The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions

Merrill Warkentin, Robert Willison, Allen C. Johnston

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

12 Citations (Scopus)

Abstract

Insider computer abuse, the problem of intentional computer-related crimes by employees, is a costly problem for firms (Warkentin and Willison, 2009). To counter this threat, IT practitioners and IS researchers assess potential antecedents of and motivations for computer abuse intentions among employees. The theory of organizational justice, the techniques of neutralization, and the role of deterrence are offered as lenses for evaluating the formation of employee disgruntlement leading to computer abuse behaviors. We have evaluated the impacts of these perceived organizational injustice and neutralization on the formation of employee intention to commit computer abuse activities in violation of security policies and procedures, with additional influences of deterrence. Utilizing the factorial survey method, we have empirically evaluated the association between these antecedents.

Original languageEnglish
Title of host publication17th Americas Conference on Information Systems 2011, AMCIS 2011
PublisherAIS/ICIS Administrative Office
ISBN (Print)9781618390981
Publication statusPublished - 2011
Externally publishedYes
Event17th Americas Conference on Information Systems 2011, AMCIS 2011 - Detroit, MI, United States
Duration: 4 Aug 20118 Aug 2011

Publication series

Name17th Americas Conference on Information Systems 2011, AMCIS 2011
Volume4

Conference

Conference17th Americas Conference on Information Systems 2011, AMCIS 2011
Country/TerritoryUnited States
CityDetroit, MI
Period4/08/118/08/11

Keywords

  • Computer abuse
  • deterrence
  • factorial survey method
  • motivation
  • neutralization
  • organizational justice

Fingerprint

Dive into the research topics of 'The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions'. Together they form a unique fingerprint.

Cite this