Font Size: a A A

Information system security: Self-efficacy and security effectiveness in Florida libraries

Posted on:2006-09-22Degree:Ph.DType:Dissertation
University:The Florida State UniversityCandidate:Phelps, Daniel CFull Text:PDF
GTID:1458390008455374Subject:Information Science
Abstract/Summary:
This study proposed a model for measuring information system security self-efficacy and examined the relationship between the educational preparation of systems librarians and the effectiveness of their information system security implementation. It differentiated education based on whether or not the participant had received other, formal information technology training. It examined the relationship between information technology training and information system security effectiveness through the intervening variables of information system security experience, information system security self-efficacy, information system security task initiation, and information system security task persistence. Gender, age, and systems librarian experience were included as possible mediating factors.; The participants in this study were systems librarians employed in Florida academic and public libraries. 56 usable responses were obtained. The study found that systems librarians with prior information technology training were more effective at implementing information system security than those without. Although the study failed to offer support for the model as a whole, significant relationships were found between prior information technology training, information system security self-efficacy, and information system security implementation effectiveness. Age showed no significant correlation between either self-efficacy or effectiveness. Gender demonstrated a weak correlation between both, but regression analysis showed no predictive power. Job experience, however, was found to be a better predictor of effectiveness than was IT training, but not as strong as self-efficacy. In combination, self-efficacy and job experience predicted a significant amount of the variance in effectiveness.
Keywords/Search Tags:Information system security, Self-efficacy, Effectiveness, Examined the relationship, Job experience
Related items