Chapter 4
Chapter 4
4.1 INTRODUCTION
The research study completed using three methodologies in three Phases as presented in the
previous Chapter. This Chapter presents the findings and the discussions based on data analysis,
and results in a Phase wise manner of the research study, presented mainly in the three sections
i.e. findings from Phase I (objectives 1 and 2) in the section 4.2, findings from Phase –II (for
meeting the objective 3) in the section 4.3 and the findings from Phase –III (for objective 4) in
the section 4.4. These three sections are further divided into sub-sections. After a brief
presentation of Introduction in the section 4.1, section 4.2 elaborates the discussions based on
results obtained from SAP-LAP model based study, section 4.3 elaborates discussion based on
results obtained from PLS-based SEM approach and section 4.4 presents discussion based on
case study approach for development of cases on two IT companies. The Conclusions and
Summary of the research findings from each phase of study are presented in the next Chapter 5
and Limitations and Future Scope of Work of the research in the following Chapter 6.
Many studies supported need of study on information security policy, but in a different research
context. These studies found indicating sometimes particular and sometimes general definition of
information security. In general, information security is defined as the protection of data that
owned by an organization or individual from threats and or risk. While on the aspect of quality as
a parameter, according to Merriam-Webster Dictionary, security in general is the quality or state
of being secured, that is, to be free from harm. In one of his study, Schneier (2003) considered
that information security is about preventing adverse consequences from the intentional and
unwarranted actions of others elements. Therefore, the objective of security is to build protection
against the enemies of those who would do damage, intentional or otherwise. However,
according to Whitman and Mattord (2005), information security is the protection of information
and its elements are critical in nature which include, including the systems and hardware that
use, store and transmit that information. Information security is the collection of technologies,
standards, policies and management practices that are applied to information to keep it secure.
Literature review also found many studies, which supported that if the information is left
unprotected, the information can be accessed by anyone. It will major threat to an organization
and can harm to the organization significantly. In addition, literature indicated that various taken
steps are to protect organizations information is a matter of maintaining privacy and will help
prevent identity theft. Therefore, it is believed that information is important business assets and
essential for the business and thus need appropriate protection through following a standard
practice or guidelines in the form of ISP. This is especially important in a business environment
increasingly interconnected, in which information is now exposed to a growing number and a
wider variety of threats and vulnerabilities. Information can cause and damage such as malicious
code, computer hacking, and denial of service attacks have become more common nowadays,
more ambitious, and more sophisticated.
Based on the concerns related to information security, it is revealed that implementing policy is
an important aspect and can protect an organization from information loss and threats. Factors
such as role and responsibilities of top management, its commitment in organizations play vital
roles in maintaining and operating the security to minimize various types of security risks to a
large extent. So, by implementing the information security policy in an organization, it can
protect the technology assets in use at the organization. In term of protecting the functionality of
an organization, both general management and IT management are responsible for implementing
information security policy that protects the organization ability. Thus, policy implementation
plays very important role in this regards.
Very few studies found related to policy orientation on information policy implementation in the
context of Indian sector organizations and companies. Organizations are found committed to a
follow implementation of security policy using management approach as deigned in the ISMS
framework. Information security aims to ensure the appropriate confidentiality, integrity and
availability of its data. The basic IS principles defined in its policy will be applied to all of the
physical and electronic information assets for which the organizations are responsible.
Out of all the elements, as defined under Information Security Strategic Framework (as shown in
Figure 4.2), governance is important one and plays a major role where controls are to be inbuilt
in the system to safeguard. It rarely happens may be because of the fact that the field as such is
growing at a phenomenal speed and it is impossible to comprehend all the security issues in the
Therefore, in view of the above, information security governance (ISG) should support various
functions of different alignments which include:
a) Strategic Alignment
a. Security requirement driven by organizational requirements
b. Security solutions fit for enterprise processes
b) Value delivery
a. A standard set of security practices (baseline security following best practices)
b. Complete solutions covering organization and process as well as technology
c. A continuous improvement culture
While exploring one of the important aspects, legal framework and compliance regime holds top
management responsible for information security. Information security governance in this
reference becomes an important function of board room activity. Figure 4.3 reveals various
actors senior management, steering committee, executive management, CISO who interact
with process of business strategy, risk management to meet the business objectives. The
interaction process involves strategic inputs and the benefits of ISG are most apparent as
On one side, ISP implementation assists in securing organizations from threats and breaches that
exist, while on the other side it ensures the smooth implementation of the governance processes.
Figure 4.4: Interrelations within the ISO 27 K family of standard (Georg Disterer, 2013)
Therefore, complete situation presented in this part of study to meet the objective 1 includes
situation on information security, cyber security issues, threats, breaches incidents, policy,
standards practices, and an approach to manage in the Indian organization.
