ANALYSIS OF THE USE OF NEUTRALISATION TECHNIQUES IN VIOLATIONS OF INFORMATION SECURITY

被引:0
|
作者
Matotek, Darko [1 ]
机构
[1] Fak Organ Informat Varazdin, Varazhdin, Croatia
来源
EKONOMSKI VJESNIK | 2012年 / 25卷 / 01期
关键词
Information security; password; theory of neutralisation;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Neutralisation theory was postulated in 1957 in the field of criminology. The theory explains the behaviour of individuals who violate rules and regulations but do not see themselves as violators. They find justification for their acts in certain techniques and by doing so renounce their responsibility in a way. Using a questionnaire, a hypothetic scenario and intensity questions, this paper examines whether individuals apply neutralisation techniques to their behaviour with respect to violations of information security regulations. The second part of the questionnaire examines respondents' understanding of the term strong password, as well as of safe ways of password handling.
引用
收藏
页码:182 / 193
页数:6
相关论文
共 50 条
  • [1] Analysis techniques for information security
    Datta, Anupam
    Jha, Somesh
    Li, Ninghui
    Melski, David
    Reps, Thomas
    Synthesis Lectures on Information Security, Privacy, and Trust, 2010, 2 (01): : 1 - 164
  • [2] RELATIONSHIP TO INDIVIDUAL INFORMATION SECURITY POLICY VIOLATIONS
    Cappellozza, Alexandre
    da Silva, Camila Bernardo
    Medeiros, Luciana Arantes
    de Moraes, Gustavo Herminio Salati Marcondes
    Perez, Gilberto
    INFORMACAO & SOCIEDADE-ESTUDOS, 2022, 32
  • [3] Information Security:A review of information security issues and techniques
    Alkhudhayr, Fatimah
    Alfarraj, Shouq
    Aljameeli, Buthina
    Elkhdiri, Salim
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [4] Optical Techniques for Information Security
    Matoba, Osamu
    Nomura, Takanori
    Perez-Cabre, Elisabet
    Millan, Maria S.
    Javidi, Bahram
    PROCEEDINGS OF THE IEEE, 2009, 97 (06) : 1128 - 1148
  • [5] The effects of multilevel sanctions on information security violations: A mediating model
    Guo, Ken H.
    Yuan, Yufei
    INFORMATION & MANAGEMENT, 2012, 49 (06) : 320 - 326
  • [6] Dispositional and situational factors: influences on information security policy violations
    Johnston, Allen C.
    Warkentin, Merrill
    McBride, Maranda
    Carter, Lemuria
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2016, 25 (03) : 231 - 251
  • [7] The role of ethical climates in employee information security policy violations
    Yazdanmehr, Adel
    Jawad, Muhammad
    Benbunan-Fich, Raquel
    Wang, Jingguo
    DECISION SUPPORT SYSTEMS, 2024, 177
  • [8] Statistical analysis of security violations in computer software
    Mishra, S
    Gui, SX
    COMPUTERS AND THEIR APPLICATIONS, 2001, : 78 - 81
  • [9] Analysis of Age of Information Threshold Violations
    Franco, Antonio
    Landfeldt, Bjorn
    Korner, Ulf
    MSWIM'19: PROCEEDINGS OF THE 22ND INTERNATIONAL ACM CONFERENCE ON MODELING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2019, : 162 - 171
  • [10] Information-Driven Security Analysis: Tools and Techniques for the Study and Practice of Security Engineering
    Whitmore, Jim
    COMPUTER, 2023, 56 (06) : 107 - 120