{"title":"Cultural drivers behind employees neutralizing deviant information systems security behaviors","authors":"Yimer Mohammed, Merrill Warkentin, Tibebe Beshah","doi":"10.1108/jkm-09-2024-1108","DOIUrl":null,"url":null,"abstract":"<h3>Purpose</h3>\n<p>This study aims to investigate how cultural factors – specifically power distance (PD) and uncertainty avoidance (UA) – affect employees’ use of neutralization techniques to rationalize deviant information systems (IS) behaviors. The goal is to enhance strategies for managing insider threats and improving security policies.</p><!--/ Abstract__block -->\n<h3>Design/methodology/approach</h3>\n<p>A cross-sectional survey was used to examine how national culture affects neutralization strategies related to IS misuse. A scenario-based survey was used to gather data from 292 employees, stressing four top ranked IS deviant behaviors in Ethiopian organizations. Using SmartPLS 4.0 software, the study validates measurement and structural models using partial least squares structural equation modeling. It then uses bootstrapping procedures to assess hypotheses that predict the use of justifications in situations of IS misuse.</p><!--/ Abstract__block -->\n<h3>Findings</h3>\n<p>The research finds that all four neutralization techniques – appeal to higher loyalty, claim of normalcy, defense of necessity and denial of responsibility – significantly predicted employees’ IS deviant use intention behaviors. PD and UA cultures also significantly influence IS deviant use intention, with neutralization techniques mediating this relationship, validating the model’s predictive relevance.</p><!--/ Abstract__block -->\n<h3>Research limitations/implications</h3>\n<p>The reliance on self-reported data and a cross-sectional design may limit the accuracy and causal inference of the findings. Additionally, the focus on Ethiopian respondents may restrict generalizability, highlighting the need for research in diverse contexts. Future studies could explore longitudinal or experimental designs and examine neutralization techniques and knowledge management to understand IS security.</p><!--/ Abstract__block -->\n<h3>Originality/value</h3>\n<p>This study introduces a novel model illustrating how cultural values, such as PD and UA, influence employees’ use of neutralization techniques to justify deviant behavior in Ethiopian organizations. It emphasizes the mediating role of these techniques and the need for culturally tailored anti-neutralization strategies and effective security awareness programs.</p><!--/ Abstract__block -->","PeriodicalId":48368,"journal":{"name":"Journal of Knowledge Management","volume":"38 1","pages":""},"PeriodicalIF":6.6000,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Knowledge Management","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.1108/jkm-09-2024-1108","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Purpose
This study aims to investigate how cultural factors – specifically power distance (PD) and uncertainty avoidance (UA) – affect employees’ use of neutralization techniques to rationalize deviant information systems (IS) behaviors. The goal is to enhance strategies for managing insider threats and improving security policies.
Design/methodology/approach
A cross-sectional survey was used to examine how national culture affects neutralization strategies related to IS misuse. A scenario-based survey was used to gather data from 292 employees, stressing four top ranked IS deviant behaviors in Ethiopian organizations. Using SmartPLS 4.0 software, the study validates measurement and structural models using partial least squares structural equation modeling. It then uses bootstrapping procedures to assess hypotheses that predict the use of justifications in situations of IS misuse.
Findings
The research finds that all four neutralization techniques – appeal to higher loyalty, claim of normalcy, defense of necessity and denial of responsibility – significantly predicted employees’ IS deviant use intention behaviors. PD and UA cultures also significantly influence IS deviant use intention, with neutralization techniques mediating this relationship, validating the model’s predictive relevance.
Research limitations/implications
The reliance on self-reported data and a cross-sectional design may limit the accuracy and causal inference of the findings. Additionally, the focus on Ethiopian respondents may restrict generalizability, highlighting the need for research in diverse contexts. Future studies could explore longitudinal or experimental designs and examine neutralization techniques and knowledge management to understand IS security.
Originality/value
This study introduces a novel model illustrating how cultural values, such as PD and UA, influence employees’ use of neutralization techniques to justify deviant behavior in Ethiopian organizations. It emphasizes the mediating role of these techniques and the need for culturally tailored anti-neutralization strategies and effective security awareness programs.
期刊介绍:
Knowledge Management covers all the key issues in its field including:
■Developing an appropriate culture and communication strategy ■Integrating learning and knowledge infrastructure
■Knowledge management and the learning organization
■Information organization and retrieval technologies for improving the quality of knowledge
■Linking knowledge management to performance initiatives ■Retaining knowledge - human and intellectual capital
■Using information technology to develop knowledge management ■Knowledge management and innovation
■Measuring the value of knowledge already within an organization ■What lies beyond knowledge management?