The role of ethical climates in employee information security policy violations

被引:2
|
作者
Yazdanmehr, Adel [1 ,4 ]
Jawad, Muhammad [2 ]
Benbunan-Fich, Raquel [1 ]
Wang, Jingguo [3 ]
机构
[1] CUNY Baruch Coll, Zicklin Sch Business, Paul H Chook Dept Informat Syst & Stat, New York, NY USA
[2] Univ Texas Austin, McCombs Sch Business, Dept Informat Risk & Operat Management, Austin, TX USA
[3] Univ Texas Arlington, Coll Business, Dept Informat Syst & Operat Management, Arlington, TX USA
[4] CUNY Baruch Coll, Zicklin Sch Business, Paul H Chook Dept Informat Syst & Stat, 55 Lexington Ave, New York, NY 10010 USA
基金
美国国家科学基金会;
关键词
Information security policy violation; Organizational ethical climate; Profit-oriented ethical climate; Friendship-oriented ethical climate; Rules-oriented ethical climate; WORK CLIMATE; ORGANIZATIONAL COMMITMENT; BREACH ANNOUNCEMENTS; MARKET REACTIONS; DECISION-MAKING; SOFTWARE PIRACY; PERSONAL USE; BEHAVIOR; DETERRENCE; MODEL;
D O I
10.1016/j.dss.2023.114086
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the context of information security, the organizational social environment plays an important role in deterring employee violations of the Information Security Policy (ISP). As extant research has not yet determined the role ethical climates may play, this study seeks to understand their influence on employee ISP violations. To this end, we classified ISPs into two major categories: those related to communal information technology (IT) resources in the organization, such as databases or software applications, and those related to connective IT resources, such as email or Internet access. Then, we explored how rules-, performance-, and friendship-oriented organizational ethical climates affect ISP violations. Based on a survey of 177 professionals employed in the United States, we found that rules-oriented and friendship-oriented ethical climates deter ISP violations, whereas a performanceoriented one does not. Moreover, rules- and friendship-oriented ethical climates lead to fewer communal ISP violations, while performance-oriented ethical climates lead to more connectivity ISP violations. These findings underscore the importance of considering the type of IT resources that an ISP aims to protect as well as the ethical climate of an organization in order to better understand the causes of ISP violations.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] NEUTRALIZATION: NEW INSIGHTS INTO THE PROBLEM OF EMPLOYEE INFORMATION SYSTEMS SECURITY POLICY VIOLATIONS
    Siponen, Mikko
    Vance, Anthony
    MIS QUARTERLY, 2010, 34 (03) : 487 - 502
  • [2] Neutralization: New insights into the problem of employee information systems security policy violations
    Siponen M.
    Vance A.
    MIS Quarterly: Management Information Systems, 2010, 34 (SPEC. ISSUE 3): : 487 - 502
  • [3] RELATIONSHIP TO INDIVIDUAL INFORMATION SECURITY POLICY VIOLATIONS
    Cappellozza, Alexandre
    da Silva, Camila Bernardo
    Medeiros, Luciana Arantes
    de Moraes, Gustavo Herminio Salati Marcondes
    Perez, Gilberto
    INFORMACAO & SOCIEDADE-ESTUDOS, 2022, 32
  • [4] Understanding Employee Information Security Policy Compliance from Role Theory Perspective
    Nasirpouri Shadbad, Forough
    Biros, David
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2021, 61 (06) : 571 - 580
  • [5] Dispositional and situational factors: influences on information security policy violations
    Johnston, Allen C.
    Warkentin, Merrill
    McBride, Maranda
    Carter, Lemuria
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2016, 25 (03) : 231 - 251
  • [6] Information system security policy noncompliance: the role of situation-specific ethical orientation
    Bansal, Gaurav
    Muzatko, Steven
    Shin, Soo Il
    INFORMATION TECHNOLOGY & PEOPLE, 2021, 34 (01) : 250 - 296
  • [7] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    AMCIS 2012 PROCEEDINGS, 2012,
  • [8] Ethical Concerns of Information Policy and Organization in National Security
    Unsworth, Kristene
    CATALOGING & CLASSIFICATION QUARTERLY, 2009, 47 (07) : 642 - 656
  • [9] Impact of negative emotions on violations of information security policy and possible mitigations
    Zhen, Jie
    Xie, Zongxiao
    Dong, Kunxiang
    Chen, Lin
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2022, 41 (11) : 2342 - 2354
  • [10] Technostress and its influence on employee information security policy compliance
    Nasirpouri Shadbad, Forough
    Biros, David
    INFORMATION TECHNOLOGY & PEOPLE, 2022, 35 (01) : 119 - 141