With the increasing dependence of businesses over a secured information system, it has become
pivotal for organizations to protect their critical information assets against misuse. Over the
years, the technical advancements, on one hand, have enabled organizations to process their
business information in a faster, more effective and efficient way, it has also posed serious
security threats and challenges for them. It has been found in one of global survey that 46 per
cent cases companies have indicated that their annual investment in information security have
increased (Ernst & Young, 2010). The survey also presents that 60 per cent respondents perceive
that use of social networking, cloud computing, smart phones and other personal devices in
enterprises have increased the level of risk faced by them. In such a challenging situation,
organizations need to be prepared with the latest technological solutions. However, technology
In view of the SAP context, qualitative approach and analysis for the same purpose is used where
critical questions are framed for each of the SAP and LAP components, separately. These
questions are framed based on the author’s intuitive approach and confidence built up through
understanding the study from literature review and feedback received from the various
stakeholders, professionals, trainers, certification bodies and IT sector organizations. Such
components are presented here. Based on following questions, Situation, various Actors and
Processes involved in ISP implementation in organizations are presented.
The selected organizations under this scope of the study are classified on the basis, their typical
characters of Indian organization, their size and type. In order to synthesize the complete
Situation, following set of critical questions were asked from various experts of Indian
organization.
CQ1: Does the organization has an IS policy? If yes, specific or as part of IT policy?
CQ2: Does the IS policy specify roles and responsibility of employees (e.g.
accountability)?
CQ3: Is the organization’s IS policy been regularly reviewed for effectiveness and
completeness? If yes, by whom, what is the procedure for it?
CQ4: Does the organization has an IS policy for contractor or third party vendors?
As mentioned above, the situation of ISP implementation and governance, both of sub-set of
situation supports, various actors and decision makes along with the employees engagement
towards policy implementation and also contribute towards performance of organizations, all are
considered in four dimensions of complete situation. Further sub-parts of dimensional situation
considered and represented in the case is as (S1), (S2), (S3) and (S4) of situation, where the
complete set of Situation is represented by the symbol (S) where, S ⊆ (S1, S2, S3, S4). The
subset parts on the Situation are applicable to a typical organization of Indian characteristics and
with the complete Situation (S) as indicated above.
4.2.5.5 Process
4.2.5.5.1 Policy Development
Referring to the previous sub-sections, where an overview of select situation is provided and
actors were identified in ISP implementation, this sector discusses the process of information
security policy. This is observed that ISP implementation process supplements IS governance
and also assist various factors within as well as outside organizations. Figure 4.7 highlights
comprehensive process of ISP in organization given by Knapp, where six major activities
involved in Information Security are policy development, specification of roles and
responsibilities, design phase developing a security control framework, implementing a solution,
monitoring and finally awareness, training and education.
The information security policy development process starts with analysis of its development as
per organizational goals, approval of policy documents by the top management and influencing
the internal actors such as senior management, business, organization culture, technology
The review should be continuous and top management should keep eye on all the policy
implementation activities. The review should be based on risk assessed by the auditor and
auditing bodies such as CERT-IN, STQC, and ISACA. These auditors play important role in the
development of policy, works with network team and vendors. They are also engaged in
providing feedback on non-compliance of standards and any threats from external or internal
factors. Not due to this reason only auditor also works and engaged with clients to get feedback
so as to improve policy review, in policy review phase, as actor who assist has been selected as
one of the decision maker to assess ISP development process.
Because ISG brings information security to the attention of Boards and CEOs, organization can
effectively address the issues of information security leading to improved outcomes, including
strategic alignment, risk management, business process assurance, value delivery, resource
management, and performance measurement. In terms of strategic alignment, ISG enables firms
to align security with business strategy to support organizational objectives. Organizations
should also likely to execute appropriate measures to reduce risks and potential impacts to an
acceptable level and integrate all relevant assurance factors to ensure processes operate as
intended from end to end. ISG also supports the optimization of security investments in support
of business objectives and enables the firm to use security knowledge and infrastructure in the
most efficient and effective manner possible. Finally, ISG better enables the monitoring and
reporting of security processes to ensure the achievement of objectives.
Based on the understanding from literature, it was revealed that designing and implementing an
effective IS policy is not just a management problem, it is a business issue. As a result of global
networking and extending the organization beyond its traditional boundaries, it is emerging as a
value creator and opportunity builder. The ISP own right by building trust of among decision
makers, players and actors within and outside a secure organization where ensuring risks as well
as careless mistakes can result in serious financial, reputational and other damages to
organizations. In order to safeguard the organization from loss and reputation, confidentiality,
integrity and availability of data needs to be protected. Thus, ISP has emerged as key aspect of
implementing information security based governance.
4.2.5.7 Actions
There are several challenges in the organization environment that makes it difficult to adequately
protect the information and implement to ISP. Few of them are very close to actions to be needed
on the areas such as, inconsistence enforcement of policies, employees lacking in awareness on
important of information security, lack of expertise and employees skills to handles attacks. In
this view, an ISMS provide management approach to secure the information using controls
implementation. Thus, many actions are required to implement in an organization.
Based on the synthesis of SAP components, the following actions are felt to be of minimum
prerequisite to support the framing of ISP and governance.
o (A1*): Identify information security risks for organizations and their counter measures;
o (A2*): Development of disaster recovery site to ensure business continuity;
o (A3*): Organization should acquire ISO/IEC: 27001:2005 certification;
o (A4*): Plan for specialized training according to the job requirements;
o (A5*): Non-disclosure agreements for employees and third party;
o (A6*): To provide adequate resource and funds for ISP implementation;
o (A7*): Implementation of a single ID authentication system.
The complete framework of research as a SAP-LAP model development in the case is shown in
the appendix where challenges for ISP implementation to organization IS governance are also
shown.
