{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:32:18Z","timestamp":1762324338312,"version":"3.40.5"},"reference-count":102,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>This article investigates security behaviours of employees using the Health Belief Model (HBM) as a theoretical lens. Given the fact that previous studies on security behaviours paid much attention to conscious information security behaviours; this article extends the HBM to study both habitual or automatic security behaviours (security habit) and conscious security behaviours of Tanzanian government employees. A structural equation modelling (SEM) technique was used for data analysis. The study found that, the intentions of government employees to practice information security behaviour is influenced by perceived severity, perceived susceptibility, perceived barriers, and cues to action and security habits. Their intentions, however, is not affected by perceived benefits and self-efficacy. Further, an employee's intentions and security habits has a significant effect on actual security practice. Generally, the extended research model enriches the understanding of the role played by both conscious and habitual security behaviours on information security behaviours of employees.<\/jats:p>","DOI":"10.4018\/ijthi.2019010102","type":"journal-article","created":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T16:28:21Z","timestamp":1537979301000},"page":"15-32","source":"Crossref","is-referenced-by-count":7,"title":["Understanding Information Security Behaviours of Tanzanian Government Employees"],"prefix":"10.4018","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4104-2704","authenticated-orcid":true,"given":"Daniel Ntabagi","family":"Koloseni","sequence":"first","affiliation":[{"name":"Universiti Tunku Abdul Rahman, Kampar, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4335-3351","authenticated-orcid":true,"given":"Chong Yee","family":"Lee","sequence":"additional","affiliation":[{"name":"Universiti Tunku Abdul Rahman, Kampar, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0993-1130","authenticated-orcid":true,"given":"Ming-Lee","family":"Gan","sequence":"additional","affiliation":[{"name":"Universiti Tunku Abdul Rahman, Kampar, Malaysia"}]}],"member":"2432","reference":[{"journal-title":"From Intentions to Actions: A Theory of Planned Behavior","year":"1985","author":"I.Ajzen","key":"IJTHI.2019010102-0"},{"key":"IJTHI.2019010102-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.12.032"},{"key":"IJTHI.2019010102-2","doi-asserted-by":"publisher","DOI":"10.4018\/jthi.2013040101"},{"key":"IJTHI.2019010102-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"key":"IJTHI.2019010102-4","doi-asserted-by":"publisher","DOI":"10.1080\/15389588.2010.535227"},{"key":"IJTHI.2019010102-5","doi-asserted-by":"publisher","DOI":"10.2307\/3151392"},{"key":"IJTHI.2019010102-6","doi-asserted-by":"publisher","DOI":"10.1348\/014466601164939"},{"key":"IJTHI.2019010102-7","doi-asserted-by":"publisher","DOI":"10.1007\/BF02723327"},{"key":"IJTHI.2019010102-8","unstructured":"Bakari, J. K. (2013). Delivering Secure, Public-Oriented e-GovernmentFacilities in Africa: A Holistic Approach. In The 7th annual e-Gov Forum of the Commonwealth Telecommunications Organisation. Kampala, Uganda: CTO."},{"key":"IJTHI.2019010102-9","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2005.243"},{"key":"IJTHI.2019010102-10","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.88.3.588"},{"key":"IJTHI.2019010102-11","doi-asserted-by":"publisher","DOI":"10.1053\/j.gastro.2004.11.002"},{"key":"IJTHI.2019010102-12","doi-asserted-by":"publisher","DOI":"10.1177\/0049124189017003004"},{"key":"IJTHI.2019010102-13","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.8"},{"key":"IJTHI.2019010102-14","unstructured":"Bourg, K. A. (2014). An Exploration of the Factors Influencing Home User\u2019s Cybersecurity Factors. PhD Thesis. Victoria University of Wellington."},{"key":"IJTHI.2019010102-15","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7359"},{"key":"IJTHI.2019010102-16","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2005.00183.x"},{"key":"IJTHI.2019010102-17","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2005.10855772"},{"key":"IJTHI.2019010102-18","doi-asserted-by":"publisher","DOI":"10.1177\/2158244013484732"},{"key":"IJTHI.2019010102-19","unstructured":"Chenoweth, T., Minch, R., & Gattiker, T. (2009). Application of protection motivation theory to the adoption of protective technologies. In 42nd Hawaii International Conference on System Sciences HICSS\u201909, Hawaii."