Cultural drivers behind employees neutralizing deviant information systems security behaviors

IF 6.6 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Journal of Knowledge Management Pub Date : 2025-02-10 DOI:10.1108/jkm-09-2024-1108
Yimer Mohammed, Merrill Warkentin, Tibebe Beshah
{"title":"Cultural drivers behind employees neutralizing deviant information systems security behaviors","authors":"Yimer Mohammed, Merrill Warkentin, Tibebe Beshah","doi":"10.1108/jkm-09-2024-1108","DOIUrl":null,"url":null,"abstract":"<h3>Purpose</h3>\n<p>This study aims to investigate how cultural factors – specifically power distance (PD) and uncertainty avoidance (UA) – affect employees’ use of neutralization techniques to rationalize deviant information systems (IS) behaviors. The goal is to enhance strategies for managing insider threats and improving security policies.</p><!--/ Abstract__block -->\n<h3>Design/methodology/approach</h3>\n<p>A cross-sectional survey was used to examine how national culture affects neutralization strategies related to IS misuse. A scenario-based survey was used to gather data from 292 employees, stressing four top ranked IS deviant behaviors in Ethiopian organizations. Using SmartPLS 4.0 software, the study validates measurement and structural models using partial least squares structural equation modeling. It then uses bootstrapping procedures to assess hypotheses that predict the use of justifications in situations of IS misuse.</p><!--/ Abstract__block -->\n<h3>Findings</h3>\n<p>The research finds that all four neutralization techniques – appeal to higher loyalty, claim of normalcy, defense of necessity and denial of responsibility – significantly predicted employees’ IS deviant use intention behaviors. PD and UA cultures also significantly influence IS deviant use intention, with neutralization techniques mediating this relationship, validating the model’s predictive relevance.</p><!--/ Abstract__block -->\n<h3>Research limitations/implications</h3>\n<p>The reliance on self-reported data and a cross-sectional design may limit the accuracy and causal inference of the findings. Additionally, the focus on Ethiopian respondents may restrict generalizability, highlighting the need for research in diverse contexts. Future studies could explore longitudinal or experimental designs and examine neutralization techniques and knowledge management to understand IS security.</p><!--/ Abstract__block -->\n<h3>Originality/value</h3>\n<p>This study introduces a novel model illustrating how cultural values, such as PD and UA, influence employees’ use of neutralization techniques to justify deviant behavior in Ethiopian organizations. It emphasizes the mediating role of these techniques and the need for culturally tailored anti-neutralization strategies and effective security awareness programs.</p><!--/ Abstract__block -->","PeriodicalId":48368,"journal":{"name":"Journal of Knowledge Management","volume":"38 1","pages":""},"PeriodicalIF":6.6000,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Knowledge Management","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.1108/jkm-09-2024-1108","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 0

Abstract

Purpose

This study aims to investigate how cultural factors – specifically power distance (PD) and uncertainty avoidance (UA) – affect employees’ use of neutralization techniques to rationalize deviant information systems (IS) behaviors. The goal is to enhance strategies for managing insider threats and improving security policies.

Design/methodology/approach

A cross-sectional survey was used to examine how national culture affects neutralization strategies related to IS misuse. A scenario-based survey was used to gather data from 292 employees, stressing four top ranked IS deviant behaviors in Ethiopian organizations. Using SmartPLS 4.0 software, the study validates measurement and structural models using partial least squares structural equation modeling. It then uses bootstrapping procedures to assess hypotheses that predict the use of justifications in situations of IS misuse.

Findings

The research finds that all four neutralization techniques – appeal to higher loyalty, claim of normalcy, defense of necessity and denial of responsibility – significantly predicted employees’ IS deviant use intention behaviors. PD and UA cultures also significantly influence IS deviant use intention, with neutralization techniques mediating this relationship, validating the model’s predictive relevance.

Research limitations/implications

The reliance on self-reported data and a cross-sectional design may limit the accuracy and causal inference of the findings. Additionally, the focus on Ethiopian respondents may restrict generalizability, highlighting the need for research in diverse contexts. Future studies could explore longitudinal or experimental designs and examine neutralization techniques and knowledge management to understand IS security.

Originality/value

This study introduces a novel model illustrating how cultural values, such as PD and UA, influence employees’ use of neutralization techniques to justify deviant behavior in Ethiopian organizations. It emphasizes the mediating role of these techniques and the need for culturally tailored anti-neutralization strategies and effective security awareness programs.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
13.70
自引率
15.70%
发文量
99
期刊介绍: Knowledge Management covers all the key issues in its field including: ■Developing an appropriate culture and communication strategy ■Integrating learning and knowledge infrastructure ■Knowledge management and the learning organization ■Information organization and retrieval technologies for improving the quality of knowledge ■Linking knowledge management to performance initiatives ■Retaining knowledge - human and intellectual capital ■Using information technology to develop knowledge management ■Knowledge management and innovation ■Measuring the value of knowledge already within an organization ■What lies beyond knowledge management?
期刊最新文献
Knowledge governance and innovation ambidexterity in the platform context: exploring the role of knowledge transformation Cultural drivers behind employees neutralizing deviant information systems security behaviors Cross-border interpersonal knowledge sharing within the MNE: does intra-MNE competition hinder or facilitate it? Bridging role conflict and active lurking: the role of transformational leadership in B2B online communities Emotional resources and knowledge management: a gender perspective on human-centric innovation amidst crises
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1