SAP-LAP modeling set out the limitations of both the intuitive and rational choice of decision-
making and ranks of actors with reference to their roles in processes, and actions with respects to
their impact on performance. The steps followed in the SAP-LAP inquiry modeling in this
Chapter is set out as given below.
Identification of Ranking Variable (defining actors or actions as the case may be for SAP
or LAP component) and Reference Variables (defining process or performance as the
case may be for SAP-LAP component). For SAP modeling, this would mean ranking of
influence of Actor’s decision on Process and for LAP modeling this would mean ranking
of influences of Actions of Performance.
Developing a cross –interaction matrix between the two set of variables. Converting the
Interpretive matrix by interpreting the interactions, entries in various cells in to Binary
matrix.
Developing Interpretive Logic of pair wise comparison and dominating interaction matrix
by interpreting the dominance of one interaction over the other. The ‘Interpretive
Ranking Model’ uses pair comparison of interpretations in the matrix resulting into
interpretive logic-knowledge base and a dominance matrix.
Various steps involved in development of cross interaction matrix are explained below.
The Cross Interaction Metric captures the contextual relationship of the roles of actors in
the identified processes. The interpretive Matrix was formed by assessing an actor’ level
of influence over a process from detailed study of the case situation, decisions taken,
available information with Indian IT sector organizations and companies top
management, wherever necessary.
It is to be noted in this case study that the Self Interaction Matrix (SIM) and Cross Interaction
Matrix (CIM) matrices structures are framed and only one situation is taken into consideration.
However, SIM is not established here and only the CIM of the SAP and LAP components are
selected to demonstrate the case.
To carry out the SAP-LAP synthesis, the five point scale for quantitative assessment using the
influence levels is considered. Later, the information used in the CIM is converted into a binary
matrix assigning ‘0’ to low and very low influences and ‘1’ to all other higher influences. Based
on the severity of influences, interpretive matrices are formed and shown in Table 4.1 (b).
The rating information in the graded interpretive matrix (Table 4.1 (a)) and the binary
matrix (Table 4.1 (b)) were again put to use to serve as a foundation for developing the
interpretive table of actors with different processes though a method of paired
comparison between actors.
The descending order of influences between the pair of actors interacting with the process
as obtained from Table 4.1 (a) and (b), is used to assess the dominance of one actor over
the other in dealing with particular process. The interpretive logic of dominance for
Actors over their counterparts in several pairs was obtained. In case both the actors exert
equal influence (say) “strong influence”, then case knowledge base is referred to for
ascertaining dominance of one actor over the other (Refer Appendix for interpretive logic
for knowledge base).
Table 4.2: Dominating Interaction Matrix and Ranking Representation (Actors over Process)
P4*
P2* P3*
Actions vs. Actions mapped to P1* (Improved
(Top (Risk
Performance process / (ISP
management assessment organizational
knowledge areas compliance)
commitment ) plan) productivity)
Identify risks and SI (1) SI (1) SI (1) SI (1)
A1*
countermeasure
Disaster recovery SGI (1) SGI (1) SGI (1) MI (1)
A2*
plan
ISO/IEC:27001 SGI (1) SGI (1) LMI (0) SG (1)
A3*
certification
A4* Employees training SI (1) SGI (1) LI (1) SG (1)
Non-disclosure SI (1) SGI (1) SI (1) SI (1)
A5*
agreements
Funds for ISP MI (1) SI (1) MI (1) SGI (1)
A6*
implementation
Single ID SI (1) SGI (1) SGI (1) SGI (1)
A7* authentication
system
Count of
Dominating Net Action
Dominating
Dominance Rank
(D)
A1* A2* A3* A4* A5* A6* A7* (D-B)
A1* - 4 4 3 3 3 3 20 20 I
Being Dominated
A2* - - 1 1 - 2 - 4 -9 VI
A4* - 2 1 - - 1 - 4 -6 IV
A5* - 2 3 2 - 3 1 11 -7 V
A6* - 2 2 2 1 - 1 8 -4 III
A7* - 2 2 1 - 2 - 7 -2 II
Count of
Being
0 13 13 10 4 12 5 Total Interactions (57)
Dominated
(B)
4.2.6 Discussion
In the previous section, SAP-LAP model on ISP implementation in organization is developed.
The model developed is based on intuitive approach of analyzing ISP within organizational
system boundary. Based on synthesis of SAP-LAP components and matrices based approach, top
management of an organization secured first ranking, followed by CISO and organizational
employees at the third place. The findings are in support to the fact that top management should
be more responsible for implementation of ISP. It should also ensure requirements of
organization as well of the other actors. CISO as a one of the important actor after the top
management plays an active role in an organization for implementing ISP, thus justifies its
ranking in order. Employees as one of the actors to follow and implement policy in organization
found very important roles. Their qualification, skills, knowledge, expertise and also their actions
found sensitive to help in minimizing various type of threats and breaches in the organizations.
In view of the above ranking obtained using matrices based SAP-LAP model where actors
involved in the process of information security policy implementation are ranked, one can
implement and re-orient many actions required for the requirements of an effective ISP
implementation in originations. Further, it can also be said that SAP-LAP is a good intuitive
approach where a system can be enquired and critical inquiry can be conducted and explored for
further level of study on the subject. Even though the ISP implementation is important
parameters to protect organization, there are several other challenges are found to protect and
manages the information as well. One of challenges faced in an organization is the lack of
understanding on important of information security.
