IS

Eggett, Dennis

Topic Weight Topic Terms
0.843 human awareness conditions point access humans images accountability situational violations result reduce moderation gain people
0.297 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.215 design artifacts alternative method artifact generation approaches alternatives tool science generate set promising requirements evaluation
0.149 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using
0.107 model research data results study using theoretical influence findings theory support implications test collected tested

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Lowry, Paul Benjamin 2 Vance, Anthony 2
accountability theory 2 factorial survey method 2 identifiability 2 social presence 2
access policy violations 1 accountability 1 awareness 1 awareness of monitoring 1
evaluation 1 expectation of evaluation 1 information security 1 information security policy violations 1
monitoring 1 mediation 1 moderation 1 user-interface design 1
unauthorized access 1

Articles (2)

Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations (MIS Quarterly, 2015)
Authors: Abstract:
    Access-policy violations are a growing problem with substantial costs for organizations. Although training programs and sanctions have been suggested as a means of reducing these violations, evidence shows the problem persists. It is thus imperative to identify additional ways to reduce access-policy violations, especially for systems providing broad access to data. We use accountability theory to develop four user-interface (UI) design artifacts that raise users' accountability perceptions within systems and in turn decrease access-policy violations. To test our model, we uniquely applied the scenario-based factorial survey method to various graphical manipulations of a records system containing sensitive information at a large organization with over 300 end users who use the system daily. We show that the UI design artifacts corresponding to four submanipulations of accountability can raise accountability and reduce access policy violation intentions. Our findings have several theoretical and practical implications for increasing accountability using UI design. Moreover, we are the first to extend the scenario-based factorial survey method to test design artifacts. This method provides the ability to use more design manipulations and to test with fewer users than is required in traditional experimentation and research on humanÐcomputer interaction. We also provide bootstrapping tests of mediation and moderation and demonstrate how to analyze fixed and random effects within the factorial survey method optimally.
Using Accountability to Reduce Access Policy Violations in Information Systems. (Journal of Management Information Systems, 2013)
Authors: Abstract:
    Access policy violations by organizational insiders are a major security concern for organizations because these violations commonly result in fraud, unauthorized disclosure, theft of intellectual property, and other abuses. Given the operational demands of dynamic organizations, current approaches to curbing access policy violations are insufficient. This study presents a new approach for reducing access policy violations, introducing both the theory of accountability and the factorial survey to the information systems field. We identify four system mechanisms that heighten an individual's perception of accountability: identifiability, awareness of logging, awareness of audit, and electronic presence. These accountability mechanisms substantially reduce intentions to commit access policy violations. These results not only point to several avenues for future research on access policy violations but also suggest highly practical design-artifact solutions that can be easily implemented with minimal impact on organizational insiders.