  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/3591</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>An Empirical Investigation on the Origins and Effects of Cybersecurity Culture in It Organizations</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Department of CSE, Dhanekula Institute of Engineering &amp; Technology, Ganguru, Vijayawada, A.P, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>D.</given_name>
    <surname>D.</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of CSE, Jawaharlal Nehru Technological University, Kakinada, Andhra pradesh, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ravi Kiran</given_name>
    <surname>Koppolu</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of CSE, Prasad V Potluri Siddhartha Institute of Technology, Vijaywada, Andhra pradesh, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>D. Lokesh Sai</given_name>
    <surname>Kumar</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of CSE, SR Gudlavalleru Engineering College, Gudlavalleru, Krishna Dt., Andhra pradesh, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Tenali</given_name>
    <surname>Nagamani</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of EEE, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Tiruvallur, Chennai, Tamilnadu, 602105, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>P.</given_name>
    <surname>Muthukumar</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of CSE, Vel Tech Rangarajan Dr.Sagunthala R&amp;D Institute of Science and Technology, Avadi, Chennai, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>S.</given_name>
    <surname>Lalitha</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>This observe investigates the reasons and effects of cybersecurity way of life in IT agencies. Given the developing threats to cybersecurity and the essential role that organizational lifestyle plays in decreasing these risks, it's miles essential to realise the connection that exists among policy elements, employee conduct, and cyber security overall performance. By concentrating at the connections between distinct factors impacting cybersecurity culture and there have an effect on the efficacy of cyber security measures, the examine fills in gaps in empirical studies. This take a look act’s principal purpose is to behaviour an empirical investigation into the methods that many sides of cyber security culture, along with policy concerns, employee behaviour, and cyber security attention, have an effect on how properly cyber security measures work in IT companies. The studies in particular examines 3 hypotheses: (1) that coverage factors positively correlate with usual effectiveness; (2) that cyber security attention and engagement in preventive measures are predictively correlated; and (three) that behavioural worries are undoubtedly correlated with the implementation of powerful cyber security measures. Data had been collected the usage of a pass-sectional survey the use of a quantitative studies method. A stratified random pattern strategy became used inside the studies to select 100 IT employees from special corporations. A systematic questionnaire overlaying coverage variables, behavioural worries, cyber security recognition, preventative measures, and the perceived efficacy of cyber security strategies become used to collect information. The conclusions of the primary records had been in addition supported and given that means with the aid of secondary information taken from organizational reviews and already published literature. An enormous wonderful connection was discovered in the research between coverage variables and cyber security measures' efficacy, suggesting that robust regulations enhance cyber security overall performance as a whole. It has been proven that employee participation in preventative actions is extensively anticipated by cyber security recognition. The adoption of successful cyber security tactics turned into strongly correlated with behavioural issues. Aside from declaring regions where cyber security lifestyle needs to be stepped forward, the research additionally found gaps in preventative measures' efficacy. The study emphasizes how crucial it is to have clear policy guidelines and raise awareness of cyber security issues in order to encourage efficient cyber security practices in IT companies. The results provide insightful information on the dynamics of cyber security culture and offer doable recommendations for improving cyber security procedures and guidelines. Organizations may enhance their cyber security frameworks and strengthen their Defences against emerging threats by filling up the holes found in the report.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>68</first_page>
   <last_page>85</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.160106</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/3591</resource>
  </doi_data>
 </journal_article>
</journal>
