12,421 Hits in 9.9 sec

Understanding Organization Employee's Information Security Omission Behavior: an Integrated Model of Social norm and Deterrence

Hao Chen, Wenli Li
2014 Pacific Asia Conference on Information Systems  
From organization control perspective, we integrate deterrence theory and social norm theory to construct research model.  ...  To date, social norms of misperception (as informal control) has not been sufficiently concerned in IS security literature and we believe that may provide a new perceptive to understand the formation mechanism  ...  Based on the organization control framework, we integrate social norm theory and deterrence theory to construct research model in order to explain and predict organization employee`s intention to information  ... 
dblp:conf/pacis/ChenL14 fatcat:lq2pboqtifgtleswt3nvcscbcm

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness

Tejaswini Herath, H.R. Rao
2009 Decision Support Systems  
Based on 312 employee responses from 77 organizations, we empirically validate and test the model.  ...  Thus, the area of end-user security behaviors in organizations has gained an increased attention. In information security observing end-user security behaviors is challenging.  ...  Part of this research is funded by NSF under grant no. 0402388, grant no. 0802062 and MDRF grant no. F0630. The usual disclaimer applies.  ... 
doi:10.1016/j.dss.2009.02.005 fatcat:fjhi2j2cojclbnj53n5tx3rb6m

Intentions of Employees to Whistleblow Information Security Policy Violations in the Organization

Liang-Cheng Wei, Carol Hsu, Kai Wang
2016 Asia Pacific Journal of Information Systems  
In particular, we focus on an investigation of employee intention to whistle-blow information security policy (ISP) violation.  ...  Drawing on the theory of planned behavior and rational choice theory, we develop a theoretical model to understand the factors at the organizational and individual levels that might influence whistleblowing  ...  To address these research questions, we propose a theoretical model based on theory of planned behaviour and rational choice theory.  ... 
doi:10.14329/apjis.2016.26.1.163 fatcat:27tom5pxbvcn7hk73qcubiqadu

Applying Police Knowledge [chapter]

2009 Policing Organized Crime  
Such an opinion is based on the theory of race. Contrary to this opinion, Walsh (2004) found powerful black organized crime groups in the United States.  ...  Contractual theory is concerned with the role of contracts in social systems. von suggests that cooperation in a criminal group is typically based on some form of contract between criminals, which is  ... 
doi:10.1201/9781439810156-14 fatcat:ybpuhllikncengi67brlnqrixu

Does deterrence work in reducing information security policy abuse by employees?

Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling
2011 Communications of the ACM  
We define information security policy violation as any act by an employee using computers that is against the established rules and policies of an organization for personal gains.  ...  Conclusion In this article, we described a comprehensive model of information security policy violation by employees in organizational settings based on multiple criminological theories.  ... 
doi:10.1145/1953122.1953142 fatcat:cckfmfplmvcnrhjkmv4bkiytwu

Images of Organizations and Consequences of Regulation

Edward L. Rubin
2005 Theoretical Inquiries in Law  
This article discusses four of these approaches to organizational behavior: the nexus of contracts theory, an application of rational choice theory to corporations; decision theory; general systems theory  ...  Government can control conflicts of interest in business firms by either issuing obligatory commands to behave in a specified way or by creating incentives to alter private behavior In order to choose  ...  But there is also a separate theory of organizations that is based on the notion of culture: rather than treating culture as an influence on the organization, it asserts that the organization itself constitutes  ... 
doi:10.2202/1565-3404.1110 fatcat:csn5qduurzgklivpbjhqf7mz4e

Investigating the Role of Socio-organizational Factors in the Information Security Compliance in Organizations [article]

Ahmed Alkalbani, Hepu Deng, Booi Kam
2016 arXiv   pre-print
, technology compatibility, processes integration, and audit and monitoring have a significant positive impact on the adoption of information security compliance in organizations.  ...  This study investigates the role of socio-organizational factors by drawing the insights from the organizational theory literature in the adoption of information security compliance in organizations.  ...  Ajzen (1991) explore the use of a role-based access control system for enforcing information security policies in organizations.  ... 
arXiv:1606.00875v1 fatcat:32oundexsbfxbn5lhi6s3ienhi

Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance

Rao Faizan Ali, P. D. D. Dominic, Syed Emad Azhar Ali, Mobashar Rehman, Abid Sohail
2021 Applied Sciences  
A grave concern to an organization's information security is employees' behavior when they do not value information security policy compliance (ISPC).  ...  This SLR contributes to information system security literature by providing a behavior transformation process model based on the existing ISPC literature.  ...  Acknowledgments: The authors would also like to thank the Department of Computer and Information Sciences, Universiti Teknologi PETRONAS, Malaysia, for facilitating this research study.  ... 
doi:10.3390/app11083383 fatcat:ckikgmvjzvaildzug3adscwboa

Social Controls and Bonds of Public Information Consumer on Sustainable Utilization and Provision for Computing