When employees are with lack of skills, awareness and information security knowledge in term
of handling information of the business process, the organization is easy to being attacked by
hackers or other threats. Such attacks try to access organization confidential information. So it is
crucial and important to all staff members, security professionals, members of IT teams in an
organization to have knowledge and understanding about the importance of information security
practice in line with the market scenario in an organization to protect the confidential data.
Information security awareness found as one of the important factor and should be provided by
top or senior level of management to organization’s employees. Generally, users of IT system
working as employees are also equally important dealing having role and responsibilities who
can maintain security and privacy. In this reference, this study can bring out the clear
demonstrations of various elements through modeling SAP and LAP components on information
security, policy and ISMS practices to IS governance.
The PLS based SEM technique is sometimes known as path modeling technique and the method
is similar to other approaches to SEM. Goodhue et al. (2006) finds that the PLS method is
widely used in the areas of marketing and information systems but used only sparingly in other
disciplines within management. However, a recent review on the methodology is done by
Henseler, et al. (2009) where he finds a growing use of PLS in literature including several
marketing studies published the international journals. The PLS based modeling offers several
potential benefits to authors, researchers and stakeholders such as methodology application
works on smaller sample size for covariance based SEM compared to PLS, and a lack of
distributional assumptions. However, a disadvantage of PLS based SEM is that it does not give a
global fit statistic for models. This is a particular limitation of the PLS based model that multiple
group comparisons become more difficult when an overall fit statistic is not available.
The PLS based modeling can be demonstrated in the SmartPLS software. The description of the
measurement instrument is available from the help page help in the SmartPLS package. Based on
the part of studies completed in the Phase –I, variables are identified to model the research
problem in this part of the study. Figure 4.8 (a) and (b) represents a research model and the
relationship to be assessed between latent variables (LVs) and manifest variables (MVs), the
nomological network. These figures are shows the hypothesis notation for each relationship.
Here, nodes are represented as LVs and are coded as ellipses and those are represented as MVs
are coded in the respective boxes. As contrast to the CBSEM method, in the PLS, each MV is
only allowed to be connected to one LV. Further, all arrows indicated connection between a LV
with its block of MVs that must be pointed in the same direction. The connections between LVs
and MVs are referred to as measurement or the outer model. On a research modeling and
assessment point of view, an outer model is a pre-requisite assessment for inner model which
primarily looks at how a research model is fit for the further research analysis. A research model
with all arrows indicating outwards notation is called a Reflective Model, all LVs have reflective
measurements. While a research model with all arrows pointing inwards is called a Formative
Model –where all LVs have formative measurements. On their combination i.e. hybrid model, a
research model containing both, i.e. formative and reflective LVs is referred to as MIMIC model.
It is worthwhile to be noted here that PLS path models only permits recursive relationships and
To ensure a consistent and effective approach for management of information security incidents,
top management responsibilities and policy procedures should be established to ensure a quick,
effective, and orderly response to information security incidents. ISO control objectives in this
context are instructions to follow and are related to parameters such as asset management,
management commitment, information access control, communications and operations
management, and compliance management in organizations. All such influencing factors
(includes controls) to ISMS practice and ISP implementation along with risk management are
considered as unobserved variables in the organization to assess ISMS practice and ISP
implementation where organizations needs to consider implementation of these unobserved
variables to support ISMS practices, which can further influence policy implementation. The
Table 4.4 represents classification of measurement items (Unobserved and Observed Variables)
to assess information security policy and further to suggest a model development for Indian
organizations.
ISO/IEC: 27001:2005 specify few more control objective concerning the need to protect the
confidentiality, integrity and availability of information. In view of the above scope of controls
defined, the international standard provides organizations with guidance on how to manage
information security, by applying a risk management process and give confidence to interested
parties that their information is adequately managed. The research model designed under this
part of the study is intended towards implementing all the practices and policy related factors
successfully. This, through implementation of ISMS practices of standard and policy
Figure 4.6 (b): Research Model: Hypothesis Representation (H7-Direct and remaining are
Indirect Relationships)
For example, employees or user of IT systems in the originations should know about the practice
they need to follow and one of the ways for achieving the same is certification and compliance of
the standard through skill training and participation in the technical workshops. Certification and
compliance can bring reputational, motivational, and financial benefits to organizations through
customers that have greater confidence that an organization can protect their information at
agreed security levels, along with improvements in organizational supply chain security. In this
view top management is more responsible towards employees of the organization for enable their
working in line with the severity of threats present in the current situation of business in the
market conditions.
In view of the above selection of all factors (i.e. LVs) which includes security controls),
followings hypotheses made for this study using structural equation modeling where data were
collected from various IT sector stakeholders, through questionnaire development. Accordingly,
responses captured and model validity testing on methodology steps and model fit were
presented in later part of this section. Data analysis for the model development and testing the
hypothesis is carried out in the software SmartPLS (Version 3).
The hypothetical relationships between the constructs chosen for this part of study are indicated
in Figure 4.8 on the next page.
