2011
DOI: 10.1145/1953122.1953142
|View full text |Cite
|
Sign up to set email alerts
|

Does deterrence work in reducing information security policy abuse by employees?

Abstract: 54 CoMM uniCAT ions of T h e AC M | j uN e 2 0 1 1 | voL . 5 4 | No. 6 practice h acK iNG iN to c o rP o r at e IT systems and individuals' computers is no longer a sport for bragging rights, but a major organized economic activity aiming for significant profits controlled largely by underground networks of criminals and organized crime on a global scale. 2 The financial impact of the computer crimes and related activities is estimated at over one trillion dollars each year worldwide. 17 Unfortunately, despite… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

3
196
1
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 233 publications
(211 citation statements)
references
References 22 publications
3
196
1
1
Order By: Relevance
“…[33]. In this study, we use perceived management participation [17] to measure vertical mimetics. However, we posit a different effect of management conduct on employees in Korea than was found in [17].…”
Section: Mimetic Pressurementioning
confidence: 99%
See 3 more Smart Citations
“…[33]. In this study, we use perceived management participation [17] to measure vertical mimetics. However, we posit a different effect of management conduct on employees in Korea than was found in [17].…”
Section: Mimetic Pressurementioning
confidence: 99%
“…In this study, we use perceived management participation [17] to measure vertical mimetics. However, we posit a different effect of management conduct on employees in Korea than was found in [17]. Kim [20: 3] describes the Koreans' legal consciousness as: "Historically, a common sentiment throughout Korea was that to obey the law implied the forfeiture of a reward that could be reaped through lawless or quasi-lawless behavior."…”
Section: Mimetic Pressurementioning
confidence: 99%
See 2 more Smart Citations
“…The controls of administrative deterrents have been validated as effective in reducing IS [34] and computer abuses (such as software piracy [35,36]) and violation of information security policies [33,37,38]. Wiant [39] also regarded information security policies as deterrent measures, and noted that the effectiveness of information security policy can be maintained when computer abuse incidents and their seriousness are monitored and reported.…”
Section: Introductionmentioning
confidence: 99%