Author List: Vance, Anthony; Lowry, Paul Benjamin; Eggett, Dennis;
MIS Quarterly, 2015, Volume 39, Issue 2, Page 345-366.
Access-policy violations are a growing problem with substantial costs for organizations. Although training programs and sanctions have been suggested as a means of reducing these violations, evidence shows the problem persists. It is thus imperative to identify additional ways to reduce access-policy violations, especially for systems providing broad access to data. We use accountability theory to develop four user-interface (UI) design artifacts that raise users' accountability perceptions within systems and in turn decrease access-policy violations. To test our model, we uniquely applied the scenario-based factorial survey method to various graphical manipulations of a records system containing sensitive information at a large organization with over 300 end users who use the system daily. We show that the UI design artifacts corresponding to four submanipulations of accountability can raise accountability and reduce access policy violation intentions. Our findings have several theoretical and practical implications for increasing accountability using UI design. Moreover, we are the first to extend the scenario-based factorial survey method to test design artifacts. This method provides the ability to use more design manipulations and to test with fewer users than is required in traditional experimentation and research on humanÐcomputer interaction. We also provide bootstrapping tests of mediation and moderation and demonstrate how to analyze fixed and random effects within the factorial survey method optimally.
Keywords: Accountability theory; identifiability; expectation of evaluation; awareness of monitoring; social presence; factorial survey method; user-interface design; information security policy violations; unauthorized access; mediation; moderation
Algorithm:

List of Topics

#121 0.359 human awareness conditions point access humans images accountability situational violations result reduce moderation gain people features presence increase uses means
#207 0.215 design artifacts alternative method artifact generation approaches alternatives tool science generate set promising requirements evaluation problem designed incentives components addressing
#108 0.107 model research data results study using theoretical influence findings theory support implications test collected tested based empirical empirically context paper
#134 0.070 users end use professionals user organizations applications needs packages findings perform specialists technical computing direct future selection ability help software
#186 0.063 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection