Abstract
Part-time and temporary employees and contractors become a major cybersecurity threat for organizations due to the ephemeral nature of their engagement. Compared with full-time employees, they may be less commited to the welfare of the organization and, therefore, less willing to engage in security recommendations to protect it. Perceived psychological ownership is an important factor that shapes employees’ security behaviors. The endowment effect also explains employees’ tendencies to overvalue information that belongs to them, and conversely, extend fewer protections to information that they view as belonging to others. Thus, employees may be more motivated to safeguard their own information than organizational information. From a principle-agent perspective, this study investigates how three types of employees perceive organizational and personal information, and how different employees make decisions about protecting their own versus organizational information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Schwab, W., & Poujol, M. (2018). The state of industrial cybersecurity 2018. Available at https://ics.kaspersky.com/media/2018-Kaspersky-ICS-Whitepaper.pdf.
Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549–566.
Goldman, J. (2014 January). Data breach roundup. Available at https://www.esecurityplanet.com/network-security/data-breach-roundup-january-2014.html.
D’Arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20(6), 643–658.
De Cuyper, N., & De Witte, H. (2007). Job insecurity in temporary versus permanent workers: Associations with attitudes, well-being, and behaviour. Work and Stress, 21(1), 65–84.
Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers and Security, 24(6), 472–484.
Williamson, O. E. (1991). Comparative economic organization: The analysis of discrete structural alternatives. Administrative Science Quarterly, 36(2), 269–296.
Sharma, S., & Warkentin, M. (2018). Do I really belong? Impact of employment status on information security policy compliance. Computers and Security, forthcoming, (published online September 23, 2018 at https://www.sciencedirect.com/science/article/pii/S0167404818304024).
Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.
Menard, P., Warkentin, M., & Lowry, P. B. (2018). The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Computers & Security, 75, 147–166.
Pierce, J. L., Kostova, T., & Dirks, K. T. (2003). The state of psychological ownership: Integrating and extending a century of research. Review of General Psychology, 7(1), 84–107.
Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of Management Review, 14(1), 57–74.
Jensen, M. C., & Meckling, W. H. (1976). Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of Financial Economics, 3(4), 305–360.
Milgrom, P. R., & Roberts, J. D. (1992). Economics, organization and management. Englewood Cliffs, NJ: Prentice-Hall.
Chrisman, J. J., Chua, J. H., & Litz, R. A. (2004). Comparing the agency costs of family and non–family firms: Conceptual issues and exploratory evidence. Entrepreneurship Theory and Practice, 28(4), 335–354.
Chrisman, J. J., Chua, J. H., Kellermanns, F. W., & Chang, E. P. (2007). Are family managers agents or stewards? An exploratory study in privately held family firms. Journal of Business Research, 60(10), 1030–1038.
Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165.
Chen, Y., Ramamurthy, K., & Wen, K. W. (2012). Organizations’ information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, 29(3), 157–188.
Dittmar, H. (1992). The social psychology of material possessions: To have is to be. Harvester Wheatsheaf and St. Martin’’s Press.
Pierce, J. L., & Furo, C. A. (1990). Employee ownership: Implications for management. Organizational Dynamics, 18(3), 32–43.
Pierce, J. L., Kostova, T., & Dirks, K. T. (2001). Toward a theory of psychological ownership in organizations. Academy of Management Review, 26(2), 298–310.
Van Dyne, L., & Pierce, J. L. (2004). Psychological ownership and feelings of possession: Three field studies predicting employee attitudes and organizational citizenship behavior. Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior, 25(4), 439–459.
Isaacs, S. (1993). Social development in young children. London: Routledge and Kegan Paul.
Avey, J. B., Avolio, B. J., Crossley, C. D., & Luthans, F. (2009). Psychological ownership: Theoretical extensions, measurement and relation to work outcomes. Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior, 30(2), 173–191.
Thompson, N., McGill, T. J., & Wang, X. (2017). “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers and Security, 70, 376–391.
Yoo, C. W., Sanders, G. L., & Cerveny, R. P. (2018). Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance. Decision Support Systems, 108, 107–118.
Chambel, M. J., & Castanheira, F. (2006). Different temporary work status, different behaviors in organization. Journal of Business and Psychology, 20(3), 351–367.
Kahneman, D., Knetsch, J. L., & Thaler, R. H. (1991). Anomalies: The endowment effect, loss aversion, and status quo bias. Journal of Economic Perspectives, 5(1), 193–206.
Horowitz, J. K., & McConnell, K. E. (2002). A review of WTA/WTP studies. Journal of Environmental Economics and Management, 44(3), 426–447.
Knetsch, J. L. (1992). Preferences and nonreversibility of indifference curves. Journal of Economic Behavior and Organization, 17(1), 131–139.
Goes, P. B. (2013). Editor’s comments: information systems research and behavioral economics. MIS Quarterly, 37(3), iii–viii.
Renaud, K., Otondo, R., & Warkentin, M. (2019). This is the way ‘I’ create my passwords”… does the endowment effect deter people from changing the way they create their passwords? Computers and Security, 82, 241–260.
Gray, H. M., Ambady, N., Lowenthal, W. T., & Deldin, P. (2004). P300 as an index of attention to self-relevant stimuli. Journal of Experimental Social Psychology, 40(2), 216–224.
Miyakoshi, M., Nomura, M., & Ohira, H. (2007). An ERP study on self-relevant object recognition. Brain and Cognition, 63(2), 182–189.
Ninomiya, H., Onitsuka, T., Chen, C. H., Sato, E., & Tashiro, N. (1998). P300 in response to the subject’s own face. Psychiatry and Clinical Neurosciences, 52(5), 519–522.
Fischler, I., Jin, Y. S., Boaz, T. L., Perry, N. W., Jr., & Childers, D. G. (1987). Brain potentials related to seeing one’s own name. Brain and Language, 30(2), 245–262.
Turk, D. J., Van Bussel, K., Brebner, J. L., Toma, A. S., Krigolson, O., & Handy, T. C. (2011). When “it” becomes “mine”: Attentional biases triggered by object ownership. Journal of Cognitive Neuroscience, 23(12), 3725–3733.
Warkentin, M., Walden, E. A., Johnston, A. C., & Straub, D. W. (2016). Neural correlates of protection motivation for secure IT behaviors: An fMRI examination. Journal of the Association for Information Systems, 17(3), 194–215.
Kim, K., & Johnson, M. K. (2015). Distinct neural networks support the mere ownership effect under different motivational contexts. Social Neuroscience, 10(4), 376–390.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Xiao, S., Warkentin, M., Walden, E., Johnston, A.C. (2020). Do We Protect What We Own?: A Proposed Neurophysiological Exploration of Workplace Information Protection Motivation. In: Davis, F., Riedl, R., vom Brocke, J., Léger, PM., Randolph, A., Fischer, T. (eds) Information Systems and Neuroscience. Lecture Notes in Information Systems and Organisation, vol 32. Springer, Cham. https://doi.org/10.1007/978-3-030-28144-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-28144-1_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-28143-4
Online ISBN: 978-3-030-28144-1
eBook Packages: Business and ManagementBusiness and Management (R0)