Activities that undermine information security such as noncompliance with information security policies raise moral concerns since they can expose valuable information assets. Existing research shows that moral reflection could play an inhibitory role in one’s decision to undermine information security. However, it is not clear whether users interpret such decisions from a moral standpoint to engage in moral reflection in the first place. Users have to be morally sensitive before they engage in moral reflection. Moral sensitivity involves perceiving a situation as morally relevant, identifying the parties involved and perceiving possible courses of action. We examine moral sensitivity in security dilemmas in a Finnish university sett...
One of the major challenges in information systems is securing information against unauthorized acce...
Research in ethical decision making has shown that individuals treat important issues differently th...
The purpose of this study is to methodologically replicate the model presented by D’Arcy et al. (201...
Activities that undermine information security such as noncompliance with information security polic...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
Information Systems Security (ISS) risks have the capacity to harm others; thus, behaviors carrying ...
The motivation for this research in progress is to illuminate on the effects of moral and subjective...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
Organisations are under constant pressure to comply with information security requirements. However,...
Security breaches of digital information represent a significant threat to the wellbeing of individu...
Insider threats has been a major challenge for organizations. Leaking sensitive information by insid...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
Information assurance focus is on one of the three major tenants: confidentiality, integrity, and av...
As security breaches in organisations are on the rise, developing an understanding of factors enabli...
Computer monitoring of workers\u27 e-mail is becoming an increasingly contentious issue. Organizatio...
One of the major challenges in information systems is securing information against unauthorized acce...
Research in ethical decision making has shown that individuals treat important issues differently th...
The purpose of this study is to methodologically replicate the model presented by D’Arcy et al. (201...
Activities that undermine information security such as noncompliance with information security polic...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
Information Systems Security (ISS) risks have the capacity to harm others; thus, behaviors carrying ...
The motivation for this research in progress is to illuminate on the effects of moral and subjective...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
Organisations are under constant pressure to comply with information security requirements. However,...
Security breaches of digital information represent a significant threat to the wellbeing of individu...
Insider threats has been a major challenge for organizations. Leaking sensitive information by insid...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
Information assurance focus is on one of the three major tenants: confidentiality, integrity, and av...
As security breaches in organisations are on the rise, developing an understanding of factors enabli...
Computer monitoring of workers\u27 e-mail is becoming an increasingly contentious issue. Organizatio...
One of the major challenges in information systems is securing information against unauthorized acce...
Research in ethical decision making has shown that individuals treat important issues differently th...
The purpose of this study is to methodologically replicate the model presented by D’Arcy et al. (201...