The Impact of Abuse Opportunity Structure on Abuse Intention of Information by the Mediating Role of Abuse-Positive Motivation and the Moderating Role of Personal Morality

Document Type : Original Article

Authors

1 Msc, Department of Management, Isfahan (Khorasgan) Branch, Islamic Azad University, Isfahan, Iran.

2 Assistant Professor, Department of Management, Isfahan (Khorasgan) Branch, Islamic Azad University, Isfahan, Iran.

Abstract

The purpose of this study was to determine the impact of abuse opportunity structure on abuse intention of information by considering the mediating role of abuse-positive motivation and the moderating role of personal moralityinhealth insurance of Isfahan province. The present research is applied in terms of type of research and descriptive-correlative research in terms of method. The statistical population of this study was all system users of the central office of health insurance of Isfahan province, which according to the human resources unit, their number was 148 employees. According to Cochran formula, the minimum sample size of 107 persons was obtained for answering the questions of the questionnaire. After collecting the questionnaires, 104 questionnaires were used. Random sampling method was used. The questionnaire was adopted and adapted from published sources and the items were based on 5 point Likert scale. The face validity was confirmed by a number of respondents and its content validity was confirmed by a group of management professors. Confirmatory factor analysis was used to verify the validity of the construct. To determine reliability, Cronbach’s alpha coefficient was calculated using the Smart-PLS software, which calculated more than 0.7. The findings of the research indicated that although the impact of abuse opportunity structure on abuse intention and the moderating role of morality in the relationship in this relationship were not supported, the impact of abuse opportunity structure on abuse-positiveaffect (t=3.09, p < 0.01) and the impact of abuse-positiveaffect on abuse intention (t=2.7, p < 0.01) were statistically supported. Moreover, the moderating role of morality in the relationship between abuse-positiveaffect and abuse intention was supported (t=2.07, p < 0.05).

