Impacts on Employee Coping Behaviors of Opportunities and Threats Related to the Use of Shadow IT (notice n° 1010648)
[ vue normale ]
000 -LEADER | |
---|---|
fixed length control field | 03548cam a2200337 4500500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250125140617.0 |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | fre |
042 ## - AUTHENTICATION CODE | |
Authentication code | dc |
100 10 - MAIN ENTRY--PERSONAL NAME | |
Personal name | Barlette, Yves |
Relator term | author |
245 00 - TITLE STATEMENT | |
Title | Impacts on Employee Coping Behaviors of Opportunities and Threats Related to the Use of Shadow IT |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Date of publication, distribution, etc. | 2024.<br/> |
500 ## - GENERAL NOTE | |
General note | 40 |
520 ## - SUMMARY, ETC. | |
Summary, etc. | La Shadow IT (SIT) est une utilisation par les employés (1) de ressources informatiques non approuvées dans le but de travailler plus efficacement, (2) sans intention malveillante, mais qui enfreint les règles de l’entreprise. Cette utilisation crée des vulnérabilités supplémentaires qui augmentent le risque d’incidents de sécurité de l’information (SSI). Nous avons mobilisé la théorie du coping afin d’étudier les comportements d’utilisation de la SIT, au travers d’une enquête auprès de 429 utilisateurs. Nous contribuons à la littérature académique d’une part, en améliorant la compréhension du maintien par les employés d’un équilibre entre les bénéfices et les risques au travers de comportements de maximisation et/ou de protection relatifs à l’utilisation de la SIT. D’autre part, nous enrichissons les modèles conceptuels d’analyses comportementales par l’identification d’effets croisés qui n’avaient pas été étudiés auparavant. Nos contributions managériales soulignent le fait que la maximisation de l’utilisation de la SIT par les employés peut être bénéfique pour les entreprises en termes d’efficacité. Cependant, en termes de SSI, nous montrons qu’il est nécessaire d’aller au-delà d’une simple sensibilisation des employés, car ils pourraient sous-estimer les risques supplémentaires qui résultent de leurs pratiques de SIT. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Shadow IT (SIT) is characterized as (1) the use of unapproved IT resources by employees for the purpose of working more efficiently and (2) usage lacking malicious intent that nevertheless violates company rules and creates additional vulnerabilities that increase the risk of information security incidents. We examine SIT usage behaviors based on coping theory by conducting a survey of 429 SIT users. We contribute to the academic literature, on the one hand, by improving our understanding of the role of the balance between benefits and risks in maximization and/or protection behaviors related to SIT usage. On the other hand, we discuss and enrich the conceptual model of behavioral analysis by identifying cross effects that have not previously been studied. Our managerial contributions highlight the fact that employee maximization of SIT usage can be beneficial for companies in terms of efficiency ; however, with regard to information security, it is necessary to go beyond simple awareness because employees may not properly assess the increased risk they cause through their SIT practices. |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | coping |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | comportements |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | sécurité |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | effets croisés |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | Shadow IT |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | orienté-problème |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | security |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | coping |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | behavior |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | problem-focused |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | cross effects |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Topical term or geographic name as entry element | Shadow IT |
700 10 - ADDED ENTRY--PERSONAL NAME | |
Personal name | Berthevas, Jean-François |
Relator term | author |
700 10 - ADDED ENTRY--PERSONAL NAME | |
Personal name | Sueur, Isabelle |
Relator term | author |
786 0# - DATA SOURCE ENTRY | |
Note | Systèmes d'information & management | Volume 28 | 4 | 2024-04-30 | p. 71-107 | 1260-4984 |
856 41 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://shs.cairn.info/revue-systemes-d-information-et-management-2023-4-page-71?lang=en&redirect-ssocas=7080">https://shs.cairn.info/revue-systemes-d-information-et-management-2023-4-page-71?lang=en&redirect-ssocas=7080</a> |
Pas d'exemplaire disponible.
Réseaux sociaux