Näytä suppeat kuvailutiedot

dc.contributor.authorSoliman, Wael
dc.contributor.authorMohammadnazar, Hojat
dc.date.accessioned2023-04-17T09:54:17Z
dc.date.available2023-04-17T09:54:17Z
dc.date.issued2022
dc.identifier.citationSoliman, W., & Mohammadnazar, H. (2022). Revisiting neutralization theory and its underlying assumptions to inspire future information security research. In <i>WISP 2022 : Proceedings of the 17th Workshop on Information Security and Privacy</i>. Association for Information Systems. <a href="https://aisel.aisnet.org/wisp2022/2/" target="_blank">https://aisel.aisnet.org/wisp2022/2/</a>
dc.identifier.otherCONVID_182734210
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/86370
dc.description.abstractOver two decades ago, neutralization theory was introduced to information systems research from the field of criminology and is currently emerging as an influential foundation to both explain and solve the information security policy noncompliance problem. Much of what we know about the theory focuses exclusively on the neutralization techniques identified in the original as well as subsequent criminological writings. What is often left unexamined in IS research is the underlying assumptions about the theory’s core elements; assumptions about the actor, the act, the normative system, and the nature of neutralizing itself. The objective of this commentary is to revisit the origin of neutralization theory to identify its core assumptions and to lay a foundation for future IS research inspired by these assumptions. This paper points to five core assumptions: (1) The actor is an early-stage offender; (2) The act is shameful; (3) Neutralizing precedes and facilitates deviance; (4) Normative rules are disputable; and (5) Specific neutralization techniques are more relevant to specific violations. Ignoring these underlying assumptions could lead to a situation where we make unfounded claims about the theory or provide practitioners with harmful, rather than helpful, guidance.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAssociation for Information Systems
dc.relation.ispartofWISP 2022 : Proceedings of the 17th Workshop on Information Security and Privacy
dc.relation.urihttps://aisel.aisnet.org/wisp2022/2/
dc.rightsIn Copyright
dc.subject.otherneutralointiteoria
dc.subject.otherneutralization theory
dc.subject.otherunderlying assumptions
dc.subject.otherISP violations
dc.titleRevisiting neutralization theory and its underlying assumptions to inspire future information security research
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202304172495
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringfi
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringen
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatusnonPeerReviewed
dc.type.versionpublishedVersion
dc.rights.copyright© Association for Information Systems 2022
dc.rights.accesslevelopenAccessfi
dc.relation.conferencePre-ICIS Workshop on Information Security and Privacy
dc.subject.ysotietoturva
dc.subject.ysokyberturvallisuus
dc.subject.ysotietojärjestelmät
dc.subject.ysotietoturvapolitiikka
dc.subject.ysoohjeet
dc.subject.ysotyöntekijät
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
jyx.subject.urihttp://www.yso.fi/onto/yso/p25795
jyx.subject.urihttp://www.yso.fi/onto/yso/p9583
jyx.subject.urihttp://www.yso.fi/onto/yso/p1075
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmD3


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright