{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:25:25Z","timestamp":1772645125673,"version":"3.50.1"},"reference-count":79,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"abstract":"<jats:p>This article contends that information security education, training and awareness programs can improve employee security behavior. Empirical studies have analyzed the direct effects of employee security training on security behavior without taking into account the mediating role of employee relations, monitoring, and accountability. Based on employee relations and accountability theories, this study proposes and tests a causal model that estimates the direct effect of employee security training on security behavior as well as its indirect effects as mediated by employee relations, monitoring, and accountability. The empirical analysis relies on a survey data from a cross section of employees from five major industry sectors and a structural equation modeling approach via SmartPLS 3.0. The results show that employee security training has indirect and significant effects on security behavior through its influence on employee relations, monitoring, and accountability. However, the result does not indicate direct and significant effect of security training on employee security behavior.<\/jats:p>","DOI":"10.4018\/jgim.2019040106","type":"journal-article","created":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T18:45:21Z","timestamp":1553712321000},"page":"102-121","source":"Crossref","is-referenced-by-count":29,"title":["SETA and Security Behavior"],"prefix":"10.4018","volume":"27","author":[{"given":"Winfred","family":"Yaokumah","sequence":"first","affiliation":[{"name":"Pentecost University College, Accra, Ghana"}]},{"given":"Daniel Okyere","family":"Walker","sequence":"additional","affiliation":[{"name":"Pentecost University College, Accra, Ghana"}]},{"given":"Peace","family":"Kumah","sequence":"additional","affiliation":[{"name":"Ghana Education Service, Accra, Ghana"}]}],"member":"2432","reference":[{"key":"JGIM.2019040106-0","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"JGIM.2019040106-1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.516"},{"issue":"1","key":"JGIM.2019040106-2","article-title":"Evaluation of Users Information Security Practices at King Saud University Hospitals.","volume":"3","author":"A. I.Albarrak","year":"2011","journal-title":"Global Business & Management Research"},{"key":"JGIM.2019040106-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"key":"JGIM.2019040106-4","unstructured":"Andrea Rea (n.d) What Is Employee Relations? - Definition & Concept Retrieved from http:\/\/study.com\/academy\/lesson\/what-is-employee-relations-definition-lesson-quiz.html"},{"key":"JGIM.2019040106-5","unstructured":"Bank of Ghana. (2011). Preamble for the Legal and Regulatory framework. Retrieved from https:\/\/www.bog.gov.gh\/supervision-a-regulation\/regulatory-framework"},{"key":"JGIM.2019040106-6","doi-asserted-by":"publisher","DOI":"10.1111\/peps.12046"},{"key":"JGIM.2019040106-7","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"JGIM.2019040106-8","unstructured":"Bumgarner, J., & Borg, S. (2007). US-CCU Cyber-Security Check List (2007). US-CCU (Cyber Consequences Unit) Cyber-Security Check. Retrieved from www.usccu.us"},{"key":"JGIM.2019040106-9","unstructured":"Burley, K. (2017). Employee Accountability Training Activities. Retrieved from https:\/\/bizfluent.com\/info-8407188-employee-accountability-training-activities.html"},{"key":"JGIM.2019040106-10","unstructured":"Chen, H., & Li, W. (2014). Understanding organization employee`s information security omission behavior: An integrated model of social norm and deterrence. In PACIS 2014 Proceedings. Retrieved from http:\/\/aisel.aisnet.org\/pacis2014\/280"},{"key":"JGIM.2019040106-11","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2015.11645767"},{"key":"JGIM.2019040106-12","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2016.12"},{"key":"JGIM.2019040106-13","first-page":"295","author":"W. W.Chin","year":"1998","journal-title":"The partial least squares approach for structural equation modeling."