User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
Author
Abstract
Suggested Citation
DOI: 10.1287/isre.1070.0160
Download full text from publisher
References listed on IDEAS
- Michael Workman & John Gathegi, 2007. "Punishment and ethics deterrents: A study of insider security contravention," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 58(2), pages 212-222, January.
- Dubin, Jeffrey A. & Graetz, Michael J. & Wilde, Louis L., 1990. "The Effect of Audit Rates on the Federal Individual Income Tax, 1977-1986," National Tax Journal, National Tax Association;National Tax Journal, vol. 43(4), pages 395-409, December.
- Detmar W. Straub, 1990. "Effective IS Security: An Empirical Study," Information Systems Research, INFORMS, vol. 1(3), pages 255-276, September.
- Jarvis, Cheryl Burke & MacKenzie, Scott B & Podsakoff, Philip M, 2003. "A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 30(2), pages 199-218, September.
- Alm, James & McKee, Michael, 2006. "Audit Certainty, Audit Productivity, and Taxpayer Compliance," National Tax Journal, National Tax Association;National Tax Journal, vol. 59(4), pages 801-816, December.
- Michael D. Wybo & Detmar W. Straub Jr., 1989. "Protecting Organizational Information Resources," Information Resources Management Journal (IRMJ), IGI Global, vol. 2(4), pages 1-16, October.
- Naresh K. Malhotra & Sung S. Kim & Ashutosh Patil, 2006. "Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research," Management Science, INFORMS, vol. 52(12), pages 1865-1883, December.
- Armstrong, J. Scott & Overton, Terry S., 1977.
"Estimating Nonresponse Bias in Mail Surveys,"
MPRA Paper
81694, University Library of Munich, Germany.
- JS Armstrong & Terry Overton, 2005. "Estimating Nonresponse Bias in Mail Surveys," General Economics and Teaching 0502044, University Library of Munich, Germany.
- Wynne W. Chin & Barbara L. Marcolin & Peter R. Newsted, 2003. "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study," Information Systems Research, INFORMS, vol. 14(2), pages 189-217, June.
- Dubin, Jeffrey A. & Graetz, Michael J. & Wilde, Louis L., 1990. "The Effect of Audit Rates on the Federal Individual Income Tax, 1977-1986," National Tax Journal, National Tax Association, vol. 43(4), pages 395-409, December.
- Urs E. Gattiker & Helen Kelley, 1999. "Morality and Computers: Attitudes and Differences in Moral Judgments," Information Systems Research, INFORMS, vol. 10(3), pages 233-254, September.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Ismael Barros-Contreras & Héctor Pérez-Fernández & Natalia Martín-Cruz & Juan Hernangómez B., 2023. "Can we make family social capital flourish? The moderating role of generational involvement," Journal of Family and Economic Issues, Springer, vol. 44(3), pages 655-673, September.
- Malte Brettel & Andreas Engelen & Thomas Müller & Oliver Schilke, 2011. "Distribution Channel Choice of New Entrepreneurial Ventures," Entrepreneurship Theory and Practice, , vol. 35(4), pages 683-708, July.
- Nambisan, Satish & Baron, Robert A., 2021. "On the costs of digital entrepreneurship: Role conflict, stress, and venture performance in digital platform-based ecosystems," Journal of Business Research, Elsevier, vol. 125(C), pages 520-532.
- Jean, Ruey Jer Bryan & Kim, Daekwan & Choi, Kyuyeong, 2021. "Pattern of information technology use and relationship learning in international customer-supplier relationships," International Business Review, Elsevier, vol. 30(4).
- Yajiong Xue & Huigang Liang & Liansheng Wu, 2011. "Punishment, Justice, and Compliance in Mandatory IT Settings," Information Systems Research, INFORMS, vol. 22(2), pages 400-414, June.
- Cai, Shun & Chen, Xi & Bose, Indranil, 2013. "Exploring the role of IT for environmental sustainability in China: An empirical analysis," International Journal of Production Economics, Elsevier, vol. 146(2), pages 491-500.
