User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach

被引:740
作者
D'Arcy, John [1 ]
Hovav, Anat [2 ]
Galletta, Dennis [3 ]
机构
[1] Univ Notre Dame, Mendoza Coll Business, Notre Dame, IN 46556 USA
[2] Korea Univ, Sch Business, Seoul 136701, South Korea
[3] Univ Pittsburgh, Katz Grad Sch Business, Pittsburgh, PA 15260 USA
关键词
IS misuse; IS security; security countermeasures; general deterrence theory; security management; end-user security; COMMON METHOD VARIANCE; COMPUTER ABUSE; SHOPLIFTING PREVENTION; PERCEIVED CERTAINTY; GENERAL DETERRENCE; INSIDER THREAT; ETHICS; MODEL; ATTITUDES; SEVERITY;
D O I
10.1287/isre.1070.0160
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%-75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of punishment for IS misuse. This paper presents an extended deterrence theory model that combines work from criminology, social psychology, and information systems. The model posits that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention. The model is then tested on 269 computer users from eight different companies. The results suggest that three practices deter IS misuse: user awareness of security policies; security education, training, and awareness (SETA) programs; and computer monitoring. The results also suggest that perceived severity of sanctions is more effective in reducing IS misuse than certainty of sanctions. Further, there is evidence that the impact of sanction perceptions vary based on one's level of morality. Implications for the research and practice of IS security are discussed.
引用
收藏
页码:79 / 98
页数:20
相关论文
共 111 条
[31]  
FINCH JH, 2003, P ISONEWORLD C LAS V, P16
[32]  
Forcht K.A., 1994, COMPUTER SECURITY MA
[33]   EVALUATING STRUCTURAL EQUATION MODELS WITH UNOBSERVABLE VARIABLES AND MEASUREMENT ERROR [J].
FORNELL, C ;
LARCKER, DF .
JOURNAL OF MARKETING RESEARCH, 1981, 18 (01) :39-50
[34]  
*FORR RES, 2007, STAT DAT SEC N AM
[35]  
*FOT INC, 2005, RISK BUS NEW SURV SH
[36]   An application of Stafford and Warr's reconceptualisation of deterrence to a group of recidivist drink drivers [J].
Freeman, J ;
Watson, B .
ACCIDENT ANALYSIS AND PREVENTION, 2006, 38 (03) :462-471
[37]   Authentication and supervision: A survey of user attitudes [J].
Furnell, SM ;
Dowland, PS ;
Illingworth, HM ;
Reynolds, PL .
COMPUTERS & SECURITY, 2000, 19 (06) :529-539
[38]  
Gaston S.J., 1996, Information security: strategies for successful management
[39]   Morality and computers: Attitudes and differences in moral judgments [J].
Gattiker, UE ;
Kelley, H .
INFORMATION SYSTEMS RESEARCH, 1999, 10 (03) :233-254
[40]   A PRACTICAL GUIDE TO FACTORIAL VALIDITY USING PLS-GRAPH: TUTORIAL AND ANNOTATED EXAMPLE [J].
Gefen, David ;
Straub, Detmar .
COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2005, 16 :91-109