Measure of Non-IT Professionals' Cyber security Skills. A dissertation submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Systems College of Engineering and Computing Nova South-eastern University.
- Cheng, Shih-I. & Shih-Chih Chen& David C. Yen. (2015)'Continuance intention of Eportfolio system: A confirmatory and multigroup invariance analysis of technology acceptance model.' Computer Standards & Interfaces 42, pp. 17-23.
- Chin, Jacky & Lin, Shu-Chiang. (2015)'Investigating users’ perspectives in building energy management system with an extension of technology acceptance model: A case study in Indonesia manufacturing companies.' Procedia Computer Science 72, pp. 31-39.
- Chmielecki,Tomasz , Chołda, Piotr ,Pacyna,Piotr , Potrawka,Paweł , Rapacz, Norbert ,Stankiewicz,Rafał &Wydrych Piotr (2014).Enterprise-oriented Cyber security Management .AGH University of Science and Technology, Kraków, Poland ,Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 863–870.
- Djamasbi, Soussan& Diane M. Strong& Mark Dishaw. (2010) 'Affect and acceptance: Examining the effects of positive mood on the technology acceptance model.' Decision Support Systems 48.2, pp.383-394.
- Everdij,Mariken , Gijsen , Bart , Smulders ,André ,Verhoogt ,Theo & Wiegers ,René (2016).Cyber-Security Management Of Atm Services: Are We Ready For The Future?.
- Farahat, Taher. (2012) 'Applying the technology acceptance model to online learning in the Egyptian universities.' Procedia-Social and Behavioral Sciences 64, pp.95-104.
- Fayad, Rima, & Paper,David . (2015) 'The technology acceptance model e-commerce extension: a conceptual framework.' Procedia Economics and Finance 26, pp. 1000-1006.
- Gleason, Peter & Clinton, Larry (2017). Managing Cyber Risk: A Handbook for UK Boards of Directors. Director’s Series Handbook—UK Edition.
- Goodyear, Marilu, Portillo, Shannon, Goerdel, Holly T. & Williams, Linda (2010)Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers. IBM Center The Business of Government.
- Islam, Md. Shariful & Stafford, Thomas (2017). Information Technology (IT) Integration and Cybersecurity/Security: The Security Savviness of Board of Directors.Twenty-third Americas Conference on Information Systems, Boston.
- JUNG, JEYONG (2018).A Study of Cyber Security Management within South Korean Businesses – An examination of risk and cybercrime involving industrial security. The thesis is submitted in partial fulfillment of the requirements for the award of the degree of Doctor of Philosophy of the University of Portsmouth.
- Kaja, Ciglic. McKay, Angela.Hering, John & Moore, Theo, Cybersecurity Policy Framework, A practical guide to the development of national cybersecurity policy.
- Kure , Halima Ibrahim , Islam ,Shareeful & Razzaque ,Mohammad Abdur (2018). An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System.
- Limba, Tadas , Plėta,Tomas , Agafonov,Konstantin & Damkus ,Martynas (2017).Cyber Security Management Model For Critical Infrastructure.The International Journal Entrepreneurship And Sustainability Issues.Volume 4 Number 4 (June).
- Masrek ,Mohamad Noorman , Harun ,Qamarul Nazrin , Ramli ,Ishak & Prasety ,Helmy (2019). The Role Of Top Management In Information Security Practices. Proceedings of SOCIOINT 2019- 6th International Conference on Education, Social Sciences and Humanities 24-26 June 2019- Istanbul, Turkey.
- Rizal, Muhamad & Yani, Yanyan M.(2016) Cybersecurity Policy and Its Implementation in Indonesia.Journal of ASEAN Studies, Vol. 4, No. 1 (2016), pp. 61-78.
- Schmittner , Christoph ,Dobaj, Jrgen ,Macher, Georg ,& Brenner, Eugen (2020). A Preliminary View on Automotive Cyber Security Management Systems.
- Sepasgozaar, Samad ME&Sara, Shirowzhan, &Cynthia, Changxin Wang. (2017) 'A scanner technology acceptance model for construction projects.' Procedia Engineering 180: 1237-1246.
- Silva, Patricia Maria& Dias, Guilherme Ataíde (2007)' Theories About Technology Acceptance: Why The Users Accept Or Reject The Information Technology?', Bjis, V.1, N.2, P.69-86.
- Teo, T., Lee, C. B., Chai, C. S., & Wong, S. L. (2009).' Assessing the intention to use technology among pre-service teachers in Singapore and Malaysia: A multigroup invariance analysis of the Technology Acceptance Model (TAM)'. Computers & Education, 53(3), pp. 1000-1009.
- Tisdale, Susan M. (2016). Architecting A Cybersecurity Management Framework. Issues in Information Systems Volume 17, Issue IV, pp. 227-236.
- Trilling, Rick (2018). Creating a New Academic Disciplineiscipline: Cybersecurity Management Education. Session 3A: Papers Applied SIGITE’18, October 3-6, 2018, Fort Lauderdale, FL, USA.
- Viswanath, Venkatesh, & Davis, Fred D. (1996) 'A model of the antecedents of perceived ease of use: Development and test.' Decision Sciences 27.3, pp.451-481.
- Zaini,Muhamad Khairulnizam ,Masrek ,Mohamad Noorman & Sani,Mad Khir Johari Abdullah (2020). The impact of information security management practices on organizational agility. Information & Computer Security Vol. 28 No. 5, 2020 pp. 681-700.

Refer & Earn |