Information protection behaviors: morality and organizational criticality

Author:

Lankton Nancy K.,Stivason Charles,Gurung Anil

Abstract

Purpose Organizational insiders play a critical role in protecting sensitive information. Prior research finds that moral beliefs influence compliance decisions. Yet, it is less clear what factors influence moral beliefs and the conditions under which those factors have stronger/weaker effects. Using an ethical decision-making model and value congruence theory, this study aims to investigate how moral intensity and organizational criticality influence moral beliefs and intentions to perform information protection behaviors. Design/methodology/approach The hypotheses were tested using a scenario-based survey of 216 organizational insiders. Two of the scenarios depict low criticality information security protection behaviors and two depict high criticality behaviors. Findings A major finding is that users rely more on perceived social consensus and magnitude of consequences when organizational criticality is low and on temporal immediacy and proximity when criticality is high. In addition, the moral intensity dimensions explain more variance in moral beliefs when organizational criticality is low. Research limitations/implications The study is limited by its sample, which is organizational insiders at a mid-size university. It is also limited in that it only examined four of the six moral intensity dimensions. Practical implications The findings can guide management about which moral intensity dimensions are more important to focus on when remediating tone at the top and other leadership weaknesses relating to information security. Originality/value This study adds value by investigating the separate dimensions of moral intensity on information protection behaviors. It also is the first to examine moral intensity under conditions of low and high organizational criticality.

Publisher

Emerald

Subject

Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Software,Management Information Systems

Reference59 articles.

1. Dimensions of moral intensity and ethical decision making: an empirical study;Journal of Applied Social Psychology,2001

2. Issue contingencies and marketers: recognition of ethical judgments and behavioral intentions;Journal of Business Research,2004

3. Barnett, T., Brown, G., Bass, K. and Hebert, F.J. (1999), “New measures for proposed dimensions of the moral intensity of ethical issues”, Paper presented at the Academy of Management, Chicago.

4. Benjamin, R. (2014), “Tone at the top: today’s biggest cyber-security weakness”, eForensics Magazine, September 4, 2014, available at https://eforensicsmag.com/tone-at-the-top-todays-biggest-cyber-security-weakness-by-rob-benjamin/ (accessed 20 October 2018).

5. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness;MIS Quarterly,2010

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3