Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model

given a paucity of research and apparent lack of coherence in information system research, it seems that there is no consensus in the information system field as to how security fits into the information system acceptance, usage, success, utilization, and/or performance impact (effectiveness, effici...

Full description

Bibliographic Details
Main Authors: Al-Shawabkeh, Mahmoud, Mohd Saudi, Madihah, Mohd Alwi, Najwa Hayaati
Format: Conference or Workshop Item
Language:English
English
Published: 2012
Subjects:
Online Access:http://irep.iium.edu.my/25358/
http://irep.iium.edu.my/25358/
http://irep.iium.edu.my/25358/1/013ID47.pdf
http://irep.iium.edu.my/25358/4/al_shawabkeh_computer_security.pdf
id iium-25358
recordtype eprints
spelling iium-253582013-01-25T07:51:37Z http://irep.iium.edu.my/25358/ Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model Al-Shawabkeh, Mahmoud Mohd Saudi, Madihah Mohd Alwi, Najwa Hayaati T Technology (General) given a paucity of research and apparent lack of coherence in information system research, it seems that there is no consensus in the information system field as to how security fits into the information system acceptance, usage, success, utilization, and/or performance impact (effectiveness, efficiency, and satisfaction). This paper is part of an ongoing research project designed to extend the Technology-to-Performance Chain (TPC) model by including the Computer Security Self-Efficacy (CSSE) construct, a strategy of model extension suggested by several researchers. This project aims to examine the research conducted in the last decade in information system journals regarding security issues then based on social cognitive theory, to propose a construct to measure individuals’ computer security self-efficacy. Based on the Technology-to-Performance Chain (TPC) model, this study design expected to models and tests relationship among computer security self-efficacy and secures online banking system performance impact. The study will try to answer the question “to what extent has the computer security self-efficacy affected user’s perception of secure online banking system effectiveness“. After this research finished, the researcher assume that this study findings will provides an initial step towards understanding of the applicability of social cognitive theory in information system security domain and helps information security professionals design information systems considering the effect of computer security self-efficacy on secure information system. 2012-07-16 Conference or Workshop Item NonPeerReviewed application/pdf en http://irep.iium.edu.my/25358/1/013ID47.pdf application/pdf en http://irep.iium.edu.my/25358/4/al_shawabkeh_computer_security.pdf Al-Shawabkeh, Mahmoud and Mohd Saudi, Madihah and Mohd Alwi, Najwa Hayaati (2012) Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model. In: 2012 IEEE Control & System Graduate Research Colloquium (ICSGRC 2012) , 16-17 July 2012, UITM Shah Alam. http://www.asprg.net/icsgrc2012/
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
English
topic T Technology (General)
spellingShingle T Technology (General)
Al-Shawabkeh, Mahmoud
Mohd Saudi, Madihah
Mohd Alwi, Najwa Hayaati
Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model
description given a paucity of research and apparent lack of coherence in information system research, it seems that there is no consensus in the information system field as to how security fits into the information system acceptance, usage, success, utilization, and/or performance impact (effectiveness, efficiency, and satisfaction). This paper is part of an ongoing research project designed to extend the Technology-to-Performance Chain (TPC) model by including the Computer Security Self-Efficacy (CSSE) construct, a strategy of model extension suggested by several researchers. This project aims to examine the research conducted in the last decade in information system journals regarding security issues then based on social cognitive theory, to propose a construct to measure individuals’ computer security self-efficacy. Based on the Technology-to-Performance Chain (TPC) model, this study design expected to models and tests relationship among computer security self-efficacy and secures online banking system performance impact. The study will try to answer the question “to what extent has the computer security self-efficacy affected user’s perception of secure online banking system effectiveness“. After this research finished, the researcher assume that this study findings will provides an initial step towards understanding of the applicability of social cognitive theory in information system security domain and helps information security professionals design information systems considering the effect of computer security self-efficacy on secure information system.
format Conference or Workshop Item
author Al-Shawabkeh, Mahmoud
Mohd Saudi, Madihah
Mohd Alwi, Najwa Hayaati
author_facet Al-Shawabkeh, Mahmoud
Mohd Saudi, Madihah
Mohd Alwi, Najwa Hayaati
author_sort Al-Shawabkeh, Mahmoud
title Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model
title_short Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model
title_full Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model
title_fullStr Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model
title_full_unstemmed Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model
title_sort computer security self-efficacy effect: an extension of technology-to-performance chain model
publishDate 2012
url http://irep.iium.edu.my/25358/
http://irep.iium.edu.my/25358/
http://irep.iium.edu.my/25358/1/013ID47.pdf
http://irep.iium.edu.my/25358/4/al_shawabkeh_computer_security.pdf
first_indexed 2023-09-18T20:37:52Z
last_indexed 2023-09-18T20:37:52Z
_version_ 1777409166886830080