},{"issue":"40","key":"IJTHI.2019010102-20","article-title":"Using Protection Motivation Theory to Increase the Persuasiveness of Public Service Communications.","author":"M.Cismaru","year":"2006","journal-title":"Public Policy"},{"key":"IJTHI.2019010102-21","unstructured":"Citizen. (2014). Delayed refunds anger victims of ATM theft. Retrieved from http:\/\/www.thecitizen.co.tz\/News\/Delayed-refunds-anger-victims-of-ATM-theft\/-\/1840392\/2483584\/-\/x9m1ixz\/-\/index.html"},{"journal-title":"The Adoption of Computer Security: An Analysis of Home Personal Computer User Behavior Using the Health Belief Model","year":"2011","author":"C.Claar","key":"IJTHI.2019010102-22"},{"issue":"4","key":"IJTHI.2019010102-23","first-page":"20","article-title":"Analysing Home PC Security Adoption Behavior.","volume":"52","author":"C.Claar","year":"2012","journal-title":"Journal of Computer Information Systems"},{"key":"IJTHI.2019010102-24","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1998.tb01685.x"},{"key":"IJTHI.2019010102-25","doi-asserted-by":"crossref","unstructured":"Crossler, R. E. (2010). Protection Motivation Theory: Understanding Determinants to Back up Personal Data. In 2010 43rd Hawaii International Conference on System Sciences.","DOI":"10.1109\/HICSS.2010.311"},{"key":"IJTHI.2019010102-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.06.023"},{"key":"IJTHI.2019010102-27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.10.003"},{"issue":"3","key":"IJTHI.2019010102-28","first-page":"114","article-title":"Current Status of e-Government Services in Tanzania: A Security Perspective.","volume":"3","author":"M.Dewa","year":"2014","journal-title":"ACSIJ Advances in Computer Science\u202f: An International Journal"},{"key":"IJTHI.2019010102-29","doi-asserted-by":"publisher","DOI":"10.1097\/MLR.0b013e318032937e"},{"key":"IJTHI.2019010102-30","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.216"},{"key":"IJTHI.2019010102-31","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(99)80135-7"},{"key":"IJTHI.2019010102-32","doi-asserted-by":"publisher","DOI":"10.2307\/3150980"},{"key":"IJTHI.2019010102-33","doi-asserted-by":"publisher","DOI":"10.1080\/09540120050123783"},{"issue":"1","key":"IJTHI.2019010102-34","first-page":"7","article-title":"Structural equation modelling and regression: Guidelines for research practice.","volume":"4","author":"D.Gefen","year":"2000","journal-title":"Communications of the Association for Information Systems"},{"key":"IJTHI.2019010102-35","doi-asserted-by":"publisher","DOI":"10.1007\/s11121-007-0070-9"},{"journal-title":"Multivariate Data Analysis","year":"2010","author":"J.Hair","key":"IJTHI.2019010102-36"},{"key":"IJTHI.2019010102-37","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2015.1117842"},{"issue":"4","key":"IJTHI.2019010102-38","first-page":"614","article-title":"Predicting Adolescent Perpetration in Cyberbullying: An Application of the Theory of Planned Behavior.","volume":"24","author":"W.Heirman","year":"2012","journal-title":"Psicothema"},{"issue":"3","key":"IJTHI.2019010102-39","first-page":"143","article-title":"Does Intention Lead to Behaviour? A Case Study of the Czech Republic Farmers.","volume":"59","author":"C. S.Herath","year":"2013","journal-title":"Agricultural Economics"},{"journal-title":"Public Participation in Medical Screening Programs: A Socio-Psychological Study","year":"1958","author":"G. M.Hochbaum","key":"IJTHI.2019010102-40"},{"key":"IJTHI.2019010102-41","article-title":"Formation of Tourist Behavioral Intention and Actual Behaviour.","author":"C.Hsu","year":"2010","journal-title":"7th International Conference on Service Systems and Service Management (ICSSSM)"},{"key":"IJTHI.2019010102-42","unstructured":"Jansen, J., & Schaik, P. (2016). Understanding Precautionary Online Behavioural Intentions: A Comparison of Three Models. In Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany."