ANALYSIS OF THE USE OF NEUTRALISATION TECHNIQUES IN VIOLATIONS OF INFORMATION SECURITY

被引:0
|
作者
Matotek, Darko [1 ]
机构
[1] Fak Organ Informat Varazdin, Varazhdin, Croatia
来源
EKONOMSKI VJESNIK | 2012年 / 25卷 / 01期
关键词
Information security; password; theory of neutralisation;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Neutralisation theory was postulated in 1957 in the field of criminology. The theory explains the behaviour of individuals who violate rules and regulations but do not see themselves as violators. They find justification for their acts in certain techniques and by doing so renounce their responsibility in a way. Using a questionnaire, a hypothetic scenario and intensity questions, this paper examines whether individuals apply neutralisation techniques to their behaviour with respect to violations of information security regulations. The second part of the questionnaire examines respondents' understanding of the term strong password, as well as of safe ways of password handling.
引用
收藏
页码:182 / 193
页数:6
相关论文
共 50 条
  • [41] The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context
    Sarkar, Sumantra
    Vance, Anthony
    Ramesh, Balasubramaniam
    Demestihas, Menelaos
    Wu, Daniel Thomas
    INFORMATION SYSTEMS RESEARCH, 2020, 31 (04) : 1240 - 1259
  • [42] EXAMINING THE NEURAL BASIS OF INFORMATION SECURITY POLICY VIOLATIONS: A NONINVASIVE BRAIN STIMULATION APPROACH
    Turel, Ofir
    He, Qinghua
    Wen, Yatong
    MIS QUARTERLY, 2021, 45 (04) : 1715 - 1744
  • [43] Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations
    Siponen, Mikko
    Vance, Anthony
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2014, 23 (03) : 289 - 305
  • [44] Can peers help reduce violations of information security policies? The role of peer monitoring
    Yazdanmehr, Adel
    Wang, Jingguo
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2023, 32 (03) : 508 - 528
  • [45] Electronic footprint analysis and cluster analysis techniques for information security risk research of university digital systems
    Lakhno, Valerii
    Lakhno, Myroslav
    Makulov, Kaiyrbek
    Kryvoruchko, Olena
    Desiatko, Alona
    Chubaievskyi, Vitalii
    Ishchuk, Dmytro
    Kabylbekova, Viktoriya
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2024, 70 (02) : 405 - 412
  • [46] Deviant customer behaviour: A study of techniques of neutralisation
    Harris, Lloyd
    Daunt, Kate
    JOURNAL OF MARKETING MANAGEMENT, 2011, 27 (7-8) : 834 - 853
  • [47] The Use of an Information Security Vocabulary Test to Assess Information Security Awareness - An Exploratory Study
    Kruger, H. A.
    Drevin, L.
    Steyn, T.
    PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, : 13 - 22
  • [49] Visual information analysis for security
    Tao, Dacheng
    Yuan, Yuan
    Shen, Jialie
    Huang, Kaiqi
    Li, Xuelong
    SIGNAL PROCESSING, 2009, 89 (12) : 2311 - 2312
  • [50] Analysis of Information Security of Distributed Information Systems
    Grusho, Alexander
    Grusho, Nick
    Levykin, Michael
    Timonina, Elena
    2017 9TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2017, : 96 - 100