A Field Study on the Impact of the Level of Knowledge of Human Resources Employees About the Principles and Applications of Cybersecurity on Human Resources Laws, Between the Theoretical Aspect and the Practical Application Reality
Keywords:
Culture, Cyber-security, department, employee, organization, Human Resources,Abstract
As organizations become more aware of the extensive damage caused by cyber threats, the need for effective cybersecurity measures has intensified. In parallel with this, Human Resources departments are tasked with legal compliance and safeguarding sensitive employee information. However, there appears to be a gap between cybersecurity understanding and HR legal compliance, leaving organizations vulnerable to potential breaches and regulatory penalties. In this article, we delve into the intricate relationship between cybersecurity understanding and HR legal compliance. As, we investigate how a lack of cybersecurity knowledge within HR departments can hinder compliance efforts, and conversely, how a strong understanding of cybersecurity can help HR personnel identify and mitigate potential risks. By bridging this gap, organizations can create a more holistic approach to cybersecurity and ensure legal compliance.
Downloads
References
Kumah, Peace & Yaokumah, Winfred & Buabeng-Andoh, Charles. (2018). Identifying HRM Practices for Improving Information Security Performance: An Importance-Performance Map Analysis. International Journal of Human Capital and Information Technology Professionals. 9. 10.4018/IJHCITP.2018100102.
Nik Nordiana, Nik Ab Rahman & Widyarto, Setyawan. (2013). Information Security: Human Resources Management and Information Security Incident Management.
Choi, Youngkeun. (2017). Human Resource Management and Security Policy Compliance. International Journal of Human Capital and Information Technology Professionals (IJHCITP). 8. 68-81. 10.4018/ijhcitp.2017070105.
Ertan, Amy & Crossland, Georgia & Heath, Claude & Denny, David & Jensen, Rikke. (2020). Cyber Security Behaviour In Organisations.
Guo, Yonggui & Cao, Lina & Gao, Xiao & Lv, Xuming. (2019). Understanding of the common methods in e-HRM data security. Journal of Physics: Conference Series. 1237. 022010. 10.1088/1742- 6596/1237/2/022010.
Zafar, Humayun & Stone, Dianna. (2021). Privacy, Security, and Legal Issues for HRIS.
Ringim, Kabiru & Yusuf, Abdulmalik & Shuaibu, Halima. (2017). Effects of Human Resource Management Practices on Cyber loafing at Work. Yar'adua University Journal of Sociology (YUJOSO). 1. 279- 293.
Zafar, Humayun. (2013). Human Resource Information Systems: Information Security Concerns for Organizations. Human Resource Management Review. 23. 105– 113. 10.1016/j.hrmr.2012.06.010.
Michaelides, Nadine. (2021). Remote Working and Cyber Security Literature Review.
Alshaikh, Moneer & Maynard, Sean & Ahmad, Atif & Chang, Shanton. (2018). An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations.
10.24251/HICSS.2018.635.
Vlachos, Ilias. (2008). The effect of human resource practices on organizational performance: Evidence from Greece. The International Journal of Human Resource Management. 19. 74-97. 10.1080/09585190701763933.
Jabrayilova, Zarifa. (2015). PROBLEMS OF PROTECTION OF PERSONAL DATA IN HUMAN RESOURCE
MANAGEMENT SYSTEMS. Problems of Information Society. 06. 22-28. 10.25045/jpis.v06.i2.03.
Ahmadi H, Nilashi M, Shahmoradi L, Ibrahim O (2017) Hospital information system adoption: expert perspectives on an adoption framework for Malaysian public hospitals. Comput Hum Behav 67:161–189
Ainin S, Parveen F, Moghavvemi S, Jaafar NI, Mohd Shuib NL (2015) Factors influencing the use of social media by SMEs and its performance outcomes. Ind Manag Data Syst 115(3):570588
Cegielski CG, Bourrie MD, Hazen BT (2013) Evaluating adoption of emerging IT for corporate IT strategy: developing a model using a qualitative method. Inf Syst Manag 30(3):235–249
Elia S, Massini S, Narula R (2019) Disintegration, modularity and entry mode choice: mirroring technical and organizational architectures in business functions offshoring. J Bus Res 103:417–431
Izuagbe R, Ibrahim NA, Ogiamien LO, Olawoyin OR, Nwokeoma NM, Ilo PI, Osayande O (2019) Effect of perceived ease of use on librarians’ e-skills: basis for library technology acceptance intention. Libr Inf Sci Res 41(3):100969
Kraemer S, Carayon P, Clem J (2009) Human and organizational factors in computer and information security: pathways to vulnerabilities. Comput Secur 28(7):509–520
Li L, He W, Xu L, Ash I, Anwar M, Yuan X (2019) Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. Int J Inf Manag 45:13–24
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.