2008
DOI: 10.1007/s10551-008-9909-7
|View full text |Cite
|
Sign up to set email alerts
|

Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures

Abstract: information systems security, deterrence theory, computer ethics, information security management, computer self-efficacy, differential deterrence hypothesis, virtual work,

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
60
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 116 publications
(62 citation statements)
references
References 37 publications
2
60
0
Order By: Relevance
“…The organization needs to assure that their computer systems and its peripherals are compromised free [43]. Studies show that the internal threats are real and have potential negative influence [30]. Insiders' behavior accounted for almost half of the breaches [61].…”
Section: Protection Motivation Theory (Pmt)mentioning
confidence: 99%
“…The organization needs to assure that their computer systems and its peripherals are compromised free [43]. Studies show that the internal threats are real and have potential negative influence [30]. Insiders' behavior accounted for almost half of the breaches [61].…”
Section: Protection Motivation Theory (Pmt)mentioning
confidence: 99%
“…The existing studies in the IS security area that look into the behavioral aspects of the insiders have provided insights into the effects of insiders" dysfunctional behaviors on organizational IS assets. These can be seen in valuable work on IS security compliance/non-compliance behaviors [10][11][12][13][14][15][16][17][18][19][20] including motivations to comply with IS security policies [21][22][23][24], IS misuse [2,[25][26][27][28][29][30][31], and studies on computer abuse [32][33][34]. These IS security studies, however, have largely focused on nonmalicious and policy non-compliance behaviors [4,7].…”
Section: Introductionmentioning
confidence: 99%
“…All constructs of our research model were adopted from supporting empirical research in the context of behavioral information security [7,16,17,31]. The questionnaire was pre-tested and afterwards improved according to pre-testers' comments.…”
Section: Methodsmentioning
confidence: 99%