2019
DOI: 10.1371/journal.pone.0221808
|View full text |Cite
|
Sign up to set email alerts
|

Neural correlates of decision making related to information security: Self-control and moral potency

Abstract: Security breaches of digital information represent a significant threat to the wellbeing of individuals, corporations, and governments in the digital era. Roughly 50% of breaches of information security result from the actions of individuals inside organizations (i.e., insider threat), and some evidence indicates that common deterrence programs may not lessen the insiders’ intention to violate information security. This had led researchers to investigate contextual and individual difference variables that infl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

4
12
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(22 citation statements)
references
References 41 publications
(80 reference statements)
4
12
1
Order By: Relevance
“… Hu et al (2015) demonstrated that some of these modulations of the ERPs were sensitive to both the presence and severity of the ethical violation, although the effect of severity was not replicated in a later study ( West et al, 2019 ). The effect of an ethical violation on the longer latency modulations of the ERPs is sensitive to individual differences in self-control and moral beliefs ( Hu et al, 2015 ; West et al, 2019 ).…”
Section: Introductionmentioning
confidence: 91%
See 4 more Smart Citations
“… Hu et al (2015) demonstrated that some of these modulations of the ERPs were sensitive to both the presence and severity of the ethical violation, although the effect of severity was not replicated in a later study ( West et al, 2019 ). The effect of an ethical violation on the longer latency modulations of the ERPs is sensitive to individual differences in self-control and moral beliefs ( Hu et al, 2015 ; West et al, 2019 ).…”
Section: Introductionmentioning
confidence: 91%
“…Control items represent decisions that do not involve an ethical element (e.g., assisting a colleague with a project), while violation items represent decisions that involve an ethical violation related to information security (e.g., unauthorized access of a secure server). Individuals are more likely to endorse (respond Yes) to control items than violation items demonstrating a general preference for avoiding unethical behavior, with this preference being moderated by the severity of the violation ( Hu et al, 2015 ; West et al, 2019 ).…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations