User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach

被引:740
作者
D'Arcy, John [1 ]
Hovav, Anat [2 ]
Galletta, Dennis [3 ]
机构
[1] Univ Notre Dame, Mendoza Coll Business, Notre Dame, IN 46556 USA
[2] Korea Univ, Sch Business, Seoul 136701, South Korea
[3] Univ Pittsburgh, Katz Grad Sch Business, Pittsburgh, PA 15260 USA
关键词
IS misuse; IS security; security countermeasures; general deterrence theory; security management; end-user security; COMMON METHOD VARIANCE; COMPUTER ABUSE; SHOPLIFTING PREVENTION; PERCEIVED CERTAINTY; GENERAL DETERRENCE; INSIDER THREAT; ETHICS; MODEL; ATTITUDES; SEVERITY;
D O I
10.1287/isre.1070.0160
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%-75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of punishment for IS misuse. This paper presents an extended deterrence theory model that combines work from criminology, social psychology, and information systems. The model posits that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention. The model is then tested on 269 computer users from eight different companies. The results suggest that three practices deter IS misuse: user awareness of security policies; security education, training, and awareness (SETA) programs; and computer monitoring. The results also suggest that perceived severity of sanctions is more effective in reducing IS misuse than certainty of sanctions. Further, there is evidence that the impact of sanction perceptions vary based on one's level of morality. Implications for the research and practice of IS security are discussed.
引用
收藏
页码:79 / 98
页数:20
相关论文
共 111 条
[91]   Examining employee compliance with organizational surveillance and monitoring [J].
Spitzmuller, Christiane ;
Stanton, Jeffrey M. .
JOURNAL OF OCCUPATIONAL AND ORGANIZATIONAL PSYCHOLOGY, 2006, 79 :245-272
[92]  
Standage T., 2002, ECONOMIST, V365, P11
[93]   Electronic monitoring in their own words: an exploratory study of employees' experiences with new types of surveillance [J].
Stanton, JM ;
Weiss, EM .
COMPUTERS IN HUMAN BEHAVIOR, 2000, 16 (04) :423-440
[94]   Analysis of end user security behaviors [J].
Stanton, JM ;
Stam, KR ;
Mastrangelo, P ;
Jolton, J .
COMPUTERS & SECURITY, 2005, 24 (02) :124-133
[95]   Effective IS Security: An Empirical Study [J].
Straub, Detmar W., Jr. .
INFORMATION SYSTEMS RESEARCH, 1990, 1 (03) :255-276
[96]   DISCOVERING AND DISCIPLINING COMPUTER ABUSE IN ORGANIZATIONS - A FIELD-STUDY [J].
STRAUB, DW ;
NANCE, WD .
MIS QUARTERLY, 1990, 14 (01) :45-60
[97]   Coping with systems risk: Security planning models for management decision making [J].
Straub, DW ;
Welke, RJ .
MIS QUARTERLY, 1998, 22 (04) :441-469
[98]   Why drug testing in elite sport does not work: Perceptual deterrence theory and the role of personal moral beliefs [J].
Strelan, Peter ;
Boeckmann, Robert J. .
JOURNAL OF APPLIED SOCIAL PSYCHOLOGY, 2006, 36 (12) :2909-2934
[99]   The insider threat to information systems and the effectiveness of ISO17799 [J].
Theoharidou, M ;
Kokolakis, S ;
Karyda, M ;
Kiountouzis, E .
COMPUTERS & SECURITY, 2005, 24 (06) :472-484
[100]  
Tittle C.R., 1980, Sanctions and social deviance: The questions of deterrence