IS

Wen, Kuang-Wei

Topic Weight Topic Terms
0.258 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.186 equity conventional punishment justice wisdom focus behavior fairness compliance suggest theory significant certainty misuse reward
0.123 model research data results study using theoretical influence findings theory support implications test collected tested
0.115 systems information research theory implications practice discussed findings field paper practitioners role general important key

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Chen, Yan 1 Ramamurthy, K. 1
coercive control 1 compliance theory 1 general deterrence theory 1 information security policy 1
punishment 1 remunerative control 1 reward 1

Articles (1)

Organizations' Information Security Policy Compliance: Stick or Carrot Approach? (Journal of Management Information Systems, 2012)
Authors: Abstract:
    Companies' information security efforts are often threatened by employee negligence and insider breach. To deal with these insider issues, this study draws on the compliance theory and the general deterrence theory to propose a research model in which the relations among coercive control, which has been advocated by scholars and widely practiced by companies; remunerative control, which is generally missing in both research and practice; and certainty of control are studied. A Web-based field experiment involving real-world employees in their natural settings was used to empirically test the model. While lending further support to the general deterrence theory, our findings highlight that reward enforcement, a remunerative control mechanism in the information systems security context, could be an alternative for organizations where sanctions do not successfully prevent violation. The significant interactions between punishment and reward found in the study further indicate a need for a more comprehensive enforcement system that should include a reward enforcement scheme through which the organizational moral standards and values are established or reemphasized. The findings of this study can potentially be used to guide the design of more effective security enforcement systems that encompass remunerative control mechanisms.