Reference Hub3
Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour

Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour

Keshnee Padayachee
Copyright: © 2020 |Volume: 10 |Issue: 4 |Pages: 19
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781799807148|DOI: 10.4018/IJCWT.2020100101
Cite Article Cite Article

MLA

Padayachee, Keshnee. "Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour." IJCWT vol.10, no.4 2020: pp.1-19. http://doi.org/10.4018/IJCWT.2020100101

APA

Padayachee, K. (2020). Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour. International Journal of Cyber Warfare and Terrorism (IJCWT), 10(4), 1-19. http://doi.org/10.4018/IJCWT.2020100101

Chicago

Padayachee, Keshnee. "Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour," International Journal of Cyber Warfare and Terrorism (IJCWT) 10, no.4: 1-19. http://doi.org/10.4018/IJCWT.2020100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This study considers the framework of neutralization techniques, which responds to the attitude/rationalization leg of the fraud triangle with respect to the dark triad of personality traits' predictability toward compliant cybersecurity behaviour. Logically, organizations focus on reducing the insider's motivation and opportunities for malfeasance. However, it may be prudent to consider the rationalization for insider crime, which is arguably the most obscure element. This study is a unique contribution as it considers both the roles of neutralization techniques and the dark triad of personality traits with respect to insider threats and compliance intention. Furthermore, the specific categories of neutralization techniques will be considered as antecedents towards insider maleficence.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.