The Role of Individual Characteristics on the Effectiveness of IS Security Countermeasures

نویسندگان

  • John D'Arcy
  • Anat Hovav
چکیده

General deterrence theory suggests that deterrent security countermeasures (e.g., security policies, security awareness programs, security software) can be used to control IS misuse in organizations. However, empirical studies that have examined the effectiveness of such techniques have produced inconclusive results. A limitation of these studies is that they ignore the impacts of sanction perceptions and individual characteristics on IS misuse behavior. The purpose of this paper is to reconcile the discrepant findings of prior research by introducing a conceptual model that proposes a relationship between deterrent security countermeasures, sanction perceptions, individual characteristics, and IS misuse. The model includes the following propositions: (i) deterrent security countermeasures increase perceived certainty and severity of sanctions, which leads to lower IS misuse intention; (ii) the relationship between deterrent countermeasures and perceived certainty and severity of sanctions is moderated by an individual’s computer self-efficacy, computer experience, gender, age, risk propensity, and employment context.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification

Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...

متن کامل

Women’s Feeling of Social Security and Social Happiness

Social Happiness is one of the humanity’s most necessary innate needs and which plays a crucial role in the sublimity of individuals and society. Reaching this would occur once individual has either physical or mental health. One of the effective factors in increasing the amount of individuals’ social Happiness especially in women is providing them with mental dimension of security e.g. felling...

متن کامل

Experimental comparison of sacrificial piles and submerged vanes as scour countermeasures around bridge pier

An experimental study has been conducted on the effectiveness of two types of flow-altering countermeasures placed around a cylindrical pier under clear water condition, which include sacrificial piles and submerged vanes. Their arrangements follow the optimal configurations recommended in the published articles with some modification. The temporal evolution of maximum scour depth and its equil...

متن کامل

The examination of relationship between individual characteristics and Workforce productivity in Guilan Gas Corporation Abstract

The aim of this study is to examine the relationship between individual factors and workforce productivity in Guilan Gas Company. In order to examine the relationship between individual factors and productivity, the Pearson correlation test was used. Moreover, regression analysis used to examine the effects of individual factors on labor productivity. The results showed that among the individua...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004