Abstract
Purpose
This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale study. This paper aims to present the preliminary findings of an investigation that explored the constructs of personality traits and situational crime prevention theory (SCPT) as antecedents to social cognitive determinants (attitude, perceived behavioural control and subjective norms using the theory of planned behaviour [TPB] framing) and how these elements subsequently estimate compliant information security behaviour. Moreover, this paper delves into the contrasting influences of light and dark personality traits on insider information security compliance.
Design/methodology/approach
A cross-sectional survey was conducted to study SCPT measures and the personality factors dyad using a diverse but limited sample (n = 82).
Findings
There were ten significant direct relationships between SCPT factors and personality traits related to the components of the TPB. Seventeen hypotheses were not supported. However, these findings highlight the complexity of the topic under study.
Practical implications
Understanding individual differences within the compliance model could be used for custom training protocols, employee selection, assignment and specific types of information security interventions.
Originality/value
There is a scarcity of studies considering the effects of situational and personality factors, specifically the dark versus light triad of personality traits within the information security domain. Therefore, this preliminary result provides early insight that could guide further studies. This research could have important implications for organisations at risk of insider attacks.
Subject
Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Software,Management Information Systems
Reference65 articles.
1. The theory of planned behavior;Organizational Behavior and Human Decision Processes,1991
2. Exploring the influence of direct and indirect factors on information security policy compliance: a systematic literature review;IEEE Access,2021
3. Alotaibi, M., Furnell, S. and Clarke, N. (2016), “Information security policies: a review of challenges and influencing factors”, Paper presented at 11th International Conference for Internet Technology and Secured Transactions (ICITST), Barcelona, Spain, pp. 352-358.
4. Don't make excuses! discouraging neutralization to reduce it policy violation;Computers and Security,2013
5. Beebe, N.L. and Roa, V.S. (2005), “Using situational crime prevention theory to explain the effectiveness of information systems security”, Paper presented at SoftWars Conference, Las Vegas, NV, 1-18 December.