2011
DOI: 10.2753/mis0742-1222280208
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

4
187
1
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 301 publications
(193 citation statements)
references
References 73 publications
4
187
1
1
Order By: Relevance
“…In addition, most current studies examine users' rationality, cognition or characteristics. For example, several studies adopted a utilitarian approach for deterring misuse behavior (e.g., [10], [41]). This is because many misuse studies are rooted in deterrence theory (e.g., [5], [17]).…”
Section: Introductionmentioning
confidence: 99%
“…In addition, most current studies examine users' rationality, cognition or characteristics. For example, several studies adopted a utilitarian approach for deterring misuse behavior (e.g., [10], [41]). This is because many misuse studies are rooted in deterrence theory (e.g., [5], [17]).…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, there are several reasons for the knowing-doing gap; first, the inevitable loss of efficiency and productivity particularly when using automated and mandatory security measures. For instance, the system that restricts acceptable passwords for a designated range of characters or numeric or a firewall configuration that might affect the communication and encryption process that could impact productivity [18], [25]. The other reason why employees do not follow certain guidelines that relate to information security policies are due to unpredictable, rare and unusual circumstances.…”
Section: A Unintentional Insider's Threat To Organizationmentioning
confidence: 99%
“…Moreover, the activities of omissive security behaviour are also influenced by workgroup norms. It refers to people in the same workgroup, including supervisors and peers who have more influence on enduser behaviour [18]. In other words, they might be unaware or not concerned with behavioural ethics as long as they are doing the same thing as their peers.…”
Section: A Unintentional Insider's Threat To Organizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Recent IS security research has devoted considerable efforts to investigating factors affecting employees' security behaviors through a plethora of theoretical lens, including General Deterrence Theory [17,24,39,41,71,72], Protection Motivation Theory [2,9,19,39,47,67], Rational Choice Theory [13,41], Reactance and Justice Theory [52,53,57,77], Accountability Theory [75,76], Theory of Reasoned Action [37,67], Cognitive Evaluation Theory [67], Coping Theory [23], Compliance Theory [17], Neutralization Theory [68], and Principal Agent Theory [38].…”
Section: Is Security Behaviorsmentioning
confidence: 99%