Author List: Vance, Anthony; Lowry, Paul Benjamin; Eggett, Dennis;
Journal of Management Information Systems, 2013, Volume 29, Issue 4, Page 263-290.
Access policy violations by organizational insiders are a major security concern for organizations because these violations commonly result in fraud, unauthorized disclosure, theft of intellectual property, and other abuses. Given the operational demands of dynamic organizations, current approaches to curbing access policy violations are insufficient. This study presents a new approach for reducing access policy violations, introducing both the theory of accountability and the factorial survey to the information systems field. We identify four system mechanisms that heighten an individual's perception of accountability: identifiability, awareness of logging, awareness of audit, and electronic presence. These accountability mechanisms substantially reduce intentions to commit access policy violations. These results not only point to several avenues for future research on access policy violations but also suggest highly practical design-artifact solutions that can be easily implemented with minimal impact on organizational insiders.
Keywords: access policy violations; accountability; accountability theory; awareness; evaluation; factorial survey method; identifiability; information security; monitoring; social presence
Algorithm:

List of Topics

#121 0.483 human awareness conditions point access humans images accountability situational violations result reduce moderation gain people features presence increase uses means
#186 0.233 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection
#44 0.102 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using proposed method present provides various