Document Type : Original Article
Authors
1 Assistant Prof. Ph.D. Knowledge and Information Science, Faculty of Management and Economics, Tarbiat Modares University, Tehran, Iran.
2 M.A, Knowledge and Information Science, Faculty of Management and Economics, Tarbiat Modares University, Tehran Iran
3 Associate Prof. Ph.D. Knowledge and Information Science, Faculty of Management and Economics, Tarbiat Modares University, Tehran, Iran
Abstract
The purpose of this study was to identify effect of human factors on information security in education departments of Gonbad-e Qabus and Maraveh Tapeh. In this study, the effective variables on information security were selected from the human resource dimension and viewpoints of managers and employees toward their impact on security were evaluated and given the importance of security for today''s organizations, a managerial model was proposed to investigate the role of human factors in the security of information systems. The research is the applied research method which has been done in a descriptive - survey method and 103 employees who were most used by computer and network were selected as a statistical sample using the purposeful sampling method. The data collection tool was a researcher-made questionnaire (including seven variables) which using SPSS software and its reliability coefficient is 0.99% was calculated and the content validity method was used to determine its reliability and validity. The data analysis was carried out using the LISREL software. The Results show that from the viewpoint of education staff in Gonbad-e Qabus and Maraveh Tapeh, The support of the higher management of the education department, the training of users, the security culture among users, users'' skills, strengthening the policy of users, self-efficacy and experiences of users have a direct impact on the effectiveness of information systems security which ultimately leads to improve the security of information systems. In addition, Lisrel’s output shows that all dimensions (high management support, training, security culture, user skills, policy enhancement, self - efficacy, self - efficacy and experiences) have a high operating load with the desired structure, the same as the effectiveness of information system security and with 95% confidence, it can be stated that fitting this model is acceptable.
Keywords