Financial institutions in Peru are obliged to protect information through security systems that are generally not effective in identifying, evaluating and treating the risks resulting from internal threats, defined as an employee who intentionally or not, accesses the information to negatively affect its confidentiality, integrity or availability. The study developed a conceptual model identifies and evaluates the main factors that influence the behaviors, intentional or not, of IT users in organizations of the microfinance sector of Lambayeque Peru. The evaluated factors are related to the behavior, the influence of the environment and the perception of the control established, to identify in advance the possible risk scenarios that later become an internal threat. This work is based on the theories of planned behavior, reasoned action and deterrence. A survey prepared by the researchers and validated using the Conbach alpha statistic was applied to a sample of 110 IT users, belonging to eight microfinance entities. Through the correlation analysis, it was obtained that the factors related to the intentional behavior obtain a correlation coefficient of 0.695 with respect to the compliance of the information security policies, while the factors related to the non-intentional behavior obtain a coefficient of correlation of 0.564. The model explains 63.9% of the behavior with the identified factors.
|Title of host publication||Proceedings of the 5th Brazilian Technology Symposium - Emerging Trends, Issues, and Challenges in the Brazilian Technology|
|Editors||Yuzo Iano, Rangel Arthur, Osamu Saotome, Guillermo Kemper, Reinaldo Padilha França|
|Publisher||Springer Science and Business Media Deutschland GmbH|
|Number of pages||10|
|State||Published - 2021|
|Event||5th Brazilian Technology Symposium, BTSym 2019 - Campinas, Brazil|
Duration: 22 Oct 2019 → 24 Oct 2019
|Name||Smart Innovation, Systems and Technologies|
|Conference||5th Brazilian Technology Symposium, BTSym 2019|
|Period||22/10/19 → 24/10/19|
Bibliographical notePublisher Copyright:
© 2021, Springer Nature Switzerland AG.
- Behavioral theories
- IT users
- Information security policies