2014 47th Hawaii International Conference on System Sciences 2014
DOI: 10.1109/hicss.2014.393
|View full text |Cite
|
Sign up to set email alerts
|

Assessing Sunk Cost Effect on Employees' Intentions to Violate Information Security Policies in Organizations

Abstract: It has been widely known that employees pose insider threats to the information and technology resources of an organization. In this paper, we develop a model to explain insiders' intentional violation of the requirements of an information security policy. We propose sunk cost as a mediating factor. We test our research model on data collected from three information-intensive organizations in banking and pharmaceutical industries (n=502). Our results show that sunk cost acts as a mediator between the proposed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(17 citation statements)
references
References 25 publications
0
16
0
Order By: Relevance
“…The results of the study also show that perceptions of employee sunk costs predicted by the effects of settlement and physical mismatches [39]. The same thing was explained by Han that fulfilling psychological contracts could reduce the adverse impact of costs on ISP compliance intentions in the supervisor group [2].…”
Section: Conceptual Frameworkmentioning
confidence: 52%
See 1 more Smart Citation
“…The results of the study also show that perceptions of employee sunk costs predicted by the effects of settlement and physical mismatches [39]. The same thing was explained by Han that fulfilling psychological contracts could reduce the adverse impact of costs on ISP compliance intentions in the supervisor group [2].…”
Section: Conceptual Frameworkmentioning
confidence: 52%
“…The organization will incur higher costs when an incident occurs due to noncompliance of its employees. Kajtazi [39] examines cost factors as a mediating mechanism to explain intentional violations by people in information security policies.…”
Section: Conceptual Frameworkmentioning
confidence: 99%
“…There are few studies involving insider threat behavior (M. Maasberg, Warren, & Beebe, 2015). The psychological profiling of hackers has attracted substantial recent research interest, but the empirical results are limited (Crossler et al, 2013;Dhillon, Samonas, & Etudo, 2016;Kajtazi, Bulgurcu, Cavusoglu, & Benbasat, 2014;Roy Sarkar, 2010;Safa, Maple, Watson, & Von Solms, 2018;Warkentin, Vance, & Johnston, 2016). There are two reasons for the limited empirical research on insider threats.…”
Section: Prior Researchmentioning
confidence: 99%
“…Psychological profiling hackers has attracted substantial recent research interest [5,[9][10][11][12][13]. Motivations for participating in hacking behavior include seeking revenge, ideology, fun, thrills, survival, notoriety, recreation, and profit [5,14,15].…”
Section: Prior Research On Hacking Motivationmentioning
confidence: 99%