Content Validity of Assessment Instrument for Information Security Culture in Relation to Digital Literacy

Authors

  • Mohd Sharulnizam Kamarulzaman Cybersecurity Malaysia, Level 4, Tower 1, Menara Cyber Axis, Jalan Impact, 63000 Cyberjaya, Selangor, Malaysia
  • Shamila Mohamed Shuhidan College of Computing, Informatics and Mathematics, UiTM Selangor Branch, Puncak Perdana Campus, 40150 Shah Alam, Selangor, Malaysia
  • Khalid Abdul Wahid College of Computing, Informatics and Mathematics, Universiti Teknologi MARA Kelantan, Bukit Ilmu, 18500 Machang, Kelantan.
  • Amirudin Abdul Wahab Cybersecurity Malaysia, Level 4, Tower 1, Menara Cyber Axis, Jalan Impact, 63000 Cyberjaya, Selangor, Malaysia
  • Abdul Jalil Toha @ Tohara Bahagian Pembangunan Kurikulum Kementerian Pendidikan Malaysia, Aras 4-8, Blok E9, Kompleks Kerajaan Parcel E, Pusat Pentadbiran Kerajaan Persekutuan, Presint 1, 62000 Putrajaya

DOI:

https://doi.org/10.24191/jikm.v14i1.4688

Keywords:

content validity, information security culture, digital literacy, information management

Abstract

This study intends to assess the content validity of an instrument intended to measure the relationship between digital literacy and information security culture among Malaysian administrative and diplomatic officers (ADO). Throughout the process of determining the content validity of the instrument, six specialists were contacted. The item content validity index (I-CVI) and scale content validity index (S-CVI) were established for assessing content validity. The two characteristics that were discovered were security risk and security awareness, and each of them had seven and six items, respectively. On the security risk and security awareness aspects of the information security culture, the scale content validity index (S-CVI/Ave) was 0.95 and 1.00 respectively, and the item content validity index (I-CVI) ranged from 0.95 to 1.00. Both indices were consistent with a high level of reliability. It has been determined that the instrument possesses a high level of content validity. In the future, research may be conducted to ensure that the instrument's reliability and other types of validity, such as face validity, concept validity, and criteria validity, are investigated to improve the instrument's applicability.

References

Al Hogail, A. and Mirza, M. (2015), “Organizational information security culture assessment”, paper presented at The 2015 International Conference on Security and Management (SAM’15), 27-30 July, Las Vegas, available at: http://worldcomp-proceedings.com/proc/p2015/SAM_contents. HTML

Aldawood, H., & Skinner, G. (2019). Reviewing cyber security social engineering training and awareness programs—pitfalls and ongoing issues. Future Internet, 11(3), 73. https://doi.org/10.3390/fi11030073

Alotaibi, A., Edum-Fotwe, F., & Price, A. D. F. (2019). Critical barriers to social responsibility implementation within mega-construction projects: The case of the kingdom of saudi arabia. Sustainability, 11(6), 1755. https://doi.org/10.3390/su11061755

Alsaleh, M., Alomar, N., & Alarifi, A. (2017). Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods. PLOS ONE, 12(3). https://doi.org/10.1371/journal.pone.0173284

Alzahrani, A., & Alomar, K. (2016). Information security issues and threats in Saudi Arabia: A research survey. International Journal of Computer Science Issues, 13(6), 129–135. https://doi.org/10.20943/01201606.129135

Aziz, K. A., Norhashim, M. B., & Halim, E. M. (2011). Information security and information technology governance: A Malaysian case study. International Journal of Management Practice, 4(4), 331–344. https://doi.org/10.1504/IJMP.2011.039204

Burkell, J. A., Fortier, A., Di Valentino, L., & Roberts, S. (2015). Enhancing Key Digital Literacy Skills: Information Privacy, Information Security, and Copyright / Intellectual Property. FIMS Publications, 35, 67.

Croitoru, I., & Neacsu, V. (2019). RISK MANAGEMENT – BETWEEN NECESSITY AND OBLIGATION. Internal Auditing & Risk Management, (1), 23–32.

