Understanding the Incentive Mechanism of Penalty for Information Security Policy Compliance Behavior

被引:4
作者
Wang, Xiaolong [1 ,2 ]
Li, Wenli [1 ]
机构
[1] Dalian Univ Technol, Fac Management & Econ, Dalian 116024, Peoples R China
[2] Shandong Transport Vocat Coll, Dept Management & Informat, Weifang 261206, Peoples R China
来源
2018 7TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE, EDUCATION AND HUMANITIES RESEARCH (SSEHR 2018) | 2018年
基金
中国国家自然科学基金;
关键词
Incentive mechanism; Information security policy; Compliance behavior; Principal-agent model with moral hazard; Penalty; SYSTEMS SECURITY; MORAL HAZARD; DETERRENCE; MISUSE; ADHERENCE; THREATS; MODEL;
D O I
10.25236/ssehr.2018.005
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
A significant number of information security incidents have been attributed to the internal employees' failure to comply with the information security policy (ISP) in the organizational setting. There exists a principal-agent problem with moral hazard between the employer and the employee individual for the practical compliance effort of the employee is not observable without high costs. In this study, an ISP compliance game has been proposed to analyze the incentive mechanism of penalty on the compliance behavior of employee individual. It is shown that in a no-penalty contract, the employee will decline to comply with the ISP if the expected payoff obtained from her noncompliance is larger than that from the outside options; and in a penalty contract, an appropriate penalty will motivate her to exert the compliance effort level expected by her employer. A numerical example has been presented to show the validity of this game analysis.
引用
收藏
页码:19 / 25
页数:7
相关论文
共 41 条
  • [1] [Anonymous], 1975, THEORY MORAL 1 UNPUB
  • [2] Beautement A., 2008, P 2008 WORKSH NEW SE
  • [3] The economics of user effort in information security
    [J]. Comput. Fraud Secur., 2009, 10 (8-12): : 8 - 12
  • [4] WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS
    Boss, Scott R.
    Galletta, Dennis F.
    Lowry, Paul Benjamin
    Moody, Gregory D.
    Polak, Peter
    [J]. MIS QUARTERLY, 2015, 39 (04) : 837 - U461
  • [5] Bulgurcu B, 2010, MIS QUART, V34, P523
  • [6] Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
    Chen, Yan
    Ramamurthy, K.
    Wen, Kuang-Wei
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2012, 29 (03) : 157 - 188
  • [7] Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model
    D'Arcy, John
    Devaraj, Sarv
    [J]. DECISION SCIENCES, 2012, 43 (06) : 1091 - 1124
  • [8] A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
    D'Arcy, John
    Herath, Tejaswini
    [J]. EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2011, 20 (06) : 643 - 658
  • [9] User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
    D'Arcy, John
    Hovav, Anat
    Galletta, Dennis
    [J]. INFORMATION SYSTEMS RESEARCH, 2009, 20 (01) : 79 - 98
  • [10] AN ANALYSIS OF THE PRINCIPAL-AGENT PROBLEM
    GROSSMAN, SJ
    HART, OD
    [J]. ECONOMETRICA, 1983, 51 (01) : 7 - 45