Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?

被引:222
作者
Hu, Qing [1 ]
Xu, Zhengchuan [2 ]
Dinev, Tamara [3 ]
Ling, Hong [2 ]
机构
[1] Iowa State Univ, Coll Business, Dept Supply Chain & Informat Syst, Ames, IA 50011 USA
[2] Fudan Univ, Sch Management, Dept Informat Management & Informat Syst, Shanghai 200433, Peoples R China
[3] Florida Atlantic Univ, Coll Business, Dept Informat Technol & Operat Management, Boca Raton, FL 33431 USA
关键词
CHOICE; AWARENESS; RISK;
D O I
10.1145/1953122.1953142
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Methods for evaluating and effectively managing the security behavior of employees. © 2011 ACM.
引用
收藏
页码:54 / 60
页数:7
相关论文
共 31 条
[1]   STRUCTURAL EQUATION MODELING IN PRACTICE - A REVIEW AND RECOMMENDED 2-STEP APPROACH [J].
ANDERSON, JC ;
GERBING, DW .
PSYCHOLOGICAL BULLETIN, 1988, 103 (03) :411-423
[2]  
ANDERSON R, 2008, P WORKSH EC INF SEC
[3]  
[Anonymous], 2006, P 6 WORKSH PRIV ENH
[4]  
[Anonymous], 2010, MIS Q
[5]   THE RATIONALITY OF SEXUAL OFFENDING - TESTING A DETERRENCE RATIONAL CHOICE CONCEPTION OF SEXUAL ASSAULT [J].
BACHMAN, R ;
PATERNOSTER, R ;
WARD, S .
LAW & SOCIETY REVIEW, 1992, 26 (02) :343-372
[6]   CRIME AND PUNISHMENT - ECONOMIC APPROACH [J].
BECKER, GS .
JOURNAL OF POLITICAL ECONOMY, 1968, 76 (02) :169-217
[7]   Person-organization fit, job choice decisions, and organizational entry [J].
Cable, DM ;
Judge, TA .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1996, 67 (03) :294-311
[8]  
Cornish D. B., 1986, REASONING CRIMINAL, DOI DOI 10.4324/9781315134482-1
[9]   User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach [J].
D'Arcy, John ;
Hovav, Anat ;
Galletta, Dennis .
INFORMATION SYSTEMS RESEARCH, 2009, 20 (01) :79-98
[10]   Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences [J].
Debatin, Bernhard ;
Lovejoy, Jennette P. ;
Horn, Ann-Kathrin ;
Hughes, Brittany N. .
JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2009, 15 (01) :83-108