Reference Hub80
IS Security Policy Violations: A Rational Choice Perspective

IS Security Policy Violations: A Rational Choice Perspective

Anthony Vance, Mikko T. Siponen
Copyright: © 2012 |Volume: 24 |Issue: 1 |Pages: 21
ISSN: 1546-2234|EISSN: 1546-5012|EISBN13: 9781466610330|DOI: 10.4018/joeuc.2012010102
Cite Article Cite Article

MLA

Vance, Anthony, and Mikko T. Siponen. "IS Security Policy Violations: A Rational Choice Perspective." JOEUC vol.24, no.1 2012: pp.21-41. http://doi.org/10.4018/joeuc.2012010102

APA

Vance, A. & Siponen, M. T. (2012). IS Security Policy Violations: A Rational Choice Perspective. Journal of Organizational and End User Computing (JOEUC), 24(1), 21-41. http://doi.org/10.4018/joeuc.2012010102

Chicago

Vance, Anthony, and Mikko T. Siponen. "IS Security Policy Violations: A Rational Choice Perspective," Journal of Organizational and End User Computing (JOEUC) 24, no.1: 21-41. http://doi.org/10.4018/joeuc.2012010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory (RCT)—a prominent criminological theory not yet applied in IS—which explains, in terms of a utilitarian calculation, an individual’s decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insignificant. Based on these findings, the authors discuss several implications for research and practice.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.