Show simple item record

dc.contributor.authorLabres Mallmann, Gabriela
dc.contributor.authorSoliman, Wael
dc.date.accessioned2023-09-27T07:34:34Z
dc.date.available2023-09-27T07:34:34Z
dc.date.issued2023
dc.identifier.citationLabres Mallmann, G., & Soliman, W. (2023). The Collective Violation Talkshow : How do Workgroups Account for Cyberdeviance?. In <i>SCIS 2023 : Proceedings of the 14th Scandinavian Conference on Information Systems</i> (Article 9). Association for Information Systems. <a href="https://aisel.aisnet.org/scis2023/9/" target="_blank">https://aisel.aisnet.org/scis2023/9/</a>
dc.identifier.otherCONVID_185043994
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/89262
dc.description.abstractCyberdeviance within workgroups is one of the most challenging cybersecurity problems facing modern organizations. Cyberdeviance is an intentional form of security policy violation, reflecting the outcome of a justification process deeming the violation acceptable for the violator. The collective nature of cyberdeviance within groups increases the challenge because group context can steer members to act in accordance with the group’s decisions, even when it violates organizational directives. Despite these challenges, we know very little about how workgroups justify cyberdeviance. We ask: How do workgroups create and validate accounts for cyberdeviance? Guided by the theoretical lens of accounts and based on insights from five deviant workgroups using unauthorized technologies (aka, shadow IT), our analysis points to three core findings. First, the group context is crucial to understanding the violation framing process. Second, at the discursive level, the groups use a unique set of verbalizations that deem cyberdeviance acceptable within the group. Third, we found that this set of verbalized accounts is instrumental to ensure group cohesion and belongingness. We discuss the theoretical and practical implications of these novel insights.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAssociation for Information Systems
dc.relation.ispartofSCIS 2023 : Proceedings of the 14th Scandinavian Conference on Information Systems
dc.relation.urihttps://aisel.aisnet.org/scis2023/9/
dc.rightsIn Copyright
dc.subject.othertietoturvapoikkeamat
dc.subject.othercyberdeviance
dc.subject.otherISP violation
dc.subject.otherworkgroups
dc.subject.otheraccounts
dc.subject.otherneutralization
dc.subject.otherrationalization
dc.subject.otherjustification
dc.subject.othermultilevel
dc.titleThe Collective Violation Talkshow : How do Workgroups Account for Cyberdeviance?
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202309275273
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringfi
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringen
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-952-64-9639-9
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.type.versionpublishedVersion
dc.rights.copyright© 2023 Association for Information Systems
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceScandinavian Conference on Information Systems
dc.subject.ysotietojärjestelmät
dc.subject.ysotietoturva
dc.subject.ysoryhmätyö
dc.subject.ysotyöryhmät
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p4079
jyx.subject.urihttp://www.yso.fi/onto/yso/p5046
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright