IS Security Policy Violations

2012 ◽  
Vol 24 (1) ◽  
pp. 21-41 ◽  
Author(s):  
Anthony Vance ◽  
Mikko T. Siponen

Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory (RCT)—a prominent criminological theory not yet applied in IS—which explains, in terms of a utilitarian calculation, an individual’s decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insignificant. Based on these findings, the authors discuss several implications for research and practice.

2007 ◽  
Vol 9 (3) ◽  
pp. 226-243 ◽  
Author(s):  
Sung-Eun Byun ◽  
James M. Ruiz

The purpose of this study is (1) to examine cause and effect relationships between bureaucratic corruption and personal, political, legal, and cultural factors in South Korea; (2) to employ criminological theory in an attempt to explain each relationship; and (3) to suggest policies for corruption prevention. Through analysing the official crime report, Analytical Report on Crimes from 1999 to 2004 issued annually by the Prosecution Office of South Korea, this study finds the following six relationships between corruption and factors. First, public officials with low socio-economic status (SES) might be more likely to commit crimes than those with high SES. Second, married officials might be more likely to commit crimes than those of any other marital status. Third, public officials in law enforcement departments are more likely to commit job-related crimes than in any other departments. Fourth, higher-ranked public officials are more likely to commit job-related crimes than are lower-ranking public officials. Fifth, arrested public officials are less likely to be convicted than are regular citizens. And, sixth, most crimes of public officials might be influenced by organisational custom. This study endeavours to apply three criminological theories: rational choice theory; control theory; and conflict theory to the above findings and to develop insight toward a corruption-free society.


Author(s):  
Erasmus Etim ◽  
Kevin Streff ◽  
Insu Park ◽  
Pam Rowland

Information security is a concern of every business, therefore the need for employees to comply with a policy that would protect the organization's assets.  The model developed for this research was based on Protection Motivation Theory, Theory of Planned Behavior, and Rational Choice Theory.  There were 129 responses from Nigeria used to validate the model.  The data analysis using PLS-SEM resulted in these findings: self-efficacy, normative beliefs, and power distance were significant, therefore impacting.  Therefore, not significant descriptive norms did not positively impact intention to comply with information security policy.  Power distance was impactful on employees' intention to comply with information system policy and contributed to theory and practice; respondents chose to do right by their intention to comply with information security policy.  Training and managerial oversight in policy compliance are significant since those actions would help protect the organization's information.  The analysis showed the adverse effect of a high correlation between indicators of different constructs.


2014 ◽  
Vol 10 (2) ◽  
pp. 62-78 ◽  
Author(s):  
Tonia San Nicolas-Rocca ◽  
Benjamin Schooley ◽  
Janine L. Spears

Institutions of higher education capture, store and disseminate information that is protected by state and federal regulations. As a result, IS security policies are developed and implemented to ensure end user compliance. This case study investigates end user knowledge of their university's IS security policy and proposes a new approach to improve end user compliance. The results of this study suggest that users may be contributors to the transfer of IS security policies when provided with an opportunity to participate in the development of an IS security awareness and training program.


Author(s):  
Jihong Zhao ◽  
Xinting Wang ◽  
Hongwei Zhang ◽  
Ruohui Zhao

Rational choice theory (RCT) is a classical theory in criminology, with deep roots in the Enlightenment. It has secured a privileged place as a mainstream criminological theory in the United States. Ironically, RCT has not been applied to research on juvenile delinquency and related decision making in China. This study attempts to test the relative utility of RCT among adjudicated juvenile offenders incarcerated in an institution located in a southwestern province of China based on their responses to two hypothetical scenarios of offending. The results of the Tobit model analyses emerged from the two-wave longitudinal data lent strong support to the view that RCT can indeed serve as an important theory for explaining delinquent behaviors in China. More specifically, juvenile offenders used cost-benefit analysis to decide if they want to be involved either in the stealing scenario or in the fighting scenario. A discussion of findings and public policy implications are highlighted at the end of the paper


2021 ◽  
Vol 7 (Extra-E) ◽  
pp. 607-613
Author(s):  
Aleksandr V. Dyatlov ◽  
Vitaly V. Kovalev ◽  
Svetlana A. Tikhonovskova ◽  
Elena L. Kharitonova

To establish the potential opportunities to achieve more efficiency of municipal management in the theory and practice of using the tools of state managerialism. This article uses rational choice theory, which is based on the idea of three forms of capital: physical, human and social. These forms are transformed into a set of resources used by the actor to achieve the goal in the process of choosing the most rational alternative. There was the research and presentation of its results on the third empirical indicator. The empirical research was carried out for the practical use of the developed theoretical model. Substantively this research will focus on such aspects of the activities of self-governments as work for indicators, management in the form of service delivery, restructuring of government bodies, effectiveness of interaction with civic activists and business communities.


2008 ◽  
Vol 30 (2) ◽  
Author(s):  
Werner Raub ◽  
Vincent Buskens

AbstractThe integration of theory and empirical research in analytical social science has always been a core topic of Analyse &amp Kritik. This paper focuses on how analytical theory and empirical research have moved closer to each other in sociology, using rational choice theory and game-theoretic models as well as empirical research on problematic social situations (social dilemmas, collective action problems, etc.) as an example. We try to highlight the use of complementary research designs (surveys, vignette studies, lab experiments) for testing the same hypotheses. We also try to show that empirical research indicates the need for the development of more complex theoretical models.


OUGHTOPIA ◽  
2020 ◽  
Vol 35 (2) ◽  
pp. 247-282
Author(s):  
In-Kyun Kim ◽  
Myeong-Geon Koh

Author(s):  
Kealeboga J Maphunye

This article examines South Africa's 20-year democracy by contextualising the roles of the 'small' political parties that contested South Africa's 2014 elections. Through the  prism  of South  Africa's  Constitution,  electoral legislation  and the African Charter on Democracy, Elections and Governance, it examines these parties' roles in South Africa's democratisation; their influence,  if any, in parliament, and whether they play any role in South Africa's continental or international engagements. Based on a review of the extant literature, official documents,  legislation, media, secondary research, reports and the results of South Africa's elections, the article relies on game theory, rational choice theory and theories of democracy and democratic consolidation to examine 'small' political parties' roles in the country's political and legal systems. It concludes that the roles of 'small' parties in governance and democracy deserve greater recognition than is currently the case, but acknowledges the extreme difficulty experienced by the 'small'  parties in playing a significant role in democratic consolidation, given their formidable opponent in a one-party dominant system.


Sign in / Sign up

Export Citation Format

Share Document