Lee et al., 2004: An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories

Topic:

Deterrence factors influence Self Defense Intention (SDI) and organizational factors significantly affect Induction Control Intention (ICI) and ICI decreases insiders’ abuse. Interestingly, SDI negatively affects both insiders’ and invaders’ abuses.

Survey, 182 respondents

Constructs in this publication:

Construct Cites Category Questions given? Content validity Pretests Response type Notes
Security policy Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 General deterrence theory No no pilot 7-point likert-type scale description given
Security awareness Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 General deterrence theory No no pilot 7-point likert-type scale description given
Physical security system Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 General deterrence theory No no pilot 7-point likert-type scale description given
Attachment Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 Social control theory No no pilot 7-point likert-type scale description given
Commitment Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 Social control theory No no pilot 7-point likert-type scale description given
Involvement Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 Social control theory No no pilot 7-point likert-type scale description given
Norms Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 Social control theory No no pilot 7-point likert-type scale description given
Self defense Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 Intention to abuse No no pilot 7-point likert-type scale description given
Induction control Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 Intention to abuse No no pilot 7-point likert-type scale description given
Invaders’ abuse Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 Computer abuse No no pilot 7-point likert-type scale description given
Insiders’ abuse Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 Computer abuse No no pilot 7-point likert-type scale description given

This publication is cited by the following publications:

Citation:

Sang M. Lee, Sang-Gun Lee, and Sangjin Yoo. An integrative model of computer abuse based on social control and general deterrence theories. Information & Management, 41(6):707–718, July 2004. doi:10.1016/j.im.2003.08.008.

Bibtex


@article{lee_integrative_2004,
 abstract = {In spite of continuous organizational efforts and investments, computer abuse shows no sign of decline. According to social control theory (SCT), ``organizational trust'' can help prevent it by enhancing insiders' involvement in computer abuse. The aim of our study was to develop a new integrative model for analyzing computer abuse through assessing the role of Self Defense Intention (SDI) and Induction Control Intention (ICI). The results show that deterrence factors influence SDI and organizational factors significantly affect ICI and ICI decreases insiders' abuse. Interestingly, SDI negatively affects both insiders' and invaders' abuses.},
 author = {Lee, Sang M. and Lee, Sang-Gun and Yoo, Sangjin},
 doi = {10.1016/j.im.2003.08.008},
 issn = {0378-7206},
 journal = {Information \& Management},
 keywords = {Social Issues,Computer abuse,Organizational trust,End user computing,Telecommunications},
 month = {July},
 number = {6},
 pages = {707-718},
 title = {An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories},
 volume = {41},
 year = {2004}
}