The role of ethical climates in employee information security policy violations

被引:2
|
作者
Yazdanmehr, Adel [1 ,4 ]
Jawad, Muhammad [2 ]
Benbunan-Fich, Raquel [1 ]
Wang, Jingguo [3 ]
机构
[1] CUNY Baruch Coll, Zicklin Sch Business, Paul H Chook Dept Informat Syst & Stat, New York, NY USA
[2] Univ Texas Austin, McCombs Sch Business, Dept Informat Risk & Operat Management, Austin, TX USA
[3] Univ Texas Arlington, Coll Business, Dept Informat Syst & Operat Management, Arlington, TX USA
[4] CUNY Baruch Coll, Zicklin Sch Business, Paul H Chook Dept Informat Syst & Stat, 55 Lexington Ave, New York, NY 10010 USA
基金
美国国家科学基金会;
关键词
Information security policy violation; Organizational ethical climate; Profit-oriented ethical climate; Friendship-oriented ethical climate; Rules-oriented ethical climate; WORK CLIMATE; ORGANIZATIONAL COMMITMENT; BREACH ANNOUNCEMENTS; MARKET REACTIONS; DECISION-MAKING; SOFTWARE PIRACY; PERSONAL USE; BEHAVIOR; DETERRENCE; MODEL;
D O I
10.1016/j.dss.2023.114086
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the context of information security, the organizational social environment plays an important role in deterring employee violations of the Information Security Policy (ISP). As extant research has not yet determined the role ethical climates may play, this study seeks to understand their influence on employee ISP violations. To this end, we classified ISPs into two major categories: those related to communal information technology (IT) resources in the organization, such as databases or software applications, and those related to connective IT resources, such as email or Internet access. Then, we explored how rules-, performance-, and friendship-oriented organizational ethical climates affect ISP violations. Based on a survey of 177 professionals employed in the United States, we found that rules-oriented and friendship-oriented ethical climates deter ISP violations, whereas a performanceoriented one does not. Moreover, rules- and friendship-oriented ethical climates lead to fewer communal ISP violations, while performance-oriented ethical climates lead to more connectivity ISP violations. These findings underscore the importance of considering the type of IT resources that an ISP aims to protect as well as the ethical climate of an organization in order to better understand the causes of ISP violations.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] IS Security Policy Violations: A Rational Choice Perspective
    Vance, Anthony
    Siponen, Mikko
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2012, 24 (01) : 21 - 41
  • [22] Security Policy Violations in SDN Data Plane
    Li, Qi
    Chen, Yanyu
    Lee, Patrick P. C.
    Xu, Mingwei
    Ren, Kui
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (04) : 1715 - 1727
  • [23] The role and the responsibility of psychologists in ethical violations in the media
    Koc, Yasin
    INTERNATIONAL JOURNAL OF PSYCHOLOGY, 2012, 47 : 356 - 357
  • [24] Examining employee security violations: moral disengagement and its environmental influences
    Herath, Tejaswini
    Yim, Myung-Seong
    D'Arcy, John
    Nam, Kichan
    Rao, H. R.
    INFORMATION TECHNOLOGY & PEOPLE, 2018, 31 (06) : 1135 - 1162
  • [25] Employee security perception in cultivating information security culture
    Zakaria, O
    Security Management, Integrity, and Internal Control in Information Systems, 2005, 193 : 83 - 92
  • [26] Can peers help reduce violations of information security policies? The role of peer monitoring
    Yazdanmehr, Adel
    Wang, Jingguo
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2023, 32 (03) : 508 - 528
  • [27] Information security: Auditing the behaviour of the employee
    Vroom, C
    von Solms, R
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 401 - 404
  • [28] On the Content Security Policy Violations due to the Same-Origin Policy
    Some, Dohere Francis
    Bielova, Nataliia
    Rezk, Tamara
    PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17), 2017, : 877 - 886
  • [29] Live Forensics Analysis: Violations of Business Security Policy
    Tanwar, Govind Singh
    Poonia, Ajeet Singh
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 971 - 976
  • [30] Investigation of information security policy violations among oil and gas employees: A security-related stress and avoidance coping perspective
    Ali, Rao Faizan
    Dominic, P. D. D.
    JOURNAL OF INFORMATION SCIENCE, 2024, 50 (01) : 254 - 272