2018
DOI: 10.1016/j.jisa.2017.11.001
|View full text |Cite
|
Sign up to set email alerts
|

Motivation and opportunity based model to reduce information security insider threats in organisations

Abstract: Rossouw (2018) Motivation and opportunity based model to reduce information security insider threats in organisations. A note on versions:The version presented here may differ from the published version or, version of record, if you wish to cite this item you are advised to consult the publisher's version. Please see the 'permanent WRAP URL' above for details on accessing the published version and note that access may require a subscription.For more information, please contact the WRAP Team at: wrap@warwick.a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
1
4

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 78 publications
(63 citation statements)
references
References 39 publications
0
58
1
4
Order By: Relevance
“…Theory of planned behavior The theory says that the attitude toward the behavior and subjective norms form an individual's behavioral intentions and actions 3,30,31 Neutralization theory Neutralization theory is a psychological method for people to turn off "inner resistance" when they perform or are about to perform something that they perceive as ethically wrong 3 Learning theory Learning theory explains how information is understood, treated, and retained by participants during the learning process 3 Protection motivation theory The protection motivation theory argues that people guard themselves based on four factors: (a) the perceived severity of an event and the occurrence; (b) vulnerability of the person; (c) the person's ability for the preventive behavior; and (d) believe in his ability to protect 3,30 General deterence theory General Deterrence is a plan designed to deter an opponent from taking actions which are not yet initiated or in another case to prevent people from performing actions that opponent wants them to do 30 Social learning theory Social Learning Theory asserts that people acquire knowledge from one another, via perception, memory, and modeling 30 Social bonding theory Social bond theory is used to explain social issues. Factors of social bonding comprise an attachment to families, devotion to social norms and institutions, engagement in activities, and the faith that these things are essential [30][31][32] General strains theory Innovation happens when community stresses culturally acceptable goals but at the same time provides insufficient opportunity to accomplish these goals with the legal institutionalized means. People finding themselves in financial strain may find a solution of crime in order to achieve goals 30 Organizational injustice If the leaders of the institution are authoritarian, their effort to solve the problems may be ineffective due to many reasons and may increase organizational stress and efficiency of the employees.…”
Section: Theory Explanation Referencesmentioning
confidence: 99%
“…Theory of planned behavior The theory says that the attitude toward the behavior and subjective norms form an individual's behavioral intentions and actions 3,30,31 Neutralization theory Neutralization theory is a psychological method for people to turn off "inner resistance" when they perform or are about to perform something that they perceive as ethically wrong 3 Learning theory Learning theory explains how information is understood, treated, and retained by participants during the learning process 3 Protection motivation theory The protection motivation theory argues that people guard themselves based on four factors: (a) the perceived severity of an event and the occurrence; (b) vulnerability of the person; (c) the person's ability for the preventive behavior; and (d) believe in his ability to protect 3,30 General deterence theory General Deterrence is a plan designed to deter an opponent from taking actions which are not yet initiated or in another case to prevent people from performing actions that opponent wants them to do 30 Social learning theory Social Learning Theory asserts that people acquire knowledge from one another, via perception, memory, and modeling 30 Social bonding theory Social bond theory is used to explain social issues. Factors of social bonding comprise an attachment to families, devotion to social norms and institutions, engagement in activities, and the faith that these things are essential [30][31][32] General strains theory Innovation happens when community stresses culturally acceptable goals but at the same time provides insufficient opportunity to accomplish these goals with the legal institutionalized means. People finding themselves in financial strain may find a solution of crime in order to achieve goals 30 Organizational injustice If the leaders of the institution are authoritarian, their effort to solve the problems may be ineffective due to many reasons and may increase organizational stress and efficiency of the employees.…”
Section: Theory Explanation Referencesmentioning
confidence: 99%
“…Neste grupo, é possível citar vandalismo virtual, disseminação de vírus ou softwares maliciosos, ataques de negação de serviço, falsificação de endereços na Internet e envio de spam ou mensagens eletrônicas indesejadas (Burden & Palmer, 2003). Os meios utilizados para o crime, os danos provocados, a natureza das ações e suas motivações são fatores adicionais para classificação do crime cibernético (Safa, Maple, Watson & Von Solms, 2018).…”
Section: Revisão Da Literatura O Crime Cibernéticounclassified
“…Roratto e Dias (2014) definem vulnerabilidade como uma fraqueza dos sistemas de informação e do ambiente no qual estes estão inseridos, e esta fraqueza pode se tornar um risco de segurança. Neste sentido, a falta de consciência sobre ameaças eminentes denota um comportamento desalinhado com preceitos da segurança cibernética (Safa, Maple, Watson & Von Solms, 2018). A gestão da segurança cibernética, portanto, deve focar neste comportamento, considerando causas e consequências, pois o sucesso ou insucesso da organização depende daquilo que seus membros fazem ou deixam de fazer.…”
Section: Revisão Da Literatura O Crime Cibernéticounclassified
See 2 more Smart Citations