The effects of persuasive technology for influencing end-users’ information security awareness

In today's digital world, information assets have grown in importance, demanding measures to ensure their protection. Ubiquitously, end-users are having trouble ensuring the security of their personal information. The human factor is a major source of vulnerability in the field of information s...

Full description

Saved in:
Bibliographic Details
Main Authors: Bawazir, Mohammed Abdullah, Mahmud, Murni, Abdul Molok, Nurul Nuha, Zeki, Akram M.
Format: Article
Language:English
Published: IIUM Press 2022
Subjects:
Online Access:http://irep.iium.edu.my/106291/6/106291_The%20effects%20of%20persuasive%20technology%20for%20influencing.pdf
http://irep.iium.edu.my/106291/
https://journals.iium.edu.my/kict/index.php/jisdt/article/view/275
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
id my.iium.irep.106291
record_format dspace
spelling my.iium.irep.1062912023-09-08T09:09:53Z http://irep.iium.edu.my/106291/ The effects of persuasive technology for influencing end-users’ information security awareness Bawazir, Mohammed Abdullah Mahmud, Murni Abdul Molok, Nurul Nuha Zeki, Akram M. T58.5 Information technology T58.6 Management information systems In today's digital world, information assets have grown in importance, demanding measures to ensure their protection. Ubiquitously, end-users are having trouble ensuring the security of their personal information. The human factor is a major source of vulnerability in the field of information security. Traditional techniques that can be used to influence information security awareness (ISA) remain prohibitively expensive, time-consuming, and repetitive. In light of these challenges, this study proposes persuasive technology to influence end-users' security awareness and behaviour intention. Based on our research, persuasive technology is effective in changing end-users' attitudes and behaviours. In this context, this study assesses the effectiveness of persuasive technology use for influencing end-users' ISA. In addition, this research establishes an integrated model for improving end-users' ISA by incorporating relevant literature and multiple empirically verified theories, including Fogg Behaviour Model (FBM), Protection Motivation Theory (PMT), Theory of Planned Behaviour (TPB), and Technology Acceptance Model (TAM). The integrated model has been proposed based on the main categories of FBM (motivation, ability, and trigger) to identify the effects of key factors in the persuasive technology context for influencing end-user ISA and behaviour intention. The prototype was developed by implementing the persuasive factors of the proposed model to measure the effectiveness of persuasive technology. Quantitative data from an experiment were gathered from 100 participants to validate the proposed research model using the paired sample T-test and partial least squares (PLS) to assess security awareness in the context of persuasive technology. The research findings show that using persuasive technology has a positive influence on ISA. The results also indicate the research model significantly predicts the key factors affecting security awareness and behaviour intention with respect to persuasive technology. Thus, this study suggests a model for the creation and development of a proactive and customised security awareness system. Therefore, persuasive technology, in general, has a positive effect on users' security awareness and the intention of security behaviour. IIUM Press 2022-05-30 Article PeerReviewed application/pdf en http://irep.iium.edu.my/106291/6/106291_The%20effects%20of%20persuasive%20technology%20for%20influencing.pdf Bawazir, Mohammed Abdullah and Mahmud, Murni and Abdul Molok, Nurul Nuha and Zeki, Akram M. (2022) The effects of persuasive technology for influencing end-users’ information security awareness. Journal of Information Systems and Digital Technologies, 4 (1). pp. 56-81. E-ISSN 2682-8790 https://journals.iium.edu.my/kict/index.php/jisdt/article/view/275
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic T58.5 Information technology
T58.6 Management information systems
spellingShingle T58.5 Information technology
T58.6 Management information systems
Bawazir, Mohammed Abdullah
Mahmud, Murni
Abdul Molok, Nurul Nuha
Zeki, Akram M.
The effects of persuasive technology for influencing end-users’ information security awareness
description In today's digital world, information assets have grown in importance, demanding measures to ensure their protection. Ubiquitously, end-users are having trouble ensuring the security of their personal information. The human factor is a major source of vulnerability in the field of information security. Traditional techniques that can be used to influence information security awareness (ISA) remain prohibitively expensive, time-consuming, and repetitive. In light of these challenges, this study proposes persuasive technology to influence end-users' security awareness and behaviour intention. Based on our research, persuasive technology is effective in changing end-users' attitudes and behaviours. In this context, this study assesses the effectiveness of persuasive technology use for influencing end-users' ISA. In addition, this research establishes an integrated model for improving end-users' ISA by incorporating relevant literature and multiple empirically verified theories, including Fogg Behaviour Model (FBM), Protection Motivation Theory (PMT), Theory of Planned Behaviour (TPB), and Technology Acceptance Model (TAM). The integrated model has been proposed based on the main categories of FBM (motivation, ability, and trigger) to identify the effects of key factors in the persuasive technology context for influencing end-user ISA and behaviour intention. The prototype was developed by implementing the persuasive factors of the proposed model to measure the effectiveness of persuasive technology. Quantitative data from an experiment were gathered from 100 participants to validate the proposed research model using the paired sample T-test and partial least squares (PLS) to assess security awareness in the context of persuasive technology. The research findings show that using persuasive technology has a positive influence on ISA. The results also indicate the research model significantly predicts the key factors affecting security awareness and behaviour intention with respect to persuasive technology. Thus, this study suggests a model for the creation and development of a proactive and customised security awareness system. Therefore, persuasive technology, in general, has a positive effect on users' security awareness and the intention of security behaviour.
format Article
author Bawazir, Mohammed Abdullah
Mahmud, Murni
Abdul Molok, Nurul Nuha
Zeki, Akram M.
author_facet Bawazir, Mohammed Abdullah
Mahmud, Murni
Abdul Molok, Nurul Nuha
Zeki, Akram M.
author_sort Bawazir, Mohammed Abdullah
title The effects of persuasive technology for influencing end-users’ information security awareness
title_short The effects of persuasive technology for influencing end-users’ information security awareness
title_full The effects of persuasive technology for influencing end-users’ information security awareness
title_fullStr The effects of persuasive technology for influencing end-users’ information security awareness
title_full_unstemmed The effects of persuasive technology for influencing end-users’ information security awareness
title_sort effects of persuasive technology for influencing end-users’ information security awareness
publisher IIUM Press
publishDate 2022
url http://irep.iium.edu.my/106291/6/106291_The%20effects%20of%20persuasive%20technology%20for%20influencing.pdf
http://irep.iium.edu.my/106291/
https://journals.iium.edu.my/kict/index.php/jisdt/article/view/275
_version_ 1778160460931006464