Abstract
PurposeThe paper focuses on intentional information security breaches by insiders. The purpose is to assess the relationship between insiders' backgrounds and motivations and their deviant behaviors. Two outcome variables, information technology (IT) espionage and IT sabotage, are correlated with four predictors, financial changes, relationship strains, substance abuse, and job changes.Design/methodology/approachSome 62 cases of intentional information security breaches by insiders are examined using canonical analysis.FindingsThe results indicate that a significant relationship exists between financial hardship, relationship strains, and the theft and sale of proprietary data by insiders; and recent firings, substance abuse, and relationship strains are related to information system sabotage.Research limitations/implicationsBecause little or no research has been conducted on this topic, there is a lack of validated measures for variables associated with information security. Thus, the measures used in this paper are necessarily simplistic. Because few organizations report information security weaknesses, the sample is relatively small.Practical implicationsIn the majority of cases included in this paper, it is found that the insider convey a number of warning signs before committing the security breach. After reading this paper, diligent managers should be able to identify potential security breaches.Originality/valueThis is one of the first studies to explore insider security breaches using canonical analysis.
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference53 articles.
1. Aldhizer, G. (2007), “The insider threat”, Internal Auditor, Vol. 65 No. 2, pp. 71‐3.
2. Ambrose, M., Seabright, M. and Schminke, M. (2000), “Sabotage in the workplace: the role of organizational injustice”, Organizational Behavior and Human Decision Processes, Vol. 89 No. 1, pp. 947‐66.
3. Band, S., Cappelli, D., Moore, A. and Shaw, E. (2006), Comparing Insider Sabotage and Espionage: A Model‐Based Analysis, Defense Personnel Security Research Center, Monterey, CA.
4. Barton, L. (2008), Crisis Leadership Now: A Real World Guide to Preparing for Threats, Disaster, Sabotage, and Scandal, McGraw‐Hill, New York, NY.
5. Bechtoldt, M., Welk, C., Hartig, J. and Zapf, D. (2007), “Main and moderating effects of self‐control, organizational justice, and emotional labor on counterproductive behavior at work”, European Journal of Work and Organizational Psychology, Vol. 16 No. 4, pp. 479‐500.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献