What Drives Information Security Policy Violations among Banking Employees?: Insights from Neutralization and Social Exchange Theory
@article{Teh2015WhatDI, title={What Drives Information Security Policy Violations among Banking Employees?: Insights from Neutralization and Social Exchange Theory}, author={Pei-Lee Teh and Pervaiz Khalid Ahmed and John D'Arcy}, journal={J. Glob. Inf. Manag.}, year={2015}, volume={23}, pages={44-64} }
Employees' information security policy ISP violations are a major problem that plagues organizations worldwide, particularly in the banking/financial sector. Research shows that employees use neutralization techniques to rationalize their ISP violating behaviors; it is therefore important to understand what leads to and influences these neutralization techniques. The authors' study draws upon social exchange theory to develop a set of factors that drive employees' neutralization of ISP…
18 Citations
What Drives Information Security Policy Violations among Banking Employees ? : Insights from Neutralization and Social Exchange Theory
- Business
- 2016
This study examines the applicability of the Thong, Yap, and Raman (1996) model of information systems (IS) effectiveness tested among Singaporean small businesses in a Canadian context. The model…
Examining employee security violations: moral disengagement and its environmental influences
- Computer ScienceInf. Technol. People
- 2018
The results suggest that security policy awareness (PA) plays a central role in reducing MD of security policy violations and that the certainty of punishment and immediacy of enforcing penalties are instrumental toward reducing such MD; however, the higher severity of penalties does not have an influence.
Understanding Employee Information Security Policy Compliance from Role Theory Perspective
- BusinessJ. Comput. Inf. Syst.
- 2021
ABSTRACT Previous research indicated security-related stress at the workplace accounts for employee non-compliant behavior with information security policy (ISP). Drawing on the role theory, we…
Stakeholder perceptions of information security policy: Analyzing personal constructs
- Computer Science, BusinessInt. J. Inf. Manag.
- 2020
Organizational information security policies: a review and research framework
- Computer Science, BusinessEur. J. Inf. Syst.
- 2017
A research framework is outlined that synthesizes the construct linkages within the current literature and identifies a series of gaps and draw on additional theoretical perspectives to propose a revised framework that can be used as a basis for future research.
Combatting the Neutralization of Security Policy Violations: Insights from the Healthcare Sector
- Computer ScienceECIS
- 2021
A theoretical model linking the quality of relational ties to coping responses and information security policy violations is proposed and evidence that factors like sharing the same goal and mutual respect can significantly reduce the usage of neutralization techniques is provided.
The role of abusive supervision and organizational commitment on employees' information security policy noncompliance intention
- BusinessInternet Res.
- 2020
It is demonstrated that abusive supervision has a significant, negative impact on affective, normative and continuance commitment, and the three dimensions of organizational commitment are negatively associated with employees' ISP noncompliance intention.
Factors Affecting Employee Intentions to Comply With Password Policies
- Computer Science
- 2019
Examination of the relationship between employees’ attitudes towards password policies, information security awareness, password self-efficacy, and employee intentions to comply with password policies suggested that a reduction in security breaches may promote more public confidence in organizational information systems.
"I do it because they do it": Social-Neutralisation in Information Security Practices of Saudi Medical Interns
- BusinessCRiSIS
- 2019
It is found that trust between medical team members is an essential social facilitator that motivates MI’s to invoke neutralisation techniques to justify violating ISP policies and controls.
Escalation of commitment as an antecedent to noncompliance with information security policy
- BusinessInf. Comput. Secur.
- 2018
This study is the first to tackle escalation of commitment theories and use antecedents that explain the effect of lost assets, such as time, effort and other resources can also explain noncompliance with ISP in terms of the value conflicts, where employees would often choose to forego compliance at the expense of finishing their tasks.
References
SHOWING 1-10 OF 55 REFERENCES
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations
- Computer ScienceMIS Q.
- 2010
This article shows that neutralization theory, a theory prominent in Criminology but not yet applied in the context of IS, provides a compelling explanation for IS security policy violations and offers new insight into how employees rationalize this behavior.
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- BusinessMIS Q.
- 2010
The results show that an employee's intention to comply with the ISP is significantly influenced by attitude, normative beliefs, and self-efficacy to comply, and the role of ISA and compliance-related beliefs in an organization's efforts to encourage compliance is shed.
Employees' adherence to information security policies: An exploratory field study
- Computer ScienceInf. Manag.
- 2014
Security culture and the employment relationship as drivers of employees' security compliance
- BusinessInf. Manag. Comput. Secur.
- 2014
The results provide empirical support for security culture as a driver of employees’ security compliance in the workplace and provide one of the few empirical validations of security culture.
Protection motivation and deterrence: a framework for security policy compliance in organisations
- Business, Computer ScienceEur. J. Inf. Syst.
- 2009
An Integrated Protection Motivation and Deterrence model of security policy compliance under the umbrella of Taylor-Todd's Decomposed Theory of Planned Behaviour is developed and it is found that employees in the sample underestimate the probability of security breaches.
Don't make excuses! Discouraging neutralization to reduce IT policy violation
- LawComput. Secur.
- 2013
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
- BusinessEur. J. Inf. Syst.
- 2009
The proposed theoretical model is a theoretical model that explains non-compliance in terms of moral reasoning and values and integrates two well-known psychological theories: the Theory of Cognitive Moral Development by Kohlberg and the theory of Motivational Types of Values by Schwartz.
Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study
- Computer ScienceMIS Q.
- 2010
This study proposes a training program based on two theories: the universal constructive instructional theory and the elaboration likelihood model and validate the training program for IS security policy compliance training through an action research project.
Unethical Information Security Behavior and Organizational Commitment
- Business
- 2012
In this article, we investigate the relationships between unethical behaviors from the viewpoint of information security and organizational commitment by using micro data collected from the survey…
Variables influencing information security policy compliance: A systematic review of quantitative studies
- BusinessInf. Manag. Comput. Secur.
- 2014
A systematic review of empirical studies described in extant literature found 29 studies meeting its inclusion criterion and identified variables that influence compliance with information security policies of organizations and how important these variables are.