Da Veiga, A., & Eloff, J. H. P. (2010). A framework and assessment instrument for information security culture. Computers and Security, 29(2), 196–207. https://doi.org/10.1016/j.cose.2009.09.002

da Veiga, A., Astakhova, L. V., Botha, A., & Herselman, M. (2020a). Defining organisational information security culture—perspectives from academia and industry. Computers & Security, 92, 101713. https://doi.org/10.1016/j.cose.2020.101713

G. Dhillon and J. Backhouse, “Technical opinion: Information system security management in the new millennium,” Commun. ACM, vol. 43, no. 7, pp. 125–128, Jul. 2000.

Hadlington, L., & Parsons, K. (2017). Can cyberloafing and internet addiction affect organizational information security? Cyberpsychology, Behavior, and Social Networking, 20(9), 567–571. https://doi.org/10.1089/cyber.2017.0239

Hyman, Michael & Sierra, Jeremy. (2016). Open- versus close-ended survey questions. NMSU Business Outlook. 14. [47]

Jaeger, J. (2013, February 5). Human error, not hackers cause most data breaches. Compliance Week. https://www.complianceweek.com/human-error-not-hackers-cause-most-data-breaches/4048.article

Jones, B. H., & Heinrichs, L. R. (2012). Do business students practice smartphone security? Journal of Computer Information Systems, 53(2), 22–30.

Jones, B. H., Chin, A. G., & Aiken, P. (2014). Risky business: Students and smartphones. TechTrends, 58(6), 73–83. https://doi.org/10.1007/s11528-014-0806-x

Karlsson, M., Karlsson, F., Åström, J., & Denk, T. (2021). The effect of perceived organizational culture on employees’ information security compliance. Information & Computer Security, 30(3), 382–401. https://doi.org/10.1108/ics-06-2021-0073

Majlis Keselamatan Negara (MKN). (n.d.). https://asset.mkn.gov.my/wp-content/uploads/2020/10/ MalaysiaCyberSecurityStrategy2020-2024.pdf

Martins, A., & Elofe, J. (2002). Information security culture. IFIP Advances in Information and Communication Technology, 203–214. https://doi.org/10.1007/978-0-387-35586-3_16

Masrek, M. N. (2018). Assessing information security culture: The case of Malaysia public organization. 1–1. https://doi.org/10.1109/icitacee.2017.8257663

McCormac, A., Calic, D., Butavicius, M., Parsons, K., Zwaans, T., & Pattinson, M. (2017). A reliable measure of information security awareness and the identification of bias in responses. Australasian Journal of Information Systems, 21. https://doi.org/10.3127/ajis.v21i0.1697

McKeown, D. A. (2019). Building a risk-based information security culture. ISSA Journal, 17(4), 14–21.

Mensch, S., & Wilkie, L. (2011). Information security activities of college students: An exploratory study. Academy of Information and Management Sciences Journal, 14(2), 91–116.

Mylonas, A., Kastania, A., & Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47–66.

Nasir, A. (2020). Information security culture model for malaysian organizations: A Review. International Journal of Advanced Trends in Computer Science and Engineering, 9(1.3), 117–121. https://doi.org/10.30534/ijatcse/2020/1691.32020

Nel, F., & Drevin, L. (2019). Key elements of an information security culture in organisations. Information and Computer Security, 27(2), 146–164. https://doi.org/10.1108/ICS-12-2016-0095

Osborne, S., & Hammoud, M. S. (2017). Effective employee engagement in the Workplace. International Journal of Applied Management and Technology, 16(1). https://doi.org/10.5590/ijamt.2017.16.1.04

Oyinloye, T., Eze, T., & Speakman, L., (2020). Towards cyber-user awareness: Design and Evaluation. Reading, Academic Conferences International Limited: 577-588, XVI.

Polit, D. F., & Beck, C. T. (2006). The content validity index: Are you sure you know what’s being reported? critique and recommendations. Research in Nursing & Health, 29(5), 489–497. https://doi.org/10.1002/nur.20147

Rahim, N. H. A., Hamid, S., Mat Kiah, M. L., Shamshirband, S., & Furnell, S. (2015). A systematic review of approaches to assessing cybersecurity awareness. Kybernetes, 44(4), 606-622. doi: http://dx.doi.org.proxy.cecybrary.com/10.1108/K-12-2014-0283

Rajivan, P., Aharonov-Majar, E., & Gonzalez, C. (2020). Update now or later? effects of experience, cost, and risk preference on update decisions. Journal of Cybersecurity, 6(1). https://doi.org/10.1093/cybsec/tyaa002

Rubenstein, S., & Francis, T. (2008). Are your medical records at risk? Wall Street Journal - Eastern Edition, 251(100), D1-D2.

