RELATIONSHIP TO INDIVIDUAL INFORMATION SECURITY POLICY VIOLATIONS

被引:0
|
作者
Cappellozza, Alexandre [1 ,2 ]
da Silva, Camila Bernardo [3 ,4 ]
Medeiros, Luciana Arantes [4 ]
de Moraes, Gustavo Herminio Salati Marcondes [3 ]
Perez, Gilberto [5 ]
机构
[1] Atitus Educ, Programa Posgrad Adm Empresas, Navegantes, Brazil
[2] Univ Presbiteriana Mackenzie, Programa Mestrado Profiss Adm Desenvolvimento Nego, Sao Paulo, Brazil
[3] Ctr Univ Fac Metropolitanas Unidas FMU, Escola Negocios & Hosp, Sao Paulo, Brazil
[4] Univ Metodista Sao Paulo, Sao Paulo, Brazil
[5] Univ Presbiteriana Mackenzie UPM, Sao Paulo, Brazil
关键词
Moral disengagement; Technological skill; Information security; Policy violation; Authentic leadership; Penalties;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
There is no doubt that Information and Communication Technology is essential for organizations' performance and that it also affects the productivity of employees. However, the improper use of technology can cause irreversible problems for organizations, such as violating information security policies. This study aims to investigate the antecedents that may impact the misuse of information systems, particularly those that may cause the violation of information security policies. To this end, the work was conducted through a quantitative survey with 456 users of organizational technologies. For the study's hypothesis tests, the analysis of structural equations was performed, according to the proposed research model. It was confirmed that Moral Disengagement had a positive effect on the Intention to Violate Organizational Information Security Policy, with the Moral Justification dimension showing the most significant effect, followed by the Euphemism dimension. Technological Skill and Authentic Leadership have not been confirmed as factors that influence the Violation of Information Security Policies.
引用
收藏
页数:37
相关论文
共 50 条
  • [31] What Drives Information Security Policy Violations among Banking Employees? Insights from Neutralization and Social Exchange Theory
    Teh, Pei-Lee
    Ahmed, Pervaiz K.
    D'Arcy, John
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2015, 23 (01) : 44 - 64
  • [32] Internalization of Information Security Policy and Information Security Practice: A Comparison with Compliance
    Park, Minjung
    Chai, Sangmi
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4723 - 4731
  • [33] Checking Network Security Policy Violations via Natural Language Questions
    Shi, Pinyi
    Song, Yongwook
    Fei, Zongming
    Griffioen, James
    30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [34] Using Accountability to Reduce Access Policy Violations in Information Systems
    Vance, Anthony
    Lowry, Paul Benjamin
    Eggett, Denis
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2013, 29 (04) : 263 - 289
  • [35] EXAMINING THE RELATIONSHIP BETWEEN INFORMATION SECURITY EFFECTIVENESS AND INFORMATION SECURITY THREATS
    Masrek, Mohamad Noorman
    Soesantari, Tri
    Khan, Asad
    Dermawan, Aang Kisnu
    INTERNATIONAL JOURNAL OF BUSINESS AND SOCIETY, 2020, 21 (03): : 1203 - 1214
  • [36] Information security policy -: what do international information security standards say?
    Höne, K
    Eloff, JHP
    COMPUTERS & SECURITY, 2002, 21 (05) : 402 - 409
  • [37] Information Security Culture Dimensions in Information Security Policy Compliance Study: A Review
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 943 - 946
  • [38] Installing an appropriate information security policy
    Gaunt, N
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 1998, 49 (01) : 131 - 134
  • [39] PFIRES: A policy framework for information security
    Rees, J
    Bandyopadhyay, S
    Spafford, EH
    COMMUNICATIONS OF THE ACM, 2003, 46 (07) : 101 - 106
  • [40] Ukrainian policy in the field of information security
    Pidbereznykh, Inna
    Koval, Oleg
    Solomin, Yevhen
    Kryvoshein, Vitaliy
    Plazova, Tetyana
    AMAZONIA INVESTIGA, 2022, 11 (60): : 206 - 213