Neutralization Tendencies in Information Systems Security Violation
dc.contributor.author | King, Frank | |
dc.contributor.author | Paul, Souren | |
dc.date.accessioned | 2023-12-26T18:48:44Z | |
dc.date.available | 2023-12-26T18:48:44Z | |
dc.date.issued | 2024-01-03 | |
dc.identifier.doi | 10.24251/HICSS.2024.728 | |
dc.identifier.isbn | 978-0-9981331-7-1 | |
dc.identifier.other | 52c211bb-2781-472d-bda9-f20d1a683a66 | |
dc.identifier.uri | https://hdl.handle.net/10125/107113 | |
dc.language.iso | eng | |
dc.relation.ispartof | Proceedings of the 57th Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Dark Sides of Digitalization | |
dc.subject | neutralization | |
dc.subject | social influence | |
dc.subject | social pressure | |
dc.subject | security policy violation | |
dc.title | Neutralization Tendencies in Information Systems Security Violation | |
dc.type | Conference Paper | |
dc.type.dcmi | Text | |
dcterms.abstract | It is estimated that over half of all information systems security breaches are due directly or indirectly to employee’s poor security practices in organizations. This problem is considered the biggest threat to an organization because employees are trusted with the knowledge and privilege of organization’s resources. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. What has not been determine from extant information security research is an explanation that address why employees drift into a neutralization state in the first place. We propose an expansion of the neutralization model by including the effects of business orientation and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. | |
dcterms.extent | 10 pages | |
prism.startingpage | 6056 |
Files
Original bundle
1 - 1 of 1