Security concerns of system users: a study of perceptions of the adequacy of security
Information and Management
Security-related behavior of PC users in organizations
Information and Management
Computer infectors: prevention, detection, and recovery
Information and Management
Fighting computer crime: a new framework for protecting information
Fighting computer crime: a new framework for protecting information
Technical opinion: Information system security management in the new millennium
Communications of the ACM
Communications of the ACM
The Ultimate Computer Security Survey
The Ultimate Computer Security Survey
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace
Deterring internal information systems misuse
Communications of the ACM
Explaining non-work-related computing in the workplace: A comparison of alternative models
Information and Management
Structural equation model for EDI controls: Controls design perspective
Expert Systems with Applications: An International Journal
Using case-based reasoning for the design of controls for internet-based information systems
Expert Systems with Applications: An International Journal
Information Systems Research
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
Information and Management
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
Information and Management
Information and Management
IS Security Policy Violations: A Rational Choice Perspective
Journal of Organizational and End User Computing
Information and Management
Modifying smartphone user locking behavior
Proceedings of the Ninth Symposium on Usable Privacy and Security
Determining the antecedents of digital security practices in the general public dimension
Information Technology and Management
Hi-index | 0.02 |
In spite of continuous organizational efforts and investments, computer abuse shows no sign of decline. According to social control theory (SCT), "organizational trust" can help prevent it by enhancing insiders' involvement in computer abuse. The aim of our study was to develop a new integrative model for analyzing computer abuse through assessing the role of Self Defense Intention (SDI) and Induction Control Intention (ICI). The results show that deterrence factors influence SDI and organizational factors significantly affect ICI and ICI decreases insiders' abuse. Interestingly, SDI negatively affects both insiders' and invaders' abuses.