Kumju Hwang, Hyemi Um
2021 Sustainability  
This study investigates the applicability of adult social bond theory, which proposes social controls in the form of social bonds that provide deterrence based on the potential shame an employee would  ...  Analysis of 672 data points largely supports the research model, proving the applicability to ISS of social bonds and social control.  ...  Nye's social controls and Hirschi's social bonding theory are integrated in the current study's research model, which leads us to understand employees' motivations for ISS compliance or violation and their  ... 
doi:10.3390/su13095263 fatcat:vbnekjbndrd43igob5ddh7jzc4

Compliance With Electronic Medical Records Privacy Policy: An Empirical Investigation of Hospital Information Technology Staff

Ming-Ling Sher, Paul C. Talley, Ching-Wen Yang, Kuang-Ming Kuo
2017 Inquiry: The Journal of Health Care Organization, Provision, and Financing  
motivation theory and the theory of reasoned action.  ...  A total of 310 responses from information technology staff of 7 medical centers in Taiwan was analyzed using the Structural Equation Modeling technique.  ...  from differing theoretical perspectives such as protection motivation theory, theory of planned behavior, deterrence theory, principal agency theory, social cognitive theory, social bond theory, control  ... 
doi:10.1177/0046958017711759 fatcat:uy53eweajfdzhd7gib6e2cmfoq


This paper constructs an integrated framework based on the theories on rational choice and general deterrence, and applies it to explain effects on sanction on ISP violation by employees.  ...  The employees' violation of information security policy (ISP) poses a major threat to the information resources of the employer.  ...  Acknowledgement This research is supported by the National Social Science Foundation of China(17CGL019).  ... 
doi:10.24205/03276716.2020.6 fatcat:re43rvaapnbwlihaaox2zovwfe

Trust Repair After An Organization-Level Failure

Nicole Gillespie, Graham Dietz
2009 Academy of Management Review  
Drawing on systems theory, we theorize how each component of an organization's system shapes employees' perceptions of the organization's trustworthiness and can contribute to failures and effective trust  ...  provided that: • a full bibliographic reference is made to the original source • a link is made to the metadata record in DRO • the full-text is not changed in any way The full-text must not be sold in  ...  To date, no coherent theory or model exists to guide such an understanding.  ... 
doi:10.5465/amr.2009.35713319 fatcat:qouuyfvyf5fqhiip27ktww63iy

High-Risk Deviant Decisions: Does Neutralization Still Play a Role?

Bradley S. Trinkle, Mississippi State University, USA, Merrill Warkentin, Kalana Malimage, Nirmalee Raddatz, Mississippi State University, USA, Florida Gulf Coast University, USA, University of Memphis, USA
2021 Journal of the AIS  
Extant research has shown that neutralization processes can enable potential IS security policy violators to justify their behavior and overcome the deterrence effect of sanctions in order to engage in  ...  Using the scenario-based factorial survey method common in IS security research, we collected data from future auditors who understand these extreme sanctions.  ...  Mixed Model Analysis Results for the Individual Impact of Magnitude of Alteration, Techniques of Neutralization, and Deterrence Theory on an Auditor's Behavioral Intention to Violate Policy 4 Predicted  ... 
doi:10.17705/1jais.00680 fatcat:wovypxnygbbkndvbz3c7z6zzny

Conceptual Modeling of Social Factors Using Social Control (Nigeria Context)

Gbenga T. Omoniyi, Shahrudin Awang Nor, Nor Iadah Yusop, Rotimi-Williams Bello
2019 Zenodo  
In this study, we integrated general deterrence theory (GDT) and social bond theory (SBT) by utilizing two essential types of social control; formal and informal social control to propose a conceptual  ...  Abstract: Social control is a sociological idea which refers to a system that manages individual and group actions, prompting congruity and consistence with the policies of a given society or social gathering  ...  The two types of social control; the formal and informal social control were used to integrate general deterrence theory (GDT) and social bond theory (SBT) for conceptual modelling of social factors.  ... 
doi:10.5281/zenodo.4453797 fatcat:midgxxkdn5fo3fc3ttpiwvfj4q

Protection Motivation and Deterrence: Evidence from a Fortune 100 Company

David Sikolia, Douglas Twitchell, Glen Sagers
2018 AIS Transactions on Replication Research  
This paper contains a conceptual replication of Herath and Rao (2009) , who tested the Integrated Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) model of security policy compliance  ...  We encourage future research and practice to focus on replicating and confirming the parts of the model that are similar in both studies.  ...  Their paper draws from the areas of Protection Motivation Theory, General Deterrence Theory, and Organizational Behavior to develop and test an Integrated Protection Motivation and Deterrence model of  ... 
doi:10.17705/1atrr.00027 fatcat:z2cahv75gbditf36ydpe72sxou
« Previous Showing results 1 — 15 out of 12,421 results