University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Opinnäytteet
  • Pro gradu -tutkielmat
  • View Item
JYX > Opinnäytteet > Pro gradu -tutkielmat > View Item

Influences of moral character on insider deviant behavior in information security

Thumbnail
View/Open
688.7Kb

Downloads:  
Show download detailsHide download details  
Authors
Anti, Emmanuel
Date
2019
Discipline
TietojärjestelmätiedeInformation Systems Science
Copyright
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.

 
Insider threats has been a major challenge for organizations. Leaking sensitive information by insiders has become rampant in recent times and presents an important issue for both private and public organizations. Though prior research has indicated that the human is the weakest link in information security and has found that insiders are threats to leaking information, there is paucity of study on the characteristics of the insider that influences information leak behavior. This master’s thesis contributes to filling this important gap. Drawing on moral development and deterrence theories, this study examines the influence of an insider’s moral character on the insider’s ethical awareness on deterrence and views on leaking sensitive information. Results show that out of the four dimensions of moral character, only justice and utilitarianism dimensions directly influence an insider’s view on leaking sensitive information. However, only the justice dimension influences the insider’s ethical awareness on deterrence. Taken together, the results show that an individual with high ethical views on justice is more likely to heed to deterrence polices; however, such individual is highly likely to leak information when heeding to deterrence policies contradicts his/her ethical views on justice. Also, contrary to the notion that personal interest (i.e., egoism) is a fundamental determinant of an insider’s view on leaking information, this study shows that an individual’s view of public interest is a stronger determinant of his/her view on leaking infor-mation. The several implications for research and practice deduced from the results are discussed. This research contributes generally to research on infor-mation systems security and specifically to the importance of moral development theory and deterrence theory in explaining insider information leak behavior. ...
Keywords
Insider Deviant Behavior Leaks Sensitive Information Moral development Deterrence Moral Character
URI

http://urn.fi/URN:NBN:fi:jyu-201908163851

Metadata
Show full item record
Collections
  • Pro gradu -tutkielmat [23404]

Related items

Showing items with similar title or keywords.

  • Exploring determinants of different information security behaviors 

    Kinnunen, Sanna (2016)
    Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Offense-to-Self Theory (SOS), to better understand information security behavior (ISB). In addition, more commonly used ...
  • Impact of deterrence theory methods on employees' information security behavior 

    Kuhalampi, Mikko (2017)
    Peloteteoria (Deterrence theory) on alun perin psykologiassa ja kriminologiassa käytetty termi, ja sen mukaan rangaistuksen pelko estää yksilöä toimimasta vastoin lakia ja sääntöjä. Digitalisoituvassa maailmassa on viimeisen ...
  • Moral sensitivity in information security dilemmas 

    Mohammadnazar, Hojat; Ghanbari, Hadi; Siponen, Mikko (Association for Information Systems, 2019)
    Activities that undermine information security such as noncompliance with information security policies raise moral concerns since they can expose valuable information assets. Existing research shows that moral reflection ...
  • Toward a stage theory of the development of employees' information security behavior 

    Karjalainen, Mari; Siponen, Mikko; Sarker, Suprateek (Elsevier, 2020)
    Existing behavioral information security research proposes continuum or non-stage models that focus on finding static determinants for information security behavior (ISB) that remains unchanged. Such models cannot explain ...
  • Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions 

    Siponen, Mikko; Soliman, Wael; Vance, Anthony (ACM, 2022)
    In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre