Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%-75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of punishment for IS misuse. This paper presents an extended deterrence theory model that combines work from criminology, social psychology, and information systems. The model posits that user awareness of security countermeasures directly influences the pe...
Modern organizations face significant information security violations from inside the organizations ...
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology...
Information System (IS) tools and applications create opportunities for a positive digital change to...
Information Technology transformed the way people executed their tasks at work. With the information...
ABSTRACT. Research from the fields of criminology and social psychology suggests that the deterrent ...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
Computer abuse by employees has increased the potential for security vulnerabilities for organizatio...
Information security is a growing concern among the general population. For instance, it has been es...
Modern organizations face significant information security violations from inside the organizations ...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Previous studies show that information security breaches and privacy violations are important issues...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
Previous studies show that information security breaches and privacy violations are important issues...
Modern organizations face significant information security violations from inside the organizations ...
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology...
Information System (IS) tools and applications create opportunities for a positive digital change to...
Information Technology transformed the way people executed their tasks at work. With the information...
ABSTRACT. Research from the fields of criminology and social psychology suggests that the deterrent ...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
Computer abuse by employees has increased the potential for security vulnerabilities for organizatio...
Information security is a growing concern among the general population. For instance, it has been es...
Modern organizations face significant information security violations from inside the organizations ...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Previous studies show that information security breaches and privacy violations are important issues...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
Previous studies show that information security breaches and privacy violations are important issues...
Modern organizations face significant information security violations from inside the organizations ...
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology...
Information System (IS) tools and applications create opportunities for a positive digital change to...