Filters








1,566 Hits in 4.9 sec

Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives

Robert Willison, Merrill Warkentin, Allen C. Johnston
2016 Information Systems Journal  
By applying deterrence theory, we also examine the extent to which formal sanctions influence and moderate the intentions to abuse computers.  ...  Our findings suggest that individual employees may form intentions to commit computer abuse if they perceive the presence of procedural injustice and that techniques of neutralization and certainty of  ...  THEORETICAL BACKGROUND To assess the motives of employee computer abuse, our research draws on the body of theoretical work on organizational justice, and further theoretical insights gained from deterrence  ... 
doi:10.1111/isj.12129 fatcat:mmaxxse4wrfwji4qwcgo7u7kwa

Why Individual Employees Commit Malicious Computer Abuse: A Routine Activity Theory Perspective

Xin (Robert) Luo, The University of New Mexico, USA, Han Li, Qing Hu, Heng Xu, The University of New Mexico, USA, Brooklyn College, The City University of New York, USA, American University, USA
2020 Journal of the AIS  
Prior information security studies have largely focused on understanding employee security behavior from a policy compliance perspective.  ...  Drawing on routine activity theory (RAT), we seek to establish a comprehensive model of employee-committed malicious computer abuse (MCA) by investigating the motivations of the offenders, the suitability  ...  commentary Neutralization, organizational justice, deterrence Computer abuse (Yes) Yes (Yes, NA) Conceptual illustration Yes No Yes No Willison, Lowry, & Paternoster (2018) Research  ... 
doi:10.17705/1jais.00646 fatcat:zpfhe4xdofdqpns5ay4wbz23za

Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance

Han Li, Rathindra Sarathy, Jie Zhang, Xin Luo
2014 Information Systems Journal  
This paper proposes a theoretical model that integrates an intrinsic self-regulatory approach with an extrinsic sanction-based command-and-control approach to examine employees' IUP compliance intention  ...  The self-regulatory approach centers on the effect of organizational justice and personal ethical objections against internet abuses.  ...  Deterrence has been supported as a useful strategy for reducing computer abuses and software piracy in organizations (Straub, 1990; Peace et al., 2003; D'Arcy et al., 2009) .  ... 
doi:10.1111/isj.12037 fatcat:yq3esvjyyzc2dcjvz5n3rz3oe4

The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies

Tamara Dinev, Qing Hu
2007 Journal of the AIS  
systems from disturbances such as viruses, unauthorized access, disruptions, spyware, and others.  ...  The findings of this study extend the theory of planned behavior to the context of protective technologies and shed insights on designing effective information security policies, practices, and protective  ...  The perspectives and the positioning of our paper all benefited from their valuable feedback and comments, and we believe they all contributed to the improvements which permitted the work's publication  ... 
doi:10.17705/1jais.00133 fatcat:gwdiw6zxnbahxcl2asnhkbvnlq

Information security awareness and behavior: a theory-based literature review

Benedikt Lebek, Jörg Uffen, Markus Neumann, Bernd Hohler, Michael H. Breitner
2014 Management Research Review  
Practical implications -This study presents an overview of determinants that have been proven to influence employees' behavioral intention.  ...  Originality/value -This paper presents a comprehensive up-to-date overview of existing academic literature in the field of employees' security awareness and behavior research.  ...  General deterrence theory: Adapted from criminal justice research, GDT is based on rational decision-making.  ... 
doi:10.1108/mrr-04-2013-0085 fatcat:7ejssqh5ifgazhoqrzbkjbm2zq

Cyber-Dependent Crimes: An Interdisciplinary Review

David Maimon, Eric R. Louderback
2019 annual review of criminology  
attention should be given to this important type of crime, this article presents an interdisciplinary review of the current state of research on cyber-dependent crimes (i.e., crimes that require the use of computer  ...  We begin with a brief discussion of the ecosystem of cyber-dependent crimes and the key actors who operate within it, including the online offenders and enablers, targets and victims, and guardians.  ...  particularly Sykes & Matza's (1957) techniques of neutralization], and deterrence theories (Gibbs 1975) .  ... 
doi:10.1146/annurev-criminol-032317-092057 fatcat:jobz6nhrkjcfppyc2vv3r6hmdy

Reflecting on the "Dark Side" of Information Technology Use

John D'Arcy, Ashish Gupta, Monideepa Tarafdar, Ofir Turel
2014 Communications of the Association for Information Systems  
We drew upon our collective research and practice-related insights in five areas that characterize the dark side of IT use, namely IT-usage-related stress, work overload, interruptions, addiction, and  ...  These are clearly important areas to examine, given that the ubiquitous and functionally pervasive nature of IT use in organizations is expected to expose users to ever greater levels of conditions that  ...  ACKNOWLEDGMENTS Authors extend sincere thanks for Raj Sharman for helping with preparing this manuscript for CAIS and Supreteek Sarkar for guiding the panel proposal for AMCIS 2012, Seattle.  ... 
doi:10.17705/1cais.03505 fatcat:qpckrkzsu5ar3ekl5s73no4ayy

