Understanding employees' information security identities: an interpretive narrative approach

被引:3
作者
Wall, Jeffrey D. [1 ]
Palvia, Prashant [2 ]
机构
[1] Michigan Technol Univ, Houghton, MI 49931 USA
[2] Univ North Carolina Greensboro, Greensboro, NC 27412 USA
关键词
Information security; Narrative analysis; Compliance; Noncompliance; Identity; FEAR APPEALS; PROTECTION MOTIVATION; POLICY COMPLIANCE; SYSTEMS MISUSE; DETERRENCE; TECHNOLOGY; INSIGHTS; NEUTRALIZATION; PRINCIPLES; FRAMEWORK;
D O I
10.1108/ITP-04-2020-0197
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Purpose The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors also seek to identify how the identities form over time and across contexts. Several identities are identified as well as the changes that may occur in the identities. Design/methodology/approach Few interpretive or critical studies exist in behavioral information security research to represent employee perspectives of power and control. Using qualitative interviews and narrative analysis of the interview transcripts, this paper analyzes the security- and control-related identities and values that employees adopt in organizational settings. Findings Two major categories of behavioral security compliance identities were identified: compliant and noncompliant. Specific identities within the compliant category included: faithful follower vs the reasoned follower, and other-preserving versus the self-preserving identities. The noncompliant category included: anti-authority identity, utilitarian identity, trusting identity and unaware identity. Furthermore, three patterns of identity changes were observed. Research limitations/implications The authors' narrative stories suggest that employee identities are complex and multi-faceted, and that they may be fluid and adaptive to situational factors. Future research should avoid assumptions that all employees are the same or that employee beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Thus, security control is far broader than is studied in behavioral studies. The authors find that history matters and should be examined carefully. Practical implications The authors' study provides insights that managers can use to enhance security initiatives. It is clear that different employees build different control-related identities. Managers must understand that their employees are unique and will not all respond to policies, punishments, and other forms of control in the same way. The narratives also suggest that many organizations lack appropriate programs to enhance employees' awareness of security issues. Originality/value The authors' narrative analysis suggests that employee security identities are complex and multi-faceted, and that they are fluid and adaptive to situational factors. Research should avoid assumptions that all employees are the same or that their beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Their history matters and should be examined carefully.
引用
收藏
页码:435 / 458
页数:24
相关论文
共 50 条
  • [1] An activity theory approach to information security non-compliance
    Khatib, Rima
    Barki, Henri
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (04) : 485 - 501
  • [2] Factors influencing the information security behaviour of IT employees
    Hooper, Val
    Blunt, Chris
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2020, 39 (08) : 862 - 874
  • [3] Toward a stage theory of the development of employees' information security behavior
    Karjalainen, Mari
    Siponen, Mikko
    Sarker, Suprateek
    COMPUTERS & SECURITY, 2020, 93
  • [4] The effect of perceived organizational culture on employees' information security compliance
    Karlsson, Martin
    Karlsson, Fredrik
    Astrom, Joachim
    Denk, Thomas
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (03) : 382 - 401
  • [5] Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making
    Johnston, Allen C.
    Warkentin, Merrill
    Dennis, Alan R.
    Siponen, Mikko
    DECISION SCIENCES, 2019, 50 (02) : 245 - 284
  • [6] Understanding employees' responses to information security management practices: a person-environment fit perspective
    Yin, Ya
    Hsu, Carol
    Zhou, Zhongyun
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2024, 43 (12) : 2987 - 3009
  • [7] Does Leadership Approach Matter? Examining Behavioral Influences of Leaders on Employees' Information Security Compliance
    Tejay, Gurvirender P. S.
    Winkfield, Marcus
    INFORMATION SYSTEMS FRONTIERS, 2025,
  • [8] Employees' Information Security Awareness and Behavior: A Literature Review
    Lebek, Benedikt
    Uffen, Joerg
    Breitner, Michael H.
    Neumann, Markus
    Hohler, Bernd
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 2978 - 2987
  • [9] An Adversarial Dance: Toward an Understanding of Insiders' Responses to Organizational Information Security Measures
    Balozian, Puzant
    Burns, A. J.
    Leidner, Dorothy E.
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2023, 24 (01): : 161 - 221
  • [10] Ensuring employees' information security policy compliance by carrot and stick: the moderating roles of organizational commitment and gender
    Liu, Chenhui
    Liang, Huigang
    Wang, Nengmin
    Xue, Yajiong
    INFORMATION TECHNOLOGY & PEOPLE, 2022, 35 (02) : 802 - 834