Explanations of Insider Deviant Behavior in Information Security: A Systematic Literature Review

被引:1
|
作者
Anti, Emmanuel [1 ]
Vartiainen, Tero [1 ]
机构
[1] Univ Vaasa, Sch Technol & Innovat, Vaasa, Finland
关键词
Insider Deviant Behavior; Systematic Literature Review; Information Security; Theories; PROTECTION MOTIVATION THEORY; COMPUTER ABUSE; POLICY VIOLATIONS; FEAR APPEALS; MORAL DISENGAGEMENT; SITUATIONAL FACTORS; USER ACCEPTANCE; RATIONAL CHOICE; PERCEIVED EASE; SOCIAL-CONTROL;
D O I
10.17705/1CAIS.05501
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider deviant behavior (IDB) in information security (IS) poses significant threats to public and private organizations. To enhance our understanding of IDB, we conducted a systematic review of existing literature, analyzing theories from the fields of criminology (e.g., Deterrence Theory), sociology (e.g., Social Control Theory), and psychology (e.g., Neutralization Techniques) utilized in IS research on IDB. We identified 46 theories from these disciplines, which we categorized into four main groups: psychological and behavioral, organizational, sociocultural, and decision-making. Additionally, we classified their constructs into eight key factors. Further, ten IDBs frequently studied in IS were identified. Our analysis identified relationships among these theories emphasizing shared concepts that improve our comprehension of IDB. These relationships and their implications for theory and practice are discussed offering insights into the multifaceted nature of insider deviance and the diverse theoretical lenses through which they can be examined. This review not only consolidates existing knowledge but also lays the groundwork for future research in effectively addressing insider deviant behavior.
引用
收藏
页码:1 / 36
页数:38
相关论文
共 50 条
  • [1] A Systematic Literature Review: Information Security Culture
    Mahfuth, Amjad
    Yussof, Salman
    Abu Baker, Asmidar
    Ali, Nor'ashikin
    2017 5TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS 2017): SOCIAL TRANSFORMATION THROUGH DATA SCIENCE, 2017,
  • [2] A Systematic Literature Review of Information Security in Chatbots
    Yang, Jing
    Chen, Yen-Lin
    Por, Lip Yee
    Ku, Chin Soon
    APPLIED SCIENCES-BASEL, 2023, 13 (11):
  • [3] INFORMATION SECURITY CULTURE: A SYSTEMATIC LITERATURE REVIEW
    Hassan, Noor Hafizah
    Ismail, Zuraini
    Maarop, Nurazean
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS, 2015, : 456 - 463
  • [4] Information Security Policy Compliance: Systematic Literature Review
    Angraini
    Alias, Rose Alinda
    Okfalisa
    FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 1216 - 1224
  • [5] Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
    Ali, Rao Faizan
    Dominic, P. D. D.
    Ali, Syed Emad Azhar
    Rehman, Mobashar
    Sohail, Abid
    APPLIED SCIENCES-BASEL, 2021, 11 (08):
  • [6] Deviant behavior and criminalization in the context of the climate movement. A systematic literature review
    Struck, Jens
    Kemme, Stefanie
    MONATSSCHRIFT FUR KRIMINOLOGIE UND STRAFRECHTSREFORM, 2024, 107 (04): : 355 - 372
  • [7] Employees' Information Security Awareness and Behavior: A Literature Review
    Lebek, Benedikt
    Uffen, Joerg
    Breitner, Michael H.
    Neumann, Markus
    Hohler, Bernd
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 2978 - 2987
  • [8] Development and validation of instruments of information security deviant behavior
    Chu, Amanda M. Y.
    Chau, Patrick Y. K.
    DECISION SUPPORT SYSTEMS, 2014, 66 : 93 - 101
  • [9] Systematic Literature Review: Information security behaviour on smartphone users
    Dawie, Ferdinand Jilan
    Masrek, Mohamad Noorman
    Rahman, Safawi Abdul
    ENVIRONMENT-BEHAVIOUR PROCEEDINGS JOURNAL, 2022, 7 : 275 - 281
  • [10] Information and cyber security maturity models: a systematic literature review
    Rabii, Anass
    Assoul, Saliha
    Ouazzani Touhami, Khadija
    Roudies, Ounsa
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (04) : 627 - 644