• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2016, Volume: 9, Issue: 46, Pages: 1-4

Original Article

A Theoretical Review of Neutralization in Security Policy

Abstract

Objectives: In these days, security violation could lead to vulnerabilities of organization. Many scholars tried to explain the violation and suggested ways to prevent user from violating information security policy. Methods/Statistical Analysis: While neutralization is used to explain the behavior of juvenile delinquency, neutralization is utilized to show the behavior of the violation in information security. Neutralization was used to explain the software piracy and the violation of information security. This study tries to investigate the extensive literature review explaining the violation behavior of information security policy and summarizes the important mainstreams giving the implications. This paper invests theoretical ground on neutralization. Findings: This study suggests the extensive adaptability of neutralization techniques applied in the information security policy. Individuals consider the violation of information security the minor rule breaking behavior. Neutralization has been utilized to explain the minor deviant behavior, so it also can be accepted to explain the various violation behaviors in the field of information security policy. Improvements/Applications: Neutralization can be useful in understanding the violation behavior of information security policy and used in designing security management systems in various organizations. 

Keywords: Deterrence Theory, Information Security, Neutralization, Organization Theory, Rational Theory, Violation Behavior

DON'T MISS OUT!

Subscribe now for latest articles and news.