New Insights into the Justifiability of Organizational Information Security Policy Noncompliance: A Case Study

dc.contributor.author Soliman, Wael
dc.contributor.author Mohammadnazar, Hojat
dc.date.accessioned 2021-12-24T18:22:09Z
dc.date.available 2021-12-24T18:22:09Z
dc.date.issued 2022-01-04
dc.description.abstract Information security policies as apparatus for communicating security principles with employees are the cornerstone of organizational information security. Resultantly, extant literature has looked at different theories to better understand the noncompliance problem. Neutralization theory is emerging as one of the most popular approaches, not only as an explanation but also as a solution. In this in-depth qualitative study, we ask the question ‘how do employees justify violating the ISP’? Our findings reveal nine rationalizing techniques, three of which have not been recognized in previous research. We label them ‘I follow my own rules’, ‘matter of mere legality’ and ‘defense of uniqueness’. But more importantly, our in-depth insights point to the danger of taking these rationalizations out of context, since without context, it becomes impossible to judge whether the behavior or the rule, needs correcting, reflecting a dilemma recognized in the original writing of neutralization theory, which has since been forgotten.
dc.format.extent 10 pages
dc.identifier.doi 10.24251/HICSS.2022.823
dc.identifier.isbn 978-0-9981331-5-7
dc.identifier.uri http://hdl.handle.net/10125/80163
dc.language.iso eng
dc.relation.ispartof Proceedings of the 55th Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security Operations
dc.subject case study
dc.subject isp noncompliance
dc.subject isp violation
dc.subject neutralization theory
dc.title New Insights into the Justifiability of Organizational Information Security Policy Noncompliance: A Case Study
dc.type.dcmi text
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
0665.pdf
Size:
345.34 KB
Format:
Adobe Portable Document Format
Description: