File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.2753/MIS0742-1222290410
- Scopus: eid_2-s2.0-84880251288
- WOS: WOS:000321266200011
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Using accountability to reduce access policy violations in information systems
Title | Using accountability to reduce access policy violations in information systems |
---|---|
Authors | |
Keywords | evaluation information security accountability identifiability factorial survey method access policy violations social presence monitoring awareness accountability theory |
Issue Date | 2013 |
Citation | Journal of Management Information Systems, 2013, v. 29, n. 4, p. 263-289 How to Cite? |
Abstract | Access policy violations by organizational insiders are a major security concern for organizations because these violations commonly result in fraud, unauthorized disclosure, theft of intellectual property, and other abuses. Given the operational demands of dynamic organizations, current approaches to curbing access policy violations are insufficient. This study presents a new approach for reducing access policy violations, introducing both the theory of accountability and the factorial survey to the information systems field. We identify four system mechanisms that heighten an individual's perception of accountability: identifiability, awareness of logging, awareness of audit, and electronic presence. These accountability mechanisms substantially reduce intentions to commit access policy violations. These results not only point to several avenues for future research on access policy violations but also suggest highly practical design-artifact solutions that can be easily implemented with minimal impact on organizational insiders. © 2013 M.E. Sharpe, Inc. All rights reserved. |
Persistent Identifier | http://hdl.handle.net/10722/233822 |
ISSN | 2023 Impact Factor: 5.9 2023 SCImago Journal Rankings: 3.070 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Vance, Anthony | - |
dc.contributor.author | Lowry, Paul Benjamin | - |
dc.contributor.author | Eggett, Dennis | - |
dc.date.accessioned | 2016-09-27T07:21:44Z | - |
dc.date.available | 2016-09-27T07:21:44Z | - |
dc.date.issued | 2013 | - |
dc.identifier.citation | Journal of Management Information Systems, 2013, v. 29, n. 4, p. 263-289 | - |
dc.identifier.issn | 0742-1222 | - |
dc.identifier.uri | http://hdl.handle.net/10722/233822 | - |
dc.description.abstract | Access policy violations by organizational insiders are a major security concern for organizations because these violations commonly result in fraud, unauthorized disclosure, theft of intellectual property, and other abuses. Given the operational demands of dynamic organizations, current approaches to curbing access policy violations are insufficient. This study presents a new approach for reducing access policy violations, introducing both the theory of accountability and the factorial survey to the information systems field. We identify four system mechanisms that heighten an individual's perception of accountability: identifiability, awareness of logging, awareness of audit, and electronic presence. These accountability mechanisms substantially reduce intentions to commit access policy violations. These results not only point to several avenues for future research on access policy violations but also suggest highly practical design-artifact solutions that can be easily implemented with minimal impact on organizational insiders. © 2013 M.E. Sharpe, Inc. All rights reserved. | - |
dc.language | eng | - |
dc.relation.ispartof | Journal of Management Information Systems | - |
dc.subject | evaluation | - |
dc.subject | information security | - |
dc.subject | accountability | - |
dc.subject | identifiability | - |
dc.subject | factorial survey method | - |
dc.subject | access policy violations | - |
dc.subject | social presence | - |
dc.subject | monitoring | - |
dc.subject | awareness | - |
dc.subject | accountability theory | - |
dc.title | Using accountability to reduce access policy violations in information systems | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.2753/MIS0742-1222290410 | - |
dc.identifier.scopus | eid_2-s2.0-84880251288 | - |
dc.identifier.volume | 29 | - |
dc.identifier.issue | 4 | - |
dc.identifier.spage | 263 | - |
dc.identifier.epage | 289 | - |
dc.identifier.isi | WOS:000321266200011 | - |
dc.identifier.issnl | 0742-1222 | - |