TY - JOUR
T1 - Dispositional and situational factors: Influences on information security policy violations
AU - Johnston, Allen C.
AU - Warkentin, Merrill
AU - McBride, Maranda E
AU - Carter, Lemuria
PY - 2016/5/1
Y1 - 2016/5/1
N2 - Insiders represent a major threat to the security of an organization's information resources. Previous research has explored the role of dispositional and situational factors in promoting compliant behavior, but these factors have not been studied together. In this study, we use a scenario-based factorial survey approach to identify key dispositional and situational factors that lead to information security policy violation intentions. We obtained 317 observations from a diverse sample of insiders. The results of a general linear mixed model indicate that dispositional factors (particularly two personality meta-traits, Stability and Plasticity) serve as moderators of the relationships between perceptions derived from situational factors and intentions to violate information security policy. This study represents the first information security study to identify the existence of these two meta-traits and their influence on information security policy violation intentions. More importantly, this study provides new knowledge of how insiders translate perceptions into intentions based on their unique personality trait mix.
AB - Insiders represent a major threat to the security of an organization's information resources. Previous research has explored the role of dispositional and situational factors in promoting compliant behavior, but these factors have not been studied together. In this study, we use a scenario-based factorial survey approach to identify key dispositional and situational factors that lead to information security policy violation intentions. We obtained 317 observations from a diverse sample of insiders. The results of a general linear mixed model indicate that dispositional factors (particularly two personality meta-traits, Stability and Plasticity) serve as moderators of the relationships between perceptions derived from situational factors and intentions to violate information security policy. This study represents the first information security study to identify the existence of these two meta-traits and their influence on information security policy violation intentions. More importantly, this study provides new knowledge of how insiders translate perceptions into intentions based on their unique personality trait mix.
KW - Big Five personality traits
KW - factorial survey method
KW - general deterrence theory
KW - information security policy violation
KW - meta-traits
KW - protection motivation theory
UR - https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84968585913&origin=inward
UR - https://www.scopus.com/inward/citedby.uri?partnerID=HzOxMe3b&scp=84968585913&origin=inward
U2 - 10.1057/ejis.2015.15
DO - 10.1057/ejis.2015.15
M3 - Article
SN - 0960-085X
VL - 25
SP - 231
EP - 251
JO - European Journal of Information Systems
JF - European Journal of Information Systems
IS - 3
ER -