Yayın:
“What about users?”: Development and validation of the mobile information security awareness scale (MISAS)

dc.contributor.authorErdoğdu, Fatih
dc.contributor.authorGökoğlu, Seyfullah
dc.contributor.authorKara, Mehmet
dc.date.accessioned2026-01-04T14:44:05Z
dc.date.issued2020-12-02
dc.description.abstractPurposeThe current study aimed to develop and validate Mobile Information Security Awareness Scale (MISAS) based on the prototype model for measuring information security awareness and the relevant literature.Design/methodology/approachThe scale was developed and validated with the participation of 562 students from four universities. The construct validity of the scale was tested through exploratory factor analysis and confirmatory factor analysis.FindingsThe reliability of the scale was tested through corrected item-total correlations and Cronbach alpha. The MISAS includes six factors and 17 items. The identified factors were labeled as backup, instant messaging and navigation, password protection, update, access permission and using others' devices.Research limitations/implicationsThe scale included only the human aspects of mobile information security. The technical aspects are not within the scope of this study. For this reason, future studies might develop and validate a different scale focusing on the technical aspects of mobile information security.Originality/valueThe developed scale contributes to the literature on the human aspects of mobile information security.
dc.description.urihttps://doi.org/10.1108/oir-04-2020-0129
dc.description.urihttps://dx.doi.org/10.1108/oir-04-2020-0129
dc.identifier.doi10.1108/oir-04-2020-0129
dc.identifier.endpage421
dc.identifier.issn1468-4527
dc.identifier.openairedoi_dedup___::70fb7b883b6f7fd2ef06cd4c2025d8fd
dc.identifier.orcid0000-0003-1022-8570
dc.identifier.orcid0000-0003-0074-7692
dc.identifier.orcid0000-0003-2758-2015
dc.identifier.scopus2-s2.0-85096931590
dc.identifier.startpage406
dc.identifier.urihttps://hdl.handle.net/20.500.12597/38378
dc.identifier.volume45
dc.identifier.wos000595685100001
dc.language.isoeng
dc.publisherEmerald
dc.relation.ispartofOnline Information Review
dc.rightsCLOSED
dc.subject.sdg6. Clean water
dc.title“What about users?”: Development and validation of the mobile information security awareness scale (MISAS)
dc.typeArticle
dspace.entity.typePublication
local.api.response{"authors":[{"fullName":"Fatih Erdoğdu","name":"Fatih","surname":"Erdoğdu","rank":1,"pid":{"id":{"scheme":"orcid","value":"0000-0003-1022-8570"},"provenance":null}},{"fullName":"Seyfullah Gökoğlu","name":"Seyfullah","surname":"Gökoğlu","rank":2,"pid":{"id":{"scheme":"orcid","value":"0000-0003-0074-7692"},"provenance":null}},{"fullName":"Mehmet Kara","name":"Mehmet","surname":"Kara","rank":3,"pid":{"id":{"scheme":"orcid","value":"0000-0003-2758-2015"},"provenance":null}}],"openAccessColor":null,"publiclyFunded":false,"type":"publication","language":{"code":"eng","label":"English"},"countries":null,"subjects":[{"subject":{"scheme":"FOS","value":"0202 electrical engineering, electronic engineering, information engineering"},"provenance":null},{"subject":{"scheme":"FOS","value":"02 engineering and technology"},"provenance":null},{"subject":{"scheme":"SDG","value":"6. Clean water"},"provenance":null}],"mainTitle":"“What about users?”: Development and validation of the mobile information security awareness scale (MISAS)","subTitle":null,"descriptions":["<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose</jats:title><jats:p>The current study aimed to develop and validate Mobile Information Security Awareness Scale (MISAS) based on the prototype model for measuring information security awareness and the relevant literature.</jats:p></jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design/methodology/approach</jats:title><jats:p>The scale was developed and validated with the participation of 562 students from four universities. The construct validity of the scale was tested through exploratory factor analysis and confirmatory factor analysis.</jats:p></jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings</jats:title><jats:p>The reliability of the scale was tested through corrected item-total correlations and Cronbach alpha. The MISAS includes six factors and 17 items. The identified factors were labeled as backup, instant messaging and navigation, password protection, update, access permission and using others' devices.</jats:p></jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Research limitations/implications</jats:title><jats:p>The scale included only the human aspects of mobile information security. The technical aspects are not within the scope of this study. For this reason, future studies might develop and validate a different scale focusing on the technical aspects of mobile information security.</jats:p></jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality/value</jats:title><jats:p>The developed scale contributes to the literature on the human aspects of mobile information security.</jats:p></jats:sec>"],"publicationDate":"2020-12-02","publisher":"Emerald","embargoEndDate":null,"sources":["Crossref"],"formats":null,"contributors":null,"coverages":null,"bestAccessRight":{"code":"c_14cb","label":"CLOSED","scheme":"http://vocabularies.coar-repositories.org/documentation/access_rights/"},"container":{"name":"Online Information Review","issnPrinted":"1468-4527","issnOnline":null,"issnLinking":null,"ep":"421","iss":null,"sp":"406","vol":"45","edition":null,"conferencePlace":null,"conferenceDate":null},"documentationUrls":null,"codeRepositoryUrl":null,"programmingLanguage":null,"contactPeople":null,"contactGroups":null,"tools":null,"size":null,"version":null,"geoLocations":null,"id":"doi_dedup___::70fb7b883b6f7fd2ef06cd4c2025d8fd","originalIds":["10.1108/OIR-04-2020-0129","10.1108/oir-04-2020-0129","50|doiboost____|70fb7b883b6f7fd2ef06cd4c2025d8fd","3110588454"],"pids":[{"scheme":"doi","value":"10.1108/oir-04-2020-0129"}],"dateOfCollection":null,"lastUpdateTimeStamp":null,"indicators":{"citationImpact":{"citationCount":6,"influence":2.853359e-9,"popularity":6.189803e-9,"impulse":3,"citationClass":"C5","influenceClass":"C5","impulseClass":"C5","popularityClass":"C4"}},"instances":[{"pids":[{"scheme":"doi","value":"10.1108/oir-04-2020-0129"}],"license":"Emerald Insight Site Policies","type":"Article","urls":["https://doi.org/10.1108/oir-04-2020-0129"],"publicationDate":"2020-12-02","refereed":"peerReviewed"},{"alternateIdentifiers":[{"scheme":"doi","value":"10.1108/oir-04-2020-0129"},{"scheme":"mag_id","value":"3110588454"}],"type":"Article","urls":["https://dx.doi.org/10.1108/oir-04-2020-0129"],"refereed":"nonPeerReviewed"}],"isGreen":false,"isInDiamondJournal":false}
local.import.sourceOpenAire
local.indexed.atWOS
local.indexed.atScopus

Dosyalar

Koleksiyonlar