Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach

This research investigated the behavior related to compliance with information security policy in the Yemeni banking sector by using the protection motivation theory (PMT). While PMT has been a prominent framework in understanding information security compliance, previous research has produced incon...

Full description

Saved in:
Bibliographic Details
Main Authors: Ebrahim Mohammed Alrawhani, Awanis Romli, Mohammed A. Al-Sharafi
Format: Article
Language:English
Published: Elsevier 2025-03-01
Series:Journal of Open Innovation: Technology, Market and Complexity
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2199853124002579
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841560531922583552
author Ebrahim Mohammed Alrawhani
Awanis Romli
Mohammed A. Al-Sharafi
author_facet Ebrahim Mohammed Alrawhani
Awanis Romli
Mohammed A. Al-Sharafi
author_sort Ebrahim Mohammed Alrawhani
collection DOAJ
description This research investigated the behavior related to compliance with information security policy in the Yemeni banking sector by using the protection motivation theory (PMT). While PMT has been a prominent framework in understanding information security compliance, previous research has produced inconsistent findings regarding its factors' effects on compliance behavior, necessitating further empirical validation. Moreover, the majority of research has been carried out in developed countries. The data were collected from 210 bank employees in Yemen and analyzed using PLS-SEM. This research study showed that perceived self-efficacy, response efficacy, and severity significantly influence the employees' intentional behavior in complying with information security policies. However, the results did not support the hypotheses of perceived response cost and perceived vulnerability. The study also discusses both theoretical and practical implications of enhancing information security compliance behavior.
format Article
id doaj-art-07ee62df3601451f99132ad71ddbfdbd
institution Kabale University
issn 2199-8531
language English
publishDate 2025-03-01
publisher Elsevier
record_format Article
series Journal of Open Innovation: Technology, Market and Complexity
spelling doaj-art-07ee62df3601451f99132ad71ddbfdbd2025-01-04T04:56:16ZengElsevierJournal of Open Innovation: Technology, Market and Complexity2199-85312025-03-01111100463Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approachEbrahim Mohammed Alrawhani0Awanis Romli1Mohammed A. Al-Sharafi2Faculty of Computing, University Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang 26600, MalaysiaFaculty of Computing, University Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang 26600, Malaysia; Corresponding authors.IRC for Finance and Digital Economy, KFUPM Business School, King Fahd University of Petroleum & Minerals, Dhahran, Saudi Arabia; Corresponding authors.This research investigated the behavior related to compliance with information security policy in the Yemeni banking sector by using the protection motivation theory (PMT). While PMT has been a prominent framework in understanding information security compliance, previous research has produced inconsistent findings regarding its factors' effects on compliance behavior, necessitating further empirical validation. Moreover, the majority of research has been carried out in developed countries. The data were collected from 210 bank employees in Yemen and analyzed using PLS-SEM. This research study showed that perceived self-efficacy, response efficacy, and severity significantly influence the employees' intentional behavior in complying with information security policies. However, the results did not support the hypotheses of perceived response cost and perceived vulnerability. The study also discusses both theoretical and practical implications of enhancing information security compliance behavior.http://www.sciencedirect.com/science/article/pii/S2199853124002579Information security policyResearch modelProtection motivation theoryCompliance behaviourBanking sector
spellingShingle Ebrahim Mohammed Alrawhani
Awanis Romli
Mohammed A. Al-Sharafi
Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
Journal of Open Innovation: Technology, Market and Complexity
Information security policy
Research model
Protection motivation theory
Compliance behaviour
Banking sector
title Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
title_full Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
title_fullStr Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
title_full_unstemmed Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
title_short Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
title_sort evaluating the role of protection motivation theory in information security policy compliance insights from the banking sector using pls sem approach
topic Information security policy
Research model
Protection motivation theory
Compliance behaviour
Banking sector
url http://www.sciencedirect.com/science/article/pii/S2199853124002579
work_keys_str_mv AT ebrahimmohammedalrawhani evaluatingtheroleofprotectionmotivationtheoryininformationsecuritypolicycomplianceinsightsfromthebankingsectorusingplssemapproach
AT awanisromli evaluatingtheroleofprotectionmotivationtheoryininformationsecuritypolicycomplianceinsightsfromthebankingsectorusingplssemapproach
AT mohammedaalsharafi evaluatingtheroleofprotectionmotivationtheoryininformationsecuritypolicycomplianceinsightsfromthebankingsectorusingplssemapproach