Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Free access

Does deterrence work in reducing information security policy abuse by employees?

Published: 01 June 2011 Publication History

Abstract

Methods for evaluating and effectively managing the security behavior of employees.

References

[1]
Acquisti, A and Gross, R. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Proceedings of the 6th Workshop on Privacy Enhancing Technologies (Cambridge, U.K, June 28--30, 2006).
[2]
Anderson, R., Böhme, R., Clayton, R., and Moore, T. Security economics and european policy. In Proceedings of the Workshop on Economics of Information Security (New Haven, CT, 2008).
[3]
Anderson, J. C., and Gerbing, S. W. Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin 103, 3 (1988), 411--423.
[4]
Bachman, R., Paternoster, R., and Ward, S. The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault. Law & Society Review 26, 2 (1992), 343--372.
[5]
Becker, G. Crime and punishment: An economic approach. Journal of Political Economy 76, (1968), 169--217.
[6]
Cable, D. M. and Judge, T. A. Person--organization fit, job choice decisions, and organizational entry. Organizational Behavior and Human Decision Processes 67, 3 (1996), 294--311.
[7]
Cornish, D. B. and Clarke, R. V. The Reasoning Criminal: Rational Choice Perspectives on Offending. Springer-Verlag, New York, NY, 1986.
[8]
D'Arcy, J., Havav, A., and Galletta, D. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20, 1 (2009), 79--98.
[9]
Debatin, B., Lovejoy, J. P., Horn, A. K., and Hughes, B. N. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication 15, 1 (2009), 83--108.
[10]
Dinev, T. and Hu, Q. The centrality of awareness in the formation of user behavioral intentions towards preventive technologies in the context of voluntary use. Journal of the Association for Information Systems 8, 7 (2007), 386--408.
[11]
Ernst & Young. Global Information Security Survey (2008); http://www.ey.com.
[12]
Gettfredson, M. and Hirschi. T. A General Theory of Crime. Stanford University Press, Stanford, CA, 1990.
[13]
Gibbs, J. P. Crime, Punishment, and Deterrence. Elsevier, New York, NY, 1975.
[14]
Hofstede, G. Cultures and Organizations: Software of the Mind. McGraw-Hill, New York, NY, 1991.
[15]
Hulland, J. use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal 20 (1999), 195--204.
[16]
Lewis, M. Shame: The Exposed Self. Macmillan, New York, NY, 1992.
[17]
Mercuri, R. T. Analyzing security costs. Commun. ACM 46, 6 (June 2003), 15--18.
[18]
Nagin, D. S. and Paternoster, R. Enduring individual differences and rational choice theories of crime. Law & Society Review 27, 3 (1993), 467--496.
[19]
Paternoster, R. and Simpson, S. Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law & Society Review 30, 3 (1996) 549--583.
[20]
Paternoster, R., Saltzman, L. E., Waldo, G. P., and Chiricos, T. G. Perceived risk and social control: Do sanctions really deter? Law & Society Review 17, 3 (1983), 457--480.
[21]
Piquero, A. and Tibbetts, S. Specifying the direct and indirect effects of low self-control and situational factors in offenders' decision making: Toward a more complete model of rational offending. Justice Quarterly 13, 3 (1996), 481--510.
[22]
Richardson, R. CSI Computer Crime & Security survey (2008); http://www.cse.msstate.edu/~cse6243/readings/CSIsurvey2008.pdf/
[23]
Ringle, C. M., Wende, S., and Will, A. SmartPLS, 2.0 (beta), University of Hamburg, Hamburg, Germany, 2005; http://www.smartpls.de/
[24]
Simon, H. Bounded rationality in social science: Today and tomorrow. Mind & Society 1, 1 (2000), 25--39.
[25]
Siponen, M. and Vance, A. Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly 34, 2 (2010).
[26]
Straub, D. W. and Welke, R. J. Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22, 4 (1998), 441--469
[27]
Tittle, C. R. Sanctions and Social Deviance: The Question of Deterrence. Praeger, New York, NY, 1980.
[28]
Tibbetts, S. G. and Gibson, C. L. Individual propensities and rational decision-making: Recent findings and promising approaches. In Rational Choice and Criminal Behavior: Recent Research and Future Challenges. A. R. Piquero and S. G. Tibbetts, eds. Routledge, New York, NY, 3--24.
[29]
Tunnell, K. Choosing crime: Close your eyes and take your choices. Justice Quarterly 7, 4 (1990), 673--690.
[30]
Warkentin, M. and Willison, R. Behavioral and policy issues in information systems security: The insider threat. European Journal of Information Systems 18 (2009), 101--105.

Cited By

View all
  • (2024)A Review of Online Information Privacy Theories Advanced in Eight AIS Journals Over the Last DecadeInformation Resources Management Journal10.4018/IRMJ.34997737:1(1-22)Online publication date: 17-Sep-2024
  • (2024)Navigating compliance complexity: insights from the MOA framework in international constructionEngineering, Construction and Architectural Management10.1108/ECAM-02-2024-0163Online publication date: 15-Jul-2024
  • (2024)The effects of organizational images on security compliance intention: focused on affection and job security in South KoreaSecurity Journal10.1057/s41284-024-00429-137:4(1509-1525)Online publication date: 14-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 54, Issue 6
June 2011
134 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1953122
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2011
Published in CACM Volume 54, Issue 6

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2,311
  • Downloads (Last 6 weeks)55
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Review of Online Information Privacy Theories Advanced in Eight AIS Journals Over the Last DecadeInformation Resources Management Journal10.4018/IRMJ.34997737:1(1-22)Online publication date: 17-Sep-2024
  • (2024)Navigating compliance complexity: insights from the MOA framework in international constructionEngineering, Construction and Architectural Management10.1108/ECAM-02-2024-0163Online publication date: 15-Jul-2024
  • (2024)The effects of organizational images on security compliance intention: focused on affection and job security in South KoreaSecurity Journal10.1057/s41284-024-00429-137:4(1509-1525)Online publication date: 14-May-2024
  • (2024)Understanding the deterrence effect of punishment for marine information security policies non-complianceJournal of Ocean Engineering and Science10.1016/j.joes.2022.06.0019:1(9-12)Online publication date: Feb-2024
  • (2024)The role of ethical climates in employee information security policy violationsDecision Support Systems10.1016/j.dss.2023.114086177(114086)Online publication date: Feb-2024
  • (2023)How people perceive malicious comments differently: factors influencing the perception of maliciousness in online news commentsFrontiers in Psychology10.3389/fpsyg.2023.122100514Online publication date: 22-Aug-2023
  • (2023)Research on Personal Information Security Protection of Social Networks in the Era of Big DataProceedings of the 2nd International Academic Conference on Blockchain, Information Technology and Smart Finance (ICBIS 2023)10.2991/978-94-6463-198-2_153(1478-1484)Online publication date: 26-Jul-2023
  • (2023)Going Beyond DeterrenceInformation Systems Research10.1287/isre.2022.113334:1(342-362)Online publication date: 1-Mar-2023
  • (2023)Falling for Social EngineeringSocial Science Computer Review10.1177/0894439322111750141:2(592-607)Online publication date: 1-Apr-2023
  • (2023)An Assessment of Capabilities Required for Effective Cybersecurity Incident Management - A Systematic Literature Review2023 International Conference on Data Security and Privacy Protection (DSPP)10.1109/DSPP58763.2023.10404318(1-11)Online publication date: 16-Oct-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media