The role of user awareness in the information technology and security governance nexus - evidence from Ghana's banking industry

被引:0
|
作者
Adu-Mensah, Emmanuel [1 ]
Odei-Appiah, Solomon [1 ]
Adjei, Joseph Kwame [2 ]
Ayivor, Enoch [1 ]
机构
[1] Ghana Inst Management & Publ Adm GIMPA, POB AH 50, Accra, Ghana
[2] Ashesi Univ, Comp Sci & Informat Syst Dept, 1 Univ Av, Berekuso, Eastern Reg, Ghana
关键词
information technology governance; ITG; information security governance; ISG; information security awareness; ISA; Ghana;
D O I
10.1504/IJICS.2024.143938
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study proposes a model to explain the interplay among information security governance, information technology governance, and information security awareness, with guidance from the information security governance theoretical lens. Employing a questionnaire survey with a sample size of 300 and structural equation modelling, the study revealed several key relationships: business/IT strategic alignment positively correlates with information technology governance, underscoring the importance of aligning IT strategies with broader organisational goals. Weak but consistent positive relationship is identified between value delivery and information technology governance, emphasising the link between extracting value from IT investments and effective governance. Contrary to expectations, risk management and information security governance exhibit an inverse relationship. Information security awareness shows a significant but inverse relationship with information security governance. Both resource management and information technology governance, as well as performance measurement and information technology governance, demonstrate no significant relationships, suggesting that adept resource management and performance monitoring alone may not ensure enhanced governance. Moreover, no significant relationship is found between information security governance and information technology governance, indicating a limited influence of managing information security on overall information technology governance practices. The study concludes by offering recommendations to stakeholders within the domain based on the outlined findings.
引用
收藏
页数:38
相关论文
共 50 条