Employees’ social bonding is found to have mixed impacts on the employee’s intention to violate ISSP. Social pressures exerted by subjective norms and co-worker behaviours also significantly influence employees’ ISSP violation intentions. In analyzing the formal sanctions, the perceived severity of sanctions was found to be significant while, perceived certainty of those sanctions was not.
Construct | Cites | Category | Questions given? | Content validity | Pretests | Response type | Notes |
---|---|---|---|---|---|---|---|
ISSP Violation intention | NEW | yes | no | pilot | The response scale ranged from 1 (“no chance at all”) to 7 (“100 per cent chance”). | ||
Perceived certainty | D'Arcy et al., 2009, Li et al., 2010, Siponen, 2010 | Formal control | yes | no | pilot | ||
Perceived severity | D'Arcy et al., 2009, Li et al., 2010, Siponen, 2010 | Formal control | yes | no | pilot | ||
Attachment to immediate supervisor | Lee et al., 2004, Chapple et al., 2005 | Social bond | yes | no | pilot | 7-point Likert scale ranging from Strongly Disagree to Strongly Agree. | |
Attachment to co-workers | Lee et al., 2004, Chapple et al., 2005 | Social bond | yes | no | pilot | 7-point Likert scale ranging from Strongly Disagree to Strongly Agree. | |
Attachment to job | Lee et al., 2004, Chapple et al., 2005 | Social bond | yes | no | pilot | 7-point Likert scale ranging from Strongly Disagree to Strongly Agree. | |
Attachment to organization | Lee et al., 2004, Chapple et al., 2005 | Social bond | yes | no | pilot | 7-point Likert scale ranging from Strongly Disagree to Strongly Agree. | |
Commitment | Lee et al., 2004, Chapple et al., 2005 | Social bond | yes | no | pilot | 7-point Likert scale ranging from Strongly Disagree to Strongly Agree. | |
Involvement | Lee et al., 2004, Chapple et al., 2005 | Social bond | yes | no | pilot | 7-point Likert scale ranging from Strongly Disagree to Strongly Agree. | |
Belief | Lee et al., 2004, Chapple et al., 2005 | Social bond | yes | no | pilot | 7-point Likert scale ranging from Strongly Disagree to Strongly Agree. | |
Subjective norm | Herath, 2009 | Informal control | yes | no | pilot | ||
Co-worker behaviour | Herath, 2009 | Informal control | yes | no | pilot |
Lijiao Cheng, Ying Li, Wenli Li, Eric Holm, and Qingguo Zhai. Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39:447–459, November 2013. doi:10.1016/j.cose.2013.09.009.
@article{cheng_understanding_2013,
abstract = {It is widely agreed that a large amount of information systems (IS) security incidents occur in the workplace because employees subvert existing IS Security Policy (ISSP). In order to understand the factors that constrain employees from deviance and violation of the organizational ISSP, past work has traditionally viewed this issue through the lens of formal deterrence mechanisms; we postulated that we could better explain employees' ISSP violation behaviours through considering both formal and informal control factors as well as through considering existing deterrence theory. We therefore developed a theoretical model based on both deterrence and social bond theories rooted in a social control perspective to better understand employee behaviour in this context. The model is validated using survey data of 185 employees. Our empirical results highlight that both formal and informal controls have a significant effect on employees' ISSP violation intentions. To be specific, employees' social bonding is found to have mixed impacts on the employee's intention to violate ISSP. Social pressures exerted by subjective norms and co-worker behaviours also significantly influence employees' ISSP violation intentions. In analyzing the formal sanctions, the perceived severity of sanctions was found to be significant while, perceived certainty of those sanctions was not. We discuss the key implications of our findings for managers and researchers and the implications for professional practice.},
author = {Cheng, Lijiao and Li, Ying and Li, Wenli and Holm, Eric and Zhai, Qingguo},
doi = {10.1016/j.cose.2013.09.009},
issn = {0167-4048},
journal = {Computers \& Security},
keywords = {IS security policy,Violation intention,General deterrence theory,Social bond theory,Social control mechanisms},
month = {November},
pages = {447-459},
shorttitle = {Understanding the Violation of {{IS}} Security Policy in Organizations},
title = {Understanding the Violation of {{IS}} Security Policy in Organizations: {{An}} Integrated Model Based on Social Control and Deterrence Theory},
volume = {39},
year = {2013}
}