Author List: Chen, Yan; Ramamurthy, K.; Wen, Kuang-Wei;
Journal of Management Information Systems, 2012, Volume 29, Issue 3, Page 157-188.
Companies' information security efforts are often threatened by employee negligence and insider breach. To deal with these insider issues, this study draws on the compliance theory and the general deterrence theory to propose a research model in which the relations among coercive control, which has been advocated by scholars and widely practiced by companies; remunerative control, which is generally missing in both research and practice; and certainty of control are studied. A Web-based field experiment involving real-world employees in their natural settings was used to empirically test the model. While lending further support to the general deterrence theory, our findings highlight that reward enforcement, a remunerative control mechanism in the information systems security context, could be an alternative for organizations where sanctions do not successfully prevent violation. The significant interactions between punishment and reward found in the study further indicate a need for a more comprehensive enforcement system that should include a reward enforcement scheme through which the organizational moral standards and values are established or reemphasized. The findings of this study can potentially be used to guide the design of more effective security enforcement systems that encompass remunerative control mechanisms.
Keywords: coercive control; compliance theory; general deterrence theory; information security policy; punishment; remunerative control; reward
Algorithm:

List of Topics

#186 0.258 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection
#92 0.186 equity conventional punishment justice wisdom focus behavior fairness compliance suggest theory significant certainty misuse reward settings behavioral mandatory drawing widely
#108 0.123 model research data results study using theoretical influence findings theory support implications test collected tested based empirical empirically context paper
#127 0.115 systems information research theory implications practice discussed findings field paper practitioners role general important key grounded researchers domain new identified
#280 0.089 control controls formal systems mechanisms modes clan informal used internal literature outsourced outcome theory configuration attempts evolution authority complementary little