IS

DêArcy, John

Topic Weight Topic Terms
0.250 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.167 equity conventional punishment justice wisdom focus behavior fairness compliance suggest theory significant certainty misuse reward
0.115 human awareness conditions point access humans images accountability situational violations result reduce moderation gain people
0.107 model research data results study using theoretical influence findings theory support implications test collected tested
0.102 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Galletta, Dennis 1 Hovav, Anat 1
end-user security 1 general deterrence theory 1 IS misuse 1 IS security 1
security countermeasures 1 security management 1

Articles (1)

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. (Information Systems Research, 2009)
Authors: Abstract:
    Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%-75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of punishment for IS misuse. This paper presents an extended deterrence theory model that combines work from criminology, social psychology, and information systems. The model posits that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention. The model is then tested on 269 computer users from eight different companies. The results suggest that three practices deter IS misuse: user awareness of security policies; security education, training, and awareness (SETA) programs; and computer monitoring. The results also suggest that perceived severity of sanctions is more effective in reducing IS misuse than certainty of sanctions. Further, there is evidence that the impact of sanction perceptions vary based on one's level of morality. Implications for the research and practice of IS security are discussed.