Police criminality and neutralization: an empirical study of court cases

Petter Gottschalk
2012 Police Practice & Research  
This is explained by neutralization theory in the paper.  ...  Based on 61 convicted police officers in Norway, court cases are analyzed in this paper to identify relationships between imprisonment days for convicted police officers and motive and brutality as determinants  ...  In order to provide insights into these questions, we sought carefully to examine the dimensions of the sample of police criminality cases related to severity of sentences.  ... 
doi:10.1080/15614263.2012.656412 fatcat:wveuhgtn4vbvnhqdbsalbblgxi

Generally Speaking, Context Matters: Making the Case for a Change from Universal to Particular ISP Research

Sal Aurigemma, University of Tulsa, USA, Thomas Mattson, " University of Richmond, USA"
2019 Journal of the AIS  
Sal Aurigemma researches employee information security policy compliance, improving end-user and small business information security practices, and end-user computing.  ...  security action to other threat-specific security actions, and from one threat-specific security action to general compliance intentions.  ...  Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives. Information Systems Journal, 28(2), 266-293. Workman, M., Bommer, W.  ... 
doi:10.17705/1jais.00583 fatcat:26qwyrpwenb5vpx6z2if3kutbe

How Paternalistic Leadership Influences IT Security PolicyCompliance:The Mediating Role oftheSocial Bond

Gengzhong Feng, Xi'an Jiaotong University, China, Jiawen Zhu, Nengmin Wang, Huigang Liang, Xi'an JiaotongUniversity, China /City University of Hong Kong, Hong Kong, Xi'an Jiaotong University, China, Universityof Memphis
2019 Journal of the AIS  
The social bond partially mediates the effects of benevolence and morality on compliance intention.  ...  with and among employees.  ...  Efficiency Engineering, and the Digital Economic Development Monitoring and Early Warning Base of China (Xi'an).  ... 
doi:10.17705/1jais.00581 fatcat:m7fwfu5sybhzvcyxok6z7s7bp4

Cyber Security and Criminal Justice Programs in the United States: Exploring the Intersections

Brian K. Payne, Lora Hadzhidimova
2019 Zenodo  
In order to examine the connections between cyber security and criminal justice, in this study attention is given to the way that criminal justice scholars have embraced cyber crime research and coursework  ...  While research on cyber security appears to be central in STEM disciplines, it is not yet clear how central cyber security and cyber crime is to criminal justice scholarship.  ...  Consequently, these programs focus primarily on understanding crime and criminal justice from a sociological perspective.  ... 
doi:10.5281/zenodo.2657646 fatcat:lykihakm6fbi7ocr6jqizvvwau

Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees

Rao Faizan Ali, P.D.D. Dominic, Kashif Ali
2020 Sustainability  
Information security attacks on oil and gas (O&G) organizations have increased since the last decade.  ...  From 2015 to 2019, almost 70 percent of O&G organizations faced at least one significant security breach worldwide.  ...  Acknowledgments: We are thankful for the help and guidance provided by P.D.D. Dominic; without his assistance it would have been impossible to achieve such a research goal.  ... 
doi:10.3390/su12208576 fatcat:rzhbpvqrjjd4je36x3rbgmvdnm

Cyber Security and Criminal Justice Programs in the United States: Exploring the Intersections

Brian K. Payne, Lora Hadzhidimova
2019 Zenodo  
In order to examine the connections between cyber security and criminal justice, in this study attention is given to the way that criminal justice scholars have embraced cyber crime research and coursework  ...  While research on cyber security appears to be central in STEM disciplines, it is not yet clear how central cyber security and cyber crime is to criminal justice scholarship.  ...  Consequently, these programs focus primarily on understanding crime and criminal justice from a sociological perspective.  ... 
doi:10.5281/zenodo.2657645 fatcat:tsky3mpwajf47asqbpwrl2vpv4

Organizational science and cybersecurity: abundant opportunities for research at the interface

Reeshad S. Dalal, David J. Howard, Rebecca J. Bennett, Clay Posey, Stephen J. Zaccaro, Bradley J. Brummel
2021 Journal of business and psychology  
In so doing, we emphasize both end-users of cybersecurity in organizations and employees focused specifically on cybersecurity work.  ...  arena (e.g., publication venues that reach new audiences, novel sources of external funding), and provide overall conceptual frameworks of the antecedents of employees' cybersecurity behavior.  ...  " (e.g., failing to log off when leaving computer) and finally to "intentional, malicious (harmful) computer abuse" (e.g., data theft).  ... 
doi:10.1007/s10869-021-09732-9 pmid:33564206 pmcid:PMC7861585 fatcat:fcxpphhewbbfphotipd4wuf3hu

The Need to Overrule Mapp v. Ohio

William T. Pizzi
2010 Social Science Research Network  
." 8 But the Court in Mapp also based its decision on the need for a deterrent remedy to protect citizens from police misconduct.  ...  Justice Brandeis famous warning in his dissent in Olmstead v. United States that " [o]ur Government is the potent, the omnipresent teacher...  ...  To the great consternation of scholars, Herring held that some negligence by police officers -in Herring, the failure of a police employee in a neighboring county to clear a warrant from a computer database  ... 
doi:10.2139/ssrn.1556386 fatcat:drdtjuqjrzbfbci2nh5gpjdlbi
« Previous Showing results 1 — 15 out of 1,566 results