Access the full text.
Sign up today, get DeepDyve free for 14 days.
G. Stoneburner, A. Goguen, A. Feringa (2002)
Risk management guide for information technology systems
Saman Salehi, M. Balafar (2015)
An Investigation on Image Secret SharingInternational journal of security and its applications, 9
(2017)
Stronger economic growth for 2017
Robert Herriott, W. Firestone (1983)
Multisite Qualitative Policy Research: Optimizing Description and GeneralizabilityEducational Researcher, 12
B. DiCicco-Bloom, B. Crabtree (2006)
The qualitative research interviewMedical Education, 40
S. Robinson, R. Bennett (1995)
A TYPOLOGY OF DEVIANT WORKPLACE BEHAVIORS: A MULTIDIMENSIONAL SCALING STUDYAcademy of Management Journal, 38
J. Creswell (1966)
Qualitative Inquiry and Research Design: Choosing Among Five Approaches
(2016)
More MNCs keen to take advantage of country’s location
M. Saunders, P. Lewis, A. Thornhill (2006)
Research Methods for Business Students
Dawn Cappelli, A. Moore, Randall Trzeciak (2012)
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
A. Veiga, N. Martins (2015)
Improving the information security culture through monitoring and implementation actions illustrated through a case studyComput. Secur., 49
C. Voss, Nikos Tsikriktsis, M. Frohlich (2002)
Case research in operations managementInternational Journal of Operations & Production Management, 22
A. Alhogail, A. Mirza (2014)
Information security culture: A definition and a literature review2014 World Congress on Computer Applications and Information Systems (WCCAIS)
Xu Jiang, Mei Li, Shanxing Gao, Y. Bao, Feifei Jiang (2013)
Managing knowledge leakage in strategic alliances: The effects of trust and formal contractsIndustrial Marketing Management, 42
K. Eisenhardt, Melissa Graebner (2007)
Theory Building From Cases: Opportunities And ChallengesAcademy of Management Journal, 50
John-Paul Hatala, J. Lutta (2009)
Managing information sharing within an organizational setting: A social network perspectivePerformance Improvement Quarterly, 21
Stephan. Schrader (2011)
Informal Technology Transfer Between Companies: Information Leakage or Know-How Trading?
Merrill Warkentin, R. Willison (2009)
Behavioral and policy issues in information systems security: the insider threatEuropean Journal of Information Systems, 18
Hyeun-Suk Rhee, Cheongtag Kim, Young Ryu (2009)
Self-efficacy in information security: Its influence on end users' information security practice behaviorComput. Secur., 28
Miguel Caldas (2003)
Research design: qualitative, quantitative, and mixed methods approaches, 7
N. Molok, Atif Ahmad, Shanton Chang (2010)
Understanding the Factors of Information Leakage through Online Social Networking to Safeguard Organizational Information
Salvatore Cannellaa, Jose Framinana, M. Bruccoleri, A. Barbosa-Póvoad, Susana Relvasd (2015)
Production , Manufacturing and Logistics The effect of Inventory Record Inaccuracy in Information Exchange Supply Chains
F. Greitzer, A. Moore, Dawn Cappelli, D. Andrews, L. Carroll, T. Hull (2008)
Combating the Insider Cyber ThreatIEEE Security & Privacy, 6
Conferencia Desarrollo (2013)
World Investment Prospects Survey 2013–2015
T. Tran, P. Childerhouse, E. Deakins (2016)
Supply chain information sharing: challenges and risk mitigation strategiesJournal of Manufacturing Technology Management, 27
Babajide Osatuyi (2015)
Personality Traits and Information Privacy Concern on Social Media PlatformsJournal of Computer Information Systems, 55
Kelly Martin, J. Cullen (2006)
Continuities and Extensions of Ethical Climate Theory: A Meta-Analytic ReviewJournal of Business Ethics, 69
Gregory Orgill, G. Romney, M. Bailey, Paul Orgill (2004)
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems
Hau Lee, S. Whang (2000)
Information sharing in a supply chainInt. J. Manuf. Technol. Manag., 1
Areej Hogail (2015)
Cultivating and Assessing an Organizational Information Security Culture; an Empirical StudyInternational journal of security and its applications, 9
A. Moore, Dawn Cappelli, Thomas Caron, E. Shaw, Randall Trzeciak (2009)
Insider Theft of Intellectual Property for Business Advantage : A Preliminary Model
A. Veiga, J. Eloff (2010)
A framework and assessment instrument for information security cultureComput. Secur., 29
Why Malaysia?
