The Impact of Employees’ Information Security Awareness on Information Security Behaviour

Melissa Indah Fianty(1*),

(1) Universitas Multimedia Nusantara, Tangerang, Indonesia
(*) Corresponding Author


Internal threats have been a hot topic in information security for several years. According to a 2018 Insider Threat Reports survey, 51% of users are more concerned about internal carelessness and negligence than 47% about external attacks. The availability of information has a vital role for companies today, including confidentiality and integrity in supporting company performance. Users or employees are an essential factor in many information security breaches. This study aims to determine whether security education & training, information security awareness, employee relations, employee accountability, organizational culture, and national culture significantly affect Information System Security Behavior. The sample of this research is employees who work at PT Infracom Technology. Sampling was carried out using the Likert Scale method, and data collection was carried out using questionnaires distributed directly to employees as many as 72 respondents. The statistical method uses Linear Regression Analysis, with statistical tests to test the hypothesis. The results showed a direct and significant influence between security training and education factors, information security awareness, employee relations, and employee responsibility. The most influential variable was employee accountability.

Full Text:



M. indah Fianty, A. Angelina, G. Claudia, and D. Sertivia, “Analysis of Factors Affecting Information System Security Behaviour in Employees at IT Company,” Ultima Infosys : Jurnal Ilmu Sistem Informasi, vol. 13, no. 1, 2022., “12 Kasus Kebocoran Data di Indonesia Sejak 2019,”,” Nov. 05, 2021.

Kompas, “Lazada Kebobolan, 1,1 Juta Data Pengguna RedMart Diretas,”, Nov. 02, 2020.

Cloud BSSN, “Laporan_Tahunan_Honeynet 2020,” Jakarta, 2020.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security (MindTap Course List), 7th ed. Cengage Learning; 7th edition , 2021.

J. Goo, M.-S. Yim, and D. Kim, “A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate,” Professional Communication, IEEE Transactions on, vol. 57, pp. 286–308, Dec. 2014, doi: 10.1109/TPC.2014.2374011.

M. Alohali, N. Clarke, S. Furnell, and S. Albakri, “Information security behavior: Recognizing the influencers,” in 2017 Computing Conference, 2017, pp. 844–853. doi: 10.1109/SAI.2017.8252194.

L. Zemmouchi-Ghomari, “Basic Concepts of Information Systems,” in Contemporary Issues in Information Systems, D. Reilly, Ed. Rijeka: IntechOpen, 2021, p. Ch. 2. doi: 10.5772/intechopen.97644.

A. Yuryna Connolly, “Employee Security Behaviour: The Importance of Education and Policies in Organisational Settings,” Feb. 2018.

Cybersecurity Insiders, “Insider Threat Report,” 2019.

G. Solomon and I. Brown, “The influence of organisational culture and information security culture on employee compliance behaviour,” J. Enterp. Inf. Manag., vol. 34, pp. 1203–1228, 2020.

D. C. Islami, K. B. I.H, and C. Candiwan, “Kesadaran Keamanan Informasi pada Pegawai Bank x di Bandung Indonesia,” Jurnal INKOM, vol. 10, no. 1, p. 19, Nov. 2016, doi: 10.14203/j.inkom.428.

W. Yaokumah, D. Walker, and P. Kumah, “SETA and Security Behavior - Mediating Role of Employee Relations, Monitoring, and Accountability,” Journal of Global Information Management, vol. 27, pp. 102–121, Apr. 2019, doi: 10.4018/JGIM.2019040106.

N. N. A. Shamsudin, S. F. M. Yatin, N. F. M. Nazim, A. W. Talib, M. A. M. Sopiee, and F. N. Shaari, “Information Security Behaviors among Employees,” International Journal of Academic Research in Business and Social Sciences, vol. 9, no. 6, Jun. 2019, doi: 10.6007/ijarbss/v9-i6/5972.

A. Yuryna Connolly, M. Lang, and D. Tygar, Investigation of Employee Security Behaviour: A Grounded Theory Approach, vol. 455. 2015. doi: 10.1007/978-3-319-18467-8_19.

G. Solomon and I. Brown, “The influence of organisational culture and information security culture on employee compliance behaviour,” Journal of Enterprise Information Management, vol. 34, pp. 1203–1228, Jul. 2021, doi: 10.1108/JEIM-08-2019-0217.

W. Yaokumah, D. O. Walker, and P. Kumah, “SETA and security behavior: Mediating role of employee relations, monitoring, and accountability,” Journal of Global Information Management, vol. 27, no. 2, pp. 102–121, Apr. 2019, doi: 10.4018/JGIM.2019040106.

D. L. Sumarna and N. B. Manik, “Analisis Technology Acceptance Model (Tam) Terhadap Pengguna Sap Pt Polychemie Asia Pacific Permai,” Jurnal Logistik Bisnis, vol. 09, no. 2, 2019, [Online]. Available:

A. Purwanto and Y. Sudargini, “Partial Least Squares Structural Squation Modeling (PLS-SEM) Analysis for Social and Management Research : A Literature Review,” Journal of Industrial Engineering & Management Research, vol. 2, no. 4, doi: 10.7777/jiemar.v2i4.

G. TomassMHultt, “Classroom Companion: Business Partial Least Squares Structural Equation Modeling (PLS-SEM) Using R AAWorkbook.” [Online]. Available: http://www.

K. S. Taber, “The Use of Cronbach’s Alpha When Developing and Reporting Research Instruments in Science Education,” Res Sci Educ, vol. 48, no. 6, pp. 1273–1296, 2018, doi: 10.1007/s11165-016-9602-2.

L. Nikitina, R. Paidi, and F. Furuoka, “Using bootstrapped quantile regression analysis for small sample research in applied linguistics: Some methodological considerations,” PLoS One, vol. 14, no. 1, pp. e0210668-, Jan. 2019, [Online]. Available:

C. Andrade, “The P value and statistical significance: Misunderstandings, explanations, challenges, and alternatives,” Indian Journal of Psychological Medicine, vol. 41, no. 3. Wolters Kluwer Medknow Publications, pp. 210–215, May 01, 2019. doi: 10.4103/IJPSYM.IJPSYM_193_19.



  • There are currently no refbacks.

Jumlah Kunjungan:

View My Stats

Published Papers Indexed/Abstracted By: