Volume 16 , Issue 1 , PP: 68-85, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Balamuralikrishna Thati 1 , Ravi Kiran Koppolu 2 , D. Lokesh Sai Kumar 3 * , Tenali Nagamani 4 , P. Muthukumar 5 , S. Lalitha 6
Doi: https://doi.org/10.54216/JCIM.160106
This observe investigates the reasons and effects of cybersecurity way of life in IT agencies. Given the developing threats to cybersecurity and the essential role that organizational lifestyle plays in decreasing these risks, it's miles essential to realise the connection that exists among policy elements, employee conduct, and cyber security overall performance. By concentrating at the connections between distinct factors impacting cybersecurity culture and there have an effect on the efficacy of cyber security measures, the examine fills in gaps in empirical studies. This take a look act’s principal purpose is to behaviour an empirical investigation into the methods that many sides of cyber security culture, along with policy concerns, employee behaviour, and cyber security attention, have an effect on how properly cyber security measures work in IT companies. The studies in particular examines 3 hypotheses: (1) that coverage factors positively correlate with usual effectiveness; (2) that cyber security attention and engagement in preventive measures are predictively correlated; and (three) that behavioural worries are undoubtedly correlated with the implementation of powerful cyber security measures. Data had been collected the usage of a pass-sectional survey the use of a quantitative studies method. A stratified random pattern strategy became used inside the studies to select 100 IT employees from special corporations. A systematic questionnaire overlaying coverage variables, behavioural worries, cyber security recognition, preventative measures, and the perceived efficacy of cyber security strategies become used to collect information. The conclusions of the primary records had been in addition supported and given that means with the aid of secondary information taken from organizational reviews and already published literature. An enormous wonderful connection was discovered in the research between coverage variables and cyber security measures' efficacy, suggesting that robust regulations enhance cyber security overall performance as a whole. It has been proven that employee participation in preventative actions is extensively anticipated by cyber security recognition. The adoption of successful cyber security tactics turned into strongly correlated with behavioural issues. Aside from declaring regions where cyber security lifestyle needs to be stepped forward, the research additionally found gaps in preventative measures' efficacy. The study emphasizes how crucial it is to have clear policy guidelines and raise awareness of cyber security issues in order to encourage efficient cyber security practices in IT companies. The results provide insightful information on the dynamics of cyber security culture and offer doable recommendations for improving cyber security procedures and guidelines. Organizations may enhance their cyber security frameworks and strengthen their Defences against emerging threats by filling up the holes found in the report.
Cybersecurity , IT companies , Organizational Culture , Policy Elements
[1] E. Amankwa, M. Loock, and E. Kritzinger, "Establishing information security policy compliance culture in organizations," Information & Computer Security, vol. 26, no. 4, pp. 420-436, 2018.
[2] A. Andronache, "Increasing security awareness through lenses of cybersecurity culture," Journal of Information Systems & Operations Management, vol. 15, no. 1, 2021.
[3] M. S. Khan, A. Yaqoob, N. F. Khan, and N. Ikram, "The cybersecurity behavioral research: A tertiary study," Computers & Security, vol. 120, p. 102826, 2022, doi: 10.1016/j.cose.2022.102826.
[4] N. S. BIYYAPU, S. B. CHANDOLU, S. GORINTLA, N. R. TIRUMALASETTI, A. CHOKKA, and S. P. PRAVEEN, "Advanced machine learning techniques for real-time fraud detection and prevention," Journal of Theoretical and Applied Information Technology, vol. 102, no. 20, 2024.
[5] G. Dhillon, R. Syed, and C. Pedron, "Interpreting information security culture: An organizational transformation case study," Computers & Security, vol. 56, pp. 63-69, 2016.
[6] R. Aruna, V. S. Kushwah, S. P. Praveen, R. Pradhan, A. J. Chinchawade, R. R. Asaad, and R. L. Kumar, "Coalescing novel QoS routing with fault tolerance for improving QoS parameters in wireless Ad-Hoc network using craft protocol," Wireless Networks, vol. 30, no. 2, pp. 711-735, 2024.
[7] R. J. Failla, "The influence of organizational culture on cybersecurity governance in breached organizations," Capitol Technology University, 2020.
[8] G. JayaLakshmi, A. Madhuri, D. Vasudevan, B. Thati, U. Sirisha, and P. P. Surapaneni, "Effective disaster management through transformer-based multimodal tweet classification," Revue d'Intelligence Artificielle, vol. 37, no. 5, p. 1263, 2023.
[9] A. Georgiadou, S. Mouzakitis, and D. Askounis, "Detecting insider threat via a cyber-security culture framework," Journal of Computer Information Systems, vol. 62, no. 4, pp. 706-716, 2022.