},{"key":"JGIM.2019040106-14","doi-asserted-by":"crossref","unstructured":"Chin, W. W. (2010). How to write up and report PLS analyses. In V. Esposito Vinzi, W.W. Chin, J. Henseler et al. (Eds.), Handbook of Partial Least Squares: Concepts, Methods and Applications (pp. 655-690). London. UK: Springer.","DOI":"10.1007\/978-3-540-32827-8_29"},{"key":"JGIM.2019040106-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.06.008"},{"key":"JGIM.2019040106-16","unstructured":"Coleman, Q. (2017). What Are the Different Theories of Industrial Relations? Retrieved from https:\/\/bizfluent.com\/facts-6323679-different-theories-industrial-relations-.html"},{"key":"JGIM.2019040106-17","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"issue":"1","key":"JGIM.2019040106-18","first-page":"37","article-title":"Assessment of Security Awareness: A Qualitative and Quantitative Study.","volume":"13","author":"K.Dahbur","year":"2017","journal-title":"International Management Review"},{"key":"JGIM.2019040106-19","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2015-0018"},{"key":"JGIM.2019040106-20","doi-asserted-by":"crossref","unstructured":"Ferrin et al., (2007). Can I Trust You to Trust Me? A Theory of Trust, Monitoring, and Cooperation in Interpersonal and Intergroup Relationships. Group & Organization Management, 32(4), 465-474.","DOI":"10.1177\/1059601106293960"},{"issue":"1","key":"JGIM.2019040106-21","first-page":"51","article-title":"New concerns in electronic employee monitoring: Have you checked your policies lately? Journal of Legal","volume":"18","author":"J.Ford","year":"2015","journal-title":"Ethical & Regulatory Issues"},{"key":"JGIM.2019040106-22","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"JGIM.2019040106-23","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1975.10479865"},{"key":"JGIM.2019040106-24","author":"J.Gennard","year":"2002","journal-title":"Employee Relations"},{"key":"JGIM.2019040106-25","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0123"},{"key":"JGIM.2019040106-26","author":"J. F.Hair","year":"2014","journal-title":"A primer on partial least squares structural equation modeling (PLS-SEM)"},{"key":"JGIM.2019040106-27","doi-asserted-by":"publisher","DOI":"10.2753\/MTP1069-6679190202"},{"key":"JGIM.2019040106-28","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-011-0261-6"},{"key":"JGIM.2019040106-29","doi-asserted-by":"publisher","DOI":"10.1080\/2333696X.2008.10855849"},{"key":"JGIM.2019040106-30","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-10-2013-0079"},{"key":"JGIM.2019040106-31","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7874"},{"key":"JGIM.2019040106-32","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7"},{"key":"JGIM.2019040106-33","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-11-2015-0358"},{"key":"JGIM.2019040106-34","doi-asserted-by":"publisher","DOI":"10.1111\/ntwe.12039"},{"key":"JGIM.2019040106-35","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-01-2014-0006"},{"key":"JGIM.2019040106-36","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2016-0002"},{"key":"JGIM.2019040106-37","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-10-2014-0065"},{"key":"JGIM.2019040106-38","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-12-2013-0087"},{"key":"JGIM.2019040106-39","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011095236"},{"key":"JGIM.2019040106-40","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011035223"},{"key":"JGIM.2019040106-41","doi-asserted-by":"publisher","DOI":"10.1108\/MRR-04-2013-0085"},{"key":"JGIM.2019040106-42","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2011.05.002"},{"key":"JGIM.2019040106-43","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-10-2012-0060"},{"key":"JGIM.2019040106-44","doi-asserted-by":"publisher","DOI":"10.1080\/15332861.2010.487415"},{"key":"JGIM.2019040106-45","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2013.10845672"},{"key":"JGIM.2019040106-46","year":"1998","journal-title":"Information technology training requirements: A role- and performance-based model (NIST Special Publication 800-16)"},{"key":"JGIM.2019040106-47","unstructured":"NCA. (2008). Electronic Transactions Act 772. Retrieved from https:\/\/nca.org.gh\/assets\/Uploads\/NCA-Electronic-Transactions-Act-773.pdf"},{"key":"JGIM.2019040106-48","author":"J. C.Nunnally","year":"1978","journal-title":"Psychometric theory"},{"key":"JGIM.2019040106-49","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-10-2013-0078"},{"key":"JGIM.2019040106-50","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2016-0009"},{"key":"JGIM.2019040106-51","doi-asserted-by":"publisher","DOI":"10.1108\/09685220710831107"},{"key":"JGIM.2019040106-52","unstructured":"Ponemon Institute. (2012). The human factor in data protection. Retrieved from http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/reports\/rpt_trend-micro_ponemon-survey\u20132012.pdf"},{"key":"JGIM.2019040106-53","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-04-2013-0025"},{"key":"JGIM.2019040106-54","unstructured":"Ringle, C. M., Wende, S., & Becker, J.