Theoretical Paper Title: An information security knowledge sharing model in organizations
Authors: Nader Sohrabi Safa, Rossouw Von Solms
Theoretical Paper Link: http://www.sciencedirect.com/science/article/pii/S0378720617303300?via%3Dihub
Summary:
The article describes how sharing knowledge about information security in organizations reduce the risk of information security occurrences. The study took in consideration the Theory of Planned Behavior, The Motivation Theory and Triandis’ model as the background of the study. The study relates between the motivation and information security sharing attitudes. The study collect data from several organizations in Malaysia with different type of work through paper based questionnaire and electronic questionnaire. The complete answered sample was 482 questionnaires.
Studying behavior of participants in several areas related to the information security sharing is not easy. The study results show a very clear relationship between sharing security information and reducing the risk of security as the more employees know about the information security and cases happened with their colleagues, they will be more aware and will reduce the risk of repeating the same issues.
Presently we can state the data security information sharing, data security coordinated effort, and agreeing to data security authoritative arrangements and methods are hierarchical parts of data security that ought to be taken into the thought by the two academic and professionals (Safa & Von Solms, 2016).
Quality of the Research:
The research question and objective is clearly stated as the information security is a critical issue for current organizations. The research is interesting and very important. The study is original in the way to tackle the employee’s behavior in sharing information security knowledge. The background of the research is clear and relevant and discussed in details. No ethical problems noted.
The Research Method:
The research summarizes the research methods used which are Interviews with the experts, Data collection through questionnaires and apply structural equation modeling. The research method seemed appropriate for the research question but the sample could be bigger to cover more industries and got more accurate results. The methodology adequately described. The analyses done correctly using Confirmatory Factor Analysis (CFA) which will confirm the data consistency. The conclusion supported by the data in Table 2 the authors summarize Respondents’ characteristics and in Table 3 full items and their descriptive statistics.
Quality of Presentation:
The study is well presented and well structured. All the symbols, terms, and concepts adequately defined. Additional tables with figures could help to clarify the work as the included figures are statistics oriented.
Additional Notes:
The authors of the research had covered a very important issue about sharing information security knowledge will help organizations reduce security risks and save money. The article had many references to support their research.
References:
Safa, N. S., & Von Solms, R. (2016). An information security knowledge sharing model in organizations. Computers in Human Behavior, 57, 442-451. doi:http://dx.doi.org/10.1016/j.chb.2015.12.037