Da Zhang, Yong Zeng, Lingyu Wang, Hongtao Li, Yuanfeng Geng (2011)
Modeling and evaluating information leakage caused by inferences in supply chainsComput. Ind., 62
Carly Huth, D. Chadwick, W. Claycomb, I. You (2013)
Guest editorial: A brief overview of data leakage and insider threatsInformation Systems Frontiers, 15
N. Mack, C. Woodsong, MacQueen Km, G. Guest, E. Namey (2005)
Qualitative research methods: a data collectors field guide.
Global data leakage report
(1987)
A theory and measure of ethical climate in organizations
Mitchell Kajzer, J. D'Arcy, C. Crowell, A. Striegel, D. Bruggen (2014)
An exploratory investigation of message-person congruence in information security awareness campaignsComput. Secur., 43
C. Durugbo, A. Tiwari, J. Alcock (2014)
Managing integrated information flow for delivery reliabilityInd. Manag. Data Syst., 114
Irene Okere, J. Niekerk, Mariana Carroll (2012)
Assessing information security culture: A critical analysis of current approaches2012 Information Security for South Africa
(2013)
Unintentional Insider Threats: A Foundational Study
Fan-Chuan Tseng, Y. Fan (2011)
Exploring the Influence of Organizational Ethical Climate on Knowledge ManagementJournal of Business Ethics, 101
Ken Guo, Yufei Yuan, N. Archer, C. Connelly (2011)
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior ModelJournal of Management Information Systems, 28
A. Salleh (2016)
Human governance: bringing the meaning of integrity in the life of professional accountants
T. Schlienger, S. Teufel (2002)
Information Security Culture: The Socio-Cultural Dimension in Information Security Management
Курпаяниди Иванович (2017)
"Doing business 2017: Equal opportunities for All" как инструмент оценки эффективности регулирования предпринимательской среды в Узбекистане
(2016)
Human Governance: Bringing the Meaning of Integrity in the Life of Professional Accountants. Working paper, Putra Graduate School of Business
Aditya Simha, J. Cullen (2012)
Ethical Climates and Their Effects on Organizational Outcomes: Implications From the Past and Prophecies for the FutureAcademy of Management Perspectives, 26
Bernd Marcus, Anita Taylor, S. Hastings, A. Sturm, Oliver Weigelt (2016)
The Structure of Counterproductive Work BehaviorJournal of Management, 42
M. Barratt, Thomas Choi, Mei-Lien Li (2011)
Qualitative case studies in operations management: Trends, research outcomes, and future research implicationsJournal of Operations Management, 29
(1995)
A taxonomy of situation awareness errors
Lijiao Cheng, Y. Li, Wenli Li, E. Holm, Qingguo Zhai (2013)
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theoryComput. Secur., 39
S. Sharma, S. Routroy (2016)
Modeling information risk in supply chain using Bayesian networksJ. Enterp. Inf. Manag., 29
Hui-Hsien Hsieh, Yau-De Wang (2016)
Linking perceived ethical climate to organizational deviance: The cognitive, affective, and attitudinal mechanismsJournal of Business Research, 69
F. Greitzer, R. Hohimer (2011)
Modeling Human Behavior to Anticipate Insider AttacksJournal of Strategic Security, 4
Atif Ahmad, H. Tscherning, R. Bosua, Rens Scheepers (2015)
Guarding Against the Erosion of Competitive Advantage: A Knowledge Leakage Mitigation Model
J. Stanton, K. Stam, Paul Mastrangelo, Jeffrey Jolton (2005)
Analysis of end user security behaviorsComput. Secur., 24
A. Pedrosa, Dag Näslund, C. Jasmand (2012)
Logistics case study based research: towards higher qualityInternational Journal of Physical Distribution & Logistics Management, 42
M. McCormick (2008)
Data Theft: A Prototypical Insider Threat
Management Science, 48
R. Haines, Lori Leonard (2007)
Individual characteristics and ethical decision-making in an IT contextInd. Manag. Data Syst., 107
Marwan Omar (2015)
Insider Threats: Detecting and Controlling Malicious Insiders
M. Faisal, D. Banwet, R. Shankar (2007)
Information risks management in supply chains: an assessment and mitigation frameworkJ. Enterp. Inf. Manag., 20
J. Sumner, J. Cantiello, K. Cortelyou-Ward, A. Noblin (2012)
Information sharing among health care employers: using technology to create an advantageous culture of sharing.Advances in health care management, 13