Keywords

ابوطالبی نایینی سمانه، پیکری حمید رضا، احتشامی اصغر. 1398. همبستگی استفاده از سیستم‌های اطلاعات سلامت با رابطه پرستار-بیمار؛ نقش میانجی عدالت سازمانی ادراک‌شده. فصلنامه مدیریت ارتقای سلامت. ۸ (۲):۱-۸
الهی، شعبان، طاهری، مهدی و حسن‌زاده خوش‌طینت علیرضا 1388. اراﺋﺔ ﭼﺎرﭼﻮﺑﻲ ﺑﺮای ﻋﻮاﻣﻞ انسانی مرتبط در امنیت سیستم‌های اطلاعاتی. پژوهش­های مدیریت در ایران، 2: 1-22.
پور نقدی، بهزاد 1388. اخلاق در فناوری اطلاعات و آسیب‌شناسی اخـلاق ارتباطـات. اخلاق در علوم و فناوری، 1 و 2: 21-28.
پور مهر, سمانه،  پیکری, حمید رضا، گلشیری پرستو. 1397. رابطه عدالت سازمانی ادراک‌شده و رعایت حریم شخصی با نقش تعدیل گر مؤلفه‌های بازدارندگی، مدیریت اطلاعات سلامت، 15(5):208-213
موسویان، سمانه سادات، نیلی، محمدرضا و ملکی حسن 1394. طراحی درس اخلاق فناوری اطلاعات برای دانشجویان علوم تربیتی. متون و برنامه‌های علوم انسانی، 4: 165-182.
مولوی، مهران، سلطانی، لقمان و زیرک طلاپه بهنام 1395. نقش فناوری اطلاعات در جرائم اینترنتی شبکه بانکی. مطالعات علوم کاربردی در مهندسی،1: 1-5.
Bachman, R., R. Paternoster, and S. Ward. 1992. The rationality of sexual offending: testing a deterrence/rational choice conception of sexual assault. Law and Society Review, 26 (2): 343–372.
Bagozzi, R.P., and R. Pieters. 1998. Goal-directed emotions. Cognition and Emotion, 12 (1): 1–26.
Baskerville, R., E. Park, and J. Kim. 2014. An emote opportunity model of computer abuse. Information Technology & People. 27 (2): 155–181.
Beebe, N.L., and V.S. Rao. 2005. Using situational crime prevention theory to explain the effectiveness of information systems security. Proceedings of the 2005 Software Conference, Las Vegas, NV, (ISBN: 0-9772107-0-7).
Clarke R.V. 1997. Situational Crime Prevention: Successful Case Studies. Albany: Harrow and Heston.
Dowland P.S., S.M. Furnell, H.M. llingworth, and P.L. Reynolds. 1999. Computer Crime and Abuse: Survey of Public Attitudes and Awareness. Computer and Security, 18 (8): 715- 726.
Frijda, N.H. 2007. The Laws of Emotion. Lawrence Erlbaum Associates, Mahwah.
Ghazi-Asgar, M., H.R., Peikari, and A. Ehteshami, A. 2018. Health Information Management: Psychological factors influencing information privacy concerns in psychiatric hospitals. Bali Medical Journal, 7(1): 120-126
Goldberg, L.R. 1999. A broad-bandwidth, public domain, personality inventory measuring the lower-level facets of several five-factor models. Personality psychology in Europe, 7: 7–28.
Hayward, K. 2007. Situational Crime Prevention and its Discontents: Rational Choice Theory versus the ‘Culture of Now’. Sociology and Social Research, 41 (3): 232–250.
Hova, A, and J. D’Arcy. 2012. Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea. Information & Management, 49: 99–110.
Hsu, C.L., and J.C.C. Lin. 2016. An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives. Computers in human behavior, 62: 516- 527.
Hudlicka, E. 2011. Guidelines for designing computational models of emotions. International Journal of Synthetic Emotions, 2 (1): 26–79.
Johnston, A.C., and M. Warkentin. 2010. Fear appeals and information security behaviors: an empirical study. Management Information Systems Quarterly, 34 (3): 549–566.
Karimi Z., and Peikari H.R. 2018. The Impact of Nurses’ Perceived Information Security Training and Information Security Policy Awareness on their Perceived Severity and Certainty of Information Security Breach Penalties (Case: the Educational Specialized Hospitals of Isfahan City). Journal of Nurses, Education; 7 (2) :17-24
Kim, J.J. E.H. Park, and R.L. Baskerville. 2016. A model of emotion and computer abuse. Information and Management, 53 (1): 91-108.
Lee, Y., and K.A. Kozar. 2008. An empirical investigation of anti-spyware software adoption. Information and Management, 45 (2): 109–119.
Lowry, P.B., C. Posey, T.L. Roberts, and R.J. Bennett. 2014. Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse. Journal of Business Ethics, 121 (3): 385–401.
Morrison, E.W., and S.L. Robinson. 1997. When employees feel betrayed: a model of how psychological contract violation develops. Academy of Management Review, 22 (1): 226–256.
Office for National statistics, (2018). https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/articles/overviewoffraudandcomputermisusestatisticsforenglandandwales/2018-01-25 (Last Access: 24 Aug 2019).
Owdley, B., and G.I. Hacker. 2010. Internet fraud casebook: The world wide web of deceit, Wiley, Hoboken, 245–252.
Ruggiero, V. 2009. On liberty and crime: Adam Smith and John Stuart Mill Crime. Law and Social Change, 51 (3–4): 435–450.
Russell, J.A. 2003. Core affect and the psychological construction of emotion. Psychological Review, 110 (1): 145–172.
Seymour, L., and K. Nadasen. 2007. Web access for IT staff: a developing world perspective on web abuse. The Electronic Library, 25(5): 543-557.
 Siponen, M., and A. Vance. 2010. Neutraliztion: new insights into the problem of employee information systems security policy violations. Management Information Systems Quarterly, 34 (3): 487–A12.
Stahl, B.C., N.F. Doherty, and M. Shaw. 2012. Information security policies in the UK healthcare sector: a critical evaluation. Information systems journal, 22: 77-94.
Strelan, P., and R.J. Boeckmann. 2006. Why drug testing in elite sport does not work: perceptual deterrence theory and the role of personal moral beliefs. Journal of Applied Social Psychology, 36 (12): 2909–2934.
Watson, D., D. Wiese, J. Vaidya, and A. Tellegen. 1999. The two general activation systems of affect: structural findings, evolutionary considerations, and psychobiological evidence. Journal of Personality and Social Psychology, 76 (5): 820–838.
Willison, R. 2002. Opportunities for Computer Abuse: Assessing a Crime-Specific Approach in the Case of Barings Bank, London School of Economics and Political Science.
Willison, R., and J. Backhouse. 2006. Opportunities for computer crime: considering systems risk from a criminological perspective. European Journal of Information Systems, 15 (4): 403–419.
Willison, R., M. Warkentin, and A.C. Johnston. 2016. Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Information Systems Journal, 28 (2): 266-293.
Young, K.S., and Case, C.J. 2004. Internet Abuse in the Workplace: New Trends in Risk Management. CyberPsychology & Behavior, 7(1): 105-111. 
Volume 5, Issue 1 - Serial Number 8
September 2019
Pages 226-245
  • Receive Date: 07 March 2019
  • Revise Date: 16 December 2019
  • Accept Date: 17 July 2019