RELATIONSHIP TO INDIVIDUAL INFORMATION SECURITY POLICY VIOLATIONS

被引:0
作者
Cappellozza, Alexandre [1 ,2 ]
da Silva, Camila Bernardo [3 ,4 ]
Medeiros, Luciana Arantes [4 ]
de Moraes, Gustavo Herminio Salati Marcondes [3 ]
Perez, Gilberto [5 ]
机构
[1] Atitus Educ, Programa Posgrad Adm Empresas, Navegantes, Brazil
[2] Univ Presbiteriana Mackenzie, Programa Mestrado Profiss Adm Desenvolvimento Nego, Sao Paulo, Brazil
[3] Ctr Univ Fac Metropolitanas Unidas FMU, Escola Negocios & Hosp, Sao Paulo, Brazil
[4] Univ Metodista Sao Paulo, Sao Paulo, Brazil
[5] Univ Presbiteriana Mackenzie UPM, Sao Paulo, Brazil
关键词
Moral disengagement; Technological skill; Information security; Policy violation; Authentic leadership; Penalties;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
There is no doubt that Information and Communication Technology is essential for organizations' performance and that it also affects the productivity of employees. However, the improper use of technology can cause irreversible problems for organizations, such as violating information security policies. This study aims to investigate the antecedents that may impact the misuse of information systems, particularly those that may cause the violation of information security policies. To this end, the work was conducted through a quantitative survey with 456 users of organizational technologies. For the study's hypothesis tests, the analysis of structural equations was performed, according to the proposed research model. It was confirmed that Moral Disengagement had a positive effect on the Intention to Violate Organizational Information Security Policy, with the Moral Justification dimension showing the most significant effect, followed by the Euphemism dimension. Technological Skill and Authentic Leadership have not been confirmed as factors that influence the Violation of Information Security Policies.
引用
收藏
页数:37
相关论文
共 50 条
  • [41] Technostress and its influence on employee information security policy compliance
    Nasirpouri Shadbad, Forough
    Biros, David
    INFORMATION TECHNOLOGY & PEOPLE, 2022, 35 (01) : 119 - 141
  • [42] The influence of inputs in the information security policy development: an institutional perspective
    Ording, Lovisa Goransson
    Gao, Shang
    Chen, Weifeng
    TRANSFORMING GOVERNMENT- PEOPLE PROCESS AND POLICY, 2022, 16 (04) : 418 - 435
  • [43] Matching training to individual learning styles improves information security awareness
    Pattinson, Malcolm
    Butavicius, Marcus
    Lillie, Meredith
    Ciccarello, Beau
    Parsons, Kathryn
    Calic, Dragana
    McCormac, Agata
    INFORMATION AND COMPUTER SECURITY, 2019, 28 (01) : 1 - 14
  • [44] Evaluation of the national information security policy by analytic hierarchy process
    Andrade dos Santos, Clarice Saraiva
    Gaviao, Luiz Octavio
    dos Santos Oliveira, Leonardo Augusto
    Pereira, Jose Cristiano
    PERSPECTIVAS EM CIENCIA DA INFORMACAO, 2022, 27 (04): : 108 - 145
  • [45] Information Security is More Than Just Policy; It is in Your Personality
    Simola, Petteri
    Virtanen, Toni
    Sartonen, Miika
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 459 - 465
  • [46] Religiosity and Information Security Policy Compliance Completed Research Paper
    Borena, Berhanu
    Belanger, France
    AMCIS 2013 PROCEEDINGS, 2013,
  • [47] The Potential for a Synergistic Relationship Between Information Security and a Financial Audit
    Singleton, Tommie W.
    Singleton, Aaron J.
    INFORMATION SECURITY JOURNAL, 2008, 17 (02): : 80 - 86
  • [48] Does Explicit Information Security Policy Affect Employees' Cyber Security Behavior? A Pilot Study
    Li, Ling
    He, Wu
    Ivan, Ash
    Xu, Li
    Anwar, Mohd
    Yuan, Xiaohong
    2014 SECOND INTERNATIONAL CONFERENCE ON ENTERPRISE SYSTEMS (ES), 2014, : 169 - 173
  • [49] Relationship quality, computer auditing and information security for mobile industry
    Wu, Tung-Hsien
    Huang, Shaio Yan
    Lin, Ching-Wen
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2020, 18 (04) : 405 - 419
  • [50] Ukraine's Information Security Policy: at the Crossroads between Russia and the West
    Fedoniuk, Serhii
    Karpchuk, Nataliia
    Yuskiv, Bohdan
    POLITOLOGICKY CASOPIS-CZECH JOURNAL OF POLITICAL SCIENCE, 2023, (03): : 184 - 205