Table 4.4: Description of ISO Controls: Selection from ISO/IEC 27001: 2005
(Latent and Measure Variable Variables)
S.no. Latent Variables Measured Variable (MV)
(LV) & Codes
Identification and classification of information assets by
Asset Management organizations (AM1)
1.
(AM) ISO advocates responsibility for assets (AM2)
(ISO /IEC:27001:2005)
Providing Organizational Structure and Resources for
information security (MC1) (Al-Awadi, 2009)
Roles and Responsibilities of Employees, Contractors and Third
Party Users (MC2)
Management Awareness and Training Related with Information Security
2. Commitment (MC3) (Siponen, 2000)
(MC) Define the action taken Against Employees for Not Following
Information Security Directions (MC4)
Adequacy of budget for Information Security (MC5)
(Bjorck, 2001)
SEM is by far the best known quantitative technique and widely used as path modeling
technique. But, recently researchers have begun to use application of PLS based SEM
(Shackman, 2013). PLS offers few advantages over other model on SEM such as lower
sample size requirements, easier hypotheses testing of moderating relationships, and built-in
provisions to handle indicators (both formative and reflective). This study examines ISMS
practice and information security policy assessment in Indian organization, and suggests a
policy development framework for them. The study finds mixed support for some of the
commonly cited reasons for using PLS over SEM. Finally, the study also discusses multi-
group analysis which may make it an attractive alternative over PLS for the scope of this
study which used small sample sizes with data from multiple countries.
4.3.3.1 Factor Analysis: Exploratory Factor Analysis and Confirmatory Factor Analysis
A research model is said as complex and complicated model when the study has many
constructs and indicators (Hair et al., 2011). Therefore, complexity of the model needs to be
reduced to the possible extent. In order to reduce the complexity of the research model,
Exploratory Factor Analysis (EFA) was conducted to identify how many factors can be
retained in the model by estimating the loading values of the MVs (items) used to measure
each construct. EFA analysis is done to achieve the best model before the research model was
tested using PLS (Preacher and MacCallum, 2002). In addition to this, EFA was conducted
because some of the relationships among the observed and underlying factors were neither
tested nor investigated beforehand. This is one of the possible reasons for using the EFA.
It is noted that the most appropriate SEM approach should be adopted by a researcher based
on his or her scope of research objectives (Christmas, 2005). As the aim and objectives of this
part of the research study is to predict or identify the significant factors ISMS practice and
policy implementation in Organization, therefore, PLS-SEM was chosen because PLS-SEM
is an exploratory methodology that relies on the data and it is used to obtain determinate
values for latent variables for predictive purposes and minimize the variance of all dependent
variables.
Other advantages that can be found in PLS-SEM over the covariance-based approach are that
PLS-SEM is able to handle complex models and is insensitive to data size. The research
model is considered complex when it has a large number of variables and indicators (Hair et
al., 2010), such as the research model adapted in this study.
Reliability is important to any research model because it can minimize the errors and biases
in research (Hair et al., 2010). While using PLS-SEM, there are two types of reliability test
that need consideration, one is indicator (manifest variable) reliability and another one is the
construct reliability. Indicator reliability is used to determine which part of an indicator’s
variance can be explained by the underlying latent variable while construct reliability is used
to assess how well a construct is measured by its assigned indicators (Götz, Liehr-Gobbers &
Krafft, 2010). Both type of reliability testing is very essential to a research model. In general
procures of SEM, the reliability of the indicators can be assessed by checking their factor
loading (λ) values, whereby, as suggested by many authors of previous studies, values larger
than 0.7 are acceptable (Chin, 1998; Götz et al., 2010; Hair et al., 2010). This value is
important parameter to determine the reliability used in similar kinds of research. However,
many studies found where acceptable value in the rages of 0.6-.07 is acceptable. This study
In view of the reliability testing, Cronbach’s alpha is the most common method used to assess
construct reliability (Sekaran, 2003). The reliability indicator has been considered as the first
method one should use to assess the reliability of a measurement scale (Lorence & Churchill,
2005). There are difference found on this part and different levels of acceptance have been
suggested by various authors in their past studies. For instance, Hair et al. (2011) suggested
that the alpha value should exceed 0.70 to indicate internal consistency. On the other hand,
Carmines and Zeller (1979) recommended a level of acceptance of 0.80 for internal
consistency. As for new scales, a level of 0.60 is considered acceptable (Hair et al., 2010;
Nunnally & Bernstein, 1994). Despite the different opinion and consideration on the level of
acceptance, an alpha with value of 0.70 is acceptable and over is acceptable to indicate
internal consistency. Therefore, this study uses 0.70 as the minimum level value to indicate
the internal consistency of the construct.
Other construct reliability (CR) test that may also be considered is the composite reliability
(CR). The construct reliability is important to ensure that all the measures used in this study
are reliable, and at the same time, provide greater confidence to the study that i.e observed
variable or manifest variable are consistent in their measurements (Hair, Ringle & Sarstedt,
2013). Sometime CR is defined as it is used to check how well a construct is measured by its
assigned indicators (Götz et al., 2010). There is also difference of opinion found the cutoff
value for the reliability acceptance. The authors of previous studies related to security
policies compliance behavior also suggested that the acceptable recommended value for CR
is equal to or greater than 0.60 (Herath & Rao, 2009b).
