Escalation of commitment and information security: Theories and implications

被引:4
作者
Chulkov D.V. [1 ]
机构
[1] School of Business, Indiana University, Kokomo, IN
关键词
Escalation of commitment; Information security; IT management; MIS;
D O I
10.1108/ICS-02-2016-0015
中图分类号
学科分类号
摘要
Purpose - This study aims to explore the challenges that the escalation of commitment poses to information security. Design/methodology/approach - Two distinct scenarios of escalation behavior are presented based on literature review. Psychological, organizational and economic theories on escalation of commitment are reviewed and applied to the area of information security. Findings - Escalation of commitment involves continuation of a course of action after receiving negative information about it. In the information security compliance context, escalation affects a firm when an employee decides to break the firm's information security policy to complete a failing task. In the information security investment context, escalation occurs if a manager continues investment in policies and solutions that are ineffective because of psychological, organizational or economic factors. Both of these types of escalation may be prevented with de-escalation techniques including a change in management or rotation of duties, monitoring, auditing and governance mechanisms. Practical implications - Implications of escalation of commitment behavior for information security decision-makers and for future research are discussed. Originality/value - This study complements the literature by establishing the context of escalation of commitment in decisions related to information security and reviewing managerial and economic theories on escalation of commitment. © Emerald Publishing Limited.
引用
收藏
页码:580 / 592
页数:12
相关论文
共 53 条
[51]  
Whyte G., Escalating commitment to a course of action: A reinterpretation, Academy of Management Review, 11, 2, pp. 311-321, (1986)
[52]  
Willison R., Understanding the perpetration of employee computer crime in the organisational context, Information and Organization, 16, 4, pp. 304-324, (2006)
[53]  
Willison R., Warkentin M., Beyond deterrence: An expanded view of employee computer abuse, MIS Quarterly, 37, pp. 1-20, (2013)