The effects of ICT use and ICT Laws on corruption: A general deterrence theory perspective

2018 ◽  
Vol 35 (4) ◽  
pp. 703-712 ◽  
Author(s):  
Anol Bhattacherjee ◽  
Utkarsh Shrivastava
PLoS ONE ◽  
2021 ◽  
Vol 16 (11) ◽  
pp. e0259675
Author(s):  
Anže Mihelič ◽  
Luka Jelovčan ◽  
Kaja Prislan

The emergence of a pandemic is usually accompanied by different measures–economic, social, preventive, and (self)protective. In the case of the COVID-19, several preventive measures were formally enforced by state authorities in the majority of countries worldwide. Thus, during the COVID-19 pandemic, the intertwining of formal and informal social control could be observed. Hence, in this study a cross-sectional design was chosen to explore the issue in Slovenia. To the best of our knowledge, this research is the first in the current literature to empirically test the general deterrence theory in pandemic circumstances (as external factors predicting individuals’ compliance with the COVID-19 preventive measures). The results suggest an important role of informal punishment, with perceived informal severity being the only statistically significant factor from the general deterrence theory. In contrast to external factors, internal factors play a significantly greater role in promoting people’s self-protective behavior in pandemic circumstances. During the unknown, the uncertain and delicate situations with which people have no previous experience, both personal beliefs about the effectiveness of measures and perceived self-efficacy are more important than fear of formal sanctions.


2017 ◽  
Vol 25 (2) ◽  
pp. 118-136 ◽  
Author(s):  
Lena Yuryna Connolly ◽  
Michael Lang ◽  
John Gathegi ◽  
Doug J. Tygar

Purpose This paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security countermeasures tend to influence employee security actions. An increasing number of information security breaches in organisations presents a serious threat to the confidentiality of personal and commercially sensitive data. While recent research shows that humans are the weakest link in the security chain and the root cause of a great portion of security breaches, the extant security literature tends to focus on technical issues. Design/methodology/approach This paper builds on general deterrence theory and prior organisational culture literature. The methodology adapted for this study draws on the analytical grounded theory approach employing a constant comparative method. Findings This paper demonstrates that procedural security countermeasures and organisational culture tend to affect security behaviour in organisational settings. Research limitations/implications This paper fills the void in information security research and takes its place among the very few studies that focus on behavioural as opposed to technical issues. Practical implications This paper highlights the important role of procedural security countermeasures, information security awareness and organisational culture in managing illicit behaviour of employees. Originality/value This study extends general deterrence theory in a novel way by including information security awareness in the research model and by investigating both negative and positive behaviours.


Author(s):  
Dinesh A. Mirchandani

Personal Web usage (PWU) in the workplace is a matter of considerable concern to organizations today. However, human resources managers are not fully aware of the range of actions they can take to reduce PWU. This chapter examines general deterrence theory in the context of PWU and identifies actions that managers can take to reduce PWU. It uses a two-stage research methodology consisting of: (1) interviews with managers to gather qualitative data, and (2) a field survey of end users to gather quantitative data on PWU. It finds support for the deterrence theory and recommends that managers use a sequential implementation of four deterrence stages to contain PWU. These are: (1) framing an ‘Internet use policy,’ (2) implementing measures to prevent PWU such as restricting Internet access only to certain employees, (3) implementing appropriate content management software to detect PWU, and (4) standardizing policies to remedy non-acceptable Web usage. These four deterrence stages can protect an organization from the harmful effects of PWU of its employees.


Author(s):  
Serkan Ada

This chapter discusses the recent theories used in information security research studies. The chapter initially introduces the importance of the information security research and why it became so important recently. Following this introduction, “theory” is defined and the importance of the theories in information security research is mentioned. After this discussion, recently used theories (socio-technical systems theory, activity theory, distributed cognition theory, general deterrence theory, grounded theory, social cognitive theory) are listed and basic information about these theories as well as applications from the literature are given. Other recently used theories are also summarized in a table in the next section. The chapter finally ends with concluding remarks on the theories and recommendations to the researchers in the information security area.


Sign in / Sign up

Export Citation Format

Share Document