The term Validity is defined as “the degree to which a measure accurately represents what it
is supposed to” (Hair et al., 2010, p. 7). Content validity and construct validity (convergent
and discriminant validity) are two types of validity, namely, measured in this study.
Content validity is the assessment of the extent the content of a scale measures a construct
(Hair et al., 2010). Careful attention is to be given to the process of developing the
questionnaires for obtaining content validity. In this part of the study, the research model is
On the other hand, construct validity is the extent to which a set of measured items actually
reflects the latent construct (Hair et al., 2010). Thus, construct validity is examined by
analyzing both convergent and discriminant validity. According to Sekaran (2003), the
convergent validity examines whether the measures of the same construct are highly
correlated, whereas discriminant validity determines whether the measures of a construct are
too highly correlated with other constructs in the research model.
In order to establish convergent validity, Average Variance Extracted (AVE) parameter was
considered. The parameter-AVE includes indicators variance which is confined by the
construct relative to the total amount of variance, including the variance due to measurement
error (Götz et al., 2010). Sometime, the threshold value of AVE suggested by previous
studies is 0.50 or higher, while otherwise it is considered insufficient (Hair et al., 2013; Götz
et al., 2010). On the other hand, discriminant validity is established when the estimated
correlations between the constructs do not to be greater than 0.85 (Awang, 2012; Kline,
2005). Authors Hulland (1999, as cited by Götz et al., 2010) stated that the shared variance
between a construct and its indicators should be larger than the shared variance with other
constructs, so that the discriminant validity will be achieved. As this study used PLS to
conduct SEM analysis, the test of goodness of fit is not necessary, however reports the
statistics of the same.
This part of analysis explains empirical results obtained from hypotheses testing. The
explanation of the evaluation of the response rate, including the non-response bias test and a
general description of the survey respondents are provided.
Furthermore, the section also reports the exploratory factor analysis (EFA) results
followed by the results of the Common Method Bias (CMB) testing. The results of
Confirmatory Factor Analysis (CFA) that was used to test the measurement model,
which covers the assessment of unidimensionality, reliability and construct validity.
Preliminary data analysis is essential to ensure that the quantitative data used in this study are
error-free and can proceed with PLS-SEM analysis. The preliminary analysis included data
editing and coding, data screening and data normality. In this phase of the PLS-SEM,
exploratory factor analysis (EFA), descriptive analysis and common method biases test were
also carried out.
Once data collection process is over, raw data was edited to ensure the completeness of the
data. Editing of the data process involved checking the data collection forms for omissions,
legibility and consistency in classification (Pallant, 2007). Later, the raw data were manually
entered into a data file in Statistical Package for Social Sciences (SPSS) version 21.0. There
are two major ways to exercise this process, one is pre-coding and another one is post-coding
(De Vaus, 1995). In this reference, this study applied the pre-coding method whereby all the
measurement items were pre-coded with numerical values. Any out of range values were
revisited and corrected where appropriate.
In order to get higher rate of respondents, 350 questionnaires were distributed to select sector
of Indian organizations. However, only 180 out of 350 have responded, which is equivalent
The response rate in this study was considered appropriate based on the following reasons.
Firstly, the researcher managed to collect more data than the target of the sample sizes
required for this study (n =350) based on the calculation of the sample size explained in
Chapter Three of Research Methodology.
Secondly, the rate of 51.4 per cent was based on the total of questionnaires distributed, but
not based on the actual sample size required. Thus, this study considered that the actual
response rate was 100 per cent.
Finally, the response rate of 51.4 per cent is still acceptable as compared to the many
previous studies where the response rate was found within the common range of 12 to 60 per
cent (Al-Omari et al., 2013; Brady, 2011; Herath & Rao, 2009b; Ng et al., 2009). Due to
several difficulties in data collection, sometimes a response rate of more than 19% is
considered reasonable (Uffen & Breitner, 2013). Therefore, for these given reasons, the
researcher concluded that the non-response bias is not an issue in this study.
As described earlier, Indian organizations (both government and private sector), particularly
Indian IT sector, Information Technology Enabled Service (ITES), banking, Telecom and
manufacturing were selected as respondents. Figures 4.10- 4.14 show the descriptive statistics
of the 141 respondents in the sample selected.
As explained in the research methodology Chapter 3, respondents were chosen based on their
knowledge about information security, cyber security, IS standards and policy
implementation in the Indian organizations.
6%
45%
49%
3% Information Technology
4%
5% Information Technology
Enabled Services (ITES)
29%
8% Telecommunication
Banking
12%
Financial services
13%
13%
Railways
13%
Education /Training
institute
Forty nine percent of the respondents were from government organizations and fifty one
(51%) percentage were from private sector organizations as shown in Figure 4.12.
Type of Organisation
Others
2%
Government
47%
Private
51%
17%
30%
34%
19%
15%
25%
4%
12% 27%
17%
Figure 4.14: Types of Information security threat incidents faced by the Organizations
It is seen that malware infection, Denial of Service attacks, Malicious code and Data
loss/theft are the most prevalent types of information security threat incidents occurring in
Indian organizations.
The EFA was conducted in several stages. Firstly, the suitability of the data for factor
analysis was assessed, whereby all 24 items used to measure the independent variables and
another 6 items used to measure the dependent variables were tested separately. The results
revealed that the Kaiser-Meyer-Olkin (KMO value) was less than 0.6 for the independent
variables, which means that the value was not appropriate for factor analysis (Pallant, 2007).
Therefore, some of the items used to measure the independent variables needed to be deleted.
Secondly, the factor loading for each item was also examined and factor loading values of
less than 0.4 were removed (Hair et al., 2010; Pallant, 2007).
Finally, 5 items for the independent variables were removed, as shown in Table 4.3. Thus, the
final EFA was conducted with 19 items used to measure the independent variables.
KMO specifies that the Kaiser–Meyer–Olkin (KMO) measure of sampling adequacy be
displayed. KMO takes values between 0 and 1, with small values meaning that overall the
variables have too little in common to warrant a factor analysis. Historically, the following
labels are given to values of KMO (Kaiser 1974): 0.00 to 0.49 unacceptable 0.50 to 0.59
miserable 0.60 to 0.69 mediocre 0.70 to 0.79 middling 0.80 to 0.89 meritorious 0.90 to 1.00
The eight constructs were used in Confirmatory Factor Analysis (CFA). Meanwhile, the
KMO for the six items used to the measure dependent variable was 0.716 and the overall
significance of the correlation matrix was p = 0.000 with a Bartlett’s test of Sphericity. The
Chi-Square value was 1125.248. Only one factor was yielded and explained 73% of the
variance in the data with the Eigenvalue greater than 1. Thus, this result indicated that the six
items used to measure the dependent variable should be retained.
The CFA was conducted to test how well the developed instrument measures particular
constructs in the research model. This is ensured by examining the reliability and validity of
the construct. Firstly, respective factor loadings in bold and cross loadings are referred to
assess (Refer Table 4.6) if there were problems with any particular variable indicators in the
full research model. Cross loadings were computed to determine and examine if the items
loaded on other constructs equally as well as on their respective construct. In the research
model under the current study, a cut-off value of 0.7 or higher for loadings are considered
significant (Hair et al., 2010). Results from the Table 4.6 show that most of the indicators
measuring a particular construct had loading values of more than 0.7 on their respective
constructs. The factor loading of item code R1 is found 0.628 as in exploratory research value
of loading factor within range of 0.6 -0.7 is acceptable. Hence, it can be said that item is still
acceptable. Therefore, the results confirmed that the indicators were valid for their respective
constructs. Next, as suggested by Hair et al. (2010), the Composite Reliability (CR) and
Average Variance Extracted (AVE) were examined to assess the convergent validity of the
measurement items. The outputs of the same indicators are shown in Table 4.7. In the full
model, the CR for each construct ranged from 0.842 to 0.924, which exceeded the
recommended value of 0.7 (Hair et al., 2010). Meanwhile, the AVE for each construct in the
full model ranged between 0.606 and 0.802, which is greater than 0.5; thus, the cut-off
values ensure that at least 50% or more of the variances in the construct were explained by
the set of indicators. The collected data were verified for reliability by calculating the
Cronbach’s Alpha (CA). The resulting values ranged from 0.725 to 0.875, which are
acceptable. The results of the measurement in the full model show that all eight constructs
(including target construct Info Sec Policy) are valid measures based on their parameter
estimates and statistical significance.
Then, the research analyses proceeded to test the discriminant validity by examining the squared
correlations between the measures of potentially overlapping constructs for full model. The
results shows that all diagonal values in bold were higher than the values in the row and column,
indicating adequate discriminant validity. These values indicate that no overlapping construct
existed. The collected data were also verified for their reliability by calculating the CA. The
Table 4.9 (a) and Table 4.9 (b) indicate that outer model is validated. Hence, model fit statistics
provide the justification for moving for presenting the research analysis for structural model.
PLS-SEM does not assume that the data is normally distributed, which implies that parametric
significance tests (e.g., as used in regression analyses) cannot be applied to test whether
coefficients such as outer weights, outer loadings and path coefficients are significant. In
contrast, PLS-SEM relies on a nonparametric bootstrap procedure (Davison and Hinkley, 1997;
Efron and Tibshirani, 1986) to test the significance of estimated path coefficients in PLS-SEM.
The findings are discussed in the next section.
Figure 4.16 (a): Full Model: Loading Factors and Path Coefficient (PLS Algorithm)
Hypothesis
In addition, this study also found that Risk, Asset Management and top daily face threats
Management Commitment have received scant attention in implementation of to their
necessary skills to practice information security mechanisms, employees will same time, they
not be able to utilize ISPs appropriately. Thus, top management focus on are becoming
Sources: Based
on Responses
and Complied by
Table 4.17: Respondent’s Profile the author
Name of Organization Profile of Respondent Work Experience
The two selected
Case A Managing director / CEO 12 Years
(Small scale private companies of IT
sector company)
sector, are from
Rashmi Anand, University of Lucknow 75
private sector one deals in web development and consultancy services and Practices, Asset
other provides services for e-procurement solutions. While, the third Management,
organization is the case of public sector undertaking at state level, engaged in Information
various activities of education and training, consultancy services for rural Security Incident
development, implementation of e-governance projects and conceptualization, Management,
design, development and implementation of state government projects. Table Information
4.17 indicates the respondents’ profiles of three organizations selected in the Security
research study. Regulations
Compliance and
The interviews were conducted through questionnaire instrument to ISM
investigate the ISMS practices and status of policy implementation in these Effectiveness.