-M. (2015). SmartPLS 3. Boenningstedt: SmartPLS GmbH. Retrieved from http:\/\/www.smartpls.com"},{"key":"JGIM.2019040106-55","doi-asserted-by":"publisher","DOI":"10.1177\/001979390906300102"},{"key":"JGIM.2019040106-56","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.012"},{"key":"JGIM.2019040106-57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-53965-7"},{"key":"JGIM.2019040106-58","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.83.3.592"},{"key":"JGIM.2019040106-59","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.006"},{"key":"JGIM.2019040106-60","doi-asserted-by":"publisher","DOI":"10.2307\/25750688"},{"issue":"1","key":"JGIM.2019040106-61","first-page":"43","article-title":"changes in employee relations: Impact of perceived organizational support on social exchange of the outsourcing industry in Sri Lanka.","volume":"9","author":"V.Sivalogathasan","year":"2013","journal-title":"Skyline Business Journal"},{"key":"JGIM.2019040106-62","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2012.10845664"},{"issue":"1","key":"JGIM.2019040106-63","first-page":"112","article-title":"Students\u2019 awareness on information security between own perception and reality \u2013 an empirical study.","volume":"15","author":"V.Stanciu","year":"2016","journal-title":"Accounting & Management Information Systems"},{"key":"JGIM.2019040106-64","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910944759"},{"key":"JGIM.2019040106-65","first-page":"8","article-title":"Accountability","author":"C.Tadmor","year":"2009","journal-title":"The Cambridge Dictionary of Psychology"},{"key":"JGIM.2019040106-66","unstructured":"The Gale Group, Inc. (1970). The Great Soviet Encyclopedia(1970-1979) (3rd ed.). Retrieved from http:\/\/encyclopedia2.thefreedictionary.com\/Human+Relations+Theory"},{"issue":"3","key":"JGIM.2019040106-67","first-page":"203","article-title":"Notes on: GPS technology; employee monitoring enters a new era.","volume":"63","author":"D.Towns","year":"2012","journal-title":"Labor Law Journal"},{"key":"JGIM.2019040106-68","doi-asserted-by":"publisher","DOI":"10.1080\/01449290500330299"},{"key":"JGIM.2019040106-69","doi-asserted-by":"publisher","DOI":"10.1108\/09593841211254358"},{"key":"JGIM.2019040106-70","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.27"},{"issue":"2","key":"JGIM.2019040106-71","first-page":"5","article-title":"Structural equation modeling in information systems research using partial least squares.","volume":"11","author":"N.Urbach","year":"2010","journal-title":"Journal of Information Technology Theory and Application"},{"key":"JGIM.2019040106-72","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290410"},{"key":"JGIM.2019040106-73","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.2.04"},{"key":"JGIM.2019040106-74","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011035232"},{"key":"JGIM.2019040106-75","doi-asserted-by":"crossref","first-page":"256","DOI":"10.4018\/978-1-5225-4944-4.ch014","article-title":"Exploring the Impact of Security Policy on Compliance","author":"W.Yaokumah","year":"2018","journal-title":"Global Implications of Emerging Technology Trends"},{"issue":"2","key":"JGIM.2019040106-76","first-page":"24","article-title":"Perceived accountability and conflict management styles as predictors of job performance of public officials in Pakistan.","volume":"32","author":"U.Zaman","year":"2016","journal-title":"Gomal University Journal of Research"},{"key":"JGIM.2019040106-77","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910993980"},{"key":"JGIM.2019040106-78","doi-asserted-by":"publisher","DOI":"10.1080\/15332860903467508"}],"container-title":["Journal of Global Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=226217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T05:47:30Z","timestamp":1651816050000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JGIM.2019040106"}},"subtitle":["Mediating Role of Employee Relations, Monitoring, and Accountability"],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":79,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/jgim.2019040106","relation":{},"ISSN":["1062-7375","1533-7995"],"issn-type":[{"value":"1062-7375","type":"print"},{"value":"1533-7995","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4]]}}}