Neutralization Tendencies in Information Systems Security Violation

Date

2024-01-03

Contributor

Advisor

Department

Instructor

Depositor

Speaker

Researcher

Consultant

Interviewer

Narrator

Transcriber

Annotator

Journal Title

Journal ISSN

Volume Title

Publisher

Volume

Number/Issue

Starting Page

6056

Ending Page

Alternative Title

Abstract

It is estimated that over half of all information systems security breaches are due directly or indirectly to employee’s poor security practices in organizations. This problem is considered the biggest threat to an organization because employees are trusted with the knowledge and privilege of organization’s resources. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. What has not been determine from extant information security research is an explanation that address why employees drift into a neutralization state in the first place. We propose an expansion of the neutralization model by including the effects of business orientation and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy.

Description

Keywords

Dark Sides of Digitalization, neutralization, social influence, social pressure, security policy violation

Citation

Extent

10 pages

Format

Geographic Location

Time Period

Related To

Proceedings of the 57th Hawaii International Conference on System Sciences

Related To (URI)

Table of Contents

Rights

Attribution-NonCommercial-NoDerivatives 4.0 International

Rights Holder

Local Contexts

Email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.