Understanding Shadow IT usage intention: a view of the dual-factor model

被引:1
|
作者
Nguyen, Trang [1 ]
机构
[1] Univ Econ Ho Chi Minh City UEH, Coll Business, Sch Int Business & Mkt, Ho Chi Minh City, Vietnam
关键词
Insider threat; Shadow IT; Informal control; Formal control; UTAUT; Dual-factor theory; SECURITY POLICY COMPLIANCE; EMPIRICAL-EXAMINATION; GENERAL DETERRENCE; USER ACCEPTANCE; SYSTEMS; NEUTRALIZATION; BEHAVIORS; TECHNOLOGY; MANAGEMENT; INTERNET;
D O I
10.1108/OIR-04-2022-0243
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention. Design/methodology/approach - An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents. Findings - The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls. Originality/value - This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.
引用
收藏
页码:500 / 522
页数:23
相关论文
共 50 条
  • [1] Explaining resistance to system usage in the PharmaCloud: A view of the dual-factor model
    Hsieh, Pi-Jung
    Lin, Weir-Sen
    INFORMATION & MANAGEMENT, 2018, 55 (01) : 51 - 63
  • [2] Dilemmatic dual-factor determinants of discontinuous intention in cryptocurrency usage
    Huang, Cheng-Kui
    Lee, Neil Chueh-An
    Chen, Wen-Chi
    INFORMATION TECHNOLOGY & PEOPLE, 2023, 36 (02) : 564 - 594
  • [3] Exploring the enablers and inhibitors of electric vehicle adoption intention from sellers' perspective in India: A view of the dual-factor model
    Shankar, Amit
    Kunnari, Pooja
    INTERNATIONAL JOURNAL OF NONPROFIT AND VOLUNTARY SECTOR MARKETING, 2019, 24 (04)
  • [4] Dual-factor Generation Model for Conversation
    Zhang, Ruqing
    Guo, Jiafeng
    Fan, Yixing
    Lan, Yanyan
    Cheng, Xueqi
    ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2020, 38 (03)
  • [5] Dual-factor model of sleep and diet: a new approach to understanding central fatigue
    Zhang, Yifei
    Zhang, Zehan
    Yu, Qingqian
    Lan, Bijuan
    Shi, Qinghuan
    Liu, Yan
    Zhang, Weiyue
    Li, Feng
    FRONTIERS IN NEUROSCIENCE, 2024, 18
  • [6] The dual-factor model of mental health in youth
    Doll, Beth
    SCHOOL PSYCHOLOGY REVIEW, 2008, 37 (01) : 69 - 73
  • [7] A Dual-Factor Model of Mental Health: Toward a More Comprehensive Understanding of Youth Functioning
    Antaramian, Susan P.
    Huebner, E. Scott
    Hills, Kimberly J.
    Valois, Robert F.
    AMERICAN JOURNAL OF ORTHOPSYCHIATRY, 2010, 80 (04) : 462 - 472
  • [8] A dual-factor model of loyalty to IT product - The case of smartphones
    Lin, Tung-Ching
    Huang, Shiu-Li
    Hsu, Chieh-Ju
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2015, 35 (02) : 215 - 228
  • [9] Understanding enablers and inhibitors of digital rupee: a dual-factor theory perspective
    Balasubramanian, Senthil Arasu
    Thirumaran, Pirasad
    DIGITAL POLICY REGULATION AND GOVERNANCE, 2024,
  • [10] DUAL-FACTOR THEORY - REPLY
    HOUSE, R
    WIGDOR, LA
    PERSONNEL PSYCHOLOGY, 1968, 21 (01) : 58 - 62