Skip to main content

Do We Protect What We Own?: A Proposed Neurophysiological Exploration of Workplace Information Protection Motivation

  • Conference paper
  • First Online:
Information Systems and Neuroscience

Part of the book series: Lecture Notes in Information Systems and Organisation ((LNISO,volume 32))

  • 1223 Accesses

Abstract

Part-time and temporary employees and contractors become a major cybersecurity threat for organizations due to the ephemeral nature of their engagement. Compared with full-time employees, they may be less commited to the welfare of the organization and, therefore, less willing to engage in security recommendations to protect it. Perceived psychological ownership is an important factor that shapes employees’ security behaviors. The endowment effect also explains employees’ tendencies to overvalue information that belongs to them, and conversely, extend fewer protections to information that they view as belonging to others. Thus, employees may be more motivated to safeguard their own information than organizational information. From a principle-agent perspective, this study investigates how three types of employees perceive organizational and personal information, and how different employees make decisions about protecting their own versus organizational information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schwab, W., & Poujol, M. (2018). The state of industrial cybersecurity 2018. Available at https://ics.kaspersky.com/media/2018-Kaspersky-ICS-Whitepaper.pdf.

  2. Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549–566.

    Article  Google Scholar 

  3. Goldman, J. (2014 January). Data breach roundup. Available at https://www.esecurityplanet.com/network-security/data-breach-roundup-january-2014.html.

  4. D’Arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20(6), 643–658.

    Article  Google Scholar 

  5. De Cuyper, N., & De Witte, H. (2007). Job insecurity in temporary versus permanent workers: Associations with attitudes, well-being, and behaviour. Work and Stress, 21(1), 65–84.

    Article  Google Scholar 

  6. Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers and Security, 24(6), 472–484.

    Article  Google Scholar 

  7. Williamson, O. E. (1991). Comparative economic organization: The analysis of discrete structural alternatives. Administrative Science Quarterly, 36(2), 269–296.

    Article  Google Scholar 

  8. Sharma, S., & Warkentin, M. (2018). Do I really belong? Impact of employment status on information security policy compliance. Computers and Security, forthcoming, (published online September 23, 2018 at https://www.sciencedirect.com/science/article/pii/S0167404818304024).

  9. Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.

    Article  Google Scholar 

  10. Menard, P., Warkentin, M., & Lowry, P. B. (2018). The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Computers & Security, 75, 147–166.

    Article  Google Scholar 

  11. Pierce, J. L., Kostova, T., & Dirks, K. T. (2003). The state of psychological ownership: Integrating and extending a century of research. Review of General Psychology, 7(1), 84–107.

    Article  Google Scholar 

  12. Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of Management Review, 14(1), 57–74.

    Article  Google Scholar 

  13. Jensen, M. C., & Meckling, W. H. (1976). Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of Financial Economics, 3(4), 305–360.

    Article  Google Scholar 

  14. Milgrom, P. R., & Roberts, J. D. (1992). Economics, organization and management. Englewood Cliffs, NJ: Prentice-Hall.

    Google Scholar 

  15. Chrisman, J. J., Chua, J. H., & Litz, R. A. (2004). Comparing the agency costs of family and non–family firms: Conceptual issues and exploratory evidence. Entrepreneurship Theory and Practice, 28(4), 335–354.

    Article  Google Scholar 

  16. Chrisman, J. J., Chua, J. H., Kellermanns, F. W., & Chang, E. P. (2007). Are family managers agents or stewards? An exploratory study in privately held family firms. Journal of Business Research, 60(10), 1030–1038.

    Article  Google Scholar 

  17. Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165.

    Article  Google Scholar 

  18. Chen, Y., Ramamurthy, K., & Wen, K. W. (2012). Organizations’ information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, 29(3), 157–188.

    Article  Google Scholar 

  19. Dittmar, H. (1992). The social psychology of material possessions: To have is to be. Harvester Wheatsheaf and St. Martin’’s Press.

    Google Scholar 

  20. Pierce, J. L., & Furo, C. A. (1990). Employee ownership: Implications for management. Organizational Dynamics, 18(3), 32–43.

    Article  Google Scholar 

  21. Pierce, J. L., Kostova, T., & Dirks, K. T. (2001). Toward a theory of psychological ownership in organizations. Academy of Management Review, 26(2), 298–310.

