ANALYSIS OF THE USE OF NEUTRALISATION TECHNIQUES IN VIOLATIONS OF INFORMATION SECURITY

被引:0
|
作者
Matotek, Darko [1 ]
机构
[1] Fak Organ Informat Varazdin, Varazhdin, Croatia
来源
EKONOMSKI VJESNIK | 2012年 / 25卷 / 01期
关键词
Information security; password; theory of neutralisation;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Neutralisation theory was postulated in 1957 in the field of criminology. The theory explains the behaviour of individuals who violate rules and regulations but do not see themselves as violators. They find justification for their acts in certain techniques and by doing so renounce their responsibility in a way. Using a questionnaire, a hypothetic scenario and intensity questions, this paper examines whether individuals apply neutralisation techniques to their behaviour with respect to violations of information security regulations. The second part of the questionnaire examines respondents' understanding of the term strong password, as well as of safe ways of password handling.
引用
收藏
页码:182 / 193
页数:6
相关论文
共 50 条
  • [21] Prioritizing Information Flow Violations: Generation of Ranked Security Assertions for Hardware Designs
    Ayalasomayajula, Avinash
    Farzana, Nusrat
    Pal, Debjit
    Farahmandi, Farimah
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 128 - 138
  • [22] Meta-analysis of network information security and Web data mining techniques
    Wu, Dongling
    Shan, Shaolong
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INFORMATION SCIENCES, MACHINERY, MATERIALS AND ENERGY (ICISMME 2015), 2015, 126 : 1974 - 1977
  • [23] Neutralization: New insights into the problem of employee information systems security policy violations
    Siponen M.
    Vance A.
    MIS Quarterly: Management Information Systems, 2010, 34 (SPEC. ISSUE 3): : 487 - 502
  • [24] ANALYSIS OF THE SECURITY OF LINEAR BLINDING TECHNIQUES FROM AN INFORMATION THEORETICAL POINT OF VIEW
    Bianchi, Tiziano
    Piva, Alessandro
    Barni, Mauro
    2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2011, : 5852 - 5855
  • [25] Exploring Personal and Environmental Factors that Can Reduce Nonmalicious Information Security Violations
    Ifinedo, Princely
    INFORMATION SYSTEMS MANAGEMENT, 2023, 40 (04) : 316 - 336
  • [26] An examination of factors that influence the number of information security policy violations in Qatari organizations
    Al-Mukahal, Hasan M.
    Alshare, Khaled
    INFORMATION AND COMPUTER SECURITY, 2015, 23 (01) : 102 - 118
  • [27] MULTIVARIATE TECHNIQUES IN LAND USE STUDIES - CASE OF INFORMATION ANALYSIS
    ALEXANDE.IC
    REGIONAL STUDIES, 1972, 6 (01) : 93 - 103
  • [28] Information security based on soft computing techniques
    Siripanwattana, Witaya
    Srinoy, Surat
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 271 - 275
  • [29] Huge information extraction techniques of Data Security
    Mylavarapu, Raghu T.
    Mylavarapu, Bharadwaja Krishnadev
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 179 - 183
  • [30] Discussion on Information Security Techniques Curriculum Construction
    Sun, Nigang
    Zheng, Hong
    Li, Jianhua
    Guo, Weibin
    ICFCSE 2011: 2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SUPPORTED EDUCATION, VOL 1, 2011, : 182 - 184