Analysis of the Use of Neutralisation Techniques in Violations of Information Security Cover Image

Analiza uporabe tehnika teorije neutralizacije u kršenju informacijske sigurnosti
Analysis of the Use of Neutralisation Techniques in Violations of Information Security

Author(s): Darko Matotek
Subject(s): ICT Information and Communications Technologies
Published by: Sveučilište Josipa Jurja Strossmayera u Osijeku, Ekonomski fakultet u Osijeku
Keywords: Information security; password; theory of neutralisation;

Summary/Abstract: Neutralisation theory was postulated in 1957 in the field of criminology. The theory explains the behaviour of individuals who violate rules and regulations but do not see themselves as violators. They find justification for their acts in certain techniques and by doing so renounce their responsibility in away. Using a questionnaire, a hypothetic scenario and intensity questions, this paper examines whether individuals apply neutralisation techniques to their behaviour with respect to violations of information security regulations. The second part of the questionnaire examines respondents’ understanding of the term strong password, as well as of safe ways of password handling.

  • Issue Year: 25/2012
  • Issue No: 1
  • Page Range: 182-191
  • Page Count: 11
  • Language: Croatian
Toggle Accessibility Mode