ANALYSIS OF THE USE OF NEUTRALISATION TECHNIQUES IN VIOLATIONS OF INFORMATION SECURITY

被引:0
|
作者
Matotek, Darko [1 ]
机构
[1] Fak Organ Informat Varazdin, Varazhdin, Croatia
来源
EKONOMSKI VJESNIK | 2012年 / 25卷 / 01期
关键词
Information security; password; theory of neutralisation;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Neutralisation theory was postulated in 1957 in the field of criminology. The theory explains the behaviour of individuals who violate rules and regulations but do not see themselves as violators. They find justification for their acts in certain techniques and by doing so renounce their responsibility in a way. Using a questionnaire, a hypothetic scenario and intensity questions, this paper examines whether individuals apply neutralisation techniques to their behaviour with respect to violations of information security regulations. The second part of the questionnaire examines respondents' understanding of the term strong password, as well as of safe ways of password handling.
引用
收藏
页码:182 / 193
页数:6
相关论文
共 50 条
  • [31] Data mining techniques for information security applications
    Al-Shawi, Amany
    WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 221 - 229
  • [32] INFORMATION TECHNIQUES AND CRIME - FORMS AND SECURITY MEASURES
    POERTING, P
    BETRIEBSWIRTSCHAFTLICHE FORSCHUNG UND PRAXIS, 1990, 42 (03): : 177 - 187
  • [33] On Information Theoretic Security: Mathematical Models and Techniques
    Csiszar, Imre
    INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 73 - 75
  • [34] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
  • [35] The use of business process modelling in information systems security analysis and design
    Kokolakis, S.A.
    Demopoulos, A.J.
    Kiountouzis, E.A.
    Information Management and Computer Security, 2000, 8 (03): : 107 - 116
  • [36] A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
    Zegzhda, P. D.
    Poltavtseva, M. A.
    Pechenkin, A. I.
    Lavrova, D. S.
    Zaitseva, E. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 918 - 930
  • [37] Analysis of Security Testing Techniques
    Bin Tauqeer, Omer
    Jan, Sadeeq
    Khadidos, Alaa Omar
    Khadidos, Adil Omar
    Khan, Fazal Qudus
    Khattak, Sana
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 29 (01): : 291 - 306
  • [38] "I do it because they do it": Social-Neutralisation in Information Security Practices of Saudi Medical Interns
    Altamimi, Saad
    Renaud, Karen
    Storer, Timothy
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2019), 2020, 12026 : 227 - 243
  • [39] Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures
    Vance, Anthony
    Siponen, Mikko T.
    Straub, Detmar W.
    INFORMATION & MANAGEMENT, 2020, 57 (04)
  • [40] Exploring the factors influencing information security policy compliance and violations: A systematic literature review
    Balagopal, N.
    Mathew, Saji K.
    COMPUTERS & SECURITY, 2024, 147