Antecedent factors of violation of information security rules
Alexandre Cappellozza,
Gustavo Hermínio Salati Marcondes de Moraes,
Gilberto Perez and
Alessandra Lourenço Simões
RAUSP Management Journal, 2021, vol. 57, issue 1, 85-103
Abstract:
Purpose - This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established security rules. Design/methodology/approach - The method used involves two stages of analysis, using techniques of structural equation modeling and artificial intelligence with neural networks, based on information collected from 318 workers of organizational information systems. Findings - The model provides a reasonable prediction regarding the intention to violate information security policies (ISP). The results revealed that the relationships of moral disengagement and perceived penalty significantly influence such an intention. Research limitations/implications - This research presents a multi-analytical approach that expands the robustness of the results by the complementarity of each analysis technique. In addition, it offers scientific evidence of the factors that reinforce the cognitive processes that involve workers’ decision-making in security breaches. Practical implications - The practical recommendation is to improve organizational communication to mitigate information security vulnerabilities in several ways, namely, training actions that simulate daily work routines; exposing the consequences of policy violations; disseminating internal newsletters with examples of inappropriate behavior. Social implications - Results indicate that information security does not depend on the employees’ commitment to the organization; system vulnerabilities can be explored even by employees committed to the companies. Originality/value - The study expands the knowledge about the individual factors that make information security in companies vulnerable, one of the few in the literature which aims to offer an in-depth perspective on which individual antecedent factors affect the violation of ISP.
Keywords: Security; Technology; Violation of information security; Moral disengagement; Information; Structural equation modeling; Neural networks; Violation of information security (search for similar items in EconPapers)
Date: 2021
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.emerald.com/insight/content/doi/10.110 ... d&utm_campaign=repec (text/html)
https://www.emerald.com/insight/content/doi/10.110 ... d&utm_campaign=repec (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:eme:rauspp:rausp-02-2021-0022
DOI: 10.1108/RAUSP-02-2021-0022
Access Statistics for this article
RAUSP Management Journal is currently edited by Flavio Hourneaux Junior and Kavita Miadaira Hamza
More articles in RAUSP Management Journal from Emerald Group Publishing Limited
Bibliographic data for series maintained by Emerald Support ().