{"title":"Understanding Shadow IT usage intention: a view of the dual-factor model","authors":"Trang Nguyen","doi":"10.1108/oir-04-2022-0243","DOIUrl":null,"url":null,"abstract":"Purpose Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention. Design/methodology/approach An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents. Findings The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls. Originality/value This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.","PeriodicalId":54683,"journal":{"name":"Online Information Review","volume":"41 1","pages":"0"},"PeriodicalIF":3.1000,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Online Information Review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/oir-04-2022-0243","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Purpose Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention. Design/methodology/approach An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents. Findings The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls. Originality/value This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.
期刊介绍:
The journal provides a multi-disciplinary forum for scholars from a range of fields, including information studies/iSchools, data studies, internet studies, media and communication studies and information systems.
Publishes research on the social, political and ethical aspects of emergent digital information practices and platforms, and welcomes submissions that draw upon critical and socio-technical perspectives in order to address these developments.
Welcomes empirical, conceptual and methodological contributions on any topics relevant to the broad field of digital information and communication, however we are particularly interested in receiving submissions that address emerging issues around the below topics.
Coverage includes (but is not limited to):
•Online communities, social networking and social media, including online political communication; crowdsourcing; positive computing and wellbeing.
•The social drivers and implications of emerging data practices, including open data; big data; data journeys and flows; and research data management.
•Digital transformations including organisations’ use of information technologies (e.g. Internet of Things and digitisation of user experience) to improve economic and social welfare, health and wellbeing, and protect the environment.
•Developments in digital scholarship and the production and use of scholarly content.
•Online and digital research methods, including their ethical aspects.