    Article  Google Scholar 

  22. Van Dyne, L., & Pierce, J. L. (2004). Psychological ownership and feelings of possession: Three field studies predicting employee attitudes and organizational citizenship behavior. Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior, 25(4), 439–459.

    Article  Google Scholar 

  23. Isaacs, S. (1993). Social development in young children. London: Routledge and Kegan Paul.

    Google Scholar 

  24. Avey, J. B., Avolio, B. J., Crossley, C. D., & Luthans, F. (2009). Psychological ownership: Theoretical extensions, measurement and relation to work outcomes. Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior, 30(2), 173–191.

    Article  Google Scholar 

  25. Thompson, N., McGill, T. J., & Wang, X. (2017). “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers and Security, 70, 376–391.

    Article  Google Scholar 

  26. Yoo, C. W., Sanders, G. L., & Cerveny, R. P. (2018). Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance. Decision Support Systems, 108, 107–118.

    Article  Google Scholar 

  27. Chambel, M. J., & Castanheira, F. (2006). Different temporary work status, different behaviors in organization. Journal of Business and Psychology, 20(3), 351–367.

    Article  Google Scholar 

  28. Kahneman, D., Knetsch, J. L., & Thaler, R. H. (1991). Anomalies: The endowment effect, loss aversion, and status quo bias. Journal of Economic Perspectives, 5(1), 193–206.

    Google Scholar 

  29. Horowitz, J. K., & McConnell, K. E. (2002). A review of WTA/WTP studies. Journal of Environmental Economics and Management, 44(3), 426–447.

    Article  Google Scholar 

  30. Knetsch, J. L. (1992). Preferences and nonreversibility of indifference curves. Journal of Economic Behavior and Organization, 17(1), 131–139.

    Article  Google Scholar 

  31. Goes, P. B. (2013). Editor’s comments: information systems research and behavioral economics. MIS Quarterly, 37(3), iii–viii.

    Google Scholar 

  32. Renaud, K., Otondo, R., & Warkentin, M. (2019). This is the way ‘I’ create my passwords”… does the endowment effect deter people from changing the way they create their passwords? Computers and Security, 82, 241–260.

    Article  Google Scholar 

  33. Gray, H. M., Ambady, N., Lowenthal, W. T., & Deldin, P. (2004). P300 as an index of attention to self-relevant stimuli. Journal of Experimental Social Psychology, 40(2), 216–224.

    Article  Google Scholar 

  34. Miyakoshi, M., Nomura, M., & Ohira, H. (2007). An ERP study on self-relevant object recognition. Brain and Cognition, 63(2), 182–189.

    Article  Google Scholar 

  35. Ninomiya, H., Onitsuka, T., Chen, C. H., Sato, E., & Tashiro, N. (1998). P300 in response to the subject’s own face. Psychiatry and Clinical Neurosciences, 52(5), 519–522.

    Article  Google Scholar 

  36. Fischler, I., Jin, Y. S., Boaz, T. L., Perry, N. W., Jr., & Childers, D. G. (1987). Brain potentials related to seeing one’s own name. Brain and Language, 30(2), 245–262.

    Article  Google Scholar 

  37. Turk, D. J., Van Bussel, K., Brebner, J. L., Toma, A. S., Krigolson, O., & Handy, T. C. (2011). When “it” becomes “mine”: Attentional biases triggered by object ownership. Journal of Cognitive Neuroscience, 23(12), 3725–3733.

    Article  Google Scholar 

  38. Warkentin, M., Walden, E. A., Johnston, A. C., & Straub, D. W. (2016). Neural correlates of protection motivation for secure IT behaviors: An fMRI examination. Journal of the Association for Information Systems, 17(3), 194–215.

    Article  Google Scholar 

  39. Kim, K., & Johnson, M. K. (2015). Distinct neural networks support the mere ownership effect under different motivational contexts. Social Neuroscience, 10(4), 376–390.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Merrill Warkentin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiao, S., Warkentin, M., Walden, E., Johnston, A.C. (2020). Do We Protect What We Own?: A Proposed Neurophysiological Exploration of Workplace Information Protection Motivation. In: Davis, F., Riedl, R., vom Brocke, J., Léger, PM., Randolph, A., Fischer, T. (eds) Information Systems and Neuroscience. Lecture Notes in Information Systems and Organisation, vol 32. Springer, Cham. https://doi.org/10.1007/978-3-030-28144-1_11

Download citation

Publish with us

Policies and ethics