2013
DOI: 10.1016/j.cose.2013.09.009
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
132
2
2

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 188 publications
(157 citation statements)
references
References 57 publications
4
132
2
2
Order By: Relevance
“…Conlleva a la realización de acciones específicas para contribuir a la preservación y mejora ecológica común, para el bien de la humanidad actual y futura (Cheng, Li, Li, Holm, & Zhai, 2013).…”
Section: La Rse Vs Tecnología De Información Y La Comunicaciónunclassified
“…Conlleva a la realización de acciones específicas para contribuir a la preservación y mejora ecológica común, para el bien de la humanidad actual y futura (Cheng, Li, Li, Holm, & Zhai, 2013).…”
Section: La Rse Vs Tecnología De Información Y La Comunicaciónunclassified
“…What is novel is how they apply brain imaging technologies-magnetic resonance imaging (fMRI) and electroencephalography (EEG) to explain selfcontrol as an inhibitor of desire for immediate gratification and how low self-control could short circuit moral judgement and rational choice. There were instances where scholarly work was coded for two or more theories used by scholars to explain information security policy violations (Aurigemma & Mattson, 2014;Bansal & Zahedi, 2015;Barlow et al, 2013;Browne et al, 2015;Cheng et al, 2013). An important consideration arising from the previous sections that have addressed various perspectives of scholarly work on IS security policy violation is the omission of the paradox perspective to problematize IS security violations.…”
Section: Interdisciplinary Perspectives In Is Security Policy Violationmentioning
confidence: 99%
“…Cheng, Li, Li, Holm, and Zhai (2013) for instance look at IS security policy violations occurring as a result of employees' weaker social bonds to their mangers, co-workers and organizations. They see this as likely leading to and influencing their willingness to engage in violations.…”
Section: Interdisciplinary Perspectives In Is Security Policy Violationmentioning
confidence: 99%
“…Fundamentally, traditional security research has a "behavioral root" (Workman & Gathegi, 2007) and is a subject of psychological and sociological actions of people. Most prior research in traditional organizational IS security-which is relevant to HRIS -has dealt with the success and failure of security policies by using a deterrence approach (Bulgurcu, Cavusoglu, & Benbasat, 2010;Chen, Ramamurthy, & Wen, 2012;Cheng, Li, Li, Holm, & Zhai, 2013;Herath & Rao, 2009;Straub & Nance, 1990).…”
Section: Security and Habit Researchmentioning
confidence: 99%