F. Greitzer, D. Frincke (2010)
Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation
R. Willison, Merrill Warkentin (2013)
Beyond Deterrence: An Expanded View of Employee Computer AbuseMIS Q., 37
Lode Li (2002)
Information Sharing in a Supply Chain with Horizontal CompetitionYale School of Management Research Paper Series
Jason Nurse, Oliver Buckley, P. Legg, M. Goldsmith, S. Creese, Gordon Wright, M. Whitty (2014)
Understanding Insider Threat: A Framework for Characterising Attacks2014 IEEE Security and Privacy Workshops
(2016)
2017 Economic report
Keshnee Padayachee (2016)
An assessment of opportunity-reducing techniques in information security: An insider threat perspectiveDecis. Support Syst., 92
(2016)
Global Data Leakage Report, 2016
P. Sackett, C. DeVore (2001)
Counterproductive behaviors at work
G. Magklaras, S. Furnell (2005)
A preliminary model of end user sophistication for insider threat prediction in IT systemsComput. Secur., 24
M. Nayar (2004)
Information Integrity (I*I): the Next Quality FrontierTotal Quality Management & Business Excellence, 15
J. Kwak, S. Gavirneni (2015)
Impact of information errors on supply chain performanceJournal of the Operational Research Society, 66
Huigang Liang, Yajiong Xue (2010)
Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance PerspectiveJ. Assoc. Inf. Syst., 11
Hongyan Dai, Jianbin Li, Nina Yan, Weihua Zhou (2016)
Bullwhip effect and supply chain costs with low- and high-quality information on inventory shrinkageEur. J. Oper. Res., 250
D. Liginlal, Inkook Sim, L. Khansa (2009)
How significant is human error as a cause of privacy breaches? An empirical study and a framework for error managementComput. Secur., 28
C. Nadel (2016)
Case Study Research Design And Methods
(2007)
Cliffs Quick Review: Psychology
(2010)
Multiple-case designs: Encyclopedia of case Study Research
J. Kembro, Dag Näslund, J. Olhager (2017)
Information sharing across multiple supply chain tiers: A Delphi study on antecedentsInternational Journal of Production Economics, 193
F. Greitzer, Jeremy Strozer, Sholom Cohen, John Bergey, Jennifer Cowley, A. Moore, David Mundie (2014)
Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies2014 47th Hawaii International Conference on System Sciences
V. Nedkovski, M. Guerci, F. Battisti, Elena Siletti (2017)
Organizational ethical climates and employee's trust in colleagues, the supervisor, and the organizationJournal of Business Research, 71
European Journal of Operational Research, 243
(2015)
Data leakage : Catching water in a sieve [ Blogpost ]
Bart Victor, J. Cullen (1988)
The Organizational Bases of Ethical Work ClimatesAdministrative Science Quarterly, 33
(2016)
Facing cyberattacks in 2016 and beyond
Ik-Whan Kwon, Taewon Suh (2005)
Trust, commitment and relationships in supply chain management: a path analysisSupply Chain Management, 10
Jeffrey Hunker, Christian Probst (2011)
Insiders and Insider Threats - An Overview of Definitions and Mitigation TechniquesJ. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2
Research Policy, 32
S. Fawcett, Paul Osterhaus, G. Magnan, James Brau, M. McCarter (2007)
Information sharing and supply chain performance: the role of connectivity and willingnessSupply Chain Management, 12
K. Tan, W. Wong, L. Chung (2016)
Information and Knowledge Leakage in Supply ChainInformation Systems Frontiers, 18
C. Colwill (2009)
Human factors in information security: The insider threat - Who can you trust these days?Inf. Secur. Tech. Rep., 14
(2017)
Malaysia
A. Moore, T. Shimeall, Randall Trzeciak (2006)
Common Sense Guide to Prevention and Detection of Insider Threats
Nikolaos Dimotakis, Remus Ilies, M. Mount (2008)
Intentional negative behaviors at work, 27
Gale (1994)
Qualitative Data Analysis: An Expanded Sourcebook
A. Hoecht, P. Trott (2006)
Outsourcing, information leakage and the risk of losing technology based competenciesEuropean Business Review, 18
Stronger economic growth for
T. Paulus, J. Lester, Paul Dempster (2013)
Digital Tools for Qualitative ResearchQMiP Bulletin
P. Ritala, Heidi Olander, Snejina Michailova, K. Husted (2015)
