Organizational Factors that Influence Information Security in Smes: A Case Study of Mogadishu, Somalia


Authors : Hassan Adan Hussein; Mohamed Adam Isak Abdirahman

Volume/Issue : Volume 9 - 2024, Issue 6 - June


Google Scholar : https://tinyurl.com/yt6bu4yn

Scribd : https://tinyurl.com/24emkcwy

DOI : https://doi.org/10.38124/ijisrt/IJISRT24JUN641

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Many organizations and businesses are currently dependent on information systems to conduct their business process and transactions. The security of the information being handled by systems has become a challenge in the corporate world today, as organizations strive to take measures to safeguard their information and maintain confidentiality. The study aimed to investigate the factors that influence information security in Small and medium-sized enterprises (SMEs) in Mogadishu Somalia. The study was guided by the following research objectives: such as organizational characteristics, data management practices, and employee characteristics in organizations that affect information security in SMEs in Mogadishu Somalia. A quantitative descriptive research design was used in this study, whereby the population consisted of 150 respondents which was focused on Owners, Managers, and Information Security Engineers of Small and Medium-sized enterprises (SMEs) in Mogadishu. Out of which a sample size of 140 respondents was obtained, spread out across three categories. The researchesr applied the probability method to select Owners, Managers, and Information Security Engineers from the Small and Medium Enterprises in Mogadishu Somalia. The elements selected from the population interacted with information security and were well-qualified to respond to the research objectives. The researches used self-administered structured questionnaires, whereby the respondents were required to point out the measure of appropriateness of the three main factors that influence information security in SMEs in Mogadishu. The questionnaire used a five-point Likert-type scale ranging from strongly disagree (1) to strongly agree (5). The respondents were also asked to indicate demographic information that comprised of Sex, age, level of education, years of experience, job position, and marital status, based on their perception and understanding. The study was a quantitative research design, whereby a total of one hundred and fifty (150) questionnaires were distributed and one hundred and fourty (140) were returned from the respondents, indicating a response rate of 99%. The analysis of the data was performed in a quantitative nature so as to obtain numerical data made use of descriptive and correlation statistics and was analyzed using SPSS software. The data was structured according to the research objectives and displayed in the form of tables.

Keywords : Information Security, SMEs Information Security, Mogadishu, Somalia.

References :

  1. Adomavicius, G., Bockstedt, J. C., Gupta, A., & Kauffman, R. J. (2008a). Making sense of technology trends in the information technology landscape: A design science approach. MIS Quarterly: Management Information Systems, 32(4), 779–809. https://doi.org/10.2307/25148872
  2. Adomavicius, G., Bockstedt, J., Gupta, A., & Kauffman, R. J. (2008b). Understanding evolution in technology ecosystems. Communications of the ACM, 51(10), 117–122. https://doi.org/10.1145/1400181.1400207
  3. Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Qjarterly Special Issue Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness1. Source: MIS Quarterly, 34(3), 39.
  4. Chaffey, D. and Wood, S. (2005) Business Information Management Improving Performance Using Information. Pearson Education Ltd., Upper Saddle River. - References - Scientific Research Publishing. (n.d.). Retrieved July 19, 2023, from https://www.scirp.org/(S(351jmbntvnsjt1aadkposzje))/reference/ReferencesPapers.aspx?ReferenceID=1392681
  5. Hall, P., & Griffin, J. J. (2012). Book Review - Wheelen and Hunger ’ s Strategic Management and Business Policy : Toward Global Sustainability , 13 th. 419–422.
  6. James Gibson, John Ivancevich, R. K. (2011). Organizations: Behavior, Structure, Processes. 640. https://books.google.com/books/about/Organizations_Behavior_Structure_Process.html?id=0ExYcgAACAAJ
  7. KIHARA, P. K. (2015). Organizational Factors That Influence Information Security in State Corporations : a Case Study of Kenya National Highways Authority By.
  8. Liao, Q., Gurung, A., Luo, X. I. N., & Long, L. I. (2009). Workplace management and employee misuse: Does punishment matter? Journal of Computer Information Systems, 50(2), 49–59.
  9. McAdams, A. C. (2004). Security and risk management: a fundamental business issue: all organizations must focus on the management issues of security, including organizational structures, skill sets, processes, and methodologies for managing security and risk management. Information Management Journal, 38(4), 36–42. http://www.freepatentsonline.com/article/Information-Management-Journal/119570070.html
  10. Straver, P., & Ravesteyn, P. (2019). End-user Compliance to the Information Security Policy: A Comparison of Motivational Factors. Communications of the IIMA, 16(4). https://doi.org/10.58729/1941-6687.1396
  11. Walkowski, D. (2019). What Are Security Controls? F5 Labs. https://www.f5.com/labs/learning-center/what-are-security-controls
  12. Whitman, M. E., & Mattord, H. J. (2011). Principles of Information Security Fourth Edition. Learning, 269, 289.
  13. Whitman, M. E., Mattord, H. J., Mackey, D. H., Green, A., TIPTON, H. F., Muscat, I., Clark, P. G., Agah, A., Chanda, K., Carlson, J., & Calder, S. R. (2016). Guide to Network Security. Security Intellegence: Analysis and Insight for Information Security Professionals, 2(7), 361. https://books.google.com/books/about/Guide_to_Network_Security.html?id=jML6CAAAQBAJ

Many organizations and businesses are currently dependent on information systems to conduct their business process and transactions. The security of the information being handled by systems has become a challenge in the corporate world today, as organizations strive to take measures to safeguard their information and maintain confidentiality. The study aimed to investigate the factors that influence information security in Small and medium-sized enterprises (SMEs) in Mogadishu Somalia. The study was guided by the following research objectives: such as organizational characteristics, data management practices, and employee characteristics in organizations that affect information security in SMEs in Mogadishu Somalia. A quantitative descriptive research design was used in this study, whereby the population consisted of 150 respondents which was focused on Owners, Managers, and Information Security Engineers of Small and Medium-sized enterprises (SMEs) in Mogadishu. Out of which a sample size of 140 respondents was obtained, spread out across three categories. The researchesr applied the probability method to select Owners, Managers, and Information Security Engineers from the Small and Medium Enterprises in Mogadishu Somalia. The elements selected from the population interacted with information security and were well-qualified to respond to the research objectives. The researches used self-administered structured questionnaires, whereby the respondents were required to point out the measure of appropriateness of the three main factors that influence information security in SMEs in Mogadishu. The questionnaire used a five-point Likert-type scale ranging from strongly disagree (1) to strongly agree (5). The respondents were also asked to indicate demographic information that comprised of Sex, age, level of education, years of experience, job position, and marital status, based on their perception and understanding. The study was a quantitative research design, whereby a total of one hundred and fifty (150) questionnaires were distributed and one hundred and fourty (140) were returned from the respondents, indicating a response rate of 99%. The analysis of the data was performed in a quantitative nature so as to obtain numerical data made use of descriptive and correlation statistics and was analyzed using SPSS software. The data was structured according to the research objectives and displayed in the form of tables.

Keywords : Information Security, SMEs Information Security, Mogadishu, Somalia.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe