Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model

被引:262
作者
Guo, Ken H. [1 ]
Yuan, Yufei [2 ]
Archer, Norman P. [2 ,3 ]
Connelly, Catherine E. [2 ]
机构
[1] Western New England Univ, Coll Business, Springfield, MA 01119 USA
[2] McMaster Univ, DeGroote Sch Business, Hamilton, ON L8S 4L8, Canada
[3] McMaster E Business Res Ctr, Hamilton, ON, Canada
关键词
information systems security; nonlinear construct relationships; nonmalicious security violation; perceived identity match; perceived security risk; relative advantage for job performance; workgroup norms; INFORMATION-TECHNOLOGY ACCEPTANCE; POLICY COMPLIANCE; COMPUTER ABUSE; SYSTEMS; IDENTITY; ORGANIZATIONS; CONSTRUCTION; DETERRENCE; MANAGEMENT; PRESSURES;
D O I
10.2753/MIS0742-1222280208
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
End users are said to be "the weakest link" in information systems (IS) security management in the workplace. They often knowingly engage in certain insecure uses of IS and violate security policies without malicious intentions. Few studies, however, have examined end user motivation to engage in such behavior. To fill this research gap, in the present study we propose and test empirically a nonmalicious security violation (NMSV) model with data from a survey of end users at work. The results suggest that utilitarian outcomes (relative advantage for job performance, perceived security risk), normative outcomes (workgroup norms), and self-identity outcomes (perceived identity match) are key determinants of end user intentions to engage in NMSVs. In contrast, the influences of attitudes toward security policy and perceived sanctions are not significant. This study makes several significant contributions to research on security-related behavior by (1) highlighting the importance of job performance goals and security risk perceptions on shaping user attitudes, (2) demonstrating the effect of workgroup norms on both user attitudes and behavioral intentions, (3) introducing and testing the effect of perceived identity match on user attitudes and behavioral intentions, and (4) identifying nonlinear relationships between constructs. This study also informs security management practices on the importance of linking security and business objectives, obtaining user buy-in of security measures, and cultivating a culture of secure behavior at local workgroup levels in organizations.
引用
收藏
页码:203 / 236
页数:34
相关论文
共 99 条
[31]   AN UPDATED PARADIGM FOR SCALE DEVELOPMENT INCORPORATING UNIDIMENSIONALITY AND ITS ASSESSMENT [J].
GERBING, DW ;
ANDERSON, JC .
JOURNAL OF MARKETING RESEARCH, 1988, 25 (02) :186-192
[32]  
Gibbs J.P., 1975, CRIME PUNISHMENT DET
[33]   Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers [J].
Grazioli, S ;
Jaryenpaa, SL .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2000, 30 (04) :395-410
[34]   The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions [J].
Harrington, SJ .
MIS QUARTERLY, 1996, 20 (03) :257-278
[35]  
Heckhausen H., 1985, GOAL DIRECTED BEHAV, P134
[36]   Protection motivation and deterrence: a framework for security policy compliance in organisations [J].
Herath, Tejaswini ;
Rao, H. Raghav .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) :106-125
[37]   Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness [J].
Herath, Tejaswini ;
Rao, H. R. .
DECISION SUPPORT SYSTEMS, 2009, 47 (02) :154-165
[38]   KNOWLEDGE-BASED CAUSAL ATTRIBUTION - THE ABNORMAL CONDITIONS FOCUS MODEL [J].
HILTON, DJ ;
SLUGOSKI, BR .
PSYCHOLOGICAL REVIEW, 1986, 93 (01) :75-88
[39]  
Hulland J, 1999, STRATEGIC MANAGE J, V20, P195, DOI 10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO
[40]  
2-7