Knowledge sharing, knowledge leaking and relative innovation performance: An empirical studyTechnovation, 35
F. Greitzer, Jeremy Strozer, Sholom Cohen, A. Moore, David Mundie, Jennifer Cowley (2014)
Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits2014 IEEE Security and Privacy Workshops
(2016)
Multinational Companies in Malaysia Online Database
Krishnan Anand, Manu Goyal (2009)
Strategic Information Management Under Leakage in a Supply ChainManag. Sci., 55
D. Harhoff, J. Henkel, Eric Hippel
Mit Sloan School of Management Mit Sloan School Working Paper 4749-09 Profiting from Voluntary Information Spillovers: How Users Benefit by Freely Revealing Their Innovations Profiting from Voluntary Information Spillovers: How Users Benefit by Freely Revealing Their Innovations *
Da Zhang, Xinlin Cao, Lingyu Wang, Yong Zeng (2012)
Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selectionJournal of Intelligent Manufacturing, 23
T. Olzak (2010)
Data leakage: catching water in a sieve
Sultan Alneyadi, E. Sithirasenan, V. Muthukkumarasamy (2016)
A survey on data leakage prevention systemsJ. Netw. Comput. Appl., 62
Robert Crossler, Allen Johnston, P. Lowry, Qing Hu, Merrill Warkentin, R. Baskerville (2013)
Future directions for behavioral information security researchComput. Secur., 32
William Dodd (1941)
A GLOSSARY OF PSYCHOLOGICAL TERMSMedical Journal of Australia, 2
Melissa Gruys, P. Sackett (2003)
Investigating the Dimensionality of Counterproductive Work BehaviorInternational Journal of Selection and Assessment, 11
R. Baskerville (2009)
The EJIS editorial organisation and submissionsEuropean Journal of Information Systems, 18
Souad Mohamed, D. Mynors, A. Grantham, K. Walsh, P. Chan (2006)
Understanding one aspect of the knowledge leakage concept: people
G. Stoneburner, Alice Goguen, Alexis Feringa (2002)
Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology
Yan Chen, K. Ramamurthy, Kuang-Wei Wen (2015)
Impacts of Comprehensive Information Security Programs on Information Security CultureJournal of Computer Information Systems, 55
A. Martins, J. Eloff (2002)
Information Security Culture
The purpose of this paper is to explore the human factors triggering information leakage and investigate how companies mitigate insider threat for information sharing integrity.Design/methodology/approachThe methodology employed is multiple case studies approach with in-depth interviews with five multinational enterprises (MNEs)/multinational corporations (MNCs).FindingsThe findings reveal that information leakage can be approached with human governance mechanism such as organizational ethical climate and information security culture. Besides, higher frequency of leakages negatively affects information sharing integrity. Moreover, this paper also contributes to a research framework which could be a guide to overcome information leakage issue in information sharing.Research limitations/implicationsThe current study involved MNCs/MNEs operating in Malaysia, while companies in other countries may have different ethical climate and information sharing culture. Thus, for future research, it will be good to replicate the study in a larger geographic region to verify the findings and insights of this research.Practical implicationsThis research contributes to the industry and business that are striving toward solving the mounting problem of information leakage by raising awareness of human factors and to take appropriate mitigating governance strategies to pre-empt information leakage. This paper also contributes to a novel theoretical model that characterizes the iniquities of humans in sharing information, and suggests measures which could be a guide to avert disruptive leakages.Originality/valueThis paper is likely an unprecedented research in molding human governance in the domain of information sharing and its Achilles’ heel which is information leakage.
Industrial Management & Data Systems – Emerald Publishing
Published: Aug 7, 2019
Keywords: Information sharing; Human governance; Information security culture; Information leakage; Organization ethical climate
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.