Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Amanda Chu & Patrick Chau & Mike So, 2015. "Explaining the Misuse of Information Systems Resources in the Workplace: A Dual-Process Approach," Journal of Business Ethics, Springer, vol. 131(1), pages 209-225, September.
- Mihaela Muntean & Laurenţiu Dijmărescu, 2018. "Sustainable Implementation of Access Control," Sustainability, MDPI, vol. 10(6), pages 1-9, May.
- Myeonggil Choi, 2016. "Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing," Sustainability, MDPI, vol. 8(7), pages 1-21, July.
- Chia-Lee Yang & Benjamin J. C. Yuan & Chi-Yo Huang, 2015. "Key Determinant Derivations for Information Technology Disaster Recovery Site Selection by the Multi-Criterion Decision Making Method," Sustainability, MDPI, vol. 7(5), pages 1-40, May.
- Francis Hannafey & Lawrence Vitulano, 2013. "Ethics and Executive Coaching: An Agency Theory Approach," Journal of Business Ethics, Springer, vol. 115(3), pages 599-603, July.
- Jensen, Michael C. & Meckling, William H., 1976. "Theory of the firm: Managerial behavior, agency costs and ownership structure," Journal of Financial Economics, Elsevier, vol. 3(4), pages 305-360, October.
- Yoav Vardi & Yoash Wiener, 1996. "Misbehavior in Organizations: A Motivational Framework," Organization Science, INFORMS, vol. 7(2), pages 151-165, April.
- Heath, Joseph, 2009. "The Uses and Abuses of Agency Theory," Business Ethics Quarterly, Cambridge University Press, vol. 19(4), pages 497-528, October.
- Myeonggil Choi & Changhan Lee, 2015. "Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations," Sustainability, MDPI, vol. 7(9), pages 1-20, August.
- Sea-Jin Chang & Arjen van Witteloostuijn & Lorraine Eden, 2010. "From the Editors: Common method variance in international business research," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 41(2), pages 178-184, February.
- Shiann Ming Wu & Dongqiang Guo & Yenchun Jim Wu & Yung Chang Wu, 2018. "Future Development of Taiwan’s Smart Cities from an Information Security Perspective," Sustainability, MDPI, vol. 10(12), pages 1-18, November.
- Detmar W. Straub, 1990. "Effective IS Security: An Empirical Study," Information Systems Research, INFORMS, vol. 1(3), pages 255-276, September.
- David E. M. Sappington, 1991. "Incentives in Principal-Agent Relationships," Journal of Economic Perspectives, American Economic Association, vol. 5(2), pages 45-66, Spring.
- Michael C. Jensen, 1994. "Self‐Interest, Altruism, Incentives, And Agency Theory," Journal of Applied Corporate Finance, Morgan Stanley, vol. 7(2), pages 40-45, June.
- Jarvis, Cheryl Burke & MacKenzie, Scott B & Podsakoff, Philip M, 2003. "A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 30(2), pages 199-218, September.
- Moberg, Dennis J., 1997. "On Employee Vice," Business Ethics Quarterly, Cambridge University Press, vol. 7(4), pages 41-60, October.
- John D’Arcy & Anat Hovav, 2009. "Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures," Journal of Business Ethics, Springer, vol. 89(1), pages 59-71, May.
- Naresh K. Malhotra & Sung S. Kim & Ashutosh Patil, 2006. "Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research," Management Science, INFORMS, vol. 52(12), pages 1865-1883, December.
- John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Amanda M. Y. Chu & Connie K. W. Liu & Mike K. P. So & Benson S. Y. Lam, 2021. "Factors for Sustainable Online Learning in Higher Education during the COVID-19 Pandemic," Sustainability, MDPI, vol. 13(9), pages 1-16, April.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Yajiong Xue & Huigang Liang & Liansheng Wu, 2011. "Punishment, Justice, and Compliance in Mandatory IT Settings," Information Systems Research, INFORMS, vol. 22(2), pages 400-414, June.
- Amanda M. Y. Chu & Mike K. P. So & Ray S. W. Chung, 2018. "Applying the Randomized Response Technique in Business Ethics Research: The Misuse of Information Systems Resources in the Workplace," Journal of Business Ethics, Springer, vol. 151(1), pages 195-212, August.
- Claus Dierksmeier, 2020. "From Jensen to Jensen: Mechanistic Management Education or Humanistic Management Learning?," Journal of Business Ethics, Springer, vol. 166(1), pages 73-87, September.
