Skip to main content
  • Dr. Eric Amankwa is a senior lecturer in the ICT department of the Presbyterian University Ghana and holds a PhD from... moreedit
Information security policy (ISP) noncompliance continue to impede information security in organizations. This paper consolidates the strength of previous studies into an effective single solution. The paper, first, synthesizes the... more
Information security policy (ISP) noncompliance continue to impede information security in organizations. This paper consolidates the strength of previous studies into an effective single solution. The paper, first, synthesizes the existing literature and groups relevant ISP compliance factors into user involvement, personality types, security awareness and training, behavioral factors, and information security culture. Secondly, a generic framework that guides the development of frameworks for ISP compliance in organizations was developed based on the literature review. The generic framework categorized elements required for developing an ISP compliance framework into structure, content and outcome elements. Thirdly, the generic framework was applied to develop a composite ISP compliance framework that proposes the establishment of ISP compliance as a culture in organizations. Finally, the results of the expert review assessment showed that the proposed composite ISP framework was ...
Information security policy (ISP) noncompliance is a growing problem that accounts for a significant number of security breaches in organizations. Existing strategies for changing employees' behavior intentions towards compliance have... more
Information security policy (ISP) noncompliance is a growing problem that accounts for a significant number of security breaches in organizations. Existing strategies for changing employees' behavior intentions towards compliance have not been effective. It is therefore imperative to identify other effective strategies to address the problem. This article investigates the effect accountability constructs on employees' attitudes and behavior intentions towards establishing ISP compliance as a culture. In addition, the authors validate a testable research model for predicting employees' compliance behavior intentions in a field survey involving 313 employees from selected Ghanaian companies. The overall effect showed that measures of accountability significantly influenced employees' attitudes and behavior intentions to ISP compliance while the establishment of ISP compliance culture largely depended on the existence of a conducive information security culture and posi...
An article published by International Journal of Research in Commerce, IT & Management Vol. 3, No. 07, 2013
The use of models has been one of the prevalent approaches to enhancing information security education and awareness in existing literature. Models provide step by step problem solving opportunities and are thus essential in security... more
The use of models has been one of the prevalent approaches to enhancing information security education and awareness in existing literature. Models provide step by step problem solving opportunities and are thus essential in security education and awareness activities. This paper categorized models for enhancing security education and awareness based on their stakeholder domains into: End-Users, Institutions and Industry domains. Analysis of literature on information security education and awareness indicates that approaches for enhancing end-users' security knowledge do exist, as do models for promoting organizational security knowledge in the industry domain. However, only one model was found to exist for enhancing security knowledge of employees in the institutions domain. This paper therefore describes a gap identified in the existing information security education and awareness models and presents the required relevant characteristics for developing information security education and awareness models for bridging the gap (in the institutions domain). The paper also evaluates and compares characteristics of existing models in order to identify the most relevant characteristics for a new model and makes a presentation to that effect. This was done through a review of existing literature on information security education and awareness models and a comparative analysis of models identified in the three domains.
Research Interests:
The importance of information security education, information security training, and information security awareness in organisations cannot be overemphasised. This paper presents working definitions for information security education,... more
The importance of information security education, information security training, and information security awareness in organisations cannot be overemphasised. This paper presents working definitions for information security education, information security training and information security awareness. An investigation to determine if any differences exist between information security education, information security training and information security awareness was conducted. This was done to help institutions understand when they need to train or educate employees and when to introduce information security awareness programmes. A conceptual analysis based on the existing literature was used for proposing working definitions, which can be used as a reference point for future information security researchers. Three important attributes (namely focus, purpose and method) were identified as the distinguishing characteristics of information security education, information security training and information security awareness. It was found that these information security concepts are different in terms of their focus, purpose and methods of delivery.
Research Interests:
Websites have become a major medium through which public institutions in Ghana disseminate public information and also render other services. It is therefore important to consider the total inclusion of all people in accessing and... more
Websites have become a major medium through which public institutions in Ghana disseminate public information and also render other services. It is therefore important to consider the total inclusion of all people in accessing and interacting with these public websites and this requirement is backed by law. This paper examines the current levels of accessibility to public websites and assesses the difficulties faced by visually impaired users in accessing web based system features including interactive content, textual resources, navigation features and communication tools. Based on a literature review of accessibility requirements, a check list was developed and used as a basis to examine 30 randomly selected public websites. Physically challenged users also responded to a questionnaire designed to elicit the challenges they face in accessing the selected websites. The results show that 70% of public websites do not have any assistive technology to support visually impaired users and high cost to access, low computer literacy among the visually impaired, and inadequate privacy protection are major challenges facing the visually impaired.
Research Interests:
Research Interests:
The rapidly evolving security threats and risks in tertiary institutions must be met with a knowledgeable security workforce. Those on the front lines must demonstrate working knowledge of information security core skills and workplace... more
The rapidly evolving security threats and risks in tertiary institutions must be met with a knowledgeable security workforce. Those on the front lines must demonstrate working knowledge of information security core skills and workplace competencies. However, analysis of existing literature revealed that employees within tertiary institutions lack the requisite knowledge on how to ensure information confidentiality and integrity. A major reason accounting for the lack of knowledge on the part of employees in tertiary institutions is the lack of effective models to guide the design and development of information security education and awareness campaigns. In recognition of this deficiency, this paper proposed a model for enhancing information security knowledge among employees of tertiary institutions. The proposed information security education and awareness model provides a practical map of the skills and knowledge that is needed to emphasize and enhance information security among employees. The model shall be used by information security trainers to develop effective information security education and awareness campaigns. Adopting the model provides immediate and long-term Information security benefits for Tertiary Institutions as well as the educational sector as a whole.
Research Interests: