Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i46/107187
Year: 2016, Volume: 9, Issue: 46, Pages: 1-4
Original Article
Myeonggil Choi1 and Jeongseok Song2*
1Department of Business Administration, Chung-Ang University, 84 Heukseak-Ro, Dongjak-Gu, Seoul, 156-756, Korea; [email protected]. 2Department of Economics, Chung-Ang University, 84 Heukseak-Ro, Dongjak-Gu, Seoul, 156-756, Korea; [email protected]
*Author for correspondence
Jeongseok Song Department of Economics, Chung-Ang University, 84 Heukseak-Ro, Dongjak-Gu, Seoul, 156-756, Korea; [email protected]
Objectives: In these days, security violation could lead to vulnerabilities of organization. Many scholars tried to explain the violation and suggested ways to prevent user from violating information security policy. Methods/Statistical Analysis: While neutralization is used to explain the behavior of juvenile delinquency, neutralization is utilized to show the behavior of the violation in information security. Neutralization was used to explain the software piracy and the violation of information security. This study tries to investigate the extensive literature review explaining the violation behavior of information security policy and summarizes the important mainstreams giving the implications. This paper invests theoretical ground on neutralization. Findings: This study suggests the extensive adaptability of neutralization techniques applied in the information security policy. Individuals consider the violation of information security the minor rule breaking behavior. Neutralization has been utilized to explain the minor deviant behavior, so it also can be accepted to explain the various violation behaviors in the field of information security policy. Improvements/Applications: Neutralization can be useful in understanding the violation behavior of information security policy and used in designing security management systems in various organizations.
Keywords: Deterrence Theory, Information Security, Neutralization, Organization Theory, Rational Theory, Violation Behavior
Subscribe now for latest articles and news.