scispace - formally typeset
Journal ArticleDOI

A holistic model of computer abuse within organizations

TLDR
A new model of computer abuse is proposed that extends the traditional model with the social criminology theories and explains the phenomenon through social lenses such as social bonds and social learning, focusing on computer abuse within organizations.
Abstract
Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in organizations. They are based on the general deterrence theory, which posits that when an organization implements countermeasures that threaten abusers, its computer abuse problems would be deterred. However, computer abuse problems persist in many organizations despite these measures. This article proposes a new model of computer abuse that extends the traditional model with the social criminology theories. Focusing on computer abuse within organizations, the model explains the phenomenon through social lenses such as social bonds and social learning. The new model contributes to our theoretical body of knowledge on computer abuse by providing a new angle for approaching the problem. It suggests to practitioners that both technical and social solutions should be implemented to reduce the pervasive computer abuse problems.

read more

Citations
More filters
Journal ArticleDOI

Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness

TL;DR: The results show that an employee's intention to comply with the ISP is significantly influenced by attitude, normative beliefs, and self-efficacy to comply, and the role of ISA and compliance-related beliefs in an organization's efforts to encourage compliance is shed.
Journal ArticleDOI

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach

TL;DR: An extended deterrence theory model is presented that combines work from criminology, social psychology, and information systems and suggests that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention.
Proceedings ArticleDOI

Employees' Behavior towards IS Security Policy Compliance

TL;DR: A theoretical model that contains the factors that explain employees' IS security policy compliance is proposed and suggests that information quality has a significant effect on actual IS security Policy compliance.
Journal ArticleDOI

Beyond deterrence: an expanded view of employee computer abuse

TL;DR: The Straub and Welke (1998) security action cycle framework is extended and three areas worthy of empirical investigation are proposed--techniques of neutralization, expressive/instrumental criminal motivations, and disgruntlement as a result of perceptions of organizational injustice--and questions for future research in these areas are proposed.
Journal ArticleDOI

Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software

TL;DR: It is demonstrated that threat and coping appraisal successfully predict SMB executives’ anti-malware software adoption intention, leading to SMB adoption.
References
More filters
Journal ArticleDOI

The theory of planned behavior

TL;DR: Ajzen, 1985, 1987, this article reviewed the theory of planned behavior and some unresolved issues and concluded that the theory is well supported by empirical evidence and that intention to perform behaviors of different kinds can be predicted with high accuracy from attitudes toward the behavior, subjective norms, and perceived behavioral control; and these intentions, together with perceptions of behavioral control, account for considerable variance in actual behavior.
Book ChapterDOI

From Intentions to Actions: A Theory of Planned Behavior

Icek Ajzen
TL;DR: There appears to be general agreement among social psychologists that most human behavior is goal-directed (e. g., Heider, 1958 ; Lewin, 1951), and human social behavior can best be described as following along lines of more or less well-formulated plans.
Journal Article

A general theory of crime.

TL;DR: In this paper, the authors discuss the social consequences of low self-control in criminal events and individual propensities: age, gender, and race, as well as white-collar crime.
Journal ArticleDOI

Causes of Delinquency.

BookDOI

Causes of delinquency

TL;DR: In Causes of Delinquency, Hirschi attempts to state and test a theory of delinquency, seeing in the delinquent a person relatively free of the intimate attachments, the aspirations, and the moral beliefs that bind most people to a life within the law.
Related Papers (5)