Using event-related brain potentials to explore the temporal dynamics of decision-making related to information security

被引:0
作者
West, Robert [1 ]
Kirby, Bridget [1 ]
Malley, Kaitlyn [2 ]
机构
[1] DePauw Univ, Dept Psychol & Neurosci, Greencastle, IN 46135 USA
[2] Univ Texas Dallas, Sch Behav & Brain Sci, Richardson, TX USA
关键词
information security; ethical decision making; event-related potentials (ERP); delay of reward; perspective taking; INSIGHTS;
D O I
10.3389/fnins.2022.878248
中图分类号
Q189 [神经科学];
学科分类号
071006 ;
摘要
Insider threat from individuals operating within an organization presents a significant source of violations of information security. Our previous research has used scalp recorded event-related brain potentials (ERPs) and the Information Security Paradigm (ISP) to identify the neural correlates of decision-making processes related to violations of information security. In the current study, we sought to expand this research by examining the effects of two variables that were drawn from the broader decision-making literature (i.e., the benefactor and delay of a reward) on ERPs measured in the ISP. In the ISP we varied whether Josh-a hypothetical IT specialist-or a significant other was the benefactor of a violation, and whether the benefit of a violation was received after a short or long delay. The choice data revealed that individuals were less likely to endorse an unethical action than a control action. The electrophysiological data revealed ERPs that differentiated ethical scenarios from control scenarios between 200 and 2,000 ms after onset of the decision prompt, distributed over the occipital, central, and lateral frontal regions of the scalp. These ERPs were insensitive to the benefactor and delay of the reward. In contrast, there was slow wave activity over the frontal-polar region that was sensitive to both variables. The current findings provide evidence for separable neural systems that are either generally related to ethical decision-making in the ISP or are sensitive to the benefactor or delay of a reward resulting from an unethical decision.
引用
收藏
页数:9
相关论文
共 26 条
[11]   The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective [J].
Hu, Qing ;
West, Robert ;
Smarandescu, Laura .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2015, 31 (04) :6-48
[12]   Does Deterrence Work in Reducing Information Security Policy Abuse by Employees? [J].
Hu, Qing ;
Xu, Zhengchuan ;
Dinev, Tamara ;
Ling, Hong .
COMMUNICATIONS OF THE ACM, 2011, 54 (06) :54-60
[13]  
Kable J.W., 2014, Neuroeconomics, Vsecond, P173, DOI [DOI 10.1016/B978-0-12-416008-8.00010-3, 10.1016/b978-0-12-416008-8.00010-3, 10.1016/B978-0-12-416008-8.00010-3]
[14]   Neural Activity Related to Information Security Decision Making: Effects of Who Is Rewarded and When the Reward Is Received [J].
Kirby, Bridget ;
Malley, Kaitlyn ;
West, Robert .
INFORMATION SYSTEMS AND NEUROSCIENCE (NEUROIS RETREAT 2018), 2019, 29 :19-27
[15]   Self-control, organizational context, and rational choice in Internet abuses at work [J].
Li, Han ;
Luo, Xin ;
Zhang, Jie ;
Sarathy, Rathindra .
INFORMATION & MANAGEMENT, 2018, 55 (03) :358-367
[16]   ERPLAB: an open-source toolbox for the analysis of event related potentials [J].
Lopez-Calderon, Javier ;
Luck, Steven J. .
FRONTIERS IN HUMAN NEUROSCIENCE, 2014, 8
[17]   Why Individual Employees Commit Malicious Computer Abuse: A Routine Activity Theory Perspective [J].
Luo, Xin ;
Li, Han ;
Hu, Qing ;
Xu, Heng .
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2020, 21 (06) :1552-1593
[18]   Medial Prefrontal Cortex Predicts Intertemporal Choice [J].
Mitchell, Jason P. ;
Schirmer, Jessica ;
Ames, Daniel L. ;
Gilbert, Daniel T. .
JOURNAL OF COGNITIVE NEUROSCIENCE, 2011, 23 (04) :857-866
[19]   What levels of moral reasoning and values explain adherence to information security rules? An empirical study [J].
Myyry, Liisa ;
Siponen, Mikko ;
Pahnila, Seppo ;
Vartiainen, Tero ;
Vance, Anthony .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) :126-139
[20]  
Richardson R., 2011, CSI COMPUTER CRIME S