Abstract
PurposeDespite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.Design/methodology/approachAn online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.FindingsThe results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.Originality/valueThis work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.
Subject
Library and Information Sciences,Computer Science Applications,Information Systems
Reference84 articles.
1. Association between stress and information security policy non-compliance behavior: a meta-analysis;Computers and Security,2023
2. Information security policies compliance in a global setting: an employee’s perspective;Computers and Security,2023
3. Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions;MIS Quarterly,2010
4. Formal and informal sanctions: a comparison of deterrent effects;Social Problems,1977
5. An analysis on the unified theory of acceptance and use of technology theory (UTAUT): acceptance of electronic document management system (EDMS);Computers in Human Behavior,2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献