Deterring employee intentions to misuse computer systems requires complementary technical and procedural controls.
Construct | Cites | Category | Questions given? | Content validity | Pretests | Response type | Notes |
---|---|---|---|---|---|---|---|
Security policies | NEW? | example | expert panel review | 2 pilots | 7-point Likert scale ranging from "strongly disagree" to "strongly agree" | ||
Security awareness program | NEW? | example | expert panel review | 2 pilots | 7-point Likert scale ranging from "strongly disagree" to "strongly agree" | ||
Computer monitoring | NEW? | example | expert panel review | 2 pilots | 7-point Likert scale ranging from "strongly disagree" to "strongly agree" | ||
Preventive security software | NEW? | example | expert panel review | 2 pilots | 7-point Likert scale ranging from "strongly disagree" to "strongly agree" |
John D'Arcy and Anat Hovav. Deterring Internal Information Systems Misuse. Commun. ACM, 50(10):113–117, October 2007. doi:10.1145/1290958.1290971.
@article{darcy_deterring_2007,
abstract = {Deterring employee intentions to misuse computer systems requires complementary technical and procedural controls.},
author = {D'Arcy, John and Hovav, Anat},
doi = {10.1145/1290958.1290971},
issn = {0001-0782},
journal = {Commun. ACM},
month = {October},
number = {10},
pages = {113--117},
title = {Deterring {{Internal Information Systems Misuse}}},
volume = {50},
year = {2007}
}