Using Accountability to Reduce Access Policy Violations in Information Systems

被引:153
作者
Vance, Anthony [1 ]
Lowry, Paul Benjamin [2 ]
Eggett, Denis [3 ,4 ]
机构
[1] Brigham Young Univ, Marriott Sch Management, Provo, UT 84602 USA
[2] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
[3] Brigham Young Univ, Provo, UT 84602 USA
[4] Pacific NW Natl Lab, Richland, WA 99352 USA
关键词
access policy violations; accountability; accountability theory; awareness; evaluation; factorial survey method; identifiability; information security; monitoring; social presence; ETHICAL DECISION-MAKING; SOCIAL PRESENCE; INTERACTIVITY MODEL; RATIONAL CHOICE; COMPUTER; COMMUNICATION; CUES; ANONYMITY; DEINDIVIDUATION; IDENTIFIABILITY;
D O I
10.2753/MIS0742-1222290410
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access policy violations by organizational insiders are a major security concern for organizations because these violations commonly result in fraud, unauthorized disclosure, theft of intellectual property, and other abuses. Given the operational demands of dynamic organizations, current approaches to curbing access policy violations are insufficient. This study presents a new approach for reducing access policy violations, introducing both the theory of accountability and the factorial survey to the information systems field. We identify four system mechanisms that heighten an individual's perception of accountability: identifiability, awareness of logging, awareness of audit, and electronic presence. These accountability mechanisms substantially reduce intentions to commit access policy violations. These results not only point to several avenues for future research on access policy violations but also suggest highly practical design-artifact solutions that can be easily implemented with minimal impact on organizational insiders.
引用
收藏
页码:263 / 289
页数:27
相关论文
共 137 条
  • [1] USE OF VIGNETTES IN SURVEY-RESEARCH
    ALEXANDER, CS
    BECKER, HJ
    [J]. PUBLIC OPINION QUARTERLY, 1978, 42 (01) : 93 - 104
  • [2] Allinson C, 2002, J RES PRACT INF TECH, V34, P47
  • [3] [Anonymous], NY TIMES
  • [4] [Anonymous], 2000, Communications of the Association for Information Systems, DOI [DOI 10.17705/1CAIS.00407, 10.17705/1cais.00407]
  • [5] [Anonymous], 1998, Fighting Computer Crime: A New Framework for Protecting Information
  • [6] [Anonymous], WALL STREET J E EDIT
  • [7] [Anonymous], 2009, CAMBRIDGE DICT PSYCH
  • [8] [Anonymous], 2018, Econometric Analysis, DOI DOI 10.1093/GERONB/GBQ006
  • [9] See-through techniques for referential awareness in collaborative virtual reality
    Argelaguet, Ferran
    Kulik, Alexander
    Kunert, Andre
    Andujar, Carlos
    Froehlich, Bernd
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2011, 69 (06) : 387 - 400
  • [10] Modeling IT ethics: A study in situational ethics
    Banerjee, D
    Cronan, TP
    Jones, TW
    [J]. MIS QUARTERLY, 1998, 22 (01) : 31 - 60