- Raymond O. S. Zaal & Ronald J. M. Jeurissen & Edward A. G. Groenland, 2019. "Organizational Architecture, Ethical Culture, and Perceived Unethical Behavior Towards Customers: Evidence from Wholesale Banking," Journal of Business Ethics, Springer, vol. 158(3), pages 825-848, September.
- Jack Shih-Chieh Hsu & Sheng-Pao Shih & Yu Wen Hung & Paul Benjamin Lowry, 2015. "The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness," Information Systems Research, INFORMS, vol. 26(2), pages 282-300, June.
- John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
- Simon Trang & Benedikt Brendel, 2019. "A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research," Information Systems Frontiers, Springer, vol. 21(6), pages 1265-1284, December.
- Jeffrey D. Wall & Prashant Palvia & John D’Arcy, 2022. "Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios," Information Systems Frontiers, Springer, vol. 24(2), pages 637-658, April.
- Candace Martinez & J. Bowen, 2013. "The Ethical Challenges of the UN’s Clean Development Mechanism," Journal of Business Ethics, Springer, vol. 117(4), pages 807-821, November.
- Jean–Luc Arregle & Bat Batjargal & Michael A. Hitt & Justin W. Webb & Toyah Miller & Anne S. Tsui, 2015. "Family Ties in Entrepreneurs’ Social Networks and New Venture Growth," Entrepreneurship Theory and Practice, , vol. 39(2), pages 313-344, March.
- Ansgar Richter & Susanne Schrader, 2017. "Levels of Employee Share Ownership and the Performance of Listed Companies in Europe," British Journal of Industrial Relations, London School of Economics, vol. 55(2), pages 396-420, June.
- Kawai, Norifumi & Chung, Chul, 2019. "Expatriate utilization, subsidiary knowledge creation and performance: The moderating role of subsidiary strategic context," Journal of World Business, Elsevier, vol. 54(1), pages 24-36.
- Kumju Hwang & Hyemi Um, 2021. "Social Controls and Bonds of Public Information Consumer on Sustainable Utilization and Provision for Computing," Sustainability, MDPI, vol. 13(9), pages 1-20, May.
- Arnold, Ulli & Neubauer, Joerg & Schoenherr, Tobias, 2012. "Explicating factors for companies’ inclination towards corruption in Operations and supply chain management: An exploratory study in Germany," International Journal of Production Economics, Elsevier, vol. 138(1), pages 136-147.
- Gupta, Manjul & George, Joey F. & Xia, Weidong, 2019. "Relationships between IT department culture and agile software development practices: An empirical investigation," International Journal of Information Management, Elsevier, vol. 44(C), pages 13-24.
- Morteza Ghobakhloo & Masood Fathi, 2019. "Modeling the Success of Application-Based Mobile Banking," Economies, MDPI, vol. 7(4), pages 1-21, November.
- Tajeddini Kayhan & Mueller Stephen, 2019. "Moderating Effect of Environmental Dynamism on the Relationship between a Firm’s Entrepreneurial Orientation and Financial Performance," Entrepreneurship Research Journal, De Gruyter, vol. 9(4), pages 1-13, October.
- Wang, Sen & Bogle, Tim & van Kooten, G. Cornelis, 2012.
"Forestry and the New Institutional Economics,"
Working Papers
130818, University of Victoria, Resource Economics and Policy.
- Sen Wang & Tim Bogle & G. Cornelis van Kooten, 2012. "Forestry and the New Institutional Economics," Working Papers 2012-05, University of Victoria, Department of Economics, Resource Economics and Policy Analysis Research Group.
- Sidney Costa & Felipe Mendes Borini, 2017. "Global Innovation in Foreign Subsidiaries: The Impact of Entrepreneurial Orientation and Corporate Networks," Brazilian Business Review, Fucape Business School, vol. 14(4), pages 417-434, July.
- Mehrdad Vahabi, 1999.
"From Walrasian General Equilibrium to Incomplete Contracts: Making Sense of Institutions,"
Post-Print
halshs-03704424, HAL.
- Vahabi, Mehrdad, 2008. "From Walrasian general equilibrium to incomplete contracts : making sense of institutions," MPRA Paper 37887, University Library of Munich, Germany, revised 2002.
- Mehrdad Vahabi, 1999. "From Walrasian General Equilibrium to Incomplete Contracts: Making Sense of Institutions," Cahiers de la Maison des Sciences Economiques j99008, Université Panthéon-Sorbonne (Paris 1).
More about this item
Keywords
business continuity; information security; information systems misuse; insider; unethical behavior;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:12:y:2020:i:8:p:3163-:d:345457. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.