首页> 外文期刊>MIS quarterly >Beyond Deterrence: An Expanded View of Employee Computer Abuse
【24h】

Beyond Deterrence: An Expanded View of Employee Computer Abuse

机译:超越威慑力:员工滥用计算机的广阔视野

获取原文
获取原文并翻译 | 示例
       

摘要

Recent academic investigations of computer security policy violations have largely focused on non-malicious noncompliance due to poor training, low employee motivation, weak affective commitment, or individual oversight. Established theoretical foundations applied to this domain have related to protection motivation, deterrence, planned behavior, self-efficacy, individual adoption factors, organizational commitment, andother individual cognitive factors. But another class of violation demands greater research emphasis: the intentional commission of computer security policy violation, or insider computer abuse. Whether motivated by greed, disgruntlement, or other psychological processes, this act has the greatest potential for loss and damage to the employer. We argue the focus must include not only the act and its immediate antecedents of intention (to commit computer abuse) and deterrence (of the crime), but also phenomena which temporally precede these areas. Specifically, we assert the need to consider the thought processes of the potential offender and how these are influenced by the organizational context, prior to deterrence. We believe the interplay between thought processes and this context may significantly impact the efficacy of IS security controls, specifically deterrence safeguards. Through this focus, we extend the Straub and Welke (1998) security action cycle framework and propose three areas worthy of empirical investigation-techniques of neutralization (rationalization), expressive/instrumental criminal motivations, and disgruntlement as a result of perceptions of organizational injustice-and propose questions for future research in these areas.
机译:由于培训不足,员工积极性低,情感投入不力或个人监督不足,最近对计算机安全策略违规的学术研究主要集中在非恶意违规。建立的适用于该领域的理论基础与保护动机,威慑,计划的行为,自我效能感,个人采用因素,组织承诺以及其他个人认知因素有关。但是另一类违规需要更大的研究重点:故意执行计算机安全策略违规或内部计算机滥用。无论是出于贪婪,不满还是其他心理过程的驱使,这种行为对雇主造成损失和损害的可能性最大。我们认为重点不仅应包括行为及其意图(进行计算机滥用)和威慑(犯罪)的直接先决条件,而且还应包括在这些方面暂时存在的现象。具体来说,我们认为有必要在威慑之前考虑潜在犯罪者的思维过程,以及这些思维过程如何受到组织环境的影响。我们认为,思考过程与这种环境之间的相互作用可能会极大地影响IS安全控制(尤其是威慑保障)的效力。通过这种关注,我们扩展了Straub和Welke(1998)的安全行动周期框架,并提出了三个值得进行实证调查的技术,即中和(理性化),表达/工具犯罪动机以及由于对组织不公正观念的不满而引起的不满。并提出问题,以供将来在这些领域进行研究。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号