Explanations of Insider Deviant Behavior in Information Security: A Systematic Literature Review

被引:1
|
作者
Anti, Emmanuel [1 ]
Vartiainen, Tero [1 ]
机构
[1] Univ Vaasa, Sch Technol & Innovat, Vaasa, Finland
关键词
Insider Deviant Behavior; Systematic Literature Review; Information Security; Theories; PROTECTION MOTIVATION THEORY; COMPUTER ABUSE; POLICY VIOLATIONS; FEAR APPEALS; MORAL DISENGAGEMENT; SITUATIONAL FACTORS; USER ACCEPTANCE; RATIONAL CHOICE; PERCEIVED EASE; SOCIAL-CONTROL;
D O I
10.17705/1CAIS.05501
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider deviant behavior (IDB) in information security (IS) poses significant threats to public and private organizations. To enhance our understanding of IDB, we conducted a systematic review of existing literature, analyzing theories from the fields of criminology (e.g., Deterrence Theory), sociology (e.g., Social Control Theory), and psychology (e.g., Neutralization Techniques) utilized in IS research on IDB. We identified 46 theories from these disciplines, which we categorized into four main groups: psychological and behavioral, organizational, sociocultural, and decision-making. Additionally, we classified their constructs into eight key factors. Further, ten IDBs frequently studied in IS were identified. Our analysis identified relationships among these theories emphasizing shared concepts that improve our comprehension of IDB. These relationships and their implications for theory and practice are discussed offering insights into the multifaceted nature of insider deviance and the diverse theoretical lenses through which they can be examined. This review not only consolidates existing knowledge but also lays the groundwork for future research in effectively addressing insider deviant behavior.
引用
收藏
页码:1 / 36
页数:38
相关论文
共 50 条
  • [21] Insider Threats in Information Security
    Elmrabit, Ncbrase
    Yang, Shuang-Hua
    Yang, Lili
    2015 21ST INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2015, : 108 - 113
  • [22] Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review
    Brezavscek, Alenka
    Baggia, Alenka
    SYSTEMS, 2025, 13 (01):
  • [23] Information systems security practices in social software applications A systematic literature review
    Tamrin, Suraya Ika
    Norman, Azah Anir
    Hamid, Suraya
    ASLIB JOURNAL OF INFORMATION MANAGEMENT, 2017, 69 (02) : 131 - 157
  • [24] Microservice security: a systematic literature review
    Berardi, Davide
    Giallorenzo, Saverio
    Mauro, Jacopo
    Melis, Andrea
    Montesi, Fabrizio
    Prandini, Marco
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [25] Microservice security: a systematic literature review
    Berardi D.
    Giallorenzo S.
    Melis A.
    Prandini M.
    Mauro J.
    Montesi F.
    PeerJ Computer Science, 2022, 7
  • [26] Usable Security: A Systematic Literature Review
    Di Nocera, Francesco
    Tempestini, Giorgia
    Orsini, Matteo
    INFORMATION, 2023, 14 (12)
  • [27] Security Ontologies: A Systematic Literature Review
    Adach, Malina
    Hanninen, Kaj
    Lundqvist, Kristina
    ENTERPRISE DESIGN, OPERATIONS, AND COMPUTING, EDOC 2022, 2022, 13585 : 36 - 53
  • [28] Sources of deviant behavior: Contrasting alternative explanations in the laboratory
    DeAngelo, Gregory
    Ferrell, Perry
    McCannon, BryanC.
    JOURNAL OF BEHAVIORAL AND EXPERIMENTAL ECONOMICS, 2017, 71 : 31 - 44
  • [29] Impacts of Workplace Culture on Deviant Workplace Behavior: A Systematic Review
    bin Bujang, Muhammad Amin
    Kamaluddin, Mohammad Rahim
    Basir, Salawati Mat
    Munusamy, Shalini
    Jiow, Hee Jhee
    SAGE OPEN, 2024, 14 (02):
  • [30] A systematic literature review on information service management and information-seeking behavior in tourism
    Varotsis, Nikolaos
    Mylonas, Naoum
    COGENT BUSINESS & MANAGEMENT, 2024, 11 (01):