Publication | Closed Access
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
400
Citations
83
References
2011
Year
End UsersInformation SecurityInformation Security EducationSocial InfluenceOrganizational BehaviorSocial SciencesPsychologyNonmalicious Security ViolationEmployee AttitudeSecurity AwarenessManagementComposite Behavior ModelCorporate ComplianceWorkplace ViolenceSocial IdentityBehavioral SciencesSecurity RiskSecurity ManagementTrustInformation Security ManagementSecurityNonmalicious Security ViolationsCriminal Behavior
End users are often the weakest link in workplace IS security, frequently violating policies without malicious intent, yet little research has examined their motivation. The study proposes and empirically tests a nonmalicious security violation model using end‑user survey data. The authors surveyed workplace end users to empirically test the NMSV model. The study found that utilitarian, normative, and self‑identity factors drive nonmalicious security violation intentions, whereas policy attitudes and sanctions do not, underscoring the importance of aligning security with business goals, fostering workgroup norms, and addressing identity match.
End users are said to be "the weakest link" in information systems (IS) security management in the workplace. They often knowingly engage in certain insecure uses of IS and violate security policies without malicious intentions. Few studies, however, have examined end user motivation to engage in such behavior. To fill this research gap, in the present study we propose and test empirically a nonmalicious security violation (NMSV) model with data from a survey of end users at work. The results suggest that utilitarian outcomes (relative advantage for job performance, perceived security risk), normative outcomes (workgroup norms), and self-identity outcomes (perceived identity match) are key determinants of end user intentions to engage in NMSVs. In contrast, the influences of attitudes toward security policy and perceived sanctions are not significant. This study makes several significant contributions to research on security-related behavior by (1) highlighting the importance of job performance goals and security risk perceptions on shaping user attitudes, (2) demonstrating the effect of workgroup norms on both user attitudes and behavioral intentions, (3) introducing and testing the effect of perceived identity match on user attitudes and behavioral intentions, and (4) identifying nonlinear relationships between constructs. This study also informs security management practices on the importance of linking security and business objectives, obtaining user buy-in of security measures, and cultivating a culture of secure behavior at local workgroup levels in organizations.
| Year | Citations | |
|---|---|---|
Page 1
Page 1