Assessing UTAUT2 Model for Cyber Security Compliance A Literature Review

Abstract:

Cyber security breaches are caused due to misuse of information systems and non-compliance with cyber security measures and requirements. For effective compliance and human acceptance of cyber security technology and complying with cyber practices, it is crucial to identify, research, and analyse the factors contributing to the technology's compliance and implementation. This study is an amalgamation and unification of the contemporary literature on the UTAUT2 Model and the relationship between technology adoption and cyber security compliance. The rationale behind this study is to heal the literature gap regarding the relationship between technology adoption and cyber security compliance in the context of the Kingdom of Saudi Arabia. Based on our research and available literature, we can preliminarily conclude that factors influencing technology adoption also affect cyber security compliance, so there is a close relationship between technology adoption and cyber security compliance. This study proves a basic level idea to organizations to formulate a fully functioning and useful security compliance framework for their organizations based on factors that influence the users' or employees' intentions and behavior. Consequently, the study is an exciting endeavor to prevent significant security weaknesses and reduce the security breaches in the information security systems by explaining different factors that strengthen the users' behavior and intentions to comply with the security. This is an ongoing study, and more information will emerge as it progresses.

nsdlogo2016