Download The Misuse of Information Systems: The Impact of Security by John P. D'arcy PDF

By John P. D'arcy

D Arcy studies on an empirical research of the impression of 4 defense countermeasures (security guidelines, safeguard knowledge application, desktop tracking, preventive safety software program) on IS misuse. utilizing the framework of common deterrence idea, he develops and exams a conceptual version utilizing survey responses from 507 pros. He unearths help for the effectiveness of safeguard regulations, safety expertise courses, and laptop tracking in deterring IS misuse. Preventive protection software program seems to be in basic terms reasonably potent. the implications additionally recommend that the deterrent effectiveness of safety countermeasures differ in keeping with computing device self-efficacy and the quantity of time spent telecommuting. D Arcy s findings support clarify the relationships among defense countermeasures and IS misuse, whereas reaffirming the applicability of common deterrence thought to the IS defense area.

Show description

Read Online or Download The Misuse of Information Systems: The Impact of Security Countermeasures (Criminal Justice: Recent Scholarship) PDF

Similar history & culture books

Virtual Freedom: Net Neutrality and Free Speech in the Internet Age

Communications giants like Google, Comcast, and AT&T take pleasure in more and more unchecked regulate over speech. As companies of broadband entry and web se's, they could regulate on-line expression. Their on-line content material restrictions—from obstructing electronic mail to censoring cablecasts—are thought of criminal as a result of contemporary adjustments in loose speech legislations.

Dualism in Qumran

This can be an evaluation of dualistic pondering within the Qumran fabric written via major individuals within the gentle of 2 many years of Qumran learn. the significance of dualistic pondering in the ''Dead Sea Scrolls'' has constantly been emphasized in ''Qumran Studies''. however, within the final twenty years the examine on Qumran dualism turns out to were at the margins of scholarly curiosity.

Beyond Deep Blue: Chess in the Stratosphere

Greater than a decade has handed in view that IBM’s Deep Blue desktop shocked the area by means of defeating Garry Kasparov, the area chess champion at the moment. Following Deep Blue’s retirement, there was a succession of higher and higher chess taking part in desktops, or chess engines, and this present day there's little doubt that the world’s most sensible engines are improved on the video game than the world’s most sensible human gamers.

Access Controlled. The Shaping of Power, Rights, and Rule in Cyberspace

Experiences on a brand new iteration of web controls that determine a brand new normative terrain during which surveillance and censorship are regimen.

Additional resources for The Misuse of Information Systems: The Impact of Security Countermeasures (Criminal Justice: Recent Scholarship)

Sample text

In addition, moral judgment, ego strength, locus of control, and organizational ethical climate were included as variables that affect ethical behavioral intention. Only personal normative beliefs, organizational ethical climate, and organization-scenario (an indicator variable controlling for scenario and company) were found to be significant. These results do not support the attitude-intention relationship predicted by the TRA and suggest that the organizational environment may be a more powerful predictor of ethical behavior intention.

In other words, are security countermeasures more/less effective in deterring IS misuse for certain people depending on these individual differences? Two overall research questions are addressed: • • Do security countermeasures increase the perceived threat of punishment associated with IS misuse and therefore decrease IS misuse intentions? Do individual differences moderate the impact of security countermeasures on punishment perceptions and therefore impact IS misuse intentions? To answer these questions, a theoretical model is developed and tested.

Existing research from the fields of social psychology and criminology supports the differential deterrence hypothesis as variables such as age, gender, risk propensity, expertise, socioeconomic status, race, geographic mobility, and labor force status have all been shown to influence perceptions of sanctions and/or projected deviant and criminal behavior (Grasmick, Jacobs, and McCollom 1983; Hollinger and Clark 1983; Richards and Tittle 1981; Tittle 1980; Weaver and Carroll 1985). There is also support for the differential deterrence hypothesis within the IS literature.

Download PDF sample

Rated 4.32 of 5 – based on 15 votes