},{"key":"IJTHI.2019010102-43","doi-asserted-by":"publisher","DOI":"10.1177\/109019818401100101"},{"key":"IJTHI.2019010102-44","article-title":"Get a cue on is Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior.","author":"J.Jenkins","year":"2011","journal-title":"Thirty-Second International Conference on Information Systems"},{"key":"IJTHI.2019010102-45","article-title":"The Effect of Technology Usage Habits on Consumers\u2019 Intention to Continue Use Mobile Payments.","author":"L.Jia","year":"2014","journal-title":"Twentieth Americas Conference on Information Systems"},{"key":"IJTHI.2019010102-46","first-page":"21","article-title":"e-Government: Security Threats.","volume":"11","author":"C.Jim\u00e9nez","year":"2012","journal-title":"E-Government"},{"key":"IJTHI.2019010102-47","doi-asserted-by":"publisher","DOI":"10.2307\/25750691"},{"key":"IJTHI.2019010102-48","doi-asserted-by":"crossref","unstructured":"Khan, B., Alghathbar, K., & Khan, M. (2011). Information Security Awareness Campaign: An Alternate Approach. In Communications in Computer and Information Science, Brno, Czech Republic.","DOI":"10.1007\/978-3-642-23141-4_1"},{"key":"IJTHI.2019010102-49","unstructured":"Kleinbaum, D., Kupper, L., Nizam, A., & Rosenberg, E. (1998). Applied regression analysis and other multivariable methods (3rd ed.). Duxbury: Pacific Glove."},{"key":"IJTHI.2019010102-50","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00071.x"},{"key":"IJTHI.2019010102-51","doi-asserted-by":"publisher","DOI":"10.1080\/01449290600879344"},{"journal-title":"Exercise Barriers in Cancer Survivors: A Multi-Dimensional Approach","year":"2013","author":"M.Lee","key":"IJTHI.2019010102-52"},{"key":"IJTHI.2019010102-53","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2001.11044227"},{"key":"IJTHI.2019010102-54","doi-asserted-by":"publisher","DOI":"10.2307\/20650279"},{"key":"IJTHI.2019010102-55","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00232"},{"key":"IJTHI.2019010102-56","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.02.005"},{"key":"IJTHI.2019010102-57","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00030"},{"key":"IJTHI.2019010102-58","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2004.835087"},{"key":"IJTHI.2019010102-59","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1988.10478722"},{"key":"IJTHI.2019010102-60","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0167.39.4.447"},{"key":"IJTHI.2019010102-61","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9310.00288"},{"key":"IJTHI.2019010102-62","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02308.x"},{"key":"IJTHI.2019010102-63","doi-asserted-by":"publisher","DOI":"10.1109\/79.543975"},{"issue":"2","key":"IJTHI.2019010102-64","first-page":"182","article-title":"The Rapid Growth of Cybercrimes Affecting Information Systems in the Global\u202f: Is this a Myth or Reality in Tanzania?","volume":"3","author":"E. N.Nfuka","year":"2014","journal-title":"International Journal of Information Security Science"},{"key":"IJTHI.2019010102-65","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"key":"IJTHI.2019010102-66","doi-asserted-by":"publisher","DOI":"10.5210\/ojphi.v4i3.4321"},{"key":"IJTHI.2019010102-67","article-title":"Employees \u2019 Behaviour towards IS Security Policy Compliance.","author":"S.Pahnila","year":"2007","journal-title":"Proceedings of the 40th Hawaii International Conference on System Sciences"},{"key":"IJTHI.2019010102-68","doi-asserted-by":"crossref","unstructured":"Pahnila, S., Siponen, M., & Mahmood, A. (2007b). Which Factors Explain Employees\u2019 Adherence to Information Security Policies? An Empirical Study. In Pacis 2007 Proceedings (pp. 438\u2013439). Aukland, USA.","DOI":"10.1007\/978-0-387-72367-9_12"},{"issue":"3","key":"IJTHI.2019010102-69","first-page":"35","article-title":"Beyond Awareness: Using Business Intelligence to Create a Culture of Information Security.","volume":"11","author":"C.Paulsen","year":"2011","journal-title":"Communications of the IIMA"},{"issue":"5","key":"IJTHI.2019010102-70","first-page":"1254","article-title":"Self-efficacy: Does it Predict the Effectiveness of Contraceptive Use in Iranian Women?","volume":"15","author":"N.Peyman","year":"2009","journal-title":"Eastern Mediterranean Health Journal"},{"key":"IJTHI.2019010102-71","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2012.11.002"},{"key":"IJTHI.2019010102-72","doi-asserted-by":"publisher","DOI":"10.1108\/13552550910995443"},{"issue":"1","key":"IJTHI.2019010102-73","first-page":"63","article-title":"Convergence of Corporate and Information Security.","volume":"7","author":"S.Rahman","year":"2010","journal-title":"International Journal of Computer Science and Information Security"},{"journal-title":"Health Beliefs and Behaviors of College Women","year":"2007","author":"L. M.Reiser","key":"IJTHI.2019010102-74"},{"key":"IJTHI.2019010102-75","doi-asserted-by":"publisher","DOI":"10.1207\/S15327027HC1203_01"},{"issue":"4","key":"IJTHI.2019010102-76","article-title":"Why