Authors :
Hassan Adan Hussein; Mohamed Adam Isak Abdirahman
Volume/Issue :
Volume 9 - 2024, Issue 6 - June
Google Scholar :
https://tinyurl.com/yt6bu4yn
Scribd :
https://tinyurl.com/24emkcwy
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24JUN641
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Many organizations and businesses are
currently dependent on information systems to conduct
their business process and transactions. The security of
the information being handled by systems has become a
challenge in the corporate world today, as organizations
strive to take measures to safeguard their information
and maintain confidentiality. The study aimed to
investigate the factors that influence information
security in Small and medium-sized enterprises (SMEs)
in Mogadishu Somalia. The study was guided by the
following research objectives: such as organizational
characteristics, data management practices, and
employee characteristics in organizations that affect
information security in SMEs in Mogadishu Somalia. A
quantitative descriptive research design was used in this
study, whereby the population consisted of 150
respondents which was focused on Owners, Managers,
and Information Security Engineers of Small and
Medium-sized enterprises (SMEs) in Mogadishu. Out of
which a sample size of 140 respondents was obtained,
spread out across three categories. The researchesr
applied the probability method to select Owners,
Managers, and Information Security Engineers from the
Small and Medium Enterprises in Mogadishu Somalia.
The elements selected from the population interacted
with information security and were well-qualified to
respond to the research objectives. The researches used
self-administered structured questionnaires, whereby the
respondents were required to point out the measure of
appropriateness of the three main factors that influence
information security in SMEs in Mogadishu. The
questionnaire used a five-point Likert-type scale ranging
from strongly disagree (1) to strongly agree (5). The
respondents were also asked to indicate demographic
information that comprised of Sex, age, level of
education, years of experience, job position, and marital
status, based on their perception and understanding.
The study was a quantitative research design, whereby a
total of one hundred and fifty (150) questionnaires were
distributed and one hundred and fourty (140) were
returned from the respondents, indicating a response
rate of 99%. The analysis of the data was performed in a
quantitative nature so as to obtain numerical data made
use of descriptive and correlation statistics and was
analyzed using SPSS software. The data was structured
according to the research objectives and displayed in the
form of tables.
Keywords :
Information Security, SMEs Information Security, Mogadishu, Somalia.
References :
- Adomavicius, G., Bockstedt, J. C., Gupta, A., & Kauffman, R. J. (2008a). Making sense of technology trends in the information technology landscape: A design science approach. MIS Quarterly: Management Information Systems, 32(4), 779–809. https://doi.org/10.2307/25148872
- Adomavicius, G., Bockstedt, J., Gupta, A., & Kauffman, R. J. (2008b). Understanding evolution in technology ecosystems. Communications of the ACM, 51(10), 117–122. https://doi.org/10.1145/1400181.1400207
- Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Qjarterly Special Issue Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness1. Source: MIS Quarterly, 34(3), 39.
- Chaffey, D. and Wood, S. (2005) Business Information Management Improving Performance Using Information. Pearson Education Ltd., Upper Saddle River. - References - Scientific Research Publishing. (n.d.). Retrieved July 19, 2023, from https://www.scirp.org/(S(351jmbntvnsjt1aadkposzje))/reference/ReferencesPapers.aspx?ReferenceID=1392681
- Hall, P., & Griffin, J. J. (2012). Book Review - Wheelen and Hunger ’ s Strategic Management and Business Policy : Toward Global Sustainability , 13 th. 419–422.
- James Gibson, John Ivancevich, R. K. (2011). Organizations: Behavior, Structure, Processes. 640. https://books.google.com/books/about/Organizations_Behavior_Structure_Process.html?id=0ExYcgAACAAJ
- KIHARA, P. K. (2015). Organizational Factors That Influence Information Security in State Corporations : a Case Study of Kenya National Highways Authority By.
- Liao, Q., Gurung, A., Luo, X. I. N., & Long, L. I. (2009). Workplace management and employee misuse: Does punishment matter? Journal of Computer Information Systems, 50(2), 49–59.
- McAdams, A. C. (2004). Security and risk management: a fundamental business issue: all organizations must focus on the management issues of security, including organizational structures, skill sets, processes, and methodologies for managing security and risk management. Information Management Journal, 38(4), 36–42. http://www.freepatentsonline.com/article/Information-Management-Journal/119570070.html
- Straver, P., & Ravesteyn, P. (2019). End-user Compliance to the Information Security Policy: A Comparison of Motivational Factors. Communications of the IIMA, 16(4). https://doi.org/10.58729/1941-6687.1396
- Walkowski, D. (2019). What Are Security Controls? F5 Labs. https://www.f5.com/labs/learning-center/what-are-security-controls
- Whitman, M. E., & Mattord, H. J. (2011). Principles of Information Security Fourth Edition. Learning, 269, 289.
- Whitman, M. E., Mattord, H. J., Mackey, D. H., Green, A., TIPTON, H. F., Muscat, I., Clark, P. G., Agah, A., Chanda, K., Carlson, J., & Calder, S. R. (2016). Guide to Network Security. Security Intellegence: Analysis and Insight for Information Security Professionals, 2(7), 361. https://books.google.com/books/about/Guide_to_Network_Security.html?id=jML6CAAAQBAJ
Many organizations and businesses are
currently dependent on information systems to conduct
their business process and transactions. The security of
the information being handled by systems has become a
challenge in the corporate world today, as organizations
strive to take measures to safeguard their information
and maintain confidentiality. The study aimed to
investigate the factors that influence information
security in Small and medium-sized enterprises (SMEs)
in Mogadishu Somalia. The study was guided by the
following research objectives: such as organizational
characteristics, data management practices, and
employee characteristics in organizations that affect
information security in SMEs in Mogadishu Somalia. A
quantitative descriptive research design was used in this
study, whereby the population consisted of 150
respondents which was focused on Owners, Managers,
and Information Security Engineers of Small and
Medium-sized enterprises (SMEs) in Mogadishu. Out of
which a sample size of 140 respondents was obtained,
spread out across three categories. The researchesr
applied the probability method to select Owners,
Managers, and Information Security Engineers from the
Small and Medium Enterprises in Mogadishu Somalia.
The elements selected from the population interacted
with information security and were well-qualified to
respond to the research objectives. The researches used
self-administered structured questionnaires, whereby the
respondents were required to point out the measure of
appropriateness of the three main factors that influence
information security in SMEs in Mogadishu. The
questionnaire used a five-point Likert-type scale ranging
from strongly disagree (1) to strongly agree (5). The
respondents were also asked to indicate demographic
information that comprised of Sex, age, level of
education, years of experience, job position, and marital
status, based on their perception and understanding.
The study was a quantitative research design, whereby a
total of one hundred and fifty (150) questionnaires were
distributed and one hundred and fourty (140) were
returned from the respondents, indicating a response
rate of 99%. The analysis of the data was performed in a
quantitative nature so as to obtain numerical data made
use of descriptive and correlation statistics and was
analyzed using SPSS software. The data was structured
according to the research objectives and displayed in the
form of tables.
Keywords :
Information Security, SMEs Information Security, Mogadishu, Somalia.