An integrative model of computer abuse based on social control and general deterrence theories

被引:155
作者
Lee, SM [1 ]
Lee, SG [1 ]
Yoo, S [1 ]
机构
[1] Univ Nebraska, Coll Business Adm, Dept Management, Lincoln, NE 68588 USA
关键词
computer abuse; organizational trust; end user computing; telecommunications; social issues;
D O I
10.1016/j.im.2003.08.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In spite of continuous organizational efforts and investments, computer abuse shows no sign of decline. According to social control theory (SCT), "organizational trust" can help prevent it by enhancing insiders' involvement in computer abuse. The aim of our study was to develop a new integrative model for analyzing computer abuse through assessing the role of Self Defense Intention (SDI) and Induction Control Intention (ICI). The results show that deterrence factors influence SDI and organizational factors significantly affect ICI and ICI decreases insiders' abuse. Interestingly, SDI negatively affects both insiders' and invaders' abuses. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:707 / 718
页数:12
相关论文
共 70 条
[61]  
Siponen M. T., 2000, Information Management & Computer Security, V8, P31, DOI 10.1108/09685220010371394
[62]   SPECIFYING SPECIFIC DETERRENCE - THE INFLUENCE OF ARREST ON FUTURE CRIMINAL ACTIVITY [J].
SMITH, DA ;
GARTIN, PR .
AMERICAN SOCIOLOGICAL REVIEW, 1989, 54 (01) :94-105
[63]   Effective IS Security: An Empirical Study [J].
Straub, Detmar W., Jr. .
INFORMATION SYSTEMS RESEARCH, 1990, 1 (03) :255-276
[64]   DISCOVERING AND DISCIPLINING COMPUTER ABUSE IN ORGANIZATIONS - A FIELD-STUDY [J].
STRAUB, DW ;
NANCE, WD .
MIS QUARTERLY, 1990, 14 (01) :45-60
[65]   Coping with systems risk: Security planning models for management decision making [J].
Straub, DW ;
Welke, RJ .
MIS QUARTERLY, 1998, 22 (04) :441-469
[66]  
STRAUB DW, 1991, INFORMATION MANAGEME, V20, P13
[67]  
Thompson D., 1998, Information Management & Computer Security, V6, P78, DOI 10.1108/09685229810209414
[68]  
Triandis H.C., 1971, Attitude and attitude change
[69]  
von Solms R., 1999, Information Management & Computer Security, V7, P50, DOI 10.1108/09685229910255223
[70]  
WOOD CC, 1991, EFFECTIVE INFORMATIO