Options
Insights into Understanding Employees' Compliance with IT Security Policies in the Shadow IT Context
What types of insider violations are practiced, which neutralization technique is used, what is the overall effect on deterrence and under which conditions? All these questions are currently unanswered. According to (Willison & Warkentin, 2013) these questions are very relevant as "research addressing these areas would not only broaden our understanding of employee computer abuse, but also provide a firm basis for contemplating intervention strategies". Our study aims to address these questions and extend the current theoretical understanding of employee's compliance with IT security policies in the Shadow IT context. Based on the preliminary studies we conducted and supported by the neutralization theory, we aim to answer the following research questions:
- Which rationalizations are associated with the Shadow IT specific form of a deviant act?
- Are neutralization techniques good predictors of employee's intention to be non-compliant in the Shadow IT context?
With our study we aim to advance the current understanding from theoretical and practical standpoints by publishing our work in high-ranking international journals.
Warning! A Comprehensive Model of the Effects of Digital Information Security Warning Messages
Taxonomy of technological risks of open source software in the enterprise adoption context
The dark side of social networking sites : Understanding phishing risks
Identification and Importance of the Technological Risks of Open Source Software in the Enterprise Adoption Context
Atos - Towards Zero Email Company
Email: from hero to zero - the beginning of the end?
Atos: Towards Zero Email Company
The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption