{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T05:54:04Z","timestamp":1715838844099},"reference-count":17,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"abstract":"\n Purpose<\/jats:title>\n \u2013 The purpose of this paper was to analyse existing theories from the social sciences to gain a better understanding of factors which contribute to student mobile phone users\u2019 poor information security behaviour. Two key aspects associated with information security behaviour were considered, namely, awareness and behavioural intent. This paper proposes that the knowing-and-doing gap can possibly be reduced by addressing both awareness and behavioural intent. This research paper explores the relationship between student mobile phone user information security awareness and behavioural intent in a developmental university in South Africa. <\/jats:p>\n <\/jats:sec>\n \n Design\/methodology\/approach<\/jats:title>\n \u2013 Information security awareness interventions were implemented in this action research study, and student information security behavioural intent was observed after each cycle. <\/jats:p>\n <\/jats:sec>\n \n Findings<\/jats:title>\n \u2013 The poor security behaviour exhibited by student mobile phone users, which was confirmed by the findings of this study, is of particular interest in the university context, as most undergraduate students are offered a computer-related course which covers certain information security-related principles. Existing researchers in the field of information security still grapple with the \u201cknowing-and-doing\u201d gap, where user information security knowledge\/awareness sometimes does not result in safer behavioural practises. <\/jats:p>\n <\/jats:sec>\n \n Originality\/value<\/jats:title>\n \u2013 Zhang et al.<\/jats:italic> (2009) suggest that understanding human behaviour is important when dealing with the problems caused by human errors. Harnesk and Lindstrom (2011) expressed a concern that existing research does not address the interlinked relationship between anticipated security behaviour and the enactment of security procedures. This study acknowledges Choi et al.<\/jats:italic> (2008) contribution in their discussions on the \u201cknowing-and-doing gap\u201d suggests a link between awareness and actual behaviour that is confirmed by the findings of this study.<\/jats:p>\n <\/jats:sec>","DOI":"10.1108\/ics-10-2014-0072","type":"journal-article","created":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T23:42:32Z","timestamp":1444693352000},"page":"406-420","source":"Crossref","is-referenced-by-count":12,"title":["Exploring the relationship between student mobile information security awareness and behavioural intent"],"prefix":"10.1108","volume":"23","author":[{"given":"Bukelwa","family":"Ngoqo","sequence":"first","affiliation":[]},{"given":"Stephen V.","family":"Flowerday","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122022543597000_b1","doi-asserted-by":"crossref","unstructured":"Ajzen, I.\n (1991), \u201cThe theory of planned behavior\u201d, \n Organizational Behaviour and Human Decision Processes\n , Vol. 50 No. 2, pp. 179-211.","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"key2020122022543597000_b2","doi-asserted-by":"crossref","unstructured":"Chen, C.C.\n , \n Medlin, B.D.\n and \n Shaw, R.S.\n (2008), \u201cA cross-cultural investigation of situational information security awareness programs\u201d, \n Information Management & Computer Security\n , Vol. 16 No. 4, pp. 360-376.","DOI":"10.1108\/09685220810908787"},{"key":"key2020122022543597000_b3","doi-asserted-by":"crossref","unstructured":"Choi, N.\n , \n Kim, D.\n , \n Goo, J.\n and \n Whitmore, A.\n (2008), Knowing is doing: an empirical validation of the relationship between managerial information security awareness and action. \n Information Management & Computer Security\n , Vol. 16 No. 5, pp. 484-501.","DOI":"10.1108\/09685220810920558"},{"key":"key2020122022543597000_b4","unstructured":"Department of Education\n (2001), \u201cNational plan for higher education in South Africa\u201d, \n Ministry of Education\n , South Africa."},{"key":"key2020122022543597000_b5","unstructured":"Furnell, S.\n (2010), \u201cJumping security hurdles\u201d, \n Computer Fraud & Security\n , Vol. 1074."},{"key":"key2020122022543597000_b6","doi-asserted-by":"crossref","unstructured":"Harnesk, D.\n and \n Lindstrom, J.