571
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Exploring Personal and Environmental Factors that Can Reduce Nonmalicious Information Security Violations

 

ABSTRACT

Employee engagement in nonmalicious information security violations (NISVs) is a threat to organizations. The Social Cognitive Theory was used to investigate the effects of personal and environmental factors on the intention to engage in NISVs. Data of 204 working professionals in Germany were used for analysis. Key results showed that personal goal setting, employee organizational commitment, and vicarious learning reduced employees’ intentions to engage in NISVs. Implications of the findings for research and practice were discussed.

Acknowledgments

The constructive comments provided by two anonymous reviewers of an earlier draft of the manuscript is appreciated. Funding for this research was provided by the Social Sciences and Humanities Research Council of Canada (#2015-423).

Disclosure statement

No potential conflict of interest was reported by the author(s).

Notes

1. A disgruntled employee who damages or sabotages organizational IS is considered a malicious insider threat. An employee who intentionally breaks organizational IS usage policies, but without an intent to harm the organization, is a nonmalicious insider threat. An employee who accidentally enters the wrong data in an online database or clicks on a link in a phishing e-mail is an accidental insider threat. A credential thief tries to get information by claiming to be someone else.

Additional information

Funding

This work was supported by the Social Sciences and Humanities Research Council of Canada (#2015-423).

Notes on contributors

Princely Ifinedo

Princely Ifinedo is a Professor in the Goodman School of Business at Brock University, Canada. He holds a Ph.D. in Information Systems (IS) from University of Jyväskylä, Finland, and an MBA from the Royal Holloway, University of London, UK. His research includes IS security management, E-business, IS adoptions, and IS issues in developing economies. He has presented papers at various international IS conferences, contributed chapters to several books, encyclopedia, and published in reputable journals such as I & M, ISM, IJIM, EIS, CHB, JGIM, JGTIM, ITD, JCIS, JSS, and DATABASE, among others. He is affiliated with AIS and ASAC.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.