Cultural drivers behind employees neutralizing deviant information systems security behaviors

IF 6.6 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE
Yimer Mohammed, Merrill Warkentin, Tibebe Beshah
{"title":"Cultural drivers behind employees neutralizing deviant information systems security behaviors","authors":"Yimer Mohammed, Merrill Warkentin, Tibebe Beshah","doi":"10.1108/jkm-09-2024-1108","DOIUrl":null,"url":null,"abstract":"<h3>Purpose</h3>\n<p>This study aims to investigate how cultural factors – specifically power distance (PD) and uncertainty avoidance (UA) – affect employees’ use of neutralization techniques to rationalize deviant information systems (IS) behaviors. The goal is to enhance strategies for managing insider threats and improving security policies.</p><!--/ Abstract__block -->\n<h3>Design/methodology/approach</h3>\n<p>A cross-sectional survey was used to examine how national culture affects neutralization strategies related to IS misuse. A scenario-based survey was used to gather data from 292 employees, stressing four top ranked IS deviant behaviors in Ethiopian organizations. Using SmartPLS 4.0 software, the study validates measurement and structural models using partial least squares structural equation modeling. It then uses bootstrapping procedures to assess hypotheses that predict the use of justifications in situations of IS misuse.</p><!--/ Abstract__block -->\n<h3>Findings</h3>\n<p>The research finds that all four neutralization techniques – appeal to higher loyalty, claim of normalcy, defense of necessity and denial of responsibility – significantly predicted employees’ IS deviant use intention behaviors. PD and UA cultures also significantly influence IS deviant use intention, with neutralization techniques mediating this relationship, validating the model’s predictive relevance.</p><!--/ Abstract__block -->\n<h3>Research limitations/implications</h3>\n<p>The reliance on self-reported data and a cross-sectional design may limit the accuracy and causal inference of the findings. Additionally, the focus on Ethiopian respondents may restrict generalizability, highlighting the need for research in diverse contexts. Future studies could explore longitudinal or experimental designs and examine neutralization techniques and knowledge management to understand IS security.</p><!--/ Abstract__block -->\n<h3>Originality/value</h3>\n<p>This study introduces a novel model illustrating how cultural values, such as PD and UA, influence employees’ use of neutralization techniques to justify deviant behavior in Ethiopian organizations. It emphasizes the mediating role of these techniques and the need for culturally tailored anti-neutralization strategies and effective security awareness programs.</p><!--/ Abstract__block -->","PeriodicalId":48368,"journal":{"name":"Journal of Knowledge Management","volume":"38 1","pages":""},"PeriodicalIF":6.6000,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Knowledge Management","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.1108/jkm-09-2024-1108","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 0

Abstract

Purpose

This study aims to investigate how cultural factors – specifically power distance (PD) and uncertainty avoidance (UA) – affect employees’ use of neutralization techniques to rationalize deviant information systems (IS) behaviors. The goal is to enhance strategies for managing insider threats and improving security policies.

Design/methodology/approach

A cross-sectional survey was used to examine how national culture affects neutralization strategies related to IS misuse. A scenario-based survey was used to gather data from 292 employees, stressing four top ranked IS deviant behaviors in Ethiopian organizations. Using SmartPLS 4.0 software, the study validates measurement and structural models using partial least squares structural equation modeling. It then uses bootstrapping procedures to assess hypotheses that predict the use of justifications in situations of IS misuse.

Findings

The research finds that all four neutralization techniques – appeal to higher loyalty, claim of normalcy, defense of necessity and denial of responsibility – significantly predicted employees’ IS deviant use intention behaviors. PD and UA cultures also significantly influence IS deviant use intention, with neutralization techniques mediating this relationship, validating the model’s predictive relevance.

Research limitations/implications

The reliance on self-reported data and a cross-sectional design may limit the accuracy and causal inference of the findings. Additionally, the focus on Ethiopian respondents may restrict generalizability, highlighting the need for research in diverse contexts. Future studies could explore longitudinal or experimental designs and examine neutralization techniques and knowledge management to understand IS security.

Originality/value

This study introduces a novel model illustrating how cultural values, such as PD and UA, influence employees’ use of neutralization techniques to justify deviant behavior in Ethiopian organizations. It emphasizes the mediating role of these techniques and the need for culturally tailored anti-neutralization strategies and effective security awareness programs.

员工消除越轨信息系统安全行为背后的文化驱动因素
目的本研究旨在探讨文化因素——特别是权力距离(PD)和不确定性回避(UA)——如何影响员工使用中和技术来合理化越轨信息系统(IS)行为。目标是增强管理内部威胁和改进安全策略的策略。设计/方法/方法采用横断面调查来研究民族文化如何影响与IS滥用相关的中和策略。一项基于场景的调查收集了292名员工的数据,强调了埃塞俄比亚组织中最常见的四种IS越轨行为。使用SmartPLS 4.0软件,该研究使用偏最小二乘结构方程建模验证了测量和结构模型。然后,它使用自举程序来评估预测在IS滥用情况下使用理由的假设。研究发现,所有四种中和技术——呼吁更高的忠诚度、声称正常、辩护必要性和否认责任——都能显著预测员工的信息系统异常使用意图行为。PD和UA文化也显著影响IS异常使用意图,中和技术介导了这种关系,验证了模型的预测相关性。研究局限/启示对自我报告数据的依赖和横断面设计可能会限制研究结果的准确性和因果推断。此外,对埃塞俄比亚受访者的关注可能会限制概括性,突出了在不同背景下进行研究的必要性。未来的研究可以探索纵向或实验设计,并检查中和技术和知识管理,以了解信息系统的安全性。原创性/价值本研究介绍了一个新颖的模型,说明了文化价值观,如PD和UA,如何影响埃塞俄比亚组织中员工使用中和技术来证明偏差行为的合理性。它强调了这些技术的中介作用,以及对文化量身定制的反中和策略和有效的安全意识计划的需求。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
13.70
自引率
15.70%
发文量
99
期刊介绍: Knowledge Management covers all the key issues in its field including: ■Developing an appropriate culture and communication strategy ■Integrating learning and knowledge infrastructure ■Knowledge management and the learning organization ■Information organization and retrieval technologies for improving the quality of knowledge ■Linking knowledge management to performance initiatives ■Retaining knowledge - human and intellectual capital ■Using information technology to develop knowledge management ■Knowledge management and innovation ■Measuring the value of knowledge already within an organization ■What lies beyond knowledge management?
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信