Derleme
BibTex RIS Kaynak Göster

Kurumlarda Siber Suçlar: İletişim, Güven Ve Liderlik Yaklaşımları

Yıl 2025, Cilt: 13 Sayı: 1, 31 - 50, 01.07.2025

Öz

Bu çalışma, kurumlarda siber suçların önlenmesinde liderlik tarzlarının, örgütsel güvenin ve iletişim stratejilerinin rolünü incelemektedir. Literatür taramasına dayanan çalışmada, dönüşümcü ve etik liderliğin güveni ve siber güvenlik direncini artırdığı, otoriter liderliğin ise iletişim ve güveni zedelediği sonucuna ulaşılmıştır. Açık ve güven temelli iletişim, çalışan farkındalığını artırmakta ve etik dışı davranışları azaltmaktadır. Çalışma, siber tehditlerle etkin mücadele için liderlik, güven ve iletişim stratejilerinin entegre bir biçimde uygulanması gerektiğini vurgulamaktadır. Bulgulara göre, örgütsel güven, liderlik özellikleri ve güvene dayalı iletişim yönetimi, siber suçların önlenmesinde son derece önemlidir. Etik ve dönüşümcü liderlik, çalışanlar arasında güveni ve bilgi paylaşımını artırarak siber saldırılara karşı güçlü bir bağışıklık sistemi oluşturmaktadır. Güven kültürü, çalışanların siber güvenlik konusundaki farkındalığını artırmakta ve etik dışı davranışları azaltmaktadır. Açık iletişim güveni güçlendirerek bu tür ihlallerin önlenmesini kolaylaştırmaktadır. Bu nedenle, liderlik, güven ve iletişim stratejilerinin eş zamanlı uygulanması, kurumların siber suçlara karşı dayanıklılığını artırmaktadır.
Anahtar Kelimeler:

