then indicative of a gap in the knowledge and associ-
ated awareness of the organisation which can leave
the organisation vulnerable.
Secondly, to show that a strong connection exists
between local information landscapes and infor-
mation deserts, and external contextual factors in se-
curity behaviour and that the mutual influence should
be considered when seeking to evaluate and address
security behaviour.
In the case of InfoSec awareness and behaviour,
local information landscapes were shown to be inex-
tricably linked to the external contextual factors that
influence individual behaviour.
The mapping that was presented in Figure 2 illus-
trated how the two concepts intersect. Their mutual
influence can either help or hinder InfoSec awareness
by extending or limiting information. It was further-
more shown how InfoSec awareness and behaviour
could be evaluated through an analysis of the compo-
nents of a local information landscape, i.e. people,
space, and technology and assessing whether they
contribute positively to the goal of improved security.
A possible limitation in this research is that the
contextual factors are specific to the organisation
where the study was conducted and may not apply to
other organisations. This implies that contextual fac-
tors can only be evaluated on a per-organisation basis.
This limits the ability of the proposed approach to
generalise across organisations.
Finally, future work entails the inclusion of intrin-
sic contextual factors in human behaviour in the
model. The intrinsic factors, when combined with lo-
cal information landscapes, may help to understand
the formation of attitude and intention as an anteced-
ent in InfoSec behaviour.
REFERENCES
Abubakar, A. M., Elrehail, H., Alatailat, M. A., & Elçi, A.
(2019). Knowledge management, decision-making style
and organizational performance. Journal of Innovation &
Knowledge, 4(2), 104-114.
Alotaibi, M. J., Furnell, S., & Clarke, N. (2019). A framework
for reporting and dealing with end-user security policy
compliance. Information & Computer Security, 27(1), 2-
25.
Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security
awareness campaigns: Why do they fail to change behav-
iour? In proceedings of the 1st International Conference
on Cyber Security for Sustainable Society, 118–131.
Barth, S., & de Jong, M. D. (2017). The privacy paradox –
Investigating discrepancies between expressed privacy
concerns and actual online behavior – A systematic liter-
ature review. Telematics and Informatics, 34(7), 1038-
1058.
Connolly, A. Y., Lang, M., Gathegi, J., & Tygar, D. J. (2017).
Organisational culture, procedural countermeasures, and
employee security behaviour: A qualitative study. Infor-
mation & Computer Security, 25(2), 118-136.
Cox, J. (2012). Information systems user security: A struc-
tured model of the knowing–doing gap. Computers in Hu-
man Behavior, 28(5), 1849-1858.
Cross, C. (2019). Is online fraud just fraud? Examining the ef-
ficacy of the digital divide. Journal of Criminological Re-
search, Policy and Practice, 5(2), 120-131.
Da Veiga, A., & Martins, N. (2017). Defining and identifying
dominant information security cultures and subcultures.
Computers & Security, 70, 72-94.
Diesch, R., Pfaff, M., & Krcmar, H. (2020). A comprehensive
model of information security factors for decision-mak-
ers. Computers & Security, 92(2020), 101-747.
Fertig, T., & Schütz, A. (2020). About the measuring of infor-
mation security awareness: A systematic literature review.
In proceedings of the 53rd Hawaii International Confer-
ence on System Sciences, Wailea-Makena, Hawaii, USA,
6518-6527.
Furnell, S., & Thomson, K.-L. (2009). Recognising and ad-
dressing ‘security fatigue’. Computer Fraud & Security,
2009(11), 7-11.
Hassandoust, F., & Techatassanasoontorn, A. A. (2020). Un-
derstanding users' information security awareness and in-
tentions: A full nomology of protection motivation theory.
Cyber Influence and Cognitive Threats (pp. 129-143):
Elsevier.
Jaeger, L., & Eckhardt, A. (2021). Eyes wide open: The role
of situational information security awareness for secu-
rity ‐ related behaviour. Information Systems Journal,
31(3), 429-472.
Kirova, V., & Thanh, T. V. (2019). Smartphone use during the
leisure theme park visit experience: The role of contextual
factors. Information & Management, 56(5), 742-753.
Lee, M., & Butler, B. S. (2019). How are information deserts
created? A theory of local information landscapes. Journal
of the Association for Information Science and Technol-
ogy, 70(2), 101-116.
Savolainen, R. (2021). Information landscapes as contexts of
information practices. Journal of Librarianship and Infor-
mation Science, 53(4), 655-667.
Snyman, D. P., & Kruger, H. A. (2021). Contextual factors in
information security group behaviour: A comparison of
two studies Communications in Computer and Infor-
mation Science (In press): Springer.
Vafaei-Zadeh, A., Thurasamy, R., & Hanifah, H. (2019).
Modeling anti-malware use intention of university stu-
dents in a developing country using the theory of planned
behavior. Kybernetes, 48(8), 1565-1585.
Wu, P. F., Vitak, J., & Zimmer, M. T. (2019). A contextual
approach to information privacy research. Journal of the
Association for Information Science and Technology,
7(41), 485-490.
Zhou, J. (2021). The role of libraries in distance learning dur-
ing COVID-19. Information Development, OnlineFirst,
1-12.