The influence of organizational injustice in the motivation for the practice of cybercrimes

Plínio Silva de Garcia, Marie Anne Macadar, Edimara Mezzomo Luciano

Resumo


A influência do contexto organizacional na motivação para a prática de crimes cibernéticos

Esta pesquisa analisou como a percepção de injustiça organizacional motiva a prática de crimes cibernéticos no local de trabalho. Em uma investigação qualitativa e exploratória, foram realizadas entrevistas com 16 especialistas em segurança cibernética. Os dados foram analisados através da técnica de análise de conteúdo categorial. Os resultados sugerem que a percepção de injustiça produz sentimentos negativos como a baixa-estima, a frustração e a ausência de culpa, e que essas emoções motivam a prática de crimes cibernéticos. Diferentes percepções identificadas entre os entrevistados deste estudo, associadas à revisão da literatura referente ao tema, permitiram a proposição de um modelo conceitual.



The influence of organizational injustice in the motivation for the practice of cybercrimes

This research analyzes how the perception of organizational injustice motivates the practice of cybercrimes in the workplace. In a qualitative and exploratory investigation, interviews have been carried out for 16 specialists in cybernetic security. Data were analyzed through the categorical content analysis technique. The results obtained suggest that the perception of injustice produces negative feelings, such as low self-esteem, frustration, and lack of guilt, and these emotions, in turn, motivate the practice of cybercrimes. Different perceptions have been identified among the interviewees of this study, which are associated with the literature review related to the theme, allowed the proposition of a conceptual model.

Palavras-chave


Justiça organizacional, Motivação criminal, Crime cibernético, Segurança cibernética, Insiders. Organizational justice, Criminal motivation, Cybercrime, Cybersecurity, Insiders.

Texto completo:

PDF (PORTUGUESE)

Referências


Arpad, I. (2013). A greater involvement of education in fight against cybercrime. 2nd World Conference on Educational Technology Research, 83, 371-377.

Bardin, L. Análise de conteúdo. São Paulo: Edições 70, 2011.

Benson, V., McAlaney, J., & Frumkin, L. A. (2018). Emerging Threats for the Human Element and Countermeasures in Current Cyber Security Landscape. In Psychological and Behavioral Examinations in Cyber Security (pp. 266-271). IGI Global.

Bies, R. J., & Moag, J. S. (1986). Interactional justice: Communication criteria of fairness. Research on negotiation in organizations, 1(1), 43-55.

Burden, K., & Palmer, C. (2003). Internet crime. Computer Law & Security Review, 19(3), 222-227.

Damasio, A., & Carvalho, G. B. (2013). The nature of feelings: evolutionary and neurobiological origins. Nat Rev Neurosci, 14(2), 143-152.

Deci, E. L., & Ryan, R. M. (2000). The 'What' and 'Why' of Goal Pursuits: Human Needs and the Self-Determination of Behavior. Psychological Inquiry, 11(4), 227.

Deci, E. L., & Ryan, R. M. (2008). Self-determination theory: A macrotheory of human motivation, development, and health. Canadian Psychology/Psychologie canadienne, 49(3), 182-185. doi:10.1037/a0012801

Dhillon, G. (2001). Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns. Computers & Security, 20(2), 165-172. doi:http://dx.doi.org/10.1016/S0167-4048(01)00209-7

Feelings, I. (1998). Welfare, stress, and the evolution of feelings. Advances in the Study of Behavior: Stress and Behavior, 27, 371.

Freitas, M. E. d. (2000). Contexto social e imaginário organizacional moderno. Revista de Administração de Empresas, 40(2), 6-15.

Gercke, M. (2014). Understanding cybercrime: Phenomena, challenges and legal response. ITU Telecommunication Development Sector, 380.

Guilhardi, H. J. (2002). Análise comportamental do sentimento de culpa. Ciência do comportamento: conhecer e avançar, 1, 173-200.

Jesus, R. G. D., & Rowe, D. E. O. (2014). Organizational Justice Perceived by Teachers of Basic, Technical anda Technological Education. Revista de administração Mackenzie, 15(6), 172-200.

