{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T13:40:08Z","timestamp":1751809208620,"version":"3.41.0"},"reference-count":64,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"abstract":"<jats:p>This article focuses on identifying key human resource management (HRM) practices necessary for improving information security performance from the perspective of IT professionals. The Importance-Performance Map Analysis (IPMA) via SmartPLS 3.0 was employed and 232 samples were collected from information technology (IT) professionals in 43 organizations. The analysis identified information security training, background checks and monitoring as very important HRM practices that could improve the performance of organizational information security. In particular, the study found training on mobile devices security and malware; background checks and monitoring of potential, current and former employees as of high importance but with low performance. Thus, these key areas need to be improved with top priority. Conversely, the study found accountability and employee relations as being overly emphasized by the organisations. The findings raised some useful implications and information for HR and IT leaders to consider in future information security strategy.<\/jats:p>","DOI":"10.4018\/ijhcitp.2018100102","type":"journal-article","created":{"date-parts":[[2018,8,22]],"date-time":"2018-08-22T11:15:23Z","timestamp":1534936523000},"page":"23-43","source":"Crossref","is-referenced-by-count":8,"title":["Identifying HRM Practices for Improving Information Security Performance"],"prefix":"10.4018","volume":"9","author":[{"given":"Peace","family":"Kumah","sequence":"first","affiliation":[{"name":"Ghana Education Service, Accra, Ghana"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7756-1832","authenticated-orcid":true,"given":"Winfred","family":"Yaokumah","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Pentecost University College, Accra, Ghana"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3781-684X","authenticated-orcid":true,"given":"Charles","family":"Buabeng-Andoh","sequence":"additional","affiliation":[{"name":"Pentecost University College, Ghana"}]}],"member":"2432","reference":[{"key":"IJHCITP.2018100102-0","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"IJHCITP.2018100102-1","unstructured":"Abed, J., & Roland, W. H. (2016). Understanding deterrence theory in security compliance behavior: A quantitative meta-analysis approach. In SAIS 2016 Proceedings. Retrieved from http:\/\/aisel.aisnet.org\/sais2016\/28"},{"key":"IJHCITP.2018100102-2","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.10"},{"key":"IJHCITP.2018100102-3","doi-asserted-by":"publisher","DOI":"10.2308\/isys-51341"},{"key":"IJHCITP.2018100102-4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163050"},{"key":"IJHCITP.2018100102-5","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"IJHCITP.2018100102-6","doi-asserted-by":"publisher","DOI":"10.1108\/01409171011030372"},{"issue":"1","key":"IJHCITP.2018100102-7","first-page":"84","article-title":"Background investigations a comparative analysis of background checks and federal security clearance investigations.","volume":"7","author":"R. G.Brody","year":"2015","journal-title":"Business Studies Journal"},{"key":"IJHCITP.2018100102-8","unstructured":"Bumgarner, J., & Borg, S. (2007). US-CCU Cyber-Security Questionnaire. US-CCU (Cyber Consequences Unit) Cyber-Security Check. Retrieved from www.usccu.us"},{"key":"IJHCITP.2018100102-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.018"},{"key":"IJHCITP.2018100102-10","article-title":"Information security and information assurance. The discussion about the meaning, scope and goals","author":"Y.Cherdantseva","year":"2013","journal-title":"Organisational, Legal, and Technological Dimensions of Information System Administrator"},{"key":"IJHCITP.2018100102-11","doi-asserted-by":"publisher","DOI":"10.4018\/IJHCITP.2017070105"},{"key":"IJHCITP.2018100102-12","unstructured":"Cybercrime Unit. (2016). Government will fight Cyber Crime. Retrieved from