Explanations of Insider Deviant Behavior in Information Security: A Systematic Literature Review

被引:1
|
作者
Anti, Emmanuel [1 ]
Vartiainen, Tero [1 ]
机构
[1] Univ Vaasa, Sch Technol & Innovat, Vaasa, Finland
关键词
Insider Deviant Behavior; Systematic Literature Review; Information Security; Theories; PROTECTION MOTIVATION THEORY; COMPUTER ABUSE; POLICY VIOLATIONS; FEAR APPEALS; MORAL DISENGAGEMENT; SITUATIONAL FACTORS; USER ACCEPTANCE; RATIONAL CHOICE; PERCEIVED EASE; SOCIAL-CONTROL;
D O I
10.17705/1CAIS.05501
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider deviant behavior (IDB) in information security (IS) poses significant threats to public and private organizations. To enhance our understanding of IDB, we conducted a systematic review of existing literature, analyzing theories from the fields of criminology (e.g., Deterrence Theory), sociology (e.g., Social Control Theory), and psychology (e.g., Neutralization Techniques) utilized in IS research on IDB. We identified 46 theories from these disciplines, which we categorized into four main groups: psychological and behavioral, organizational, sociocultural, and decision-making. Additionally, we classified their constructs into eight key factors. Further, ten IDBs frequently studied in IS were identified. Our analysis identified relationships among these theories emphasizing shared concepts that improve our comprehension of IDB. These relationships and their implications for theory and practice are discussed offering insights into the multifaceted nature of insider deviance and the diverse theoretical lenses through which they can be examined. This review not only consolidates existing knowledge but also lays the groundwork for future research in effectively addressing insider deviant behavior.
引用
收藏
页码:1 / 36
页数:38
相关论文
共 50 条
  • [41] Security Gap in Microservices: A Systematic Literature Review
    Hutasuhut, Nurman Rasyid Panusunan
    Amri, Mochamad Gani
    Aji, Rizal Fathoni
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (12) : 165 - 171
  • [42] System security assurance: A systematic literature review
    Shukla, Ankur
    Katt, Basel
    Nweke, Livinus Obiora
    Yeng, Prosper Kandabongee
    Weldehawaryat, Goitom Kahsay
    COMPUTER SCIENCE REVIEW, 2022, 45
  • [43] Food security governance: a systematic literature review
    Candel, Jeroen J. L.
    FOOD SECURITY, 2014, 6 (04) : 585 - 601
  • [44] Systematic Literature Review of Security Pattern Research
    Washizaki, Hironori
    Xia, Tian
    Kamata, Natsumi
    Fukazawa, Yoshiaki
    Kanuka, Hideyuki
    Kato, Takehisa
    Yoshino, Masayuki
    Okubo, Takao
    Ogata, Shinpei
    Kaiya, Haruhiko
    Hazeyama, Atsuo
    Tanaka, Takafumi
    Yoshioka, Nobukazu
    Priyalakshmi, G.
    INFORMATION, 2021, 12 (01) : 1 - 27
  • [45] Food security governance: a systematic literature review
    Jeroen J. L. Candel
    Food Security, 2014, 6 : 585 - 601
  • [46] BYOD security issues: a systematic literature review
    Ratchford, Melva
    El-Gayar, Omar
    Noteboom, Cherie
    Wang, Yong
    INFORMATION SECURITY JOURNAL, 2022, 31 (03): : 253 - 273
  • [47] A systematic literature review of blockchain cyber security
    Taylor, Paul J.
    Dargahi, Tooska
    Dehghantanha, Ali
    Parizi, Reza M.
    Choo, Kim-Kwang Raymond
    DIGITAL COMMUNICATIONS AND NETWORKS, 2020, 6 (02) : 147 - 156
  • [48] A systematic literature review of blockchain cyber security
    Paul JTaylor
    Tooska Dargahi
    Ali Dehghantanha
    Reza MParizi
    KimKwang Raymond Choo
    Digital Communications and Networks, 2020, 6 (02) : 147 - 156
  • [49] Security in Smart Toys: A Systematic Review of Literature
    Pontes, Lara
    Coutinho, Gustavo
    Hung, Patrick C. K.
    Yankson, Benjamin
    DISTRIBUTED, AMBIENT AND PERVASIVE INTERACTIONS, 2019, 11587 : 28 - 38
  • [50] Information Security Culture: A Definition and A Literature Review
    AlHogail, Areej
    Mirza, Abdulrahman
    2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,