Why Petty IT Tyrants Are the Real Enemy of Cybersecurity, Productivity, and Innovation

Authors

  • John H. Batchelor University of West Florida
  • Timothy R. McIlveene University of West Florida
  • Dennis Barber East Carolina University

DOI:

https://doi.org/10.33423/jabe.v26i2.7050

Keywords:

business, economics, petty tyranny, information technology, petty tyranny emergence, petty tyranny lifecycle

Abstract

Despite purportedly acting in the best interests of the organization, many Information Technology (IT) managers succumb to desires for control and power that result in behavior that is detrimental to employees and, ultimately, the organization as a whole. Drawing from Ashforth’s seminal work on petty tyranny, we highlight the unique dynamics of IT-related tyranny, characterized by micromanagement and arbitrary control over user activities. Employing models that both illustrate petty tyranny emergence and delineate the lifecycle of IT petty tyranny, this work describes how individual predispositions and organizational factors catalyze and perpetuate tyrannical behaviors. In addition, we examine the harmful effects of IT petty tyranny on employee morale, productivity, and even organizational cybersecurity. We conclude with practical advice on how organizations can recognize and mitigate IT petty tyranny to avoid negative outcomes for employees and the organization.

References

Alotaibi, M., Furnell, S., & Clarke, N. (2016, December). Information security policies: A review of challenges and influencing factors. In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 352–358). IEEE.

Ashforth, B.E. (1994). Petty tyranny in organizations. Human Relations, 47(7), 755–778.

Ashforth, B.E. (1997). Petty tyranny in organizations: A preliminary examination of antecedents and consequences. Canadian Journal of Administrative Sciences, 14(2), 126–140.

Bateman, T.S., & Organ, D.W. (1983). Job satisfaction and the good soldier: The relationship between affect and employee “citizenship.” Academy of Management Journal, 26(4), 587–595.

Cacciolatti, L., Lee, S.H., & Molinero, C.M. (2017). Clashing institutional interests in skills between government and industry: An analysis of demand for technical and soft skills of graduates in the UK. Technological Forecasting and Social Change, 119, 139–153.

Cameron, E.A., & Marcum, T.M. (2019, March 27–29). Why business schools must incorporate cybersecurity into the business curriculum – Preparing the next generation for success. Chicago, IL, United States: Society for the Advancement of Information Systems.

Fist, N., Kelly, N.M., & Liebrock, L. (2023). Cybersecurity communities of practice: Strategies for creating gateways to participation. Computers & Security, 132, 1–11.

Kirlappos, I., Parkin, S., & Sasse, M.A. (2014). Learning from “Shadow Security”. In NDSS Workshop on Usable Security.

Lindzon, J. (2020, January 24). Does blocking certain websites at work hurt employee productivity? Fast Company. Retrieved from https://www.fastcompany.com/90453980/does-blocking-certain-websites-at-work-hurt-employee-productivity

Schaeffer, D.M. (2017). An interdisciplinary approach to cybersecurity curriculum. Journal of Higher Education Theory and Practice, 17(9), 36–40.

Searle, R., & Renaud, K. (2023). Trust and vulnerability in the cybersecurity context. Hawaiian International Conference on System Science, Lahaina, HI, United States.

Taylor, L. (2009). Tame your terrible office tyrant. Wiley.

University of Michigan News. (2019, May 28). Soft skills training boosts productivity. Retrieved from https://news.umich.edu/soft-skills-training-boosts-productivity/

Wilson, G., Wolford, R., Beneda, J., Ellis, S.K., & Laros, S.L. (2022). Better ways to work together: A playbook for understanding and changing toxic workplaces. The Threat Lab.

Downloads

Published

2024-06-21

How to Cite

Batchelor, J. H., McIlveene, T. R., & Barber, D. (2024). Why Petty IT Tyrants Are the Real Enemy of Cybersecurity, Productivity, and Innovation. Journal of Applied Business and Economics, 26(2). https://doi.org/10.33423/jabe.v26i2.7050

Issue

Section

Articles