Measuring information security policy compliance: Content validity of questionnaire

Instruments used to measure compliance with information security policies have been developed by many researchers before, but only a few have conducted validity tests per item, especially for variables selected based on qualitative research. This study aims to validate the questionnaire will be used...

Full description

Saved in:
Bibliographic Details
Main Authors: Angraini, Angraini, Alias, Rose Alinda, Okfalisa, Okfalisa
Format: Article
Language:English
Published: Institute of Advanced Engineering and Science 2021
Subjects:
Online Access:http://eprints.utm.my/id/eprint/97915/1/RoseAlindaAlias2021_MeasuringInformationSecurityPolicyCompliance.pdf
http://eprints.utm.my/id/eprint/97915/
http://dx.doi.org/10.11591/ijeecs.v22.i1.pp469-475
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Instruments used to measure compliance with information security policies have been developed by many researchers before, but only a few have conducted validity tests per item, especially for variables selected based on qualitative research. This study aims to validate the questionnaire will be used to measure user compliance with policies of information security. This study began by designing a questionnaire and conducting content validation using content ratio validation (CVR) and content index validation (CVI). As many as eight experts from the university assessed the items given. The results of 72 items submitted a questionnaire, as many as 22 items eliminated, and only 50 items that have CVR and CVI values above 0.75. Also, Kappa statistical calculations show that items have excellent reliability among assessors at the item level. This study revealed that this instrument had obtained an appropriate level of validity to measure compliance with information security policies.