Antecedent factors of violation of information security rules

Purpose – This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established security rules. Design/methodology/approach – The method used involves two stages of analysis, using techniques of...

Full description

Bibliographic Details
Main Authors: Alexandre Cappellozza, Gustavo Hermínio Salati Marcondes de Moraes, Gilberto Perez, Alessandra Lourenço Simões
Format: Article
Language:English
Published: Emerald Publishing 2022-02-01
Series:RAUSP Management Journal
Subjects:
Online Access:https://www.emerald.com/insight/content/doi/10.1108/RAUSP-02-2021-0022/full/pdf?title=antecedent-factors-of-violation-of-information-security-rules
_version_ 1828105769600417792
author Alexandre Cappellozza
Gustavo Hermínio Salati Marcondes de Moraes
Gilberto Perez
Alessandra Lourenço Simões
author_facet Alexandre Cappellozza
Gustavo Hermínio Salati Marcondes de Moraes
Gilberto Perez
Alessandra Lourenço Simões
author_sort Alexandre Cappellozza
collection DOAJ
description Purpose – This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established security rules. Design/methodology/approach – The method used involves two stages of analysis, using techniques of structural equation modeling and artificial intelligence with neural networks, based on information collected from 318 workers of organizational information systems. Findings – The model provides a reasonable prediction regarding the intention to violate information security policies (ISP). The results revealed that the relationships of moral disengagement and perceived penalty significantly influence such an intention. Research limitations/implications – This research presents a multi-analytical approach that expands the robustness of the results by the complementarity of each analysis technique. In addition, it offers scientific evidence of the factors that reinforce the cognitive processes that involve workers’ decision-making in security breaches. Practical implications – The practical recommendation is to improve organizational communication to mitigate information security vulnerabilities in several ways, namely, training actions that simulate daily work routines; exposing the consequences of policy violations; disseminating internal newsletters with examples of inappropriate behavior. Social implications – Results indicate that information security does not depend on the employees’ commitment to the organization; system vulnerabilities can be explored even by employees committed to the companies. Originality/value – The study expands the knowledge about the individual factors that make information security in companies vulnerable, one of the few in the literature which aims to offer an in-depth perspective on which individual antecedent factors affect the violation of ISP.
first_indexed 2024-04-11T10:07:29Z
format Article
id doaj.art-88ae4ab1f1be42a4a66d37ef4ffe0e5c
institution Directory Open Access Journal
issn 2531-0488
language English
last_indexed 2024-04-11T10:07:29Z
publishDate 2022-02-01
publisher Emerald Publishing
record_format Article
series RAUSP Management Journal
spelling doaj.art-88ae4ab1f1be42a4a66d37ef4ffe0e5c2022-12-22T04:30:12ZengEmerald PublishingRAUSP Management Journal2531-04882022-02-015718510310.1108/RAUSP-02-2021-0022676954Antecedent factors of violation of information security rulesAlexandre Cappellozza0Gustavo Hermínio Salati Marcondes de Moraes1Gilberto Perez2Alessandra Lourenço Simões3Universidade Presbiteriana Mackenzie, Centro de Ciências Sociais e Aplicadas, Sao Paulo, BrazilUniversidade Estadual de Campinas, Faculdade de Ciências Aplicadas, Limeira, BrazilUniversidade Presbiteriana Mackenzie, Centro de Ciências Sociais e Aplicadas, Sao Paulo, BrazilUniversidade Metodista de São Paulo, São Bernardo do Campo, BrazilPurpose – This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established security rules. Design/methodology/approach – The method used involves two stages of analysis, using techniques of structural equation modeling and artificial intelligence with neural networks, based on information collected from 318 workers of organizational information systems. Findings – The model provides a reasonable prediction regarding the intention to violate information security policies (ISP). The results revealed that the relationships of moral disengagement and perceived penalty significantly influence such an intention. Research limitations/implications – This research presents a multi-analytical approach that expands the robustness of the results by the complementarity of each analysis technique. In addition, it offers scientific evidence of the factors that reinforce the cognitive processes that involve workers’ decision-making in security breaches. Practical implications – The practical recommendation is to improve organizational communication to mitigate information security vulnerabilities in several ways, namely, training actions that simulate daily work routines; exposing the consequences of policy violations; disseminating internal newsletters with examples of inappropriate behavior. Social implications – Results indicate that information security does not depend on the employees’ commitment to the organization; system vulnerabilities can be explored even by employees committed to the companies. Originality/value – The study expands the knowledge about the individual factors that make information security in companies vulnerable, one of the few in the literature which aims to offer an in-depth perspective on which individual antecedent factors affect the violation of ISP.https://www.emerald.com/insight/content/doi/10.1108/RAUSP-02-2021-0022/full/pdf?title=antecedent-factors-of-violation-of-information-security-rulessecuritytechnologyviolation of information securitymoral disengagementinformationstructural equation modelingneural networksviolation of information security
spellingShingle Alexandre Cappellozza
Gustavo Hermínio Salati Marcondes de Moraes
Gilberto Perez
Alessandra Lourenço Simões
Antecedent factors of violation of information security rules
RAUSP Management Journal
security
technology
violation of information security
moral disengagement
information
structural equation modeling
neural networks
violation of information security
title Antecedent factors of violation of information security rules
title_full Antecedent factors of violation of information security rules
title_fullStr Antecedent factors of violation of information security rules
title_full_unstemmed Antecedent factors of violation of information security rules
title_short Antecedent factors of violation of information security rules
title_sort antecedent factors of violation of information security rules
topic security
technology
violation of information security
moral disengagement
information
structural equation modeling
neural networks
violation of information security
url https://www.emerald.com/insight/content/doi/10.1108/RAUSP-02-2021-0022/full/pdf?title=antecedent-factors-of-violation-of-information-security-rules
work_keys_str_mv AT alexandrecappellozza antecedentfactorsofviolationofinformationsecurityrules
AT gustavoherminiosalatimarcondesdemoraes antecedentfactorsofviolationofinformationsecurityrules
AT gilbertoperez antecedentfactorsofviolationofinformationsecurityrules
AT alessandralourencosimoes antecedentfactorsofviolationofinformationsecurityrules