Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Deterring internal information systems misuse

Published: 01 October 2007 Publication History

Abstract

Deterring employee intentions to misuse computer systems requires complementary technical and procedural controls.

References

[1]
Galletta, D. and Polak, P. An empirical investigation of antecedents of Internet abuse in the workplace. In Proceedings of the Second Annual Workshop on HCI Research in MIS (Seattle, Dec. 12--13, 2003), 47--51.
[2]
Gordon, L., Loeb, M., Lucyshyn, W., and Richardson. R. 2006 CSI/FBI Computer Crime and Security Survey. Computer Security Institute, San Francisco, CA; www.gocsi.com/forms/fbi/csi_fbi_survey.jhtml.
[3]
Hays, R., Hayashi, T., and Stewart, A. A five-item measure of socially desirable response set. Educational and Psychology Measurement 49, 3 (1989), 629--637.
[4]
InformationWeek. U.S. Information Security Research Report. InformationWeek (Aug. 29, 2005); www.informationweek.com/reports/showReport.jhtml?articleID=170100861.
[5]
Lee, J. and Lee, Y. A holistic model of computer abuse within organizations. Information Management & Computer Security 10, 2 (2002), 57--63.
[6]
Lee, S.M., Lee, S.-G., and Yoo, S. An integrative model of computer abuse based on social control and general deterrence theories. Information and Management 41, 6 (2004), 707--718.
[7]
Parker, D. Fighting Computer Crime. John Wiley & Sons, New York, 1998.
[8]
Standage, T. The weakest link. The Economist (Oct. 26, 2002), 11--14.
[9]
Stanton, J., Stam, K., Mastrangelo, P., and Jolton, J. An analysis of end-user security behaviors. Computers & Security 24, 2 (2005), 124--133.
[10]
Straub, D. and Welke, R. Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22, 4 (Dec. 1998), 441--469.
[11]
Straub, D. Effective IS security: An empirical study. Information Systems Research 1, 3 (1990), 255--276.
[12]
Wiant, T. Policy and Its Impact on Medical Record Security. Unpublished doctoral dissertation, University of Kentucky, 2003.

Cited By

View all
  • (2024)From cyber benign to cyber malicious: unveiling the evolution of insider cyber maliciousness from a stage theory perspectiveEuropean Journal of Information Systems10.1080/0960085X.2024.2413072(1-19)Online publication date: 7-Oct-2024
  • (2024)The role of ethical climates in employee information security policy violationsDecision Support Systems10.1016/j.dss.2023.114086177(114086)Online publication date: Feb-2024
  • (2024)Incorrect compliance and correct noncompliance with information security policies: A framework of rule-related information security behaviourComputers & Security10.1016/j.cose.2024.103986145(103986)Online publication date: Oct-2024
  • Show More Cited By

Recommendations

Reviews

Gordon B. Davis

An important objective of organizations is to deter or prevent employee misuse of information technology (IT) resources. The authors surveyed 579 employees from eight organizations. They presented five scenarios of IT misuse that offered potential benefit to an employee and asked respondents to rate the likelihood that they would misuse the system. They also asked about their awareness of four types of security measures to prevent or detect misuse: security policies, security awareness programs, computer monitoring, and preventive security software. The results were interesting. The respondents seemed to be influenced more by security policies and security awareness programs than by technical practices, such as computer monitoring and security software. The results suggest the importance of preventing misuse with security policies and security awareness procedures. Technical solutions were important, but were perceived to be less effective when there was not strong evidence of a commitment to security. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 50, Issue 10
October 2007
109 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1290958
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2007
Published in CACM Volume 50, Issue 10

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)201
  • Downloads (Last 6 weeks)29
Reflects downloads up to 17 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)From cyber benign to cyber malicious: unveiling the evolution of insider cyber maliciousness from a stage theory perspectiveEuropean Journal of Information Systems10.1080/0960085X.2024.2413072(1-19)Online publication date: 7-Oct-2024
  • (2024)The role of ethical climates in employee information security policy violationsDecision Support Systems10.1016/j.dss.2023.114086177(114086)Online publication date: Feb-2024
  • (2024)Incorrect compliance and correct noncompliance with information security policies: A framework of rule-related information security behaviourComputers & Security10.1016/j.cose.2024.103986145(103986)Online publication date: Oct-2024
  • (2024)Cybersecurity Needs and Benefits: The Four Rings ModelProceedings of International Conference on Information Technology and Applications10.1007/978-981-99-8324-7_39(461-471)Online publication date: 18-Mar-2024
  • (2023)Going Beyond DeterrenceInformation Systems Research10.1287/isre.2022.113334:1(342-362)Online publication date: 1-Mar-2023
  • (2023)Cybersecurity Awareness Training: A Use Case Model2023 IEEE International Conference on Electro Information Technology (eIT)10.1109/eIT57321.2023.10187349(242-247)Online publication date: 18-May-2023
  • (2023)Design and evaluation of a self-paced cybersecurity toolInformation & Computer Security10.1108/ICS-09-2021-014531:2(244-262)Online publication date: 26-Apr-2023
  • (2023)Employees as a Source of Security Issues in Times of Change and Stress: A Longitudinal Examination of Employees’ Security Violations during the COVID-19 PandemicJournal of Business and Psychology10.1007/s10869-023-09917-439:5(1027-1048)Online publication date: 28-Oct-2023
  • (2023)A Qualitative Study of the Effects of Socio—organizational Factors on the Information Security Culture of Employees in a Financial InstitutionProceedings of ICACTCE'23 — The International Conference on Advances in Communication Technology and Computer Engineering10.1007/978-3-031-37164-6_10(119-141)Online publication date: 24-Sep-2023
  • (2022)Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research DirectionsACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3514097.351410153:1(25-60)Online publication date: 24-Jan-2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media