Kaynakça

  • Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour?. arXiv preprint arXiv:1901.02672.
  • Bass, B. M. (1999). Two decades of research and development in transformational leadership. European journal of work and organizational psychology, 8(1), 932.
  • Bass, B. M., & Avolio, B. J. (Eds.). (1994). Improving organizational effectiveness through transformational leadership. Sage.
  • Bass, B. M., & Riggio, R. E. (2006). Transformational leadership (2nd ed.). Mahwah, NJ: Lawrence Erlbaum Associates.
  • Bass. B. M. (1998). Transformational Leadership: Industrial, Military, and Educational Impact. Mahwah, NJ: Lawrence Erlbaum Associates.
  • Booth, A., James, M. S., Clowes, M., & Sutton, A. (2021). Systematic approaches to a successful literature review. Sage.
  • Brown, M. E., & Treviño, L. K. (2006). Ethical leadership: A review and future directions. The leadership quarterly, 17(6), 595616.
  • Brown, M. E., Treviño, L. K., & Harrison, D. A. (2005). Ethical leadership: A social learning perspective for construct development and testing. Organizational behavior and human decision processes, 97(2), 117134.
  • Calton, J. M. (1998). Trust in organizations: frontiers of theory and research. Business and society, 37(3), 342.
  • Colquitt, J. A., Scott, B. A., & LePine, J. A. (2007). Trust, trustworthiness, and trust propensity: a metaanalytic test of their unique relationships with risk taking and job performance. Journal of applied psychology, 92(4), 909.
  • Cooper, H. M. (1989). Integrating research: A guide for literature reviews (2nd ed.). Sage Publications.
  • Cowan, D. (2014). Strategic internal communication: How to build employee engagement and performance. Kogan Page.
  • Cronin, C. (2011). Doing your literature review: Traditional and systematic techniques. Evaluation & Research in Education, 24(3), 219–221
  • Das, S., & Nayak, T. (2013). Impact of cybercrime: Issues and challenges. International journal of engineering sciences & Emerging technologies, 6(2), 142153.
  • Dirks, K. T., & Ferrin, D. L. (2002). Trust in leadership: metaanalytic findings and implications for research and practice. Journal of applied psychology, 87(4), 611628.
  • ENISA. (2023). Threat Landscape 2023 – Phishing incidents in EU universities and hospitals. European Union Agency for Cybersecurity. https://www.enisa.europa.eu/publications/enisa-threat-landscape-2023
  • Fink, A. (2019). Conducting research literature reviews: From the internet to paper. Sage publications.
  • Gillespie, N. (2003). Measuring trust in working relationships: The behavioral trust inventory. Melbourne Business School.
  • Goldstein, M. (2021, May 10). Cyberattack forces shutdown of major U.S. fuel pipeline. The New York Times. https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html
  • Goleman, D. (2017). Leadership that gets results. In Leadership perspectives (pp. 8596). Routledge.
  • Haney, J., & Lutters, W. (2025). From compliance to impact: Tracing the transformation of an organisational security awareness programme. Cyber Security: A Peer-Reviewed Journal, 8(2), 110-130. https://doi.org/10.69554/NJYA9034
  • Harms, P. D., Wood, D., Landay, K., Lester, P. B., & Lester, G. V. (2018). Autocratic leaders and authoritarian followers revisited: A review and agenda for the future. The Leadership Quarterly, 29(1), 105122.
  • Hart, C. (1998). Doing a literature review: Releasing the social science research imagination. Sage.
  • Hollander, E. P., & Offermann, L. R. (1990). Power and leadership in organizations: Relationships in transition. American Psychologist, 45(2), 179–189.
  • Judge, T. A., & Piccolo, R. F. (2004). Transformational and transactional leadership: A metaanalytic test of their relative validity. Journal of Applied Psychology, 89(5), 755768.
  • Kirkpatrick, S. A., & Locke, E. A. (1996). Direct and indirect effects of three core charismatic leadership components on performance and attitudes. Journal of applied psychology, 81(1), 36.
  • Kramer, R. M. (1999). Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual review of psychology, 50(1), 569598.
  • Kshetri, N. (2017). 1 Cybercrime and Cybersecurity in the Global South. Springer.
  • Lewin, K., Lippitt, R., & White, R. K. (1939). Patterns of aggressive behavior in experimentally created “social climates”. The Journal of social psychology, 10(2), 269299.
  • Mayer, D. M., Aquino, K., Greenbaum, R. L., & Kuenzi, M. (2012). Who displays ethical leadership, and why does it matter? An examination of antecedents and consequences of ethical leadership. Academy of management journal, 55(1), 151171.
  • Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of management review, 20(3), 709734.
  • Men, L. R. (2014). Strategic internal communication: Transformational leadership, communication channels, and employee satisfaction. Management communication quarterly, 28(2), 264284.
  • Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 1938-1940.
  • Ng, T. W. H., & Sorensen, K. L. (2008). Toward a further understanding of the relationships between perceptions of support and work attitudes: A metaanalysis. Group & Organization Management, 33(3), 243–268. https://doi.org/10.1177/1059601107313307
  • Northouse, P. G. (2018). Leadership: Theory and Practice (8th ed.). Sage Publications.
  • Okoli, C., & Schabram, K. (2015). A guide to conducting a systematic literature review of information systems research.
  • Saini, H., Rao, Y. S., & Panda, T. C. (2012). Cybercrimes and their impacts: A review. International Journal of Engineering Research and Applications, 2(2), 202209.
  • Sashkin, M. (2004). Transformational leadership approaches: A review and synthesis. In J.
  • Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of business research, 104, 333339.
  • Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk management guide for information technology systems. Nist special publication, 800(30), 80030.
  • Şeker, C. (2024). Örgütlerde değişime direnç performans ilişkisinde öğrenen örgüt algısı ve dönüşümcü liderliğin rolü (Doktora Tezi). Bandırma Onyedi Eylül Üniversitesi, Sosyal Bilimler Enstitüsü, İşletme Anabilim Dalı, Bandırma
  • Tannenbaum, R., & Schmidt, W. H. (1973). How to choose a leadership pattern. Harvard business review.
  • Tranfield, D., Denyer, D., & Smart, P. (2003). Towards a methodology for developing evidence‐informed management knowledge by means of systematic review. British journal of management, 14(3), 207222.
  • Tushman, M. L., & O'Reilly, C. A. III. (1996). Ambidextrous organizations: Managing evolutionary and revolutionary change. California Management Review, 38(4), 8–30.
  • Uchendu, B., Nurse, J. R., Bada, M., & Furnell, S. (2021). Developing a cyber security culture: Current practices and future needs. Computers & Security, 109, 102387. https://doi.org/10.1016/j.cose.2021.102387
  • Vrhovec, S., & Markelj, B. (2024). We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers. Plos one, 19(10), e0312266. https://doi.org/10.1371/journal.pone.0312266
  • Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a literature review. MIS quarterly, xiiixxiii.
  • Zand, D. E. (1972). Trust and managerial problem solving. Administrative science quarterly, 229-239.

Cybercrimes In Organizations: Communication, Trust, And Leadership Approaches

Yıl 2025, Cilt: 13 Sayı: 1, 31 - 50, 01.07.2025

Öz

This study explores the role of leadership styles, organizational trust, and communication strategies in preventing cybercrimes within organizations. Based on a literature review, it finds that transformational and ethical leadership enhance trust and cybersecurity resilience, while authoritarian leadership harms communication and trust. Open and trustbased communication increases employee awareness and reduces ethical misconducts. The study emphasizes the need for integrated leadership, trust, and communication strategies to effectively combat cyber threats. According to findings, organizational trust, leadership characteristics, and trustful communication management are of utmost importance in preventing cybercrimes. Ethical and transformational leadership enhance trust, and information sharing among employees, making a strong immune system against cyberattacks. The trust culture increases employees' awareness of cybersecurity as well as reduces ethical misconducts. Open communication strengthens trust so that it will be easier to prevent such violations. Therefore, the simultaneous implementation of leadership, trust, and communication strategies enhances organizations' cybercrime resilience.

Kaynakça

  • Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour?. arXiv preprint arXiv:1901.02672.
  • Bass, B. M. (1999). Two decades of research and development in transformational leadership. European journal of work and organizational psychology, 8(1), 932.
  • Bass, B. M., & Avolio, B. J. (Eds.). (1994). Improving organizational effectiveness through transformational leadership. Sage.
  • Bass, B. M., & Riggio, R. E. (2006). Transformational leadership (2nd ed.). Mahwah, NJ: Lawrence Erlbaum Associates.
  • Bass. B. M. (1998). Transformational Leadership: Industrial, Military, and Educational Impact. Mahwah, NJ: Lawrence Erlbaum Associates.
  • Booth, A., James, M. S., Clowes, M., & Sutton, A. (2021). Systematic approaches to a successful literature review. Sage.
  • Brown, M. E., & Treviño, L. K. (2006). Ethical leadership: A review and future directions. The leadership quarterly, 17(6), 595616.
  • Brown, M. E., Treviño, L. K., & Harrison, D. A. (2005). Ethical leadership: A social learning perspective for construct development and testing. Organizational behavior and human decision processes, 97(2), 117134.
  • Calton, J. M. (1998). Trust in organizations: frontiers of theory and research. Business and society, 37(3), 342.
  • Colquitt, J. A., Scott, B. A., & LePine, J. A. (2007). Trust, trustworthiness, and trust propensity: a metaanalytic test of their unique relationships with risk taking and job performance. Journal of applied psychology, 92(4), 909.
  • Cooper, H. M. (1989). Integrating research: A guide for literature reviews (2nd ed.). Sage Publications.
  • Cowan, D. (2014). Strategic internal communication: How to build employee engagement and performance. Kogan Page.
  • Cronin, C. (2011). Doing your literature review: Traditional and systematic techniques. Evaluation & Research in Education, 24(3), 219–221
  • Das, S., & Nayak, T. (2013). Impact of cybercrime: Issues and challenges. International journal of engineering sciences & Emerging technologies, 6(2), 142153.
  • Dirks, K. T., & Ferrin, D. L. (2002). Trust in leadership: metaanalytic findings and implications for research and practice. Journal of applied psychology, 87(4), 611628.
  • ENISA. (2023). Threat Landscape 2023 – Phishing incidents in EU universities and hospitals. European Union Agency for Cybersecurity. https://www.enisa.europa.eu/publications/enisa-threat-landscape-2023
  • Fink, A. (2019). Conducting research literature reviews: From the internet to paper. Sage publications.
  • Gillespie, N. (2003). Measuring trust in working relationships: The behavioral trust inventory. Melbourne Business School.
  • Goldstein, M. (2021, May 10). Cyberattack forces shutdown of major U.S. fuel pipeline. The New York Times. https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html
  • Goleman, D. (2017). Leadership that gets results. In Leadership perspectives (pp. 8596). Routledge.
  • Haney, J., & Lutters, W. (2025). From compliance to impact: Tracing the transformation of an organisational security awareness programme. Cyber Security: A Peer-Reviewed Journal, 8(2), 110-130. https://doi.org/10.69554/NJYA9034
  • Harms, P. D., Wood, D., Landay, K., Lester, P. B., & Lester, G. V. (2018). Autocratic leaders and authoritarian followers revisited: A review and agenda for the future. The Leadership Quarterly, 29(1), 105122.
  • Hart, C. (1998). Doing a literature review: Releasing the social science research imagination. Sage.
  • Hollander, E. P., & Offermann, L. R. (1990). Power and leadership in organizations: Relationships in transition. American Psychologist, 45(2), 179–189.
  • Judge, T. A., & Piccolo, R. F. (2004). Transformational and transactional leadership: A metaanalytic test of their relative validity. Journal of Applied Psychology, 89(5), 755768.
  • Kirkpatrick, S. A., & Locke, E. A. (1996). Direct and indirect effects of three core charismatic leadership components on performance and attitudes. Journal of applied psychology, 81(1), 36.
  • Kramer, R. M. (1999). Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual review of psychology, 50(1), 569598.
  • Kshetri, N. (2017). 1 Cybercrime and Cybersecurity in the Global South. Springer.
  • Lewin, K., Lippitt, R., & White, R. K. (1939). Patterns of aggressive behavior in experimentally created “social climates”. The Journal of social psychology, 10(2), 269299.
  • Mayer, D. M., Aquino, K., Greenbaum, R. L., & Kuenzi, M. (2012). Who displays ethical leadership, and why does it matter? An examination of antecedents and consequences of ethical leadership. Academy of management journal, 55(1), 151171.
  • Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of management review, 20(3), 709734.
  • Men, L. R. (2014). Strategic internal communication: Transformational leadership, communication channels, and employee satisfaction. Management communication quarterly, 28(2), 264284.
  • Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 1938-1940.
  • Ng, T. W. H., & Sorensen, K. L. (2008). Toward a further understanding of the relationships between perceptions of support and work attitudes: A metaanalysis. Group & Organization Management, 33(3), 243–268. https://doi.org/10.1177/1059601107313307
  • Northouse, P. G. (2018). Leadership: Theory and Practice (8th ed.). Sage Publications.
  • Okoli, C., & Schabram, K. (2015). A guide to conducting a systematic literature review of information systems research.
  • Saini, H., Rao, Y. S., & Panda, T. C. (2012). Cybercrimes and their impacts: A review. International Journal of Engineering Research and Applications, 2(2), 202209.
  • Sashkin, M. (2004). Transformational leadership approaches: A review and synthesis. In J.
  • Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of business research, 104, 333339.
  • Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk management guide for information technology systems. Nist special publication, 800(30), 80030.
  • Şeker, C. (2024). Örgütlerde değişime direnç performans ilişkisinde öğrenen örgüt algısı ve dönüşümcü liderliğin rolü (Doktora Tezi). Bandırma Onyedi Eylül Üniversitesi, Sosyal Bilimler Enstitüsü, İşletme Anabilim Dalı, Bandırma
  • Tannenbaum, R., & Schmidt, W. H. (1973). How to choose a leadership pattern. Harvard business review.
  • Tranfield, D., Denyer, D., & Smart, P. (2003). Towards a methodology for developing evidence‐informed management knowledge by means of systematic review. British journal of management, 14(3), 207222.
  • Tushman, M. L., & O'Reilly, C. A. III. (1996). Ambidextrous organizations: Managing evolutionary and revolutionary change. California Management Review, 38(4), 8–30.
  • Uchendu, B., Nurse, J. R., Bada, M., & Furnell, S. (2021). Developing a cyber security culture: Current practices and future needs. Computers & Security, 109, 102387. https://doi.org/10.1016/j.cose.2021.102387
  • Vrhovec, S., & Markelj, B. (2024). We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers. Plos one, 19(10), e0312266. https://doi.org/10.1371/journal.pone.0312266
  • Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a literature review. MIS quarterly, xiiixxiii.
  • Zand, D. E. (1972). Trust and managerial problem solving. Administrative science quarterly, 229-239.
Toplam 48 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Afet ve Acil Durum Yönetimi
Bölüm MAKALELER
Yazarlar

Cemile Şeker 0000-0002-9150-6845

Yayımlanma Tarihi 1 Temmuz 2025
Gönderilme Tarihi 30 Nisan 2025
Kabul Tarihi 18 Haziran 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 13 Sayı: 1

Kaynak Göster

APA Şeker, C. (2025). Cybercrimes In Organizations: Communication, Trust, And Leadership Approaches. International Review of Economics and Management, 13(1), 31-50.