I shall, we shall, and all others will: paradoxical information security behaviour
Abstract
Purpose
The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security.
Design/methodology/approach
Behavioural threshold analysis is used to test for the presence of the lemming effect in information security behaviour. Paradoxical behaviour may be caused by the influential nature of the lemming effect. The lemming effect is presented as a possible cause of the privacy paradox.
Findings
The behavioural threshold analysis indicates that the lemming effect is indeed present in information security behaviour and may lead to paradoxical information security behaviour.
Practical implications
The analysis of the lemming effect can be used to assist companies in understanding the way employees influence each other in their behaviour in terms of security. By identifying possible problem areas, this approach can also assist in directing their information security education endeavours towards the most relevant topics.
Originality/value
This research describes the first investigation of the lemming effect in information security by means of behavioural threshold analysis in practice.
Keywords
Citation
Snyman, D.P., Kruger, H. and Kearney, W.D. (2018), "I shall, we shall, and all others will: paradoxical information security behaviour", Information and Computer Security, Vol. 26 No. 3, pp. 290-305. https://doi.org/10.1108/ICS-03-2018-0034
Publisher
:Emerald Publishing Limited
Copyright © 2018, Emerald Publishing Limited