Revisiting neutralization theory and its underlying assumptions to inspire future information security research
Soliman, W., & Mohammadnazar, H. (2022). Revisiting neutralization theory and its underlying assumptions to inspire future information security research. In WISP 2022 : Proceedings of the 17th Workshop on Information Security and Privacy. Association for Information Systems. https://aisel.aisnet.org/wisp2022/2/
Päivämäärä
2022Oppiaine
Empirical Cyber Security and Software EngineeringTietojärjestelmätiedeEmpirical Cyber Security and Software EngineeringInformation Systems ScienceTekijänoikeudet
© Association for Information Systems 2022
Over two decades ago, neutralization theory was introduced to information systems research from the field of criminology and is currently emerging as an influential foundation to both explain and solve the information security policy noncompliance problem. Much of what we know about the theory focuses exclusively on the neutralization techniques identified in the original as well as subsequent criminological writings. What is often left unexamined in IS research is the underlying assumptions about the theory’s core elements; assumptions about the actor, the act, the normative system, and the nature of neutralizing itself. The objective of this commentary is to revisit the origin of neutralization theory to identify its core assumptions and to lay a foundation for future IS research inspired by these assumptions. This paper points to five core assumptions: (1) The actor is an early-stage offender; (2) The act is shameful; (3) Neutralizing precedes and facilitates deviance; (4) Normative rules are disputable; and (5) Specific neutralization techniques are more relevant to specific violations. Ignoring these underlying assumptions could lead to a situation where we make unfounded claims about the theory or provide practitioners with harmful, rather than helpful, guidance.
...
Julkaisija
Association for Information SystemsKonferenssi
Pre-ICIS Workshop on Information Security and PrivacyKuuluu julkaisuun
WISP 2022 : Proceedings of the 17th Workshop on Information Security and PrivacyAsiasanat
Alkuperäislähde
https://aisel.aisnet.org/wisp2022/2/Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/182734210
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Effects of Sanctions, Moral Beliefs, and Neutralization on Information Security Policy Violations Across Cultures
Vance, Anthony; Boyer Fellow, Selvoy J.; Siponen, Mikko T.; Straub, Detmar W. (Elsevier, 2020)A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies ... -
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
Siponen, Mikko; Soliman, Wael; Vance, Anthony (ACM, 2022)In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ... -
Reconceptualizing the Human in the Loop : A Problematization of Taken-for-Granted Metaphors in Cybersecurity Research
Soliman, Wael; Järveläinen, Jonna (Association for Information Systems, 2024)The use of metaphors is crucial to advancing not only scientific fields but also in facilitating the development of knowledge and understanding in general. While metaphors facilitate the exchange of novel concepts and ... -
Can Individuals’ Neutralization Techniques Be Overcome? : A Field Experiment on Password Policy
Siponen, Mikko; Puhakainen, Petri; Vance, Anthony (Elsevier Advanced Technology, 2020)Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information ... -
Tietoturvaohjeiden ja työympäristön ristiriita
Ketola, Tuomas (2016)Tässä tutkimuksessa luodaan ensin katsaus alan aihepiiriin, eli tietoturvaohjeistuksiin ja standardeihin. Tämän jälkeen tarkastellaan tutkimuksen tärkeintä osiota, joka on tietoturvaohjeiden ja työympäristön välillä ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.