Development and validation of instruments of information security deviant behavior Amanda M.Y. Chu a , Patrick Y.K. Chau b, a Department of Management Sciences, The City University of Hong Kong, Hong Kong b Faculty of Business and Economics, The University of Hong Kong, Hong Kong abstract article info Article history: Received 11 July 2013 Received in revised form 6 June 2014 Accepted 10 June 2014 Available online 19 June 2014 Keywords: Information security Deviant behavior Instrument development Measurement Validity Reliability Information security deviant behavior (ISDB) of employees is a serious threat to organizations. However, not much empirical research on ISDB has been carried out. This paper attempts to develop and validate instruments of ISDB using an empirical method. Two instruments of ISDB are proposed and tested, including a four-item instrument of resource misuse (ISDB that is related to the misuse of information systems resources) and a three-item instrument of security carelessness (ISDB that is related to the employees' omissive activities when using computers or handling data). A rigorous instrument development process which includes three surveys and addresses six crucial measurement properties (content analysis, factorial validity, reliability, convergent validity, discriminant validity, and nomological validity) is adopted. The implications of these two instruments for future empirical studies on ISDB are discussed. © 2014 Elsevier B.V. All rights reserved. 1. Introduction Information security deviant behavior (ISDB) of employees, such as leaving removable storage devices unattended and using untrusted appli- cations at work, is a serious threat to organizations. A recent survey re- ported that 63% of interviewed information security professionals deemed employees to be a high concern for organizations; the percentage was higher than that of hackers (55%) or organized crime (38%) [24]. ISDB also results in serious nancial losses for organizations, with a 2009 secu- rity survey reporting the average annual such losses arising from security incidents to be US$234,244 per company [59]. A quarter of respondents to this survey believed that at least 60% of these nancial losses stem from insiders' actions. Despite the increasing prevalence and high associated costs of ISDB in the workplace, our understanding of this topic remains limited and fragmented [30,64,78]. The lack of instruments to measure ISDB pre- sents a barrier to our understanding of the relationship between ISDB and correlated constructs and the development of theories and frame- works to tackle security problems [48]. In order to understand ISDB, it is important to develop reliable and valid instruments to measure it. This study aims to ll this research gap by developing instruments for the measurement of ISDB under a rigorous instrument development process. The instruments developed are useful for researchers to inves- tigate the different properties of such behavior. The remainder of this paper is organized as follows. We review related studies and discuss the background theory in Section 2, and then describe how we used a four-stage process to develop the instru- ments for ISDB in Sections 3 and 4. Section 3 focuses on the domain specication, instrument development and instrument renement while Section 4 focuses on the instrument validity. Finally, we discuss the implications of the ndings and draw our conclusion in Section 5. 2. Background theory 2.1. Information security deviant behavior Workplace deviant behavior is not a new concept. A number of studies in sociology, psychology, and organizational behavior have attempted to study acts related to workplace deviant behavior and used different terminologies to denote the behavior. Examples include antisocial behavior [26], counterproductive workplace behavior [44], organizational misbehavior [74], organizational retaliation behavior [65], workplace aggression [47], and workplace deviance [60]. Regard- less of the different terminologies, prior literature tended to vary work- place deviant behavior based on its target interpersonal deviance and organizational deviance. Table 1 summarizes the denitions of different terminologies used to describe the behavior and examples on interper- sonal deviance and organizational deviance in each terminology. Inter- personal deviance was further categorized into political deviance and personal aggression as well as organizational deviance into property de- viance and production deviance [60]. Decision Support Systems 66 (2014) 93101 Corresponding author. Tel.: +852 3917 1025. E-mail address: pchau@business.hku.hk (P.Y.K. Chau). http://dx.doi.org/10.1016/j.dss.2014.06.008 0167-9236/© 2014 Elsevier B.V. All rights reserved. Contents lists available at ScienceDirect Decision Support Systems journal homepage: www.elsevier.com/locate/dss