skip to main content
research-article
Free Access

Does deterrence work in reducing information security policy abuse by employees?

Authors Info & Claims
Published:01 June 2011Publication History
Skip Abstract Section

Abstract

Methods for evaluating and effectively managing the security behavior of employees.

References

  1. Acquisti, A and Gross, R. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Proceedings of the 6th Workshop on Privacy Enhancing Technologies (Cambridge, U.K, June 28--30, 2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Anderson, R., Böhme, R., Clayton, R., and Moore, T. Security economics and european policy. In Proceedings of the Workshop on Economics of Information Security (New Haven, CT, 2008).Google ScholarGoogle Scholar
  3. Anderson, J. C., and Gerbing, S. W. Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin 103, 3 (1988), 411--423.Google ScholarGoogle ScholarCross RefCross Ref
  4. Bachman, R., Paternoster, R., and Ward, S. The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault. Law & Society Review 26, 2 (1992), 343--372.Google ScholarGoogle Scholar
  5. Becker, G. Crime and punishment: An economic approach. Journal of Political Economy 76, (1968), 169--217.Google ScholarGoogle ScholarCross RefCross Ref
  6. Cable, D. M. and Judge, T. A. Person--organization fit, job choice decisions, and organizational entry. Organizational Behavior and Human Decision Processes 67, 3 (1996), 294--311.Google ScholarGoogle ScholarCross RefCross Ref
  7. Cornish, D. B. and Clarke, R. V. The Reasoning Criminal: Rational Choice Perspectives on Offending. Springer-Verlag, New York, NY, 1986.Google ScholarGoogle ScholarCross RefCross Ref
  8. D'Arcy, J., Havav, A., and Galletta, D. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20, 1 (2009), 79--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Debatin, B., Lovejoy, J. P., Horn, A. K., and Hughes, B. N. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication 15, 1 (2009), 83--108.Google ScholarGoogle ScholarCross RefCross Ref
  10. Dinev, T. and Hu, Q. The centrality of awareness in the formation of user behavioral intentions towards preventive technologies in the context of voluntary use. Journal of the Association for Information Systems 8, 7 (2007), 386--408.Google ScholarGoogle ScholarCross RefCross Ref
  11. Ernst & Young. Global Information Security Survey (2008); http://www.ey.com.Google ScholarGoogle Scholar
  12. Gettfredson, M. and Hirschi. T. A General Theory of Crime. Stanford University Press, Stanford, CA, 1990.Google ScholarGoogle Scholar
  13. Gibbs, J. P. Crime, Punishment, and Deterrence. Elsevier, New York, NY, 1975.Google ScholarGoogle Scholar
  14. Hofstede, G. Cultures and Organizations: Software of the Mind. McGraw-Hill, New York, NY, 1991.Google ScholarGoogle Scholar
  15. Hulland, J. use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal 20 (1999), 195--204.Google ScholarGoogle ScholarCross RefCross Ref
  16. Lewis, M. Shame: The Exposed Self. Macmillan, New York, NY, 1992.Google ScholarGoogle Scholar
  17. Mercuri, R. T. Analyzing security costs. Commun. ACM 46, 6 (June 2003), 15--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Nagin, D. S. and Paternoster, R. Enduring individual differences and rational choice theories of crime. Law & Society Review 27, 3 (1993), 467--496.Google ScholarGoogle Scholar
  19. Paternoster, R. and Simpson, S. Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law & Society Review 30, 3 (1996) 549--583.Google ScholarGoogle Scholar
  20. Paternoster, R., Saltzman, L. E., Waldo, G. P., and Chiricos, T. G. Perceived risk and social control: Do sanctions really deter? Law & Society Review 17, 3 (1983), 457--480.Google ScholarGoogle Scholar
  21. Piquero, A. and Tibbetts, S. Specifying the direct and indirect effects of low self-control and situational factors in offenders' decision making: Toward a more complete model of rational offending. Justice Quarterly 13, 3 (1996), 481--510.Google ScholarGoogle ScholarCross RefCross Ref
  22. Richardson, R. CSI Computer Crime & Security survey (2008); http://www.cse.msstate.edu/~cse6243/readings/CSIsurvey2008.pdf/Google ScholarGoogle Scholar
  23. Ringle, C. M., Wende, S., and Will, A. SmartPLS, 2.0 (beta), University of Hamburg, Hamburg, Germany, 2005; http://www.smartpls.de/Google ScholarGoogle Scholar
  24. Simon, H. Bounded rationality in social science: Today and tomorrow. Mind & Society 1, 1 (2000), 25--39.Google ScholarGoogle Scholar
  25. Siponen, M. and Vance, A. Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly 34, 2 (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Straub, D. W. and Welke, R. J. Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22, 4 (1998), 441--469 Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Tittle, C. R. Sanctions and Social Deviance: The Question of Deterrence. Praeger, New York, NY, 1980.Google ScholarGoogle Scholar
  28. Tibbetts, S. G. and Gibson, C. L. Individual propensities and rational decision-making: Recent findings and promising approaches. In Rational Choice and Criminal Behavior: Recent Research and Future Challenges. A. R. Piquero and S. G. Tibbetts, eds. Routledge, New York, NY, 3--24.Google ScholarGoogle Scholar
  29. Tunnell, K. Choosing crime: Close your eyes and take your choices. Justice Quarterly 7, 4 (1990), 673--690.Google ScholarGoogle ScholarCross RefCross Ref
  30. Warkentin, M. and Willison, R. Behavioral and policy issues in information systems security: The insider threat. European Journal of Information Systems 18 (2009), 101--105.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Does deterrence work in reducing information security policy abuse by employees?

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 54, Issue 6
              June 2011
              134 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/1953122
              Issue’s Table of Contents

              Copyright © 2011 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 June 2011

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format