Antecedent factors of violation of information security rules

被引:0
|
作者
Cappellozza, Alexandre [1 ]
Salati Marcondes de Moraes, Gustavo Herminio [2 ]
Perez, Gilberto [1 ]
Simoes, Alessandra Lourenco [3 ]
机构
[1] Univ Presbiteriana Mackenzie, Ctr Ciencias Sociais & Aplicadas, Sao Paulo, Brazil
[2] Univ Estadual Campinas, Fac Ciencias Aplicadas, Limeira, Brazil
[3] Univ Metodista Sao Paulo, Sao Bernardo Do Campo, Brazil
来源
RAUSP MANAGEMENT JOURNAL | 2022年 / 57卷 / 01期
关键词
Security; Technology; Violation of information security; Moral disengagement; Information; Structural equation modeling; Neural networks; MORAL DISENGAGEMENT; TURNOVER INTENTION; PRIVACY CONCERNS; WORK ENGAGEMENT; PROTECTION; PARADOX;
D O I
10.1108/RAUSP-02-2021-0022
中图分类号
F [经济];
学科分类号
02 ;
摘要
Purpose - This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established security rules. Design/methodology/approach - The method used involves two stages of analysis, using techniques of structural equation modeling and artificial intelligence with neural networks, based on information collected from 318 workers of organizational information systems. Findings - The model provides a reasonable prediction regarding the intention to violate information security policies (ISP). The results revealed that the relationships of moral disengagement and perceived penalty significantly influence such an intention. Research limitations/implications - This research presents a multi-analytical approach that expands the robustness of the results by the complementarity of each analysis technique. In addition, it offers scientific evidence of the factors that reinforce the cognitive processes that involve workers' decision-making in security breaches. Practical implications - The practical recommendation is to improve organizational communication to mitigate information security vulnerabilities in several ways, namely, training actions that simulate daily work routines; exposing the consequences of policy violations; disseminating internal newsletters with examples of inappropriate behavior. Social implications - Results indicate that information security does not depend on the employees' commitment to the organization; system vulnerabilities can be explored even by employees committed to the companies. Originality/value - The study expands the knowledge about the individual factors that make information security in companies vulnerable, one of the few in the literature which aims to offer an in-depth perspective on which individual antecedent factors affect the violation of ISP.
引用
收藏
页码:84 / 101
页数:18
相关论文
共 50 条
  • [1] Information Security Behavior in Health Information Systems: A Review of Research Trends and Antecedent Factors
    Sari, Puspita Kencana
    Handayani, Putu Wuri
    Hidayanto, Achmad Nizar
    Yazid, Setiadi
    Aji, Rizal Fathoni
    [J]. HEALTHCARE, 2022, 10 (12)
  • [2] Antecedent of reactions to norm violation: Intergroup emotions or contextual factors
    Siddiqui, Roomana
    [J]. INTERNATIONAL JOURNAL OF PSYCHOLOGY, 2012, 47 : 711 - 712
  • [3] Rules in information sharing for security
    Chan, Janet
    Logan, Sarah
    Bennett Moses, Lyria
    [J]. CRIMINOLOGY & CRIMINAL JUSTICE, 2022, 22 (02) : 304 - 322
  • [4] Escalation of commitment as an antecedent to noncompliance with information security policy
    Kajtazi, Miranda
    Cavusoglu, Hasan
    Benbasat, Izak
    Haftor, Darek
    [J]. INFORMATION AND COMPUTER SECURITY, 2018, 26 (02) : 171 - 193
  • [5] RULES OF VIOLATION OF THE RULES
    Bayburin, A.
    [J]. ETHNOLINGUISTIC EXPLORATIONS OF THE SERBIAN AND OTHER SLAVIC LANGUAGES, 2008, : 51 - 57
  • [6] Onlooker effect and affective responses in information security violation mitigation
    Farshadkhah, Sahar
    Van Slyke, Craig
    Fuller, Bryan
    [J]. COMPUTERS & SECURITY, 2021, 100
  • [7] Antecedent factors of the need for information regarding petrochemical complex hazards
    Tortosa-Edo, V.
    Lopez-Navarro, M. A.
    Llorens-Monzonis, J.
    [J]. JOURNAL OF RISK RESEARCH, 2016, 19 (02) : 135 - 152
  • [8] Security Violation Prevention: CPTED in the context of information Security Emergent Research Forum (ERF)
    Farshadkhah, Sahar
    Lee, Jaeung
    [J]. AMCIS 2018 PROCEEDINGS, 2018,
  • [9] ORGANIZATIONAL INFORMATION TECHNOLOGY MATURITY: ANTECEDENT FACTORS AND CONSEQUENT OUTCOMES
    Ragowsky, Arik
    Licker, Paul
    Gefen, David
    [J]. PROCEEDINGS OF THE SIXTEENTH INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE (ICEC 2014), 2014, : 86 - 86
  • [10] Global Information Security Factors
    White, Garry
    Long, Ju
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (02) : 49 - 60