Leveraging Fairness and Reactance Theories to Deter Reactive Computer Abuse Following Enhanced Organisational Information Security Policies : An Empirical Study of the Influence of Counterfactual Reasoning and Organisational Trust
Research shows that organisational efforts to protect their information assets from employee security threats do not always reach their full potential and may actually encourage the behaviours they attempt to thwart, such as reactive computer abuse (CA). To better understand this dilemma, we use fairness theory (FT) and reactance theory (RT) to explain why employees may blame organisations for and retaliate against enhanced information security policies (ISPs). We tested our model with 553 working professionals and found support for most of it. Our results show that organisational trust can decrease reactive CA. FT suggests that explanation adequacy (EA) is an important factor that builds trust after an event. Our results also suggest that trust both fully mediates the relationship between EA and CA and partially mediates the relationship between perceived freedom restrictions related to enhanced ISPs and reactive CA. EA also had a strong negative relationship with freedom restrictions. Moreover, organisational security education, training, and awareness (SETA) initiatives decreased the perceptions of external control and freedom restrictions and increased EA, and advance notification of changes increased EA. We also included 14 control variables and rival explanations to determine with more confidence what drove reactive CA in our context. Notably, the deterrence theory (DT)-based constructs of sanction severity, certainty, and celerity had no significant influence on reactive CA. We provide support for the importance of respectful communication efforts and SETA programmes, coupled with maximising employee rights and promoting trust and fairness to decrease reactive CA. These efforts can protect organisations from falling victim to their own organisational security efforts
Year of publication: |
2015
|
---|---|
Authors: | Lowry, Paul Benjamin ; Posey, Clay ; Bennett, Becky ; Roberts, Tom |
Publisher: |
[S.l.] : SSRN |
Saved in:
freely available
Extent: | 1 Online-Ressource (60 p) |
---|---|
Type of publication: | Book / Working Paper |
Language: | English |
Notes: | In: Information Systems Journal, vol. 25(3), pp. 193–230 ( Nach Informationen von SSRN wurde die ursprüngliche Fassung des Dokuments December 31, 2014 erstellt |
Source: | ECONIS - Online Catalogue of the ZBW |
Persistent link: https://www.econbiz.de/10014139311
Saved in favorites
Similar items by person
-
Posey, Clay, (2013)
-
Posey, Clay, (2014)
-
Posey, Clay, (2015)
- More ...