Kazemi, A., & Törnblom, K. (2014). Third-Party Allocation of Rewards The Effects of Categorization and Request for Justice. Small Group Research, 45(4), 435-450.

Kelloway, E. K., Francis, L., Prosser, M., & Cameron, J. E. (2010). Counterproductive work behavior as protest. Human Resource Management Review, 20(1), 18-25.

Klein, R. H., & Luciano, E. M. (2016). What influences information security behavior? A study with Brazilian users. JISTEM-Journal of Information Systems and Technology Management, 13(3), 479-496.

Korsgaard, M. A., Meglino, B. M., & Call, M. L. (2015). The Role of Concern for Others in Reactions to Justice: Integrating the Theory of Other Orientation with Organizational Justice. The Oxford Handbook of Justice in the Workplace, 387.

Leventhal, G., Karuza, J., & Fry, W. (1980). Beyond fairness: A theory of allocation preferences. In G. Mikula (Ed.), Justice and social interaction: 167-218. New York: Springer-Verlag.

Mendonça, H., & Tamayo, Á. (2008). Valores pessoais e retaliação organizacional: estudo em uma organização pública organização pública. RAC-Eletrônica, Curitiba, 2(2), 189-200.

Rasmi, M., & Jantan, A. (2013). A New Algorithm to Estimate the Similarity between the Intentions of the Cyber Crimes for Network Forensics. 4th International Conference on Electrical Engineering and Informatics (Iceei 2013), 11, 540-547.

Rebellon, C. J., Piquero, N. L., Piquero, A. R., & Tibbetts, S. G. (2010). Anticipated shaming and criminal offending. Journal of Criminal Justice, 38(5), 988-997. doi:10.1016/j.jcrimjus.2010.06.016

Rego, A., & Souto, S. (2004). A percepção de justiça como antecedente do comprometimento organizacional: um estudo luso-brasileiro. Revista de administração contemporânea, 8(1), 151-177.

Richardson, R. (2008). CSI computer crime and security survey. Computer Security Institute, 1, 1-30.

Robinson, S. L., & Bennett, R. J. (1995). A typology of deviant workplace behaviors: A multidimensional scaling study. Academy of Management Journal, 38(2), 555-572.

Rogers, M. K. (2006). A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation, 3(2), 97-102. doi:10.1016/j.diin.2006.03.001

Roratto, R., & Dias, E. D. (2014). Security information in production and operations: a study on audit trails in database systems. JISTEM-Journal of Information Systems and Technology Management, 11(3), 717-734.

Safa, N. S., Maple, C., Watson, T., & Von Solms, R. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of Information Security and Applications, doi.org/10.1016/j.jisa.2017.11.001

Schwarz, N., & Clore, G. L. (1996). Feelings and phenomenal experiences. Social psychology: Handbook of basic principles, 2, 385-407.

Shropshire, J., Warkentin, M., & Sharma, S. (2015). Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. Computers & Security, 49, 177-191.

Simons, T., & Roberson, Q. (2003). Why managers should care about fairness: the effects of aggregate justice perceptions on organizational outcomes. Journal of Applied Psychology, 88(3), 432-443.

Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & management, 51(2), 217-224.

Siqueira, M. M. M., & Padovam, V. A. R. (2008). Bases teóricas de bem-estar subjetivo, bem-estar psicológico e bem-estar no trabalho. Psicologia: teoria e pesquisa, 24(2), 201-209.

Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-225.

Skinner, B. (1995). O lugar do sentimento na análise do comportamento. AL Néri (Trad.), Questões recentes na análise do comportamento, 13-24.

Skinner, B. (1974). Sobre o Behaviorismo. Trad. Maria da Penha Villalobos: São Paulo: Cultrix/EDUSP.

Son, J.-Y. (2011). Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies. Information & Management, 48(7), 296-302. doi:10.1016/j.im.2011.07.002

Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: insights from habit and protection motivation theory. Information & Management, 49(3), 190-198.

Willison, R., & Warkentin, M. (2013). Beyond deterrence: An expanded view of employee computer abuse. Mis Quarterly, 37(1), 1-20.




DOI: http://dx.doi.org/10.4301/S1807-1775201815002