Cultural drivers behind employees neutralizing deviant information systems security behaviors

IF 6.6 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE
Yimer Mohammed, Merrill Warkentin, Tibebe Beshah
{"title":"Cultural drivers behind employees neutralizing deviant information systems security behaviors","authors":"Yimer Mohammed, Merrill Warkentin, Tibebe Beshah","doi":"10.1108/jkm-09-2024-1108","DOIUrl":null,"url":null,"abstract":"<h3>Purpose</h3>\n<p>This study aims to investigate how cultural factors – specifically power distance (PD) and uncertainty avoidance (UA) – affect employees’ use of neutralization techniques to rationalize deviant information systems (IS) behaviors. The goal is to enhance strategies for managing insider threats and improving security policies.</p><!--/ Abstract__block -->\n<h3>Design/methodology/approach</h3>\n<p>A cross-sectional survey was used to examine how national culture affects neutralization strategies related to IS misuse. A scenario-based survey was used to gather data from 292 employees, stressing four top ranked IS deviant behaviors in Ethiopian organizations. Using SmartPLS 4.0 software, the study validates measurement and structural models using partial least squares structural equation modeling. It then uses bootstrapping procedures to assess hypotheses that predict the use of justifications in situations of IS misuse.</p><!--/ Abstract__block -->\n<h3>Findings</h3>\n<p>The research finds that all four neutralization techniques – appeal to higher loyalty, claim of normalcy, defense of necessity and denial of responsibility – significantly predicted employees’ IS deviant use intention behaviors. PD and UA cultures also significantly influence IS deviant use intention, with neutralization techniques mediating this relationship, validating the model’s predictive relevance.</p><!--/ Abstract__block -->\n<h3>Research limitations/implications</h3>\n<p>The reliance on self-reported data and a cross-sectional design may limit the accuracy and causal inference of the findings. Additionally, the focus on Ethiopian respondents may restrict generalizability, highlighting the need for research in diverse contexts. Future studies could explore longitudinal or experimental designs and examine neutralization techniques and knowledge management to understand IS security.</p><!--/ Abstract__block -->\n<h3>Originality/value</h3>\n<p>This study introduces a novel model illustrating how cultural values, such as PD and UA, influence employees’ use of neutralization techniques to justify deviant behavior in Ethiopian organizations. It emphasizes the mediating role of these techniques and the need for culturally tailored anti-neutralization strategies and effective security awareness programs.</p><!--/ Abstract__block -->","PeriodicalId":48368,"journal":{"name":"Journal of Knowledge Management","volume":"38 1","pages":""},"PeriodicalIF":6.6000,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Knowledge Management","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.1108/jkm-09-2024-1108","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 0

Abstract

Purpose

This study aims to investigate how cultural factors – specifically power distance (PD) and uncertainty avoidance (UA) – affect employees’ use of neutralization techniques to rationalize deviant information systems (IS) behaviors. The goal is to enhance strategies for managing insider threats and improving security policies.

Design/methodology/approach

A cross-sectional survey was used to examine how national culture affects neutralization strategies related to IS misuse. A scenario-based survey was used to gather data from 292 employees, stressing four top ranked IS deviant behaviors in Ethiopian organizations. Using SmartPLS 4.0 software, the study validates measurement and structural models using partial least squares structural equation modeling. It then uses bootstrapping procedures to assess hypotheses that predict the use of justifications in situations of IS misuse.

Findings

The research finds that all four neutralization techniques – appeal to higher loyalty, claim of normalcy, defense of necessity and denial of responsibility – significantly predicted employees’ IS deviant use intention behaviors. PD and UA cultures also significantly influence IS deviant use intention, with neutralization techniques mediating this relationship, validating the model’s predictive relevance.

Research limitations/implications

The reliance on self-reported data and a cross-sectional design may limit the accuracy and causal inference of the findings. Additionally, the focus on Ethiopian respondents may restrict generalizability, highlighting the need for research in diverse contexts. Future studies could explore longitudinal or experimental designs and examine neutralization techniques and knowledge management to understand IS security.

Originality/value

This study introduces a novel model illustrating how cultural values, such as PD and UA, influence employees’ use of neutralization techniques to justify deviant behavior in Ethiopian organizations. It emphasizes the mediating role of these techniques and the need for culturally tailored anti-neutralization strategies and effective security awareness programs.

求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
13.70
自引率
15.70%
发文量
99
期刊介绍: Knowledge Management covers all the key issues in its field including: ■Developing an appropriate culture and communication strategy ■Integrating learning and knowledge infrastructure ■Knowledge management and the learning organization ■Information organization and retrieval technologies for improving the quality of knowledge ■Linking knowledge management to performance initiatives ■Retaining knowledge - human and intellectual capital ■Using information technology to develop knowledge management ■Knowledge management and innovation ■Measuring the value of knowledge already within an organization ■What lies beyond knowledge management?
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信