Author List: Guo, Ken H.; Yuan, Yufei; Archer, Norman P.; Connelly, Catherine E.;
Journal of Management Information Systems, 2011, Volume 28, Issue 2, Page 203-236.
End users are said to be "the weakest link" in information systems (IS) security management in the workplace. They often knowingly engage in certain insecure uses of IS and violate security policies without malicious intentions. Few studies, however, have examined end user motivation to engage in such behavior. To fill this research gap, in the present study we propose and test empirically a nonmalicious security violation (NMSV) model with data from a survey of end users at work. The results suggest that utilitarian outcomes (relative advantage for job performance, perceived security risk), normative outcomes (workgroup norms), and self-identity outcomes (perceived identity match) are key determinants of end user intentions to engage in NMSVs. In contrast, the influences of attitudes toward security policy and perceived sanctions are not significant. This study makes several significant contributions to research on security-related behavior by (1) highlighting the importance of job performance goals and security risk perceptions on shaping user attitudes, (2) demonstrating the effect of workgroup norms on both user attitudes and behavioral intentions, (3) introducing and testing the effect of perceived identity match on user attitudes and behavioral intentions, and (4) identifying nonlinear relationships between constructs. This study also informs security management practices on the importance of linking security and business objectives, obtaining user buy-in of security measures, and cultivating a culture of secure behavior at local workgroup levels in organizations.
Keywords: information systems security; nonlinear construct relationships; nonmalicious security violation; perceived identity match; perceived security risk; relative advantage for job performance; workgroup norms
Algorithm:

List of Topics

#186 0.176 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection
#93 0.150 performance results study impact research influence effects data higher efficiency effect significantly findings impacts empirical significant suggest outcomes better positive
#275 0.102 perceptions attitudes research study impacts importance perceived theory results perceptual perceive perception impact relationships basis significant positive reported common individuals
#99 0.096 perceived usefulness acceptance use technology ease model usage tam study beliefs intention user intentions users behavioral perceptions determinants constructs studies
#75 0.090 behavior behaviors behavioral study individuals affect model outcomes psychological individual responses negative influence explain hypotheses expected theories consequences impact theory
#298 0.090 job employees satisfaction work role turnover employee organizations organizational information ambiguity characteristics personnel stress professionals conflict organization intention variables systems
#253 0.073 user involvement development users satisfaction systems relationship specific results successful process attitude participative implementation effective application authors suggested user's contingency
#259 0.051 identity norms identification symbolic community help sense european social important verification set identities form obtained properties deterioration mixed match emphasis