People Use Health Services.","volume":"83","author":"I. M.Rosenstock","year":"1966","journal-title":"The Milbank Quarterly"},{"issue":"4","key":"IJTHI.2019010102-77","first-page":"328","article-title":"Historical Origins of the Health Belief Model.","volume":"2","author":"I. M.Rosenstock","year":"1974","journal-title":"Health and Behaviour"},{"key":"IJTHI.2019010102-78","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-3293(97)00024-4"},{"key":"IJTHI.2019010102-79","doi-asserted-by":"publisher","DOI":"10.1038\/sj.ejcn.1601051"},{"key":"IJTHI.2019010102-80","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.012"},{"key":"IJTHI.2019010102-81","unstructured":"Sasse, M., Ashenden, D., Lawrence, D., Coles-Kemp, L., Flechais, I., & Kearney, P. (2007). Human Vulnerabilities in Security Systems (White Paper). Cyber Security Knowledge Transfer Network (KTN), Buenos Aires, Argentina."},{"journal-title":"Serikali Mtandao: Madhumuni, Matatizo, Mafanikio, na Changamoto.","year":"2007","author":"D.Sawe","key":"IJTHI.2019010102-82"},{"key":"IJTHI.2019010102-83","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.54.3.182"},{"key":"IJTHI.2019010102-84","doi-asserted-by":"publisher","DOI":"10.1207\/s15327906mbr3304_5"},{"key":"IJTHI.2019010102-85","unstructured":"Schwarzer, R., & Fuchs, R. (1996). Self-Efficacy and Health Behaviours. In Predicting Health Behaviour: Research and Practice with Social Cognition Models (pp. 163\u2013196)."},{"journal-title":"Enhancing Governance of Information Security in Developing Countries: The Case of Zanzibar","year":"2014","author":"H.Shaaban","key":"IJTHI.2019010102-86"},{"journal-title":"State of Information Security in Zanzibar\u2019s Public Sector","year":"2012","author":"H.Shaaban","key":"IJTHI.2019010102-87"},{"key":"IJTHI.2019010102-88","doi-asserted-by":"publisher","DOI":"10.1177\/2158244014556726"},{"key":"IJTHI.2019010102-89","first-page":"29","article-title":"The Health Belief Model","volume":"Vol. 2","author":"P.Sheeran","year":"1996","journal-title":"Predicting Health Behaviour"},{"key":"IJTHI.2019010102-90","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.006"},{"key":"IJTHI.2019010102-91","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1.3.255"},{"key":"IJTHI.2019010102-92","unstructured":"TCRA. (2012). Report of the Steering Committee on Establishment of National Computer Response Team (TZ- CERT) Tanzania."},{"journal-title":"Tanzania e-Government Strategy","year":"2013","key":"IJTHI.2019010102-93"},{"key":"IJTHI.2019010102-94","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"IJTHI.2019010102-95","doi-asserted-by":"publisher","DOI":"10.1080\/101967802320245929"},{"issue":"6","key":"IJTHI.2019010102-96","first-page":"29","article-title":"Towards a Secure Maturity Model for Protecting e-Government Services in Tanzania: A Stakeholders View.","volume":"3","author":"M. D.Waziri","year":"2014","journal-title":"ACSIJ Advances in Computer Science\u202f: An International Journal"},{"key":"IJTHI.2019010102-97","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.132.2.249"},{"key":"IJTHI.2019010102-98","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994083"},{"key":"IJTHI.2019010102-99","first-page":"367","article-title":"A Protection Motivation Theory Approach to Home Wireless Security.","author":"I.Woon","year":"2005","journal-title":"Proceedings of the Twenty-Sixth International Conference on Information Systems,"},{"key":"IJTHI.2019010102-100","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"issue":"4","key":"IJTHI.2019010102-101","first-page":"407","article-title":"Exploring Factors that Influence Students\u2019 Behaviors in Information Security.","volume":"23","author":"C.Yoon","year":"2012","journal-title":"Journal of Information Systems Education"}],"container-title":["International Journal of Technology and Human Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=214928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T21:47:58Z","timestamp":1651787278000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJTHI.2019010102"}},"subtitle":["A Health Belief Model Perspective"],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":102,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijthi.2019010102","relation":{},"ISSN":["1548-3908","1548-3916"],"issn-type":[{"type":"print","value":"1548-3908"},{"type":"electronic","value":"1548-3916"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}