The Collective Violation Talkshow : How do Workgroups Account for Cyberdeviance?
Labres Mallmann, G., & Soliman, W. (2023). The Collective Violation Talkshow : How do Workgroups Account for Cyberdeviance?. In SCIS 2023 : Proceedings of the 14th Scandinavian Conference on Information Systems (Article 9). Association for Information Systems. https://aisel.aisnet.org/scis2023/9/
Päivämäärä
2023Oppiaine
Empirical Cyber Security and Software EngineeringTietojärjestelmätiedeEmpirical Cyber Security and Software EngineeringInformation Systems ScienceTekijänoikeudet
© 2023 Association for Information Systems
Cyberdeviance within workgroups is one of the most challenging cybersecurity problems facing modern organizations. Cyberdeviance is an intentional form of security policy violation, reflecting the outcome of a justification process deeming the violation acceptable for the violator. The collective nature of cyberdeviance within groups increases the challenge because group context can steer members to act in accordance with the group’s decisions, even when it violates organizational directives. Despite these challenges, we know very little about how workgroups justify cyberdeviance. We ask: How do workgroups create and validate accounts for cyberdeviance? Guided by the theoretical lens of accounts and based on insights from five deviant workgroups using unauthorized technologies (aka, shadow IT), our analysis points to three core findings. First, the group context is crucial to understanding the violation framing process. Second, at the discursive level, the groups use a unique set of verbalizations that deem cyberdeviance acceptable within the group. Third, we found that this set of verbalized accounts is instrumental to ensure group cohesion and belongingness. We discuss the theoretical and practical implications of these novel insights.
...
Julkaisija
Association for Information SystemsEmojulkaisun ISBN
978-952-64-9639-9Konferenssi
Scandinavian Conference on Information SystemsKuuluu julkaisuun
SCIS 2023 : Proceedings of the 14th Scandinavian Conference on Information SystemsAsiasanat
Alkuperäislähde
https://aisel.aisnet.org/scis2023/9/Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/185043994
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Revisiting neutralization theory and its underlying assumptions to inspire future information security research
Soliman, Wael; Mohammadnazar, Hojat (Association for Information Systems, 2022)Over two decades ago, neutralization theory was introduced to information systems research from the field of criminology and is currently emerging as an influential foundation to both explain and solve the information ... -
Effects of Sanctions, Moral Beliefs, and Neutralization on Information Security Policy Violations Across Cultures
Vance, Anthony; Boyer Fellow, Selvoy J.; Siponen, Mikko T.; Straub, Detmar W. (Elsevier, 2020)A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies ... -
Dokumenttiprojekti Chilen muistoista
Näveri, Anna (2018)Tämä raportti kuvaa dokumenttiprojektin teon ideasta ensi-iltaan. Kyseessä on journalistinen pro gradu, joka koostuu työnäytteestä ja kirjallisesta osasta. Työnäyte on vuonna 2017 valmistunut 50-minuuttinen dokumenttielokuva ... -
Fysioterapeuttien kokemuksia asiantuntijuudestaan moniammatillisissa työryhmissä
Tyyskä, Eija (2002) -
From Legal Fiction to Collective Agency : Contemporary Arguments for Collective Personhood
Hirvonen, Onni (Springer, 2023)In our everyday language, groups are described as if they had intentions, beliefs, attitudes, rights, and responsibilities. This practice of group personification is especially prevalent in the legal context where corporations ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.