2017
DOI: 10.1016/j.im.2017.02.007
|View full text |Cite
|
Sign up to set email alerts
|

A new perspective on neutralization and deterrence: Predicting shadow IT usage

Abstract: A B S T R A C TThis study examines the role of neutralization and deterrence in discouraging employees from using Shadow IT: tools, services and systems used in an organization but not authorized by the IT department.Our study provides a unique contribution to the IT security literature by studying effects of neutralization on both intentions (self-reported) and actual behavior, as well as examining the role of shame as a mediator. We surveyed employees from four organizations and found that the "metaphor of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

6
52
0
5

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 75 publications
(63 citation statements)
references
References 62 publications
(148 reference statements)
6
52
0
5
Order By: Relevance
“…Chan et al [9] detail ISP compliance as "core information security activities that need to be carried out by individuals to maintain information security as defined by ISP ". Thus, an internal security threat exists when an employee with legitimate access to the organisation's IT assets fails to comply with the organisation's ISPs [29]. In an effort to improve individual compliance and reduce undesirable behaviours, information security scholars have published a large number of studies that incorporate theories from sociology, criminology, psychology and other disciplines to achieve a deeper understanding of the antecedents of ISP non-compliance triggers [13,12].…”
Section: Information Security Policy Compliance and Privacy Protectionmentioning
confidence: 99%
“…Chan et al [9] detail ISP compliance as "core information security activities that need to be carried out by individuals to maintain information security as defined by ISP ". Thus, an internal security threat exists when an employee with legitimate access to the organisation's IT assets fails to comply with the organisation's ISPs [29]. In an effort to improve individual compliance and reduce undesirable behaviours, information security scholars have published a large number of studies that incorporate theories from sociology, criminology, psychology and other disciplines to achieve a deeper understanding of the antecedents of ISP non-compliance triggers [13,12].…”
Section: Information Security Policy Compliance and Privacy Protectionmentioning
confidence: 99%
“…O termo shadow IT, apesar de não ser recente, ainda carece de um conceito largamente aceito e um entendimento do que é o fenômeno e de como ele se apresenta nas organizações. O tópico pode ser considerado, então, relativamente inexplorado e o conhecimento atual ainda é limitado (e.g., Silic et al, 2017;Haag & Eckhartd, 2017…”
Section: Revisão De Literaturaunclassified
“…O lado negativo da shadow IT, contudo, persiste apesar dos potenciais benefícios. Muitos funcionários não estão cientes de que a shadow IT está violando as políticas de TI da empresa e colocando em risco a segurança da informação organizacional (Walter, 2013;Silic & Back, 2014;Silic et al, 2017). O risco a segurança, assim, figura entre as principais preocupações citadas na literatura (e.g., Silic & Back, 2014).…”
Section: Consequências Do Uso De Shadow It Para Os Indivíduos E Organunclassified
See 2 more Smart Citations