[10] S. Hasan, M. Ali, S. Kurnia, and R. Thurasamy, "Evaluating the cyber security readiness of organizations and its influence on performance," Journal of Information Security and Applications, vol. 58, p. 102726, 2021.
[11] A. C. Johnston and M. Warkentin, "Fear appeals and information security behaviors: An empirical study," MIS Quarterly, pp. 549-566, 2010.
[12] M. Karyda, "Fostering information security culture in organizations: A research agenda," 2017.
[13] N. F. Khan, A. Yaqoob, M. S. Khan, and N. Ikram, "The cybersecurity behavioral research: A tertiary study," Computers & Security, vol. 120, p. 102826, 2022.
[14] N. Kim and S. Lee, "Cybersecurity breach and crisis response: An analysis of organizations’ official statements in the United States and South Korea," International Journal of Business Communication, vol. 58, no. 4, pp. 560-581, 2021.
[15] B. Krishna, S. Krishnan, and M. P. Sebastian, "Examining the relationship between national cybersecurity commitment, culture, and digital payment usage: An institutional trust theory perspective," Information Systems Frontiers, vol. 25, no. 5, pp. 1713-1741, 2023.
[16] S. Kumar, B. Biswas, M. S. Bhatia, and M. Dora, "Antecedents for enhanced level of cyber-security in organisations," Journal of Enterprise Information Management, vol. 34, no. 6, pp. 1597-1629, 2021.
[17] E. Kweon, H. Lee, S. Chai, and K. Yoo, "The utility of information security training and education on cybersecurity incidents: An empirical evidence," Information Systems Frontiers, vol. 23, pp. 361-373, 2021.
[18] A. Onumo, I. Ullah-Awan, and A. Cullen, "Assessing the moderating effect of security technologies on employees compliance with cybersecurity control procedures," ACM Transactions on Management Information Systems (TMIS), vol. 12, no. 2, pp. 1-29, 2021.
[19] D. Pérez-González, S. T. Preciado, and P. Solana-Gonzalez, "Organizational practices as antecedents of the information security management performance: An empirical investigation," Information Technology & People, vol. 32, no. 5, pp. 1262-1275, 2019.
[20] V. N. Thatha, S. Donepudi, M. A. Safali, S. P. Praveen, N. T. Tung, and N. H. H. Cuong, "Security and risk analysis in the cloud with software defined networking architecture," International Journal of Electrical & Computer Engineering (2088-8708), vol. 13, no. 5, 2023.
[21] K. Reegård, C. Blackett, and V. Katta, "The concept of cybersecurity culture," in 29th European Safety and Reliability Conference, 2019, pp. 4036-4043.
[22] M. U. Shah, F. Iqbal, U. Rehman, and P. C. Hung, "A comparative assessment of human factors in cybersecurity: Implications for cyber governance," IEEE Access, 2023.
[23] F. A. Shaikh and M. Siponen, "Organizational learning from cybersecurity performance: Effects on cybersecurity investment decisions," Information Systems Frontiers, vol. 26, no. 3, pp. 1109-1120, 2024.
[24] A. Madhuri, S. Sindhura, D. Swapna, S. P. Phani Praveen, and T. Sri Lakshmi, "Distributed computing meets movable wireless communications in next generation mobile communication networks (NGMCN)," in Computational Methods and Data Engineering: Proceedings of ICCMDE 2021, Singapore: Springer Nature Singapore, 2022, pp. 125-136.
[25] A. Sutton and L. Tompson, "Towards a cybersecurity culture-behaviour framework: A rapid evidence review," 2023.
[26] A. Tolah, S. M. Furnell, and M. Papadaki, "An empirical analysis of the information security culture key factors framework," Computers & Security, vol. 108, p. 102354, 2021.
[27] P. Trim and D. Upton, Cyber security culture: Counteracting cyber threats through organizational learning and training, Routledge, 2016.
[28] B. Uchendu, J. R. Nurse, M. Bada, and S. Furnell, "Developing a cyber security culture: Current practices and future needs," Computers & Security, vol. 109, p. 102387, 2021.
[29] P. S. Ulrich, A. Timmermann, and V. Frank, "Organizational aspects of cybersecurity in German family firms–Do opportunities or risks predominate?," Organizational Cybersecurity Journal: Practice, Process and People, vol. 2, no. 1, pp. 21-40, 2022.
[30] A. Wiley, A. McCormac, and D. Calic, "More than the individual: Examining the relationship between culture and Information Security Awareness," Computers & Security, vol. 88, p. 101640, 2020.