{"id":17,"date":"2024-02-10T03:03:52","date_gmt":"2024-02-10T03:03:52","guid":{"rendered":"https:\/\/student.wp.odu.edu\/pgagn002\/?p=17"},"modified":"2024-04-21T21:40:52","modified_gmt":"2024-04-21T21:40:52","slug":"article-one-review-cybersecurity-determinants-in-iraqs-digital-workplace-attitude-policy-and-compliance-roles","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/pgagn002\/2024\/02\/10\/article-one-review-cybersecurity-determinants-in-iraqs-digital-workplace-attitude-policy-and-compliance-roles\/","title":{"rendered":"Article one review: Cybersecurity Determinants in Iraq&#8217;s Digital Workplace: Attitude, Policy, and Compliance Roles"},"content":{"rendered":"\n<p>By Phillip Gagnon&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Date: 09 February 2024<\/p>\n\n\n\n<p><strong>Article one review:<\/strong> <em>Cybersecurity Determinants in Iraq&#8217;s Digital Workplace: Attitude, Policy, and Compliance Roles<\/em><\/p>\n\n\n\n<p>By Phillip Gagnon&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Date: 09 February 2024<\/p>\n\n\n\n<p>The Study Above inspected a sample group of Iraqi\u2019s that work in a cyber workplace. The study operated off survey responses from 430 people out of an initial 500 questionnaires. From this study they produced 3 hypothesis regarding how employee\u2019s regard policy, attitude, and compliance in the Iraqi digital workplace.<\/p>\n\n\n\n<p><strong>Article Introduction<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Article begins with how cyber culture may relate to people with differing opinions, views, beliefs, etc. and that, as a result, Security issues need to be incorporated into employee routine behavior due to the easy of access into new advances in everyday life. The author\u2019s do blame Iraq\u2019s current lack of security concerns over Iraq\u2019s \u201crobust entry into cyberspace, particularly after 2003\u201d (Nazem, 2023) with the increased use of smart phones, and assorted computer systems. They were unclear what led to this outcome or if this allegation is a result of the 2003 U.S. Led invasion. They studies aim is:<\/p>\n\n\n\n<ol>\n<li>To assess the impact of organizational cybersecurity determinants on the digital workplace in Iraq.<\/li>\n\n\n\n<li>2. To assess the management and employee perspectives on cybersecurity in Iraqi organizations operating in the digital workplace.<\/li>\n\n\n\n<li>3.To&nbsp; evaluate&nbsp; the&nbsp; impact&nbsp; of&nbsp; policy&nbsp; and&nbsp; compliance on&nbsp; organizations\u2019&nbsp; general cybersecurity anticipation in Iraq&#8217;s digital workplace.<\/li>\n<\/ol>\n\n\n\n<p>(Nazem, 2023)<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong>The Hypothesis!<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The article highlights that while we have great use for the new technology, it still comes with its own risks. Which leads us to the 3 Hypothesis, which are in regards to sample persons thoughts toward cyber defensive measures.<\/p>\n\n\n\n<ul>\n<li><strong>H1:<\/strong> <em>The organizational cybersecurity determinants significantly positively impact <\/em><em>digital workplace performance<\/em>.<\/li>\n<\/ul>\n\n\n\n<p>For H1 Since the start of the 21<sup>st<\/sup> century, the Internet has become a staple in life that carries risks associated with the information available. Risks that require mediation and mediation of those risks allow for better protected workplaces.<\/p>\n\n\n\n<ul>\n<li><strong>H2:<\/strong> <em>The attitudes towards cybersecurity <\/em><em>mediate the association between organizational cybersecurity and digital workplace performance.<\/em><\/li>\n<\/ul>\n\n\n\n<p>H2\u2019s thought process stems from different personality traits that affect intended use of Cybersecurity practices and applications. That Employees may impulsively lack practices. The article states through Triplett, 2022; that humans are the weakest link<\/p>\n\n\n\n<ul>\n<li><strong>H3:<\/strong> <em>Company policy compliance mediates the association between organizational <\/em><em>cybersecurity and the digital workplace performance of employees.<\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>H3: <\/strong>Is that previous studies such as Chen, Ramamurthy, &amp; Wen 2012 suggest that control is a policy that can be used to prevent security violations.<\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Data related<\/strong><\/p>\n\n\n\n<p>The data related to the current studies were tested through a questionnaire reliability test. Distributed to 500 randomly selected people who work in digital workplaces, 450 were received back however 20 where determined to not be valid for reasons such as incomplete answers. 430 of the responses were efficient enough to be finalized for the data entry, making it an 86% response rate. That data was collected from the samples answer via a 1 (strongly disagree) to 5 (strongly agree) response measurement in relation to statements regarding the work place and their habits. The 1<sup>st<\/sup> variable had 8 statements. About the organization\u2019s culture for good cyber habits. It used words such as \u201cemphasizes\u201d and \u201cendorses\u201d and made statements about the sample\u2019s organization\u2019s current take on cyber security actions. The 2<sup>nd<\/sup> had 4 statements that was more focus toward policy and compliance using words like \u201cfollowing\u201d and \u201cgood idea\u201d, which seems to kind of guide someone\u2019s thoughts. The 3<sup>rd <\/sup>had 3 statements toward Policy compliance, inferring that the sample will start making changes to their cyber behaviors. It used words such as \u201cI Intend to\u201d when making a statement. The final was geared toward the Digital work place again using words like \u201cI intend\u201d but also words like \u201ctransformed\u201d written in a style that the sample will begin to assist and change both their behaviors and the workplace norms.<\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Conclusion<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>The study states that 2 out of the 3 Hypothesis where approved with H2 being the rejected Hypothesis. The results produced no notable outliners, it also went into detail toward tests that they used to check the suitability of the data. The study itself provided further insights toward the attitude of digital workplace employees and its impact. The study hopes that the organizations can use its findings to increase awareness for their employees and implement new safeguards to protect there information.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong>My Take<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>The article study showed the research approach they followed and from my own understanding into the area it does follow (see figure 1.)( Nazem, 2023). The article went in further by displaying the ways they tests there data to ensure it is correct and provide graphs with the outcomes of the responses. Being that it was a study into people who work in cyber workplaces with different view and upbringings it was a true social study.<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Nazem, S. Nizar, Abid, Majeed M., Gdheed, Salah Hasan, Altememy, Haady Adbilnibi, Al Jouani, Isra Shakir Hassan, Mohsen, Karrar Shareef, Abdulaal, Alaa Hussein, Hamzah, Abdulnaser khalid, &amp; Rasol, M. Asaad. (2023, December). <em>Cybersecurity Determinants in Iraq\u2019s Digital Workplace: Attitude, Policy, and Compliance Roles<\/em>. View of cybersecurity determinants in Iraq\u2019s digital workplace: Attitude, policy, and compliance roles. https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/184\/66<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Phillip Gagnon&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Date: 09 February 2024 Article one review: Cybersecurity Determinants in Iraq&#8217;s Digital Workplace: Attitude, Policy, and Compliance Roles By Phillip Gagnon&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Date: 09 February 2024 The Study Above inspected a sample group of Iraqi\u2019s that work in&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/pgagn002\/2024\/02\/10\/article-one-review-cybersecurity-determinants-in-iraqs-digital-workplace-attitude-policy-and-compliance-roles\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28353,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4,5],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/posts\/17"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/users\/28353"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/comments?post=17"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/posts\/17\/revisions"}],"predecessor-version":[{"id":18,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/posts\/17\/revisions\/18"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/media?parent=17"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/categories?post=17"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/tags?post=17"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}