The paper proceeds as follows. The next section reviews relevant IS security literature, while the third section lays out the SRS concept and the theoretical foundation of the research. This is followed by the research model and hypotheses, and then the methodology and data analysis. The final section discusses the study’s findings, implications for research and practice, limitations, and future research