We found that while the rational choice framework of deviant behavior is largely supported, the perceived benefits of violations often dominate the perceived risks in individual decision calculus. As a result, the deterrence antecedents are less effective than the self-control and moral belief antecedents in shaping individual behavior.
Construct | Cites | Category | Questions given? | Content validity | Pretests | Response type | Notes |
---|---|---|---|---|---|---|---|
Low Self-Control | NOT NEW | Individual Propensity | no | None | pilot with students | 7-point Likert scale | |
Moral Beliefs | NOT NEW | Individual Moral Beliefs | no | None | pilot with students | 7-point Likert scale | |
Perceived Certainty of Sanctions | NOT NEW | Perceived Deterrence | no | None | pilot with students | 7-point Likert scale | |
Perceived Severity of Sanctions | NOT NEW | Perceived Deterrence | no | None | pilot with students | 7-point Likert scale | |
Perceived Celerity of Sanctions | NOT NEW | Perceived Deterrence | no | None | pilot with students | 7-point Likert scale | |
Perceived Extrinsic Benefits | NOT NEW | Rational Choice Calculus | no | None | pilot with students | 7-point Likert scale | |
Perceived Intrinsic Benefits | NOT NEW | Rational Choice Calculus | no | None | pilot with students | 7-point Likert scale | |
Perceived Formal Risk | NOT NEW | Rational Choice Calculus | no | None | pilot with students | 7-point Likert scale | |
Perceived Informal Risk | NOT NEW | Rational Choice Calculus | no | None | pilot with students | 7-point Likert scale | |
Perceived Risk of Shame | NOT NEW | Rational Choice Calculus | no | None | pilot with students | 7-point Likert scale | |
Intention to Commit Violation | NOT NEW | Behavioral Intention | no | None | pilot with students | 7-point Likert scale |
Qing Hu, Zhengchuan Xu, Tamara Dinev, and Hong Ling. Does Deterrence Work in Reducing Information Security Policy Abuse by Employees? Commun. ACM, 54(6):54–60, June 2011. doi:10.1145/1953122.1953142.
@article{hu_does_2011,
abstract = {Methods for evaluating and effectively managing the security behavior of employees.},
author = {Hu, Qing and Xu, Zhengchuan and Dinev, Tamara and Ling, Hong},
doi = {10.1145/1953122.1953142},
issn = {0001-0782},
journal = {Commun. ACM},
month = {June},
number = {6},
pages = {54--60},
title = {Does {{Deterrence Work}} in {{Reducing Information Security Policy Abuse}} by {{Employees}}?},
volume = {54},
year = {2011}
}