Schoenmakers, K., Greene, D., Stutterheim, S., Lin, H., & Palmer, M. J. (2023). The security mindset: Characteristics, development, and consequences. Journal of Cybersecurity, 9(1). https://doi.org/10.1093/cybsec/tyad010

Sebescen, N., & Vitak, J. (2017). Securing the human: Employee security vulnerability risk in organizational settings. Journal of the Association for Information Science and Technology, 68(9), 2237–2247. https://doi.org/10.1002/asi.23851

Shamsudin, N. N. A., Yatin, S. F. M., Nazim, N. F. M., Talib, A. W., Sopiee, M. A. M., & Shaari, F. N. (2019). Information Security Behaviors among Employees. International Journal of Academic Research in Business and Social Sciences, 9(6). https://doi.org/10.6007/ijarbss/v9-i6/5972

Sierra, J. J. (2016). Open-versus close-ended survey questions. https://www.researchgate.net/publication/282249876 @report{Sierra2016, author = {Jeremy J Sierra}, title = {Open-versus close-ended survey questions}, url = {https://www.researchgate.net/publication/282249876}, year = {2016}, }

Singh, N., Gupta, A.M. and Ojha, A. (2014), “Identifying factors of organizational information security management’”, Journal of Enterprise Information Management, Vol. 27 No. 5, pp. 644-667.

Stanciu, V., & Tinca, A. (2016). Students’ awareness on information security between own perception and reality – an empirical study. Accounting & Management Information Systems, 15(1), 112–130.

Tan, M., & Sagala Aguilar, K. (2012). An investigation of students’ perception of Bluetooth security. Information Management & Computer Security, 20(5), 364–381

Tasevski, P. (2016). It and cyber security awareness – raising campaigns. Information & Security: An International Journal, 34, 7–22. https://doi.org/10.11610/isij.3401

Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E. (2015). Managing the introduction of information security awareness programmes in organisations. European Journal of Information Systems, 24(1), 38-58. doi: http://dx.doi.org.proxy.cecybrary.com/10.1057/ejis.2013.27

U. Sekaran, & R. Bougie, Research methods for business: A Skill-Building Approach, 2016.

Valiente Jr, C. (2017). Addressing malware with cybersecurity awareness. ISSA Journal, 15(10), 16-22.

Van Niekerk, J.F. and Von Solms, R. (2010), “Information security culture: a management perspective”, Computers and Security, Vol. 29 No. 4, pp. 476-486, doi: 10.1016/j.cose.2009.10.005

Vance, A., Lowry, P. B., & Eggett, D. (2013). Using accountability to reduce access policy violations in Information Systems. Journal of Management Information Systems, 29(4), 263–290. https://doi.org/10.2753/mis0742-1222290410

Yeniman Yildirim, E., Akalp, G., Aytac, S., & Bayram, N. (2011). Factors influencing information security management in small- and medium-sized enterprises: A case study from Turkey. International Journal of Information Management, 31(4), 360–365. https://doi.org/10.1016/j.ijinfomgt.2010.10.006

Z. Musanni1Xp, E. Siregar, E. Ahman, & S. H. Senen, ―Factors Influencing Innovative Work Behavior: An Individual Factors Perspective‖, International Journal of Scientific & Technology Research, vol. 8, no. 9, 324–327, 2019.

Zhang, J., Reithel, B. J., & Li, H. (2009). Impact of perceived technical protection on security behaviors. Information Management & Computer Security, 17(4), 330–340. https://doi.org/10.1108/09685220910993980

Downloads

Published

01-04-2024

How to Cite

Kamarulzaman, M. S. ., Mohamed Shuhidan, S. ., Abdul Wahid, K. ., Abdul Wahab, A. ., & Toha @ Tohara, A. J. . (2024). Content Validity of Assessment Instrument for Information Security Culture in Relation to Digital Literacy. Journal of Information and Knowledge Management, 14(1), 95–107. https://doi.org/10.24191/jikm.v14i1.4688

Issue

Section

Articles