Lee et al., 2004: An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories
Topic:
Deterrence factors influence Self Defense Intention (SDI) and organizational factors significantly affect Induction Control Intention (ICI) and ICI decreases insiders’ abuse. Interestingly, SDI negatively affects both insiders’ and invaders’ abuses.
Survey, 182 respondents
Constructs in this publication:
Construct |
Cites |
Category |
Questions given? |
Content validity |
Pretests |
Response type |
Notes |
Security policy |
Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 |
General deterrence theory |
No |
no |
pilot |
7-point likert-type scale |
description given |
Security awareness |
Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 |
General deterrence theory |
No |
no |
pilot |
7-point likert-type scale |
description given |
Physical security system |
Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 |
General deterrence theory |
No |
no |
pilot |
7-point likert-type scale |
description given |
Attachment |
Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 |
Social control theory |
No |
no |
pilot |
7-point likert-type scale |
description given |
Commitment |
Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 |
Social control theory |
No |
no |
pilot |
7-point likert-type scale |
description given |
Involvement |
Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 |
Social control theory |
No |
no |
pilot |
7-point likert-type scale |
description given |
Norms |
Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 |
Social control theory |
No |
no |
pilot |
7-point likert-type scale |
description given |
Self defense |
Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 |
Intention to abuse |
No |
no |
pilot |
7-point likert-type scale |
description given |
Induction control |
Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 |
Intention to abuse |
No |
no |
pilot |
7-point likert-type scale |
description given |
Invaders’ abuse |
Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 |
Computer abuse |
No |
no |
pilot |
7-point likert-type scale |
description given |
Insiders’ abuse |
Joseph, 1992, Schaub, 1995, Dinnie, 1999, Thompson, 1998, Nance, 1988 |
Computer abuse |
No |
no |
pilot |
7-point likert-type scale |
description given |
This publication is cited by the following publications:
- Cheng et al., 2013: Attachment to immediate supervisor
- Cheng et al., 2013: Attachment to co-workers
- Cheng et al., 2013: Attachment to job
- Cheng et al., 2013: Attachment to organization
- Cheng et al., 2013: Commitment
- Cheng et al., 2013: Involvement
- Cheng et al., 2013: Belief
- Ifinedo, 2014: Attachment
- Ifinedo, 2014: Commitment
- Ifinedo, 2014: Involvement
- Sommestad et al., 2014: Actual misuse
- Sommestad et al., 2014: Attachment
- Sommestad et al., 2014: Intention to misuse
- Sommestad et al., 2014: Involvement
- Sommestad et al., 2014: Moral beliefs
- Sommestad et al., 2014: Organizational commitment
- Sommestad et al., 2014: Self defense
Citation:
Sang M. Lee, Sang-Gun Lee, and Sangjin Yoo.
An integrative model of computer abuse based on social control and general deterrence theories.
Information & Management, 41(6):707–718, July 2004.
doi:10.1016/j.im.2003.08.008.
Bibtex
@article{lee_integrative_2004,
abstract = {In spite of continuous organizational efforts and investments, computer abuse shows no sign of decline. According to social control theory (SCT), ``organizational trust'' can help prevent it by enhancing insiders' involvement in computer abuse. The aim of our study was to develop a new integrative model for analyzing computer abuse through assessing the role of Self Defense Intention (SDI) and Induction Control Intention (ICI). The results show that deterrence factors influence SDI and organizational factors significantly affect ICI and ICI decreases insiders' abuse. Interestingly, SDI negatively affects both insiders' and invaders' abuses.},
author = {Lee, Sang M. and Lee, Sang-Gun and Yoo, Sangjin},
doi = {10.1016/j.im.2003.08.008},
issn = {0378-7206},
journal = {Information \& Management},
keywords = {Social Issues,Computer abuse,Organizational trust,End user computing,Telecommunications},
month = {July},
number = {6},
pages = {707-718},
title = {An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories},
volume = {41},
year = {2004}
}