Understanding employees' information security identities: an interpretive narrative approach

被引:3
作者
Wall, Jeffrey D. [1 ]
Palvia, Prashant [2 ]
机构
[1] Michigan Technol Univ, Houghton, MI 49931 USA
[2] Univ North Carolina Greensboro, Greensboro, NC 27412 USA
关键词
Information security; Narrative analysis; Compliance; Noncompliance; Identity; FEAR APPEALS; PROTECTION MOTIVATION; POLICY COMPLIANCE; SYSTEMS MISUSE; DETERRENCE; TECHNOLOGY; INSIGHTS; NEUTRALIZATION; PRINCIPLES; FRAMEWORK;
D O I
10.1108/ITP-04-2020-0197
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Purpose The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors also seek to identify how the identities form over time and across contexts. Several identities are identified as well as the changes that may occur in the identities. Design/methodology/approach Few interpretive or critical studies exist in behavioral information security research to represent employee perspectives of power and control. Using qualitative interviews and narrative analysis of the interview transcripts, this paper analyzes the security- and control-related identities and values that employees adopt in organizational settings. Findings Two major categories of behavioral security compliance identities were identified: compliant and noncompliant. Specific identities within the compliant category included: faithful follower vs the reasoned follower, and other-preserving versus the self-preserving identities. The noncompliant category included: anti-authority identity, utilitarian identity, trusting identity and unaware identity. Furthermore, three patterns of identity changes were observed. Research limitations/implications The authors' narrative stories suggest that employee identities are complex and multi-faceted, and that they may be fluid and adaptive to situational factors. Future research should avoid assumptions that all employees are the same or that employee beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Thus, security control is far broader than is studied in behavioral studies. The authors find that history matters and should be examined carefully. Practical implications The authors' study provides insights that managers can use to enhance security initiatives. It is clear that different employees build different control-related identities. Managers must understand that their employees are unique and will not all respond to policies, punishments, and other forms of control in the same way. The narratives also suggest that many organizations lack appropriate programs to enhance employees' awareness of security issues. Originality/value The authors' narrative analysis suggests that employee security identities are complex and multi-faceted, and that they are fluid and adaptive to situational factors. Research should avoid assumptions that all employees are the same or that their beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Their history matters and should be examined carefully.
引用
收藏
页码:435 / 458
页数:24
相关论文
共 50 条
  • [31] Understanding Information Security Behaviours of Tanzanian Government Employees: A Health Belief Model Perspective
    Koloseni, Daniel Ntabagi
    Lee, Chong Yee
    Gan, Ming-Lee
    INTERNATIONAL JOURNAL OF TECHNOLOGY AND HUMAN INTERACTION, 2019, 15 (01) : 15 - 32
  • [32] Security monitoring and information security assurance behaviour among employees An empirical analysis
    Ahmad, Zauwiyah
    Ong, Thian Song
    Liew, Tze Hui
    Norhashim, Mariati
    INFORMATION AND COMPUTER SECURITY, 2019, 27 (02) : 165 - 188
  • [33] INFORMATION SECURITY: THREAT FROM EMPLOYEES
    Erceg, Aleksandar
    TEHNICKI GLASNIK-TECHNICAL JOURNAL, 2019, 13 (02): : 123 - 128
  • [34] The role of abusive supervision and organizational commitment on employees' information security policy noncompliance intention
    Guan, Bowen
    Hsu, Carol
    INTERNET RESEARCH, 2020, 30 (05) : 1383 - 1405
  • [35] Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective
    Karjalainen, Mari
    Sarker, Suprateek
    Siponen, Mikko
    INFORMATION SYSTEMS RESEARCH, 2019, 30 (02) : 687 - 704
  • [36] The effects of knowledge mechanisms on employees' information security threat construal
    Mady, Ashraf
    Gupta, Saurabh
    Warkentin, Merrill
    INFORMATION SYSTEMS JOURNAL, 2023, 33 (04) : 790 - 841
  • [37] Employees' information security policy compliance: A norm activation perspective
    Yazdanmehr, Adel
    Wang, Jingguo
    DECISION SUPPORT SYSTEMS, 2016, 92 : 36 - 46
  • [38] Information Security Policies Compliance among Employees in Cybersecurity Malaysia
    Kadir, Mohd Razilan Abdul
    Norman, Sharifah Norwahidah Syed
    Rahman, Safawi Abdul
    Ahmad, Abdul Rahman
    Bunawan, Ap-Azli
    VISION 2020: INNOVATION MANAGEMENT, DEVELOPMENT SUSTAINABILITY, AND COMPETITIVE ECONOMIC GROWTH, 2016, VOLS I - VII, 2016, : 2419 - 2430
  • [39] Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model
    Chen, Yan
    Galletta, Dennis F.
    Lowry, Paul Benjamin
    Luo, Xin
    Moody, Gregory D.
    Willison, Robert
    INFORMATION SYSTEMS RESEARCH, 2021, 32 (03) : 1043 - 1065
  • [40] Understanding Information Security Policy Violation from a Situational Action Perspective
    Li, Han
    Luo, Xin
    Chen, Yan
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2021, 22 (03): : 739 - 772