Information Security is More Than Just Policy; It is in Your Personality

被引:0
|
作者
Simola, Petteri [1 ]
Virtanen, Toni [1 ]
Sartonen, Miika [2 ]
机构
[1] Finnish Def Res Agcy, Human Performance Div, Riihimaki, Finland
[2] Finnish Def Res Agcy, Concepts & Doctrine Div, Riihimaki, Finland
关键词
Information security; personality; neutralisation; military cadets; big five; dark triad; NEUTRALIZATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It has been estimated that human factors (HF) account for 27% of data breaches on the global scale (Ponemon institute 2018). Even with clear and often strict policies in place, with clear sanctions, employees still are considered to be the weakest link in the field of information security (IS). This paper seeks to find one explanation to this phenomenon in military context by exploring military cadets' attitudes towards IS, as well as their reasons and justifications for using neutralisation techniques in order to transgress from organisational IS regulations. Neutralisation techniques offer a way of rendering existing norms inoperative by justifying behaviour that violates those norms (Rogers & Buffalo 1974; Sykes & Matza 1957). These techniques are as follows: Condemnation of the condemners, The Metaphor of the ledger, Denial of injury, Denial of responsibility, Appeal to higher loyalties and Defence of necessity. 144 military cadets completed a survey assessing their use of neutralisation techniques (Siponen & Vance 2010) in addition to assessing their personality by the Five Factor (Konstabel, et. al. 2012) and the Dark Triad (Jones & Paulhus, 2014) models of personality. The Dark Triad model supplements the Five Factor model with more sinister aspects of personality: Machiavellianism, Narcissism and Psychopathy, which are still considered to be sub-clinical. Even though the tendency to use neutralisation techniques was relatively low, there still was a significant correlation between personality traits and the use of neutralisation techniques. Those high in Machiavellianism (r. 0.19 - 0.4) and Neuroticism 0.23 - 0.4) were more likely to use these techniques whereas high scores on Conscientiousness (r. -0.18 - -0.27) and Extraversion (r. -0.27 - -0.42) decreased this likelihood. The results suggest that a more individualised approach in IS education could be useful. Understanding how one's personality can sensitise oneself to certain kinds of neutralisation techniques can help an individual to acknowledge his or her strengths and vulnerabilities in IS behaviour.
引用
收藏
页码:459 / 465
页数:7
相关论文
共 50 条
  • [1] The Parkinsonian Personality: More Than Just a "Trait"
    Luca, Antonina
    Nicoletti, Alessandra
    Mostile, Giovanni
    Zappia, Mario
    [J]. FRONTIERS IN NEUROLOGY, 2019, 9
  • [2] More than just a doctor: Working with your team
    Surveyer, Stephanie
    [J]. CANADIAN VETERINARY JOURNAL-REVUE VETERINAIRE CANADIENNE, 2020, 61 (02): : 187 - 188
  • [3] Is Your Utility Leaking More Than Just Water?
    Cox, Joel
    Ohrt, Andrew
    Walsh, Sarah
    Bartolucci, Bailey
    [J]. JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2021, 113 (06): : 85 - 87
  • [4] DOING MORE THAN JUST COVERING INFORMATION
    MOORE, R
    [J]. AMERICAN BIOLOGY TEACHER, 1993, 55 (05): : 260 - 261
  • [5] MORE THAN JUST IT - STRATEGIC INFORMATION MANAGEMENT
    STROMFELT, R
    [J]. ASLIB PROCEEDINGS, 1991, 43 (2-3): : 93 - 98
  • [6] OT Security: More than just a Marginal Issue
    Runde, Markus
    [J]. ATP MAGAZINE, 2022, (09): : 1 - 1
  • [7] Is avoidant personality disorder more than just social avoidance?
    Taylor, CT
    Laposa, JM
    Alden, LE
    [J]. JOURNAL OF PERSONALITY DISORDERS, 2004, 18 (06) : 571 - 594
  • [8] Get more than just the facts from your ISP
    Brown, E
    [J]. VETERINARY ECONOMICS, 1998, 39 (01): : 105 - 105
  • [9] Vitamin D: Feel It in More Than Just Your Bones!
    Cornfield, David N.
    [J]. AMERICAN JOURNAL OF RESPIRATORY CELL AND MOLECULAR BIOLOGY, 2020, 63 (01) : 11 - 12
  • [10] NATIONAL-SECURITY - MORE THAN JUST WEAPONS PRODUCTION
    GLENN, JH
    [J]. ISSUES IN SCIENCE AND TECHNOLOGY, 1989, 5 (04) : 27 - 28