Applying Push-Pull-Mooring model to investigate non-malicious workarounds behavior

dc.contributor.advisorWarkentin, Merrill
dc.contributor.authorAljohani, Nawaf
dc.date.accessioned2024-01-03T08:21:54Z
dc.date.available2024-01-03T08:21:54Z
dc.date.issued2023
dc.description.abstractMore than half of the violations of information systems security policies are initiated by non-malicious activities of insiders. To investigate these non-malicious activities, we utilized the theory of workaround and argued that the application of neutralization techniques impacts the use of workarounds. We built our model using three theories: the theory of workaround, push pull-mooring theory, and techniques of neutralization. We identified the elements of workarounds related to non-malicious violations and proposed a theoretical perspective using the push-pull-mooring theory to investigate non-malicious workarounds empirically. We propose that non-malicious activities of insiders can be seen as a switching behavior, with push factors such as system dissatisfaction and time pressure, and pull factors such as convenience and alternative attractiveness. The mooring factors in our model are techniques of neutralization, including denial of injury, denial of responsibility, and defense of necessity. We employed the scenario-based factorial survey method to mitigate the effect of social desirability bias. Our mixed model analysis indicates that time pressure, convenience, denial of injury, and defense of necessity significantly impact an individual's likelihood of engaging in non-malicious workarounds. Additionally, the relative weight analysis of our model shows that convenience and time pressure explain most of the variance in our model.
dc.format.extent153
dc.identifier.citationAljohani, Nawaf Rasheed, "Applying Push-Pull-Mooring model to investigate non-malicious workarounds behavior" (2023). Theses and Dissertations. 5905. https://scholarsjunction.msstate.edu/td/5905
dc.identifier.urihttps://hdl.handle.net/20.500.14154/70514
dc.language.isoen_US
dc.publisherSaudi Digital Library
dc.subjectInformation Systems
dc.subjectSecurity
dc.subjectInsiders
dc.subjectNon-malicious
dc.subjectPush-pull-mooring
dc.subjectTechniques of Neutralization
dc.subjectFactorial Survey Method
dc.subjectThreat
dc.titleApplying Push-Pull-Mooring model to investigate non-malicious workarounds behavior
dc.typeThesis
sdl.degree.departmentManagement Information Systems
sdl.degree.disciplineBusiness Information Systems
sdl.degree.grantorMississippi State Univesity
sdl.degree.nameDoctor of Philosophy

Files

Copyright owned by the Saudi Digital Library (SDL) © 2025