Understanding employees' information security identities: an interpretive narrative approach

被引:3
作者
Wall, Jeffrey D. [1 ]
Palvia, Prashant [2 ]
机构
[1] Michigan Technol Univ, Houghton, MI 49931 USA
[2] Univ North Carolina Greensboro, Greensboro, NC 27412 USA
关键词
Information security; Narrative analysis; Compliance; Noncompliance; Identity; FEAR APPEALS; PROTECTION MOTIVATION; POLICY COMPLIANCE; SYSTEMS MISUSE; DETERRENCE; TECHNOLOGY; INSIGHTS; NEUTRALIZATION; PRINCIPLES; FRAMEWORK;
D O I
10.1108/ITP-04-2020-0197
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Purpose The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors also seek to identify how the identities form over time and across contexts. Several identities are identified as well as the changes that may occur in the identities. Design/methodology/approach Few interpretive or critical studies exist in behavioral information security research to represent employee perspectives of power and control. Using qualitative interviews and narrative analysis of the interview transcripts, this paper analyzes the security- and control-related identities and values that employees adopt in organizational settings. Findings Two major categories of behavioral security compliance identities were identified: compliant and noncompliant. Specific identities within the compliant category included: faithful follower vs the reasoned follower, and other-preserving versus the self-preserving identities. The noncompliant category included: anti-authority identity, utilitarian identity, trusting identity and unaware identity. Furthermore, three patterns of identity changes were observed. Research limitations/implications The authors' narrative stories suggest that employee identities are complex and multi-faceted, and that they may be fluid and adaptive to situational factors. Future research should avoid assumptions that all employees are the same or that employee beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Thus, security control is far broader than is studied in behavioral studies. The authors find that history matters and should be examined carefully. Practical implications The authors' study provides insights that managers can use to enhance security initiatives. It is clear that different employees build different control-related identities. Managers must understand that their employees are unique and will not all respond to policies, punishments, and other forms of control in the same way. The narratives also suggest that many organizations lack appropriate programs to enhance employees' awareness of security issues. Originality/value The authors' narrative analysis suggests that employee security identities are complex and multi-faceted, and that they are fluid and adaptive to situational factors. Research should avoid assumptions that all employees are the same or that their beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Their history matters and should be examined carefully.
引用
收藏
页码:435 / 458
页数:24
相关论文
共 50 条
  • [41] Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations
    AlGhamdi, Sultan
    Win, Khin Than
    Vlahu-Gjorgievska, Elena
    GOVERNMENT INFORMATION QUARTERLY, 2022, 39 (04)
  • [42] Narrative review: Social media use by employees and the risk to institutional and personal information security compliance in South Africa
    Murire, Obrain T.
    Flowerday, Stephen
    Strydom, Kariena
    Fourie, Christoffel J. S.
    TD-THE JOURNAL FOR TRANSDISCIPLINARY RESEARCH IN SOUTHERN AFRICA, 2021, 17 (01)
  • [43] The Influence of Organizational Enforcement on the Attitudes of Employees towards Information Security Compliance
    AlKalbani, Ahmed
    Deng, Hepu
    Kam, Booi
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2019, : 152 - 158
  • [44] Understanding the Antecedents of Information Security Awareness - An Empirical Study Completed Research Paper
    Haeussinger, Felix
    Kranz, Johann
    AMCIS 2013 PROCEEDINGS, 2013,
  • [45] How Do Paternalistic Leaders Motivate Employees' Information Security Compliance? Building a Climate and Applying Sanctions
    Zhu, Jiawen
    Feng, Gengzhong
    Liang, Huigang
    Tsui, Kwok-Leung
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2023, 24 (03): : 782 - 817
  • [46] The impact of leadership on employees' intended information security behaviour: An examination of the full-range leadership theory
    Guhr, Nadine
    Lebek, Benedikt
    Breitner, Michael H.
    INFORMATION SYSTEMS JOURNAL, 2019, 29 (02) : 340 - 362
  • [47] A dimension-based information security culture model and its relationship with employees' security behavior: A case study in Malaysian higher educational institutions
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    Ab Hamid, Mohd Rashid
    INFORMATION SECURITY JOURNAL, 2019, 28 (03): : 55 - 80
  • [48] Understanding organisational responses to regulative pressures in information security management: The case of a Chinese hospital
    Hou, Ye
    Gao, Ping
    Nicholson, Brian
    TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2018, 126 : 64 - 75
  • [49] Leader power and employees’ information security policy compliance
    Hyungjin Lukas Kim
    HanByeol Stella Choi
    Jinyoung Han
    Security Journal, 2019, 32 : 391 - 409
  • [50] Leader power and employees' information security policy compliance
    Kim, Hyungjin Lukas
    Choi, HanByeol Stella
    Han, Jinyoung
    SECURITY JOURNAL, 2019, 32 (04) : 391 - 409