Author List: DêArcy, John; Hovav, Anat; Galletta, Dennis;
Information Systems Research, 2009, Volume 20, Issue 1, Page 79-98.
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%-75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of punishment for IS misuse. This paper presents an extended deterrence theory model that combines work from criminology, social psychology, and information systems. The model posits that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention. The model is then tested on 269 computer users from eight different companies. The results suggest that three practices deter IS misuse: user awareness of security policies; security education, training, and awareness (SETA) programs; and computer monitoring. The results also suggest that perceived severity of sanctions is more effective in reducing IS misuse than certainty of sanctions. Further, there is evidence that the impact of sanction perceptions vary based on one's level of morality. Implications for the research and practice of IS security are discussed.
Keywords: end-user security; general deterrence theory; IS misuse; IS security; security countermeasures; security management
Algorithm:

List of Topics

#186 0.250 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection
#92 0.167 equity conventional punishment justice wisdom focus behavior fairness compliance suggest theory significant certainty misuse reward settings behavioral mandatory drawing widely
#121 0.115 human awareness conditions point access humans images accountability situational violations result reduce moderation gain people features presence increase uses means
#108 0.107 model research data results study using theoretical influence findings theory support implications test collected tested based empirical empirically context paper
#73 0.102 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures benefit costs threats ability rate
#127 0.063 systems information research theory implications practice discussed findings field paper practitioners role general important key grounded researchers domain new identified