NWU Institutional Repository

I shall, we shall, and all others will: paradoxical information security behaviour

Loading...
Thumbnail Image

Date

Authors

Snyman, Dirk P.
Kruger, Hennie
Kearney, Wayne D.

Journal Title

Journal ISSN

Volume Title

Publisher

Emerald

Abstract

Purpose – The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security. Design/methodology/approach – Behavioural threshold analysis is used to test for the presence of the lemming effect in information security behaviour. Paradoxical behaviour may be caused by the influential nature of the lemming effect. The lemming effect is presented as a possible cause of the privacy paradox. Findings – The behavioural threshold analysis indicates that the lemming effect is indeed present in information security behaviour and may lead to paradoxical information security behaviour. Practical implications – The analysis of the lemming effect can be used to assist companies in understanding the way employees influence each other in their behaviour in terms of security. By identifying possible problem areas, this approach can also assist in directing their information security education endeavours towards the most relevant topics. Originality/value – This research describes the first investigation of the lemming effect in information security by means of behavioural threshold analysis in practice

Description

Citation

Snyman, D.P. et al. 2018. I shall, we shall, and all others will: paradoxical information security behaviour. Information and computer security, 26(3):290-305. [https://doi.org/10.1108/ICS-03-2018-0034]

Endorsement

Review

Supplemented By

Referenced By