RELATIONSHIP TO INDIVIDUAL INFORMATION SECURITY POLICY VIOLATIONS

被引:0
|
作者
Cappellozza, Alexandre [1 ,2 ]
da Silva, Camila Bernardo [3 ,4 ]
Medeiros, Luciana Arantes [4 ]
de Moraes, Gustavo Herminio Salati Marcondes [3 ]
Perez, Gilberto [5 ]
机构
[1] Atitus Educ, Programa Posgrad Adm Empresas, Navegantes, Brazil
[2] Univ Presbiteriana Mackenzie, Programa Mestrado Profiss Adm Desenvolvimento Nego, Sao Paulo, Brazil
[3] Ctr Univ Fac Metropolitanas Unidas FMU, Escola Negocios & Hosp, Sao Paulo, Brazil
[4] Univ Metodista Sao Paulo, Sao Paulo, Brazil
[5] Univ Presbiteriana Mackenzie UPM, Sao Paulo, Brazil
关键词
Moral disengagement; Technological skill; Information security; Policy violation; Authentic leadership; Penalties;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
There is no doubt that Information and Communication Technology is essential for organizations' performance and that it also affects the productivity of employees. However, the improper use of technology can cause irreversible problems for organizations, such as violating information security policies. This study aims to investigate the antecedents that may impact the misuse of information systems, particularly those that may cause the violation of information security policies. To this end, the work was conducted through a quantitative survey with 456 users of organizational technologies. For the study's hypothesis tests, the analysis of structural equations was performed, according to the proposed research model. It was confirmed that Moral Disengagement had a positive effect on the Intention to Violate Organizational Information Security Policy, with the Moral Justification dimension showing the most significant effect, followed by the Euphemism dimension. Technological Skill and Authentic Leadership have not been confirmed as factors that influence the Violation of Information Security Policies.
引用
收藏
页数:37
相关论文
共 50 条
  • [21] More than the individual: Examining the relationship between culture and Information Security Awareness
    Wiley, Ashleigh
    McCormac, Agata
    Calic, Dragana
    COMPUTERS & SECURITY, 2020, 88 (88)
  • [22] Policy specification and enforcement for detection of security violations in a mail service
    Murali, A.
    Rao, M.
    ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 172 - +
  • [23] A Rigorous Approach to Uncovering Security Policy Violations in UML Designs
    Yu, Lijun
    France, Robert
    Ray, Indrakshi
    Ghosh, Sudipto
    2009 14TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2009, : 126 - 135
  • [24] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    AMCIS 2012 PROCEEDINGS, 2012,
  • [25] Information security policy architecture
    Alam, Mehtab
    Bokhari, M. U.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 120 - +
  • [26] INFORMATION SECURITY POLICY CREATING
    Koziel, Grzegorz
    ACTUAL PROBLEMS OF ECONOMICS, 2011, (126): : 376 - 380
  • [27] The effects of multilevel sanctions on information security violations: A mediating model
    Guo, Ken H.
    Yuan, Yufei
    INFORMATION & MANAGEMENT, 2012, 49 (06) : 320 - 326
  • [28] Individual differences and Information Security Awareness
    McCormac, Agata
    Zwaans, Tara
    Parsons, Kathryn
    Calic, Dragana
    Butavicius, Marcus
    Pattinson, Malcolm
    COMPUTERS IN HUMAN BEHAVIOR, 2017, 69 : 151 - 156
  • [29] Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
    Kraemer, Sara
    Carayon, Pascale
    APPLIED ERGONOMICS, 2007, 38 (02) : 143 - 154
  • [30] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602