Neutralization Tendencies in Information Systems Security Violation

dc.contributor.authorKing, Frank
dc.contributor.authorPaul, Souren
dc.date.accessioned2023-12-26T18:48:44Z
dc.date.available2023-12-26T18:48:44Z
dc.date.issued2024-01-03
dc.identifier.doi10.24251/HICSS.2024.728
dc.identifier.isbn978-0-9981331-7-1
dc.identifier.other52c211bb-2781-472d-bda9-f20d1a683a66
dc.identifier.urihttps://hdl.handle.net/10125/107113
dc.language.isoeng
dc.relation.ispartofProceedings of the 57th Hawaii International Conference on System Sciences
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectDark Sides of Digitalization
dc.subjectneutralization
dc.subjectsocial influence
dc.subjectsocial pressure
dc.subjectsecurity policy violation
dc.titleNeutralization Tendencies in Information Systems Security Violation
dc.typeConference Paper
dc.type.dcmiText
dcterms.abstractIt is estimated that over half of all information systems security breaches are due directly or indirectly to employee’s poor security practices in organizations. This problem is considered the biggest threat to an organization because employees are trusted with the knowledge and privilege of organization’s resources. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. What has not been determine from extant information security research is an explanation that address why employees drift into a neutralization state in the first place. We propose an expansion of the neutralization model by including the effects of business orientation and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy.
dcterms.extent10 pages
prism.startingpage6056

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
0593.pdf
Size:
1.29 MB
Format:
Adobe Portable Document Format