2006
DOI: 10.1002/asi.20474
|View full text |Cite
|
Sign up to set email alerts
|

Punishment and ethics deterrents: A study of insider security contravention

Abstract: Information security is a growing concern among the general population. For instance, it has been estimated by the U.S. Department of Justice (2004) that one in three people will become victims of identity theft at some point in their lifetime. The bulk of the research into information security has gone into the investigation of technological aspects of security, and there are gaps in the literature relative to contravention of security measures. Drawing from deterrence theory and using the theory of planned b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
49
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 61 publications
(55 citation statements)
references
References 75 publications
4
49
0
Order By: Relevance
“…Workman & Gathegi, 2007). However, whether or not people simply comply with policies is incomplete in explaining organizational results.…”
Section: Procedural Justice Interactions With Tcm Componentsmentioning
confidence: 95%
See 1 more Smart Citation
“…Workman & Gathegi, 2007). However, whether or not people simply comply with policies is incomplete in explaining organizational results.…”
Section: Procedural Justice Interactions With Tcm Componentsmentioning
confidence: 95%
“…Security policies are organizational instruments that establish the rules and punitive sanctions regarding security behaviors. Increasingly, employment is conditioned upon employee agreements that elicit promises to comply with security policies including allowing the organization to collect personal data and monitoring their activities (Straub & Welke, 1998;Workman & Gathegi, 2007).…”
Section: Threat Perceptions Severity and Likelihood And Monitoringmentioning
confidence: 99%
“…Employee attitudes-especially strong negative affect-are precursors of intentional counterproductive (and even subversive) behaviors ranging from absenteeism to various forms of retaliation (Workman, 2009b;Workman and Gathegi, 2007). Wells (2001) points out that employee dissatisfaction with the work organization is a powerful predictor of workplace fraud.…”
Section: Relevant Researchmentioning
confidence: 99%
“…Fundamentally, traditional security research has a "behavioral root" (Workman & Gathegi, 2007) and is a subject of psychological and sociological actions of people. Most prior research in traditional organizational IS security-which is relevant to HRIS -has dealt with the success and failure of security policies by using a deterrence approach (Bulgurcu, Cavusoglu, & Benbasat, 2010;Chen, Ramamurthy, & Wen, 2012;Cheng, Li, Li, Holm, & Zhai, 2013;Herath & Rao, 2009;Straub & Nance, 1990).…”
Section: Security and Habit Researchmentioning
confidence: 99%