Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess

被引:49
作者
Wall, Jeffrey D. [1 ]
Lowry, Paul Benjamin [2 ]
Barlow, Jordan B. [3 ]
机构
[1] Michigan Technol Univ, Sch Business & Econ, Houghton, MI 49931 USA
[2] City Univ Hong Kong, Dept Informat Syst, Hong Kong, Hong Kong, Peoples R China
[3] Calif State Univ Fullerton, Fullerton, CA 92634 USA
来源
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS | 2016年 / 17卷 / 01期
关键词
Selective Organizational Information Privacy And Security Violations Model (SOIPSVM); Privacy; Security; Theory Building; Organizational Privacy; Organizational Security; Rule Violations; Policy Violations; Information Abuse; SOIPSVM; PCI DSS; HIPAA; Selective Organizational Rule Violations Model (SORVM); HEALTH-INSURANCE PORTABILITY; INTERNET PRIVACY; PERSONAL INFORMATION; ACCOUNTABILITY ACT; RISK PREFERENCES; SOCIAL-STRUCTURE; FEAR APPEALS; E-COMMERCE; ONLINE; POLICY;
D O I
10.17705/1jais.00420
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy and security concerns are pervasive because of the ease of access to information. Recurrent negative cases in the popular press attest to the failure of current privacy regulations to keep consumer and protected health information sufficiently secure in today's climate of increased IT use. One reason for such failure is that organizations violate these regulations for multiple reasons. To address this issue, we propose a theoretical model to explain the likelihood that organizations will select an externally governed privacy or security rule for violation in response to organizational strain or slack resources. Our proposed theoretical model, the selective organizational information privacy and security violations model (SOIPSVM), explains how organizational structures and processes, along with characteristics of regulatory rules, alter perceptions of risk when an organization's performance does not match its aspiration levels and, thereby, affects the likelihood of rule violations. Importantly, we contextualize SOIPSVM to organizational privacy and security violations. SOIPSVM builds on and extends the selective organizational rule violations model (SORVM), which posits that organizational rule violations are selective. SOIPSVM provides at least four contributions to the privacy and security literature that can further guide empirical research and practice. First, SOIPSVM introduces the concept of selectivity in rule violations to privacy and security research. This concept can improve privacy and security research by showing that organizational violations of privacy and security rules are dynamic and selective yet influenced by external forces. Second, SOIPSVM extends the boundaries of SORVM, which is limited to explaining the behavior of organizations under strain, such as economic hardship. We contribute to the theory of selective deviance by proposing that selectivity extends to organizations with slack resources. Third, we address ideas of non-economic risk and strain in addition to economic risk and strain. Thus, SOIPSVM explains organizational rule-violating behavior as an attempt to protect core organizational values from external entities that pressure organizations to change their values to comply with rules. Fourth, we broaden the theoretical scope of two important constructs (namely, structural secrecy and procedural emphasis) to improve the model's explanatory power. Fifth, we identify important elements of rule enforcement by drawing from the tenets of general deterrence theory. We also discuss how one can study constructs from general deterrence theory at the organizational level. To conclude, we offer recommendations for the structuring of organizations and external regulations to decrease organizational rule violations, which often lead to the abuse of consumer information.
引用
收藏
页码:39 / 76
页数:38
相关论文
共 154 条
[1]   Building on the foundation of general strain theory: Specifying the types of strain most likely to lead to crime and delinquency [J].
Agnew, R .
JOURNAL OF RESEARCH IN CRIME AND DELINQUENCY, 2001, 38 (04) :319-361
[2]   A general strain theory of community differences in crime rates [J].
Agnew, R .
JOURNAL OF RESEARCH IN CRIME AND DELINQUENCY, 1999, 36 (02) :123-155
[3]  
Agranoff M. H., 1991, Journal of Information Systems Management, V8, P48, DOI 10.1080/07399019108964997
[4]  
Akers Ronald., 2009, SOCIAL LEARNING SOCI
[5]  
Alexander C.R., 1996, MANAG DECIS ECON, V17, P421, DOI DOI 10.1002/(SICI)1099-1468(199607)17:43.0.CO
[6]  
2-U
[7]  
[Anonymous], INT C INF SYST MILW
[8]  
[Anonymous], 2011, TIME
[9]  
[Anonymous], 2003, Summary of the HIPAA Privacy Rule
[10]   Inside JetBlue's privacy policy violations [J].
Antón, AI ;
He, QF ;
Baumer, DL .
IEEE SECURITY & PRIVACY, 2004, 2 (06) :12-18