\n (2011), \u201cShaping security behaviour through discipline and agility: implications for information security management\u201d, \n Information Management & Computer Security\n , Vol. 19 No. 4, pp. 262-276.","DOI":"10.1108\/09685221111173076"},{"key":"key2020122022543597000_b7","doi-asserted-by":"crossref","unstructured":"Kruger, H.A.\n and \n Kearney, W.D.\n (2006), \u201cA prototype for assessing information security awareness\u201d, \n Computers & Security\n , Vol. 25 No. 4, pp. 289-296.","DOI":"10.1016\/j.cose.2006.02.008"},{"key":"key2020122022543597000_b9","unstructured":"Ministry of Education\n . (2003), \u201cHigher education restructuring\u201d, \n Guidelines for Mergers and Incorporations\n , available at: www.education.gov.za\/LinkClick.aspx?fileticket=Fk0AzO7hgqA%3D\n\t\t\t\t\t&\n\t\t\t\ttabid=95\n\t\t\t\t\t&\n\t\t\t\tmid=507 (accessed 11 November 2013)."},{"key":"key2020122022543597000_b10","doi-asserted-by":"crossref","unstructured":"Oyedemi, T.D.\n (2012), \u201cDigital inequalities and implications for social inequalities: a study of Internet penetration amongst university students in South Africa\u201d, \n Telematics and Informatics\n , Vol. 29 No. 2012, pp. 302-313.","DOI":"10.1016\/j.tele.2011.12.001"},{"key":"key2020122022543597000_b12","unstructured":"Parakkattu, S.\n and \n Kunnathur, A.S.\n (2010), \u201cA framework for research in information security management\u201d, \n Northeast Decision Sciences Institute Proceedings\n , pp. 318-323."},{"key":"key2020122022543597000_b13","doi-asserted-by":"crossref","unstructured":"Talib, S.\n , \n Clarke, N.L.\n and \n Furnell, S.M.\n (2010), \u201cAn analysis of information security awareness within home and work environments\u201d, Conference on Availability, Reliability and Security, ARES\u201910 International conference, Krakov, Universit\u00e9 Paul Sabatier, Toulouse, France, pp. 196-203.","DOI":"10.1109\/ARES.2010.27"},{"key":"key2020122022543597000_b14","doi-asserted-by":"crossref","unstructured":"Todd, J.\n and \n Mullan, B.\n (2011), \u201cUsing the theory of planned behaviour and prototype willingness model to target binge drinking in female undergraduate university students\u201d, \n Addictive Behaviors\n , Vol. 36, pp. 980-986.","DOI":"10.1016\/j.addbeh.2011.05.010"},{"key":"key2020122022543597000_b15","doi-asserted-by":"crossref","unstructured":"Van Niekerk, J.F.\n and \n Von Solms, R.\n (2010), \u201cInformation security culture: a management perspective\u201d, \n Computers & Security\n , Vol. 29, pp. 476-486.","DOI":"10.1016\/j.cose.2009.10.005"},{"key":"key2020122022543597000_frd1","doi-asserted-by":"crossref","unstructured":"Lee, H.\n and \n Lee, S.\n (2010), \u201cInternet vs mobile services: comparisons of gender and ethnicity\u201d, \n Journal of Research in Interactive Marketing\n , Vol. 4 No. 4, pp. 346-375.","DOI":"10.1108\/17505931011092835"},{"key":"key2020122022543597000_frd2","unstructured":"Pahnilla, S.\n , \n Siponen, M.\n and \n Mahmood, A.\n (2007), \u201cEmployees adherence to information security policies an empirical study\u201d, IFIP TC-11 22nd International Information Security Conference, Johannesburg."},{"key":"key2020122022543597000_frd3","doi-asserted-by":"crossref","unstructured":"Workman, M.\n and \n Gathegi, J.\n (2007), \u201cPunishment and ethics deterrents: a study of insider security contravention\u201d, \n Journal of the American Society for Information Science and Technology\n , Vol. 58 No. 2, pp. 212-222.","DOI":"10.1002\/asi.20474"},{"key":"key2020122022543597000_frd4","doi-asserted-by":"crossref","unstructured":"Zhang, J.\n , \n Reithel, B.J.\n and \n Li, H.\n (2009), \u201cImpact of perceived technical protection on security behaviours\u201d, \n Information Management & Computer Security\n , Vol. 17 No. 4, pp. 330-340.","DOI":"10.1108\/09685220910993980"}],"container-title":["Information & Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ICS-10-2014-0072","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-10-2014-0072\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-10-2014-0072\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,20]],"date-time":"2020-12-20T22:54:56Z","timestamp":1608504896000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-10-2014-0072\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,10,12]]}},"alternative-id":["10.1108\/ICS-10-2014-0072"],"URL":"https:\/\/doi.org\/10.1108\/ics-10-2014-0072","relation":{},"ISSN":["2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2015,10,12]]}}}