2020
DOI: 10.17705/1jais.00646
|View full text |Cite
|
Sign up to set email alerts
|

Why Individual Employees Commit Malicious Computer Abuse: A Routine Activity Theory Perspective

et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 52 publications
3
9
0
Order By: Relevance
“…Mitigating security threats and safeguarding information security has become an important organizational strategic agenda. Among a variety of security threats, employees' information security policy (ISP) violation has been deemed to be a major concern to organizations (Chen et al, 2021;Luo et al, 2020;Moody et al, 2018;Siponen and Vance, 2010). Academics and practitioners have recognized the significant negative outcomes of employees' ISP violation behavior.…”
Section: Introductionmentioning
confidence: 99%
“…Mitigating security threats and safeguarding information security has become an important organizational strategic agenda. Among a variety of security threats, employees' information security policy (ISP) violation has been deemed to be a major concern to organizations (Chen et al, 2021;Luo et al, 2020;Moody et al, 2018;Siponen and Vance, 2010). Academics and practitioners have recognized the significant negative outcomes of employees' ISP violation behavior.…”
Section: Introductionmentioning
confidence: 99%
“…The elements of IIDTRC often involve compromise of consumers' PID and business commercial data through account identity fraud, account take-over, privacy counterfeiting and account withdrawal. Studies noted that the majority of consumers do not shop online because of their personal data security risks and lack of trust in its employees (Lyytinen & Grover, 2017;Zimmer et al, 2010), and noted that many consumers believed that retailers were primarily responsible for online transactions safety against identity theft and cyber-enabled crimes. Unfortunately, such consumers' perceptions still remain an irony.…”
Section: Historic Decades Of Increasing Incidents and Impacts Of Inte...mentioning
confidence: 99%
“…Researchers (e.g., Wakunuma & Stahl, 2014) have noted that at times, honest employees face increasing challenges of external pressure through coercion luring them to compromise their professional work ethics and commit IIDTRC. Luo et al (2020) developed a comprehensive model of employee-committed malicious computer abuse to indicate the effects of the individual characteristics of self-control, hacking self-efficacy, moral beliefs, and the effect of security guardianship in organisational settings. Their model shows how certain circumstances can lead an employee to commit a malicious their organisation.…”
Section: The Nature Of Internal Identity Theft Related Crimes In Busi...mentioning
confidence: 99%
“…According to RAT, the occurrence of workplace crime would be leveraged under difference level of guardianship [13]. Organizations need to implement both internal guardianship and external guardianship in monitoring sales representatives.…”
Section: Introductionmentioning
confidence: 99%