Author List: Willison, Robert; Warkentin, Merrill E.;
MIS Quarterly, 2013, Volume 37, Issue 1, Page 1/20/2017.
Recent academic investigations of computer security policy violations have largely focused on non-malicious noncompliance due to poor training, low employee motivation, weak affective commitment, or individual oversight. Established theoretical foundations applied to this domain have related to protection motivation, deterrence, planned behavior, self-efficacy, individual adoption factors, organizational commitment, and other individual cognitive factors. But another class of violation demands greater research emphasis: the intentional commission of computer security policy violation, or insider computer abuse. Whether motivated by greed, disgruntlement, or other psychological processes, this act has the greatest potential for loss and damage to the employer. We argue the focus must include not only the act and its immediate antecedents of intention (to commit computer abuse) and deterrence (of the crime), but also phenomena which temporally precede these areas. Specifically, we assert the need to consider the thought processes of the potential offender and how these are influenced by the organizational context, prior to deterrence. We believe the interplay between thought processes and this context may significantly impact the efficacy of IS security controls, specifically deterrence safeguards. Through this focus, we extend the Straub and Welke (1998) security action cycle framework and propose three areas worthy of empirical investigation-techniques of neutralization(rationalization), expressive/instrumental criminal motivations, and disgruntlement as a result of perceptions of organizational injustice-and propose questions for future research in these areas.
Keywords: deterrence; Disgruntlement; Expressive Crimes; information systems security; insider; Instrumental Crimes; motivation; neutralization; organizational justice
Algorithm:

List of Topics

#186 0.284 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection
#153 0.142 usage use self-efficacy social factors individual findings influence organizations beliefs individuals support anxiety technology workplace key outcome behavior contextual longitudinal
#222 0.138 research researchers framework future information systems important present agenda identify areas provide understanding contributions using literature studies paper potential review
#116 0.109 research study influence effects literature theoretical use understanding theory using impact behavior insights examine influences mechanisms specifically context perspective findings
#227 0.084 commitment need practitioners studies potential role consider difficult models result importance influence researchers established conduct investigated establishing appear clearly determining
#15 0.079 motivation intrinsic theory social extrinsic expectancy motivations motivate usage enjoyment rewards consequences reciprocity organizational motivational focus helping system's exploratory substantial
#291 0.055 local global link complex view links particularly need thought number supports efforts difficult previously linked achieving simple poor individual rise