Abstract
Insider computer abuse, the problem of intentional computer-related crimes by employees, is a costly problem for firms (Warkentin and Willison, 2009). To counter this threat, IT practitioners and IS researchers assess potential antecedents of and motivations for computer abuse intentions among employees. The theory of organizational justice, the techniques of neutralization, and the role of deterrence are offered as lenses for evaluating the formation of employee disgruntlement leading to computer abuse behaviors. We have evaluated the impacts of these perceived organizational injustice and neutralization on the formation of employee intention to commit computer abuse activities in violation of security policies and procedures, with additional influences of deterrence. Utilizing the factorial survey method, we have empirically evaluated the association between these antecedents.
| Original language | English |
|---|---|
| Title of host publication | 17th Americas Conference on Information Systems 2011, AMCIS 2011 |
| Publisher | AIS/ICIS Administrative Office |
| ISBN (Print) | 9781618390981 |
| Publication status | Published - 2011 |
| Externally published | Yes |
| Event | 17th Americas Conference on Information Systems 2011, AMCIS 2011 - Detroit, MI, United States Duration: 4 Aug 2011 → 8 Aug 2011 |
Publication series
| Name | 17th Americas Conference on Information Systems 2011, AMCIS 2011 |
|---|---|
| Volume | 4 |
Conference
| Conference | 17th Americas Conference on Information Systems 2011, AMCIS 2011 |
|---|---|
| Country/Territory | United States |
| City | Detroit, MI |
| Period | 4/08/11 → 8/08/11 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 16 Peace, Justice and Strong Institutions
Keywords
- Computer abuse
- deterrence
- factorial survey method
- motivation
- neutralization
- organizational justice
Fingerprint
Dive into the research topics of 'The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver