Punishment and ethics deterrents: A study of insider security contravention

نویسندگان

  • Michael Workman
  • John Ng'ang'a Gathegi
چکیده

by the U.S. Department of Justice (2004) that one in three people will become victims of identity theft at some point in their lifetime. The bulk of the research into information security has gone into the investigation of technological aspects of security, and there are gaps in the literature relative to contravention of security measures. Drawing from deterrence theory and using the theory of planned behavior as a general framework, this empirical field study investigated the effects of punishment and ethics training on behaviors related to contravention of information security measures among information professionals to fill an important gap in the literature. We found that both punishment and ethics training can be effective in mitigating the threat of software and information security , but that these depend on certain underlying moti-vational factors of individuals. The results of this study suggest a need to develop and refine the theoretical models, and we offer suggestions for getting at the root of behavioral issues surrounding information security. Information security has become an increasingly important research topic because there is little in the literature to explain why people contravene information security defense procedures that lead to billions of dollars annually in corporate and Contravention is associated with the behaviors of illegal copying of software (software piracy or softlifting), breaking software license keys, removing software and/or proprietary information from the office for personal use, cracking passwords, and committing fraudulent acts such as stealing information The problem has been studied primarily from the point of view of a technological problem, and the extant research has suggested techniques and technologies to use for creating better defenses, for example, through criteria used in performing risk analyses and the appropriate application of countermeasures (cf. Duh, Jamal, & Sunder, 2002). However, the problem has a behavioral root, and the ability to breach security defenses continues to outrun the ability to defend against them (Bresz, 2004; Sasse et al., 2004). Some of the counterproductive behaviors research (e.g., Harrington, 1996) has suggested treatments such as using ethics training as a means to address contravention propensities ; however, this approach appears, on the whole, to be somewhat ineffective in stemming the contravention prob-have used deter-rence theory to explain behaviors associated with various insider security breaches and have suggested punitive forms of treatment after the fact. While these studies have helped to advance the understanding of techniques to preclude or at least diminish some …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Jurisprudential Legal Explanation of Confiscation of Property in Drug Crimes

Drug crimes, regardless of the economic consequences, have threatened public and individual health and determined the international community to combat them effectively. Therefore, in the laws in question, confiscation of property is considered as a punishment for criminals of drug crimes; while from a jurisprudential point of view, this punishment has faced challenges. The findings of the pres...

متن کامل

An Authorization Framework for Database Systems

Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...

متن کامل

MVAL: Addressing the Insider Threat by Valuation-based Query Processing

The research presented in this paper is inspired by problems of conventional database security mechanisms to address the insider threat, i.e. authorized users abusing granted privileges for illegal or disadvantageous accesses. The basic idea is to restrict the data one user can access by a valuation of data, e.g. a monetary value of data items, and, based on that, introducing limits for accesse...

متن کامل

The insider threat to information systems and the effectiveness of ISO17799

Insider threat is widely recognised as an issue of utmost importance for IS security management. In this paper, we investigate the approach followed by ISO17799, the dominant standard in IS security management, in addressing this type of threat. We unfold the criminology theory that has designated the measures against insider misuse suggested by the standard, i.e. the General Deterrence Theory,...

متن کامل

Towards an insider threat prediction specification language

Purpose This concept paper presents the process of constructing a language tailored to describing insider threat incidents, for the purposes of mitigating threats originating from legitimate users in an IT infrastructure. Various information security surveys indicate that misuse by legitimate (insider) users has serious implications for the health of IT environments. A brief discussion of surve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JASIST

دوره 58  شماره 

صفحات  -

تاریخ انتشار 2007