IS

Siponen, Mikko

Topic Weight Topic Terms
1.040 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.587 information issue special systems article introduction editorial including discusses published section articles reports various presented
0.427 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.303 model research data results study using theoretical influence findings theory support implications test collected tested
0.302 theory theories theoretical paper new understanding work practical explain empirical contribution phenomenon literature second implications
0.183 training learning outcomes effectiveness cognitive technology-mediated end-user methods environments longitudinal skills performance using effective method
0.180 social networks influence presence interactions network media networking diffusion implications individuals people results exchange paper
0.144 systems information objectives organization organizational development variety needs need efforts technical organizations developing suggest given
0.132 action research engagement principles model literature actions focus provides developed process emerging establish field build
0.113 results study research information studies relationship size variables previous variable examining dependent increases empirical variance
0.105 framework model used conceptual proposed given particular general concept frameworks literature developed develop providing paper
0.101 media social content user-generated ugc blogs study online traditional popularity suggest different discourse news making

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Johnston, Allen 1 Lowry, Paul Benjamin 1 Mahmood, M. Adam 1 Puhakainen, Petri 1
Rao, H. Raghav 1 Raghu, T. S. 1 Straub, Detmar 1 Vance, Anthony 1
Warkentin, Merrill E. 1 Wang, Chuang 1 Zhang, Jun 1
deterrence theory 2 anonymity 1 compliance 1 cyberbullying 1
cyberstalking 1 cyberharassment 1 disinhibition 1 deindividuation 1
differential association 1 differential reinforcement 1 definition 1 employees' compliance with security policies 1
Fear appeals 1 IS security policies 1 IS security 1 IS security training 1
information security 1 imitation 1 Neutralization theory 1 neutralization 1
protection motivation theory 1 responses 1 rhetoric 1 sanctions 1
social media 1 social media cyberbullying model 1 SMCBM 1 social structure and social learning model 1
SSSL model 1 social learning 1 social learning theory 1 SLT 1
threats 1

Articles (5)

Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model (Information Systems Research, 2016)
Authors: Abstract:
    The dramatic increase in social media use has challenged traditional social structures and shifted a great deal of interpersonal communication from the physical world to cyberspace. Much of this social media communication has been positive: Anyone around the world who has access to the Internet has the potential to communicate with and attract a massive global audience. Unfortunately, such ubiquitous communication can be also used for negative purposes such as cyberbullying, which is the focus of this paper. Previous research on cyberbullying, consisting of 135 articles, has improved the understanding of why individualsÑmostly adolescentsÑengage in cyberbullying. However, our study addresses two key gaps in this literature: (1) how the information technology (IT) artifact fosters/inhibits cyberbullying and (2) why people are socialized to engage in cyberbullying. To address these gaps, we propose the social media cyberbullying model (SMCBM), which modifies Akers' [Akers RL (2011) Social Learning and Social Structure: A General Theory of Crime and Deviance, 2nd ed. (Transaction Publishers, New Brunswick, NJ)] social structure and social learning model. Because Akers developed his model for crimes in the physical world, we add a rich conceptualization of anonymity composed of five subconstructs as a key social media structural variable in the SMCBM to account for the IT artifact. We tested the SMCBM with 1,003 adults who have engaged in cyberbullying. The empirical findings support the SMCBM. Heavy social media use combined with anonymity facilitates the social learning process of cyberbullying in social media in a way that fosters cyberbullying. Our results indicate new directions for cyberbullying research and implications for anticyberbullying practices.
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric (MIS Quarterly, 2015)
Authors: Abstract:
    Fear appeals, which are used widely in information security campaigns, have become common tools in motivating individual compliance with information security policies and procedures. However, empirical assessments of the effectiveness of fear appeals have yielded mixed results, leading IS security scholars and practitioners to question the validity of the conventional fear appeal framework and the manner in which fear appeal behavioral modeling theories, such as protection motivation theory (PMT), have been applied to the study of information security phenomena. We contend that the conventional fear appeal rhetorical framework is inadequate when used in the context of information security threat warnings and that its primary behavioral modeling theory, PMT, has been misspecified in the extant information security research. Based on these arguments, we propose an enhanced fear appeal rhetorical framework that leverages sanctioning rhetoric as a secondary vector of threats to the human asset, thereby adding the dimension of personal-relevance threat, which is critically absent from previous fear appeal frameworks and PMT-grounded security studies. Following a hypothetical scenario research approach involving the employees of a Finnish city government, we validate the efficacy of the enhanced fear appeal framework and determine that informal sanction rhetoric effectively enhances conventional fear appeals, thus providing a significant positive influence on compliance intentions.
MOVING TOWARD BLACK HAT RESEARCH IN INFORMATION SYSTEMS SECURITY: AN EDITORIAL INTRODUCTION TO THE SPECIAL ISSUE. (MIS Quarterly, 2010)
Authors: Abstract:
    An introduction is presented for this issue which includes articles about information security in a digital economy, research methodology evaluation, and computer security.
NEUTRALIZATION: NEW INSIGHTS INTO THE PROBLEM OF EMPLOYEE INFORMATION SYSTEMS SECURITY POLICY VIOLATIONS. (MIS Quarterly, 2010)
Authors: Abstract:
    Employees' failure to comply with information systems security policies is a major concern for information technology security managers. In efforts to understand this problem, IS security researchers have traditionally viewed violations of IS security policies through the lens of deterrence theory. In this article, we show that neutralization theory, a theory prominent in Criminology but not yet applied in the context of IS, provides a compelling explanation for IS security policy violations and offers new insight into how employees rationalize this behavior. In doing so, we propose a theoretical model in which the effects of neutralization techniques are tested alongside those of sanctions described by deterrence theory. Our empirical results highlight neutralization as an important factor to take into account with regard to developing and implementing organizational security policies and practices.
IMPROVING EMPLOYEES' COMPLIANCE THROUGH INFORMATION SYSTEMS SECURITY TRAINING: AN ACTION RESEARCH STUDY. (MIS Quarterly, 2010)
Authors: Abstract:
    Employee noncompliance with information systems security policies is a key concern for organizations. If users do not comply with IS security policies, security solutions lose their efficacy. Of the different IS security policy compliance approaches, training is the most commonly suggested in the literature. Yet, few of the existing studies about training to promote IS policy compliance utilize theory to explain what learning principles affect user compliance with IS security policies, or offer empirical evidence of their practical effectiveness. Consequently, there is a need for IS security training approaches that are theory-based and empirically evaluated. Accordingly, we propose a training program based on two theories: the universal constructive instructional theory and the elaboration likelihood model. We then validate the training program for IS security policy compliance training through an action research project. The action research intervention suggests that the theory-based training achieved positive results and was practical to deploy. Moreover, the intervention suggests that information security training should utilize contents and methods that activate and motivate the learners to systematic cognitive processing of information they receive during the training. In addition, the action research study made clear that a continuous communication process was also required to improve user IS security policy compliance. The findings of this study offer new insights for scholars and practitioners involved in IS security policy compliance.