Understanding the influence of Individual's Self-efficacy for Information Systems Security Innovation Adoption: A Systematic Literature Review

09/28/2018
by   Mumtaz Abdul Hameed, et al.
0

Information Systems security cannot be fully apprehended if the user lacks the required knowledge and skills to effectively apply the safeguard measures. Knowledge and skills enhance one's self-efficacy. Individual self-efficacy is an important element in ensuring Information Systems safeguard effectiveness. In this research, we explore the role of individual's self-efficacy for Information Systems security adoption. The study uses the method of Systematic Literature Review using 42 extant studies to evaluate individual self- efficacy for Information Systems security innovation adoption. The systematic review findings reveal the appropriateness of the existing empirical investigations on the individual self-efficacy for Information Systems security adoption. Furthermore, the review results confirmed the significance of the relationship between individual self-efficacy and Information Systems security adoption. In addition, the study validates the past administration of the research on this subject in terms of sample size, sample subject and theoretical grounds.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/16/2019

On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations

A number of determinants predict the adoption of Information Systems (IS...
research
06/16/2023

Cybersecurity Career Requirements: A Literature Review

This study employs a systematic literature review approach to identify t...
research
12/04/2022

Status Quo Bias in Users Information Systems (IS) Adoption and Continuance Intentions: A Literature Review and Framework

Information systems (IS) adoption and continuance intentions of users ha...
research
10/31/2021

Alexa, Play Fetch! A Review of Alexa Skills for Pets

Alexa Skills are used for a variety of daily routines and purposes, but ...
research
08/16/2019

Evaluating User Perception of Multi-Factor Authentication: A Systematic Review

Security vulnerabilities of traditional single factor authentication has...
research
07/20/2023

To What Extent Are Honeypots and Honeynets Autonomic Computing Systems?

Cyber threats, such as advanced persistent threats (APTs), ransomware, a...

Please sign up or login with your details

Forgot password? Click here to reset