Abstract
Cybersecurity systems provide a unique opportunity of study as they can be used as agents of protection and harm. Practice uses these systems of protection against employees through the use of red team and black hat tactics for perimeter testing as well as invasive, complex monitoring for defense of internal threats. It is important to understand the effects of these actions on end users. This study seeks to understand the effects of these cybersecurity practices on individuals through the perspectives of trust, betrayal, aversion, and resistance. An integrative model is built and employed to understand the formation and consequences of IS betrayal.
Recommended Citation
Pienta, Daniel; Thatcher, Jason; Sun, Heshan; and George, Joey, "Information Systems Betrayal: When Cybersecurity Systems Shift from Agents of Protection to Agents of Harm" (2018). PACIS 2018 Proceedings. 175.
https://aisel.aisnet.org/pacis2018/175