http:\/\/cybercrime.gov.gh\/?p=313"},{"key":"IJHCITP.2018100102-13","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-08-2013-0057"},{"key":"IJHCITP.2018100102-14","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-12-2015-0048"},{"key":"IJHCITP.2018100102-15","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-006-9191-5"},{"issue":"1","key":"IJHCITP.2018100102-16","first-page":"51","article-title":"New concerns in electronic employee monitoring: Have you checked your policies lately? Journal of Legal","volume":"18","author":"J.Ford","year":"2015","journal-title":"Ethical & Regulatory Issues"},{"key":"IJHCITP.2018100102-17","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(09)70019-3"},{"key":"IJHCITP.2018100102-18","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/61.1.101"},{"journal-title":"A primer on partial least squares structural equation modeling (PLS-SEM)","year":"2014","author":"J. F.Hair","key":"IJHCITP.2018100102-19"},{"journal-title":"A primer on partial least squares structural equation modeling (PLS-SEM)","year":"2017","author":"J. F.Hair","key":"IJHCITP.2018100102-20"},{"key":"IJHCITP.2018100102-21","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-011-0261-6"},{"key":"IJHCITP.2018100102-22","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"IJHCITP.2018100102-23","doi-asserted-by":"publisher","DOI":"10.2308\/isys-51580"},{"key":"IJHCITP.2018100102-24","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2012.00361.x"},{"key":"IJHCITP.2018100102-25","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.1001255"},{"key":"IJHCITP.2018100102-26","doi-asserted-by":"publisher","DOI":"10.1002\/ir.342"},{"key":"IJHCITP.2018100102-27","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-11-2015-0358"},{"key":"IJHCITP.2018100102-28","first-page":"16","article-title":"Information Security in the Digital Age: The Case of Developing Countries.","volume":"42","author":"I. J.Ikenwe","year":"2016","journal-title":"Chinese Librarianship"},{"key":"IJHCITP.2018100102-29","unstructured":"Javad, A., & Weistroffer, H. R. (2016). Understanding Deterrence Theory in Security Compliance Behavior: A Quantitative Meta-Analysis Approach. In SAIS 2016 Proceedings. Retrieved from http:\/\/aisel.aisnet.org\/sais2016\/28"},{"key":"IJHCITP.2018100102-30","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-05-2014-0033"},{"key":"IJHCITP.2018100102-31","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-01-2014-0006"},{"issue":"3","key":"IJHCITP.2018100102-32","first-page":"49","article-title":"Information security governance of enterprise information systems: An approach to legislative compliant.","volume":"14","author":"B.Khao","year":"2010","journal-title":"International Journal of Management and Information Systems"},{"key":"IJHCITP.2018100102-33","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-01-2013-0005"},{"key":"IJHCITP.2018100102-34","doi-asserted-by":"publisher","DOI":"10.1108\/09685221311314383"},{"key":"IJHCITP.2018100102-35","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011035223"},{"key":"IJHCITP.2018100102-36","doi-asserted-by":"publisher","DOI":"10.1108\/09670731311296492"},{"key":"IJHCITP.2018100102-37","doi-asserted-by":"publisher","DOI":"10.1080\/15332861.2010.487415"},{"issue":"11","key":"IJHCITP.2018100102-38","first-page":"699","article-title":"Impact of Human Resource Management Practices (HRM) on Performance of SMEs in Multan, Pakistan. International Journal of Management","volume":"3","author":"F.Naz","year":"2016","journal-title":"Accounting & Economics"},{"journal-title":"Psychometric theory","year":"1978","author":"J. C.Nunnally","key":"IJHCITP.2018100102-39"},{"key":"IJHCITP.2018100102-40","doi-asserted-by":"publisher","DOI":"10.1080\/14719037.2011.642567"},{"key":"IJHCITP.2018100102-41","unstructured":"Overseas Security Advisory Council (OSAC). (2012). Ghana 2012 OSAC crime and safety report. Retrieve from https:\/\/www.osac.gov"},{"key":"IJHCITP.2018100102-42","doi-asserted-by":"publisher","DOI":"10.1080\/10658989509342474"},{"issue":"3","key":"IJHCITP.2018100102-43","first-page":"23","article-title":"Commitment of information technology employees