With the joint cooperation of Payam Noor University and the Scientific Association of Iran Public Library Advancement

Document Type : Research Paper

Authors

1 Associated Professor, Department of Knowledge and Information Science, Payame Noor University, Tehran, Iran.

2 MSc, Department of Knowledge and Information Sciences, payame Noor University, Tehran, Iran.

Abstract

purpose: The purpose of this study was to determine the information security behavior of users in professional virtual communities based on Islamic Azad University, Kermanshah Branch.
Methodology: The method of the present study was descriptive-correlational. The statistical population of this study was faculty members of Islamic Azad University of Kermanshah, which was selected data.. Descriptive statistics, Pearson correlation matrix and structural equation test were used to analyze the data using SPSS and Amos software.
Findings: The results indicated that the variables "Safeguarding Measure Cost", "Perceived Susceptibility", "Perceived Severity", "Information Security Knowledge Sharing" and "Information Security Experience" had a positive and significant relationship with users’ “Avoidance Behavior”. On the other hand, the variable "Avoidance Motivation" as a mediating dependent variable had a positive and significant relationship with "Avoidance Behavior". Also, the fit of the model showed that the proposed conceptual model was very useful.
Conclusion: The results of the research showed that it is necessary for the planners and trustees of information protection in organizations to provide necessary and continuous training for people to better understand information protection against various threats. Therefore, it is necessary to pay more attention to various factors, including sharing knowledge and experience of people and creating a safe environment for trust between people. On the other hand, awareness and understanding of the types of threats and the nature of each of them will lead to keeping organizations healthy and progressing.

Keywords

Bifulco, A., & Santoro, R. (2005, September). A conceptual framework for “Professional Virtual Communities”. In Working Conference on Virtual Enterprises (pp. 417-424). Springer, Boston, MA.
Elahi, S., Taheri, M., & Hassanzadeh, A. (2021). A Framework for the Role of Human Factors In information Systemsâ Security.Management Research in Iran13(2), 1-22.
Fathian, M,. & Mahdavi Noor, H. (2015). Information Technology: Fundation and Management, Tehran: Iran University of Science & Technology. (In Persian).
Farazmand, H., Mashayekh, M, & Hesami, K. (2012). The Relationship between Information Technology and Manpower Productivity and Capital in Companies Listed in Tehran Stock Exchange. The Journal of Social Development, 7(3), 63-78. (In Persian).
Forrester, V. V. (2019). User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach (Doctoral dissertation, Nova Southeastern University). Giwah, A. D., Wang, L., Levy, Y., & Hur, I. (2019). Empirical assessment of mobile device users’ information security behavior towards data breach: Leveraging protection motivation theory.Journal of Intellectual Capital.
Jackson, B. A., Greenfield, V. A., Morral, A. R., & Hollywood, J. S. (2014). Police department investments in information technology systems: challenges assessing their payoff.
Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS quarterly, 549-566.
Karjalainen, M., Siponen, M., & Sarker, S. (2020). Toward a stage theory of the development of employees’ information security behavior. Computers & Security93, 101782.
Keikha, F. (2018). Interpersonal trust factors affecting members’ knowledge sharing behavior in virtual communities. Iran. J. Inf. Process. Manag, 34, 275-300.
Kheirgoo, M., & Shukuhy, J. (2017). Identification and ranking of key factors influencing the effectiveness of information systems in State-Owned Organizations. Iranian Journal of Information processing and Management32(3), 695-712.
Nadri, Gh. & Bakhshayesh, A (2020). Investigating the Impact of Virtual Social Networks on Social Security of Iran with a policy approach. Protectiv and Society researchs, 7(25), 125-154. (In Persian)
Nia, M. G., Harandi, M. F., & de Vries, M. J. (2019). Technology development as a normative practice: A meaning-based approach to learning about values in engineering—Damming as a case study. Science and engineering ethics25(1), 55-82.
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The journal of psychology91(1), 93-114.
Rogers, R. W. (1983). Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychophysiology: A sourcebook, 153-176.
Samtani, S., Chinn, R., Chen, H., & Nunamaker Jr, J. F. (2017). Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. Journal of Management Information Systems34(4), 1023-1053.
Shamala, P., Ahmad, R., Zolait, A., & Sedek, M. (2017). Integrating information quality dimensions into information security risk management (ISRM). Journal of Information Security and Applications36, 1-10.
Van Schaik, P., Jansen, J., Onibokun, J., Camp, J., & Kusev, P. (2018). Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Computers in Human Behavior, 78, 283-297.
Yousefi Zenouz, R., Hassanpoor, A., & Mousavi, P. (2015). A model to Prioritizing Organizational Information security risks using by Fuzzy AHP and Bayesian Networks in the banking industry. Industrial Management Studies, 13(37), 161-185. (In Persian).
Yudatama, U., Hidayanto, A. N., Nazief, B. A., & Phusavat, K. (2019). Data to model the effect of awareness on the success of IT Governance implementation: A partial least squares structural equation modeling approach (PLS-SEM). Data in brief25, 104333.