Impacts on Employee Coping Behaviors of Opportunities and Threats Related to the Use of Shadow IT (notice n° 1010648)

détails MARC
000 -LEADER
fixed length control field 03548cam a2200337 4500500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250125140617.0
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title fre
042 ## - AUTHENTICATION CODE
Authentication code dc
100 10 - MAIN ENTRY--PERSONAL NAME
Personal name Barlette, Yves
Relator term author
245 00 - TITLE STATEMENT
Title Impacts on Employee Coping Behaviors of Opportunities and Threats Related to the Use of Shadow IT
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Date of publication, distribution, etc. 2024.<br/>
500 ## - GENERAL NOTE
General note 40
520 ## - SUMMARY, ETC.
Summary, etc. La Shadow IT (SIT) est une utilisation par les employés (1) de ressources informatiques non approuvées dans le but de travailler plus efficacement, (2) sans intention malveillante, mais qui enfreint les règles de l’entreprise. Cette utilisation crée des vulnérabilités supplémentaires qui augmentent le risque d’incidents de sécurité de l’information (SSI). Nous avons mobilisé la théorie du coping afin d’étudier les comportements d’utilisation de la SIT, au travers d’une enquête auprès de 429 utilisateurs. Nous contribuons à la littérature académique d’une part, en améliorant la compréhension du maintien par les employés d’un équilibre entre les bénéfices et les risques au travers de comportements de maximisation et/ou de protection relatifs à l’utilisation de la SIT. D’autre part, nous enrichissons les modèles conceptuels d’analyses comportementales par l’identification d’effets croisés qui n’avaient pas été étudiés auparavant. Nos contributions managériales soulignent le fait que la maximisation de l’utilisation de la SIT par les employés peut être bénéfique pour les entreprises en termes d’efficacité. Cependant, en termes de SSI, nous montrons qu’il est nécessaire d’aller au-delà d’une simple sensibilisation des employés, car ils pourraient sous-estimer les risques supplémentaires qui résultent de leurs pratiques de SIT.
520 ## - SUMMARY, ETC.
Summary, etc. Shadow IT (SIT) is characterized as (1) the use of unapproved IT resources by employees for the purpose of working more efficiently and (2) usage lacking malicious intent that nevertheless violates company rules and creates additional vulnerabilities that increase the risk of information security incidents. We examine SIT usage behaviors based on coping theory by conducting a survey of 429 SIT users. We contribute to the academic literature, on the one hand, by improving our understanding of the role of the balance between benefits and risks in maximization and/or protection behaviors related to SIT usage. On the other hand, we discuss and enrich the conceptual model of behavioral analysis by identifying cross effects that have not previously been studied. Our managerial contributions highlight the fact that employee maximization of SIT usage can be beneficial for companies in terms of efficiency ; however, with regard to information security, it is necessary to go beyond simple awareness because employees may not properly assess the increased risk they cause through their SIT practices.
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element coping
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element comportements
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element sécurité
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element effets croisés
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element Shadow IT
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element orienté-problème
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element security
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element coping
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element behavior
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element problem-focused
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element cross effects
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element Shadow IT
700 10 - ADDED ENTRY--PERSONAL NAME
Personal name Berthevas, Jean-François
Relator term author
700 10 - ADDED ENTRY--PERSONAL NAME
Personal name Sueur, Isabelle
Relator term author
786 0# - DATA SOURCE ENTRY
Note Systèmes d'information & management | Volume 28 | 4 | 2024-04-30 | p. 71-107 | 1260-4984
856 41 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://shs.cairn.info/revue-systemes-d-information-et-management-2023-4-page-71?lang=en&redirect-ssocas=7080">https://shs.cairn.info/revue-systemes-d-information-et-management-2023-4-page-71?lang=en&redirect-ssocas=7080</a>

Pas d'exemplaire disponible.

PLUDOC

PLUDOC est la plateforme unique et centralisée de gestion des bibliothèques physiques et numériques de Guinée administré par le CEDUST. Elle est la plus grande base de données de ressources documentaires pour les Étudiants, Enseignants chercheurs et Chercheurs de Guinée.

Adresse

627 919 101/664 919 101

25 boulevard du commerce
Kaloum, Conakry, Guinée

Réseaux sociaux

Powered by Netsen Group @ 2025