理解影子IT使用意图:双因素模型的观点

IF 3.1 3区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Online Information Review Pub Date : 2023-09-25 DOI:10.1108/oir-04-2022-0243
Trang Nguyen
{"title":"理解影子IT使用意图:双因素模型的观点","authors":"Trang Nguyen","doi":"10.1108/oir-04-2022-0243","DOIUrl":null,"url":null,"abstract":"Purpose Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention. Design/methodology/approach An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents. Findings The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls. Originality/value This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.","PeriodicalId":54683,"journal":{"name":"Online Information Review","volume":"41 1","pages":"0"},"PeriodicalIF":3.1000,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Understanding Shadow IT usage intention: a view of the dual-factor model\",\"authors\":\"Trang Nguyen\",\"doi\":\"10.1108/oir-04-2022-0243\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Purpose Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention. Design/methodology/approach An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents. Findings The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls. Originality/value This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.\",\"PeriodicalId\":54683,\"journal\":{\"name\":\"Online Information Review\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":3.1000,\"publicationDate\":\"2023-09-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Online Information Review\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1108/oir-04-2022-0243\",\"RegionNum\":3,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Online Information Review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/oir-04-2022-0243","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

尽管人们越来越关注来自影子IT使用的安全漏洞和风险,这是组织内部人员所犯的一种信息安全违规行为,但这一现象很少受到学术界的关注。本研究通过整合双因素理论、技术接受与使用统一理论(UTAUT)和社会控制理论,探讨影子IT使用意愿的促进因素和阻碍因素。设计/方法/方法进行在线调查以获取数据。由于本研究的目的是调查组织内部的行为,LinkedIn,一个就业导向的网络网站,被选为主要网站,以达到潜在的受访者。结果表明,绩效期望、努力期望和主观规范对影子IT使用意愿有显著影响,而个人规范和制裁相关因素对影子IT使用意愿没有影响。此外,道德工作氛围的组织因素显著增加了个人对非正式控制和正式控制的感知。本文首次尝试将双因素理论和UTAUT模型的通用性从系统使用的语境扩展到信息安全的新语境。本研究也是为数不多的同时考虑组织和个人因素并确定其对信息安全背景下用户行为影响的研究之一。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Understanding Shadow IT usage intention: a view of the dual-factor model
Purpose Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention. Design/methodology/approach An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents. Findings The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls. Originality/value This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Online Information Review
Online Information Review 工程技术-计算机:信息系统
CiteScore
6.90
自引率
16.10%
发文量
67
审稿时长
6 months
期刊介绍: The journal provides a multi-disciplinary forum for scholars from a range of fields, including information studies/iSchools, data studies, internet studies, media and communication studies and information systems. Publishes research on the social, political and ethical aspects of emergent digital information practices and platforms, and welcomes submissions that draw upon critical and socio-technical perspectives in order to address these developments. Welcomes empirical, conceptual and methodological contributions on any topics relevant to the broad field of digital information and communication, however we are particularly interested in receiving submissions that address emerging issues around the below topics. Coverage includes (but is not limited to): •Online communities, social networking and social media, including online political communication; crowdsourcing; positive computing and wellbeing. •The social drivers and implications of emerging data practices, including open data; big data; data journeys and flows; and research data management. •Digital transformations including organisations’ use of information technologies (e.g. Internet of Things and digitisation of user experience) to improve economic and social welfare, health and wellbeing, and protect the environment. •Developments in digital scholarship and the production and use of scholarly content. •Online and digital research methods, including their ethical aspects.
期刊最新文献
A contribution-based indicator of research productivity: theoretical definition and empirical testing in the field of communication Bibliometric analysis of literature on social media trends during the COVID-19 pandemic Open science policies as regarded by the communities of researchers from the basic sciences in the scientific periphery Shaming behavior in online communities: exploring a new configuration of digital conversations Who corrects misinformation online? Self-perceived media literacy and the moderating role of reflective judgment
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1