- James Alm & Matthias Kasper, 2020. "Laboratory Experiments," Working Papers 2008, Tulane University, Department of Economics.
- Paul Lowry & Clay Posey & Tom Roberts & Rebecca Bennett, 2014. "Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse," Journal of Business Ethics, Springer, vol. 121(3), pages 385-401, May.
- Bag, Surajit & Rahman, Muhammad Sabbir & Srivastava, Gautam & Chan, Hau-Ling & Bryde, David J., 2022. "The role of big data and predictive analytics in developing a resilient supply chain network in the South African mining industry against extreme weather events," International Journal of Production Economics, Elsevier, vol. 251(C).
- Ghiyoung Im & Arun Rai, 2008. "Knowledge Sharing Ambidexterity in Long-Term Interorganizational Relationships," Management Science, INFORMS, vol. 54(7), pages 1281-1296, July.
- James Alm, 2019.
"What Motivates Tax Compliance?,"
Journal of Economic Surveys, Wiley Blackwell, vol. 33(2), pages 353-388, April.
- James Alm, 2019. "What Motivates Tax Compliance," Working Papers 1903, Tulane University, Department of Economics.
- Eva Blömeke & Michel Clement & Edlira Shehu & Eva Pagendarm, 2013. "Kundenbindung im Electronic Commerce Eine empirische Analyse zur Wahrnehmung und Wirkung verschiedener Kundenbindungsinstrumente im Internet," Schmalenbach Journal of Business Research, Springer, vol. 65(1), pages 63-96, February.
- Soumya Ray & Sung S. Kim & James G. Morris, 2012. "Research Note ---Online Users' Switching Costs: Their Nature and Formation," Information Systems Research, INFORMS, vol. 23(1), pages 197-213, March.
- Johnson, Cathleen & Masclet, David & Montmarquette, Claude, 2010.
"The Effect of Perfect Monitoring of Matched Income on Sales Tax Compliance: An Experimental Investigation,"
National Tax Journal, National Tax Association;National Tax Journal, vol. 63(1), pages 121-148, March.
- Cathleen Johnson & David Masclet & Claude Montmarquette, 2008. "The Effect of Perfect Monitoring of Matched Income on Sales Tax Compliance: An Experimental Investigation," CIRANO Working Papers 2008s-17, CIRANO.
- Cathleen Johnson & David Masclet & Claude Montmarquette, 2010. "The effect of perfect monitoring of matched income on sales tax compliance: An experimental investigation," Post-Print halshs-00601691, HAL.
- Isabel Pizarro & Juan C.Real & M.Dolores de la Rosa, 2009. "The role of entrepreneurial culture and human capital in innovation," Working Papers 09.02, Universidad Pablo de Olavide, Department of Business Administration.
- Kawai, Norifumi & Chung, Chul, 2019. "Expatriate utilization, subsidiary knowledge creation and performance: The moderating role of subsidiary strategic context," Journal of World Business, Elsevier, vol. 54(1), pages 24-36.
- Jean, Ruey-Jer “Bryan” & Kim, Daekwan & Cavusgil, Erin, 2020. "Antecedents and outcomes of digital platform risk for international new ventures’ internationalization," Journal of World Business, Elsevier, vol. 55(1).
- Alm, James & Jackson, Betty R. & McKee, Michael, 2009. "Getting the word out: Enforcement information dissemination and compliance behavior," Journal of Public Economics, Elsevier, vol. 93(3-4), pages 392-402, April.
- Phong Nguyen, Nguyen & Adomako, Samuel & Ahsan, Mujtaba, 2023. "The base-of- the-pyramid orientation and export performance of Vietnamese small and medium enterprises," Journal of Business Research, Elsevier, vol. 154(C).
- Zhang, Man & Hartley, Janet L., 2018. "Guanxi, IT systems, and innovation capability: The moderating role of proactiveness," Journal of Business Research, Elsevier, vol. 90(C), pages 75-86.
More about this item
Keywords
IS misuse; IS security; security countermeasures; general deterrence theory; security management; end-user security;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orisre:v:20:y:2009:i:1:p:79-98. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.