organizations (two Pvt. Sector companies and one PSU). These questionnaire Total 15
questions were semi structured questions, developed keeping in mind the interviews were
SAP-LAP methodology. Judgmental sampling (where the researcher selects conducted, 5
units to be sampled based on their knowledge and professional judgment), was from each case
used to select interview of respondents across the hierarchies in all three cases of organizations.
to capture multiple viewpoints. Interviews were conducted personally, face-to- Profiles of the
face in the real-life setting of the top and middle management executives as respondents are
the respondents. A semi-structured questionnaire template as given in the given in Table
Annexed (Refer Annexure) was used for the interview purpose. 4.17. Each
interview,
The template consists of ISMS factors derived from literature on IS standards approximately
and policy ISP implementation factors identified by Singh and Gupta (2017). 30–45 minutes
These factors include Information Security Requirements, Top Management long, was audio
Support, Information Security Policy, Information Security Training, recorded and
Information Security Awareness, Information Security Audit, ISM Best transcripts were
Table 4.19: SAP-LAP Analysis of Case B
SITUATION Information security policy exists and reviewed annuallyACTION
Top management support the ISMS practices and operations
Proactive approach of employees towards IS directions from the
management
No major security incidents, however, IS events are reported to CISO and
technical manager who in-turn may escalate to the top management if
necessary
Organizational security measure taken as per ISO/IEC:2005 27001 and
CMMI (Level 5)
Wide spread IS awareness and regular training is also given
PERFORMA
ACTORS Top management and CEO NCE
Chief information security officer, Network team and technical managers
Separate team for conducting IS audit and even CISO’s functions are also
audited by an internal auditor, and Employees all found participating if
ISMS practices
PROCESS First internal information security audit conducted recently
Periodic general and specific area-information security Source:awareness
training
Prepared by the
Monthly internal workshop for sharing groups’ information security
experience author.
No risk management process, based on efforts of individuals and SAP-
Table 4.20: group
head LAP Analysis of
Network logs are generated and monitored on daily basis
Case C
Asset classification based on risk, chances of occurrence and cost of
recovery SITUATION
Technologies, training etc as per the fast changing IS environment
LEARNING Internal threats are as challenging as external threats
Internal information security audit has revealed vulnerabilities in the
system
Rashmi Anand, University of Lucknow 90
The
Organization has sufficient budget, manpower and technology findings
to fulfill
organization's security policy requirement from SAP-LAP
ACTORS Top management
Chief information security officer analysis of Case
Network team and technical managers C (Table 4.20)
IT Professionals
show that the top
Vendors and contract employees, Clients/customers, Employees
PROCESS management is
Internal Information security audits are conducted weekly
Back-up technique is used as risk mitigation technique committeemen
Organization has an IS risk management plan
towards
Periodic general information security awareness training and specific
area-related training information
Asset classification based on risk, chances of occurrence and cost of
recovery security
Monitoring and logs are maintained to access record of the critical
management. For
systems/applications
this purpose, it
LEARNING Sometimes security management fails as per internal IS audit
Training is required at all levels that are based also on theinformation
role and
responsibilities of employees
security audits
Building an information security culture is must for good ISM practices
in organization weekly. Asset
classification is
ACTION Specialized training according to the specific job requirement
Creation of an information security forum for management alsoand
done in this
employees organization.
External IS audits by an independent third party
Need to implement higher level of information security Learning
standards derived
from this case is
PERFORMA Top management needs to give more priority to information security
NCE that in order to
issues of the organization
Compliance enforcement for organizational informationimprovesecurity process
Policies and guidelines to build an information security ofinformed
ISMS, there
workforce
Source: Prepared by the author. should be an
audit conducted
Case C
Rashmi Anand, University of Lucknow 91
by independent third party. and
accountabilities
4.4.5 DISCUSSION towards
Fast pacing technological advancements provide new and innovative ways to organizational
businesses to conduct their daily operations, such as collaboration, information and
coordination, product service—design, development and delivery and information
providing alternate ways to connect and communicate with different asset, making
stakeholders. In this pursuit, modern day organizations have become over them prone to
dependent on IT/ICT for their various business functions. In case of some information
businesses, it has become nearly impossible to conduct daily operations security risks and
without proper functioning of their information systems. In such a scenario, threats. It is the
protecting business information and related assets from external as well as responsibility of
internal threats have become a matter of paramount importance for top management
organizations. To deal with this situation, on one hand, companies and India to make
IT sector organizations are relying more and more on the usage of advance employees aware
technological solutions, the management issues are often overlooked (Price of the policies,
Waterhouse Coopers, 2012). guidelines, risks
and
As evident from the cases, it is the responsibility of top and middle countermeasures
management to design and develop information security strategy in through regular
accordance to the business objectives of company. Aligning information training and
security goals to the business objectives of the organization is the key to awareness
success of organizational information security strategy (Kayworth & Whitten, programmes
2010). Having a comprehensive information security policy is the first step (Abouzeedan &
towards this direction. As reflected from Case A, in absence of any Busler, 2006).
information security policy, there are no clearly defined roles, responsibilities Once the policy