in relation to perceived organisational justice.","volume":"11","author":"H. A.Patrick","year":"2012","journal-title":"IUP Journal of Organisational Behavior"},{"key":"IJHCITP.2018100102-44","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1138374"},{"issue":"3","key":"IJHCITP.2018100102-45","first-page":"28","article-title":"A study on the effect of human resource development on employment relations.","volume":"14","author":"A.Radhakrishna","year":"2015","journal-title":"IUP Journal of Management Research"},{"issue":"2","key":"IJHCITP.2018100102-46","first-page":"115","article-title":"Is seeing believing? Training users on information security: Evidence from Java Applets.","volume":"28","author":"A.Ramakrishna","year":"2017","journal-title":"Journal of Information Systems Education"},{"key":"IJHCITP.2018100102-47","doi-asserted-by":"crossref","unstructured":"Rantos, K., Fysarakis, K., & Manifavas, C.(2012). How effective is your security awareness program? An evaluation methodology. Information Security Journal: A Global Perspective, 21(6), 328-345.","DOI":"10.1080\/19393555.2012.747234"},{"key":"IJHCITP.2018100102-48","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-04-2013-0025"},{"key":"IJHCITP.2018100102-49","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-10-2015-0449"},{"key":"IJHCITP.2018100102-50","doi-asserted-by":"publisher","DOI":"10.5958\/0976-478X.2017.00005.2"},{"journal-title":"Certified Information Systems Security Professional (Study Guide)","year":"2005","author":"J. M.Stewart","key":"IJHCITP.2018100102-51"},{"issue":"2","key":"IJHCITP.2018100102-52","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.2517-6161.1974.tb00994.x","article-title":"Cross-Validatory Choice and Assessment of Statistical Predictions.","volume":"36","author":"M.Stone","year":"1974","journal-title":"Journal of the Royal Statistical Society. Series A (General)"},{"key":"IJHCITP.2018100102-53","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910944759"},{"key":"IJHCITP.2018100102-54","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-561-0.ch058"},{"key":"IJHCITP.2018100102-55","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219191"},{"key":"IJHCITP.2018100102-56"},{"key":"IJHCITP.2018100102-57","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290410"},{"issue":"1","key":"IJHCITP.2018100102-58","first-page":"11","article-title":"Incorporating global information security and assurance in I.S. education.","volume":"24","author":"G. L.White","year":"2013","journal-title":"Journal of Information Systems Education"},{"issue":"3","key":"IJHCITP.2018100102-59","doi-asserted-by":"crossref","first-page":"247","DOI":"10.18421\/TEM23-07","article-title":"Information Security Threats and Information Assurance.","volume":"2","author":"Y.Yalman","year":"2013","journal-title":"TEM Journal"},{"key":"IJHCITP.2018100102-60","doi-asserted-by":"publisher","DOI":"10.4018\/IJISSC.2016070104"},{"issue":"2","key":"IJHCITP.2018100102-61","first-page":"24","article-title":"Perceived accountability and conflict management styles as predictors of job performance of public officials in Pakistan.","volume":"32","author":"U.Zaman","year":"2016","journal-title":"Gomal University Journal of Research"},{"key":"IJHCITP.2018100102-62","doi-asserted-by":"publisher","DOI":"10.1080\/15332860903467508"},{"key":"IJHCITP.2018100102-63","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300104"}],"container-title":["International Journal of Human Capital and Information Technology Professionals"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=212356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T13:23:29Z","timestamp":1751808209000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJHCITP.2018100102"}},"subtitle":["An Importance-Performance Map Analysis"],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":64,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijhcitp.2018100102","relation":{},"ISSN":["1947-3478","1947-3486"],"issn-type":[{"type":"print","value":"1947-3478"},{"type":"electronic","value":"1947-3486"}],"subject":[],"published":{"date-parts":[[2018,10]]}}}