RESEARCH COMMONS
LIBRARY

Determinants Of Adverse Usage Of Information Systems Assets: A Study Of Antecedents Of IS Exploit In Organizations

ResearchCommons/Manakin Repository

Determinants Of Adverse Usage Of Information Systems Assets: A Study Of Antecedents Of IS Exploit In Organizations

Show simple item record

dc.contributor.author Taneja, Aakash en_US
dc.date.accessioned 2007-08-23T01:56:41Z
dc.date.available 2007-08-23T01:56:41Z
dc.date.issued 2007-08-23T01:56:41Z
dc.date.submitted August 2006 en_US
dc.identifier.other DISS-1340 en_US
dc.identifier.uri http://hdl.handle.net/10106/413
dc.description.abstract Information systems assets are vital to the functioning and survival of organizations. Therefore, organizations expend many resources in protecting these assets. Organizations spent resources on technologies, policies, procedures, guidelines, user awareness, education, training and other protection mechanisms. Advancing technology and complexity of organizations make the protection of these assets a continuing challenge. Studies show that in spite of these efforts, the main reason for security failures in organizations is due to human behavior (Stanton et al. 2004). This study speaks for an enhanced behavioral model for the adverse usage of IS assets and addresses the factors that influence these behaviors. The presented model uses extended higher order conceptualization of the three basic constructs of the theory of planned behavior to study the adverse usage of IS assets. Instead of using a single IS misuse variable, it includes a category of behaviors related to adverse usage of IS assets. The factors considered in this study are Attitude (Affective, Cognitive); Social Influence (Subjective norm, Descriptive norm), Perceived Behavioral Control (Self-efficacy, Controllability); Moral Norms; Organizational Commitment; Job Satisfaction; and Influence Mechanisms (Likelihood of Detection, Security Awareness). This study is expected to contribute to theory, methodology and practice. To the best of our knowledge, this is the first study that conceptualize and empirically measure a category of behaviors related to adverse usage of IS assets instead of studying a single behavior. It is the first attempt in IS to conceptualize and empirically test all the three basic variables of the theory of planned behavior as higher order constructs. From a managerial perspective, this study determines the factors that can predict the intention of employees towards adverse usage of IS assets and can directly or indirectly impact the information security of an organization. It also tests the role of various influence mechanisms to control the behavior related to information security. The results indicate that organizations should make major investments in education, training and awareness programs to enhance their security. The results of this study will help the managers to develop actions and strategies to deal with issues related to such behaviors in organizations. en_US
dc.description.sponsorship Raja, M.K. en_US
dc.language.iso EN en_US
dc.publisher Business Administration en_US
dc.title Determinants Of Adverse Usage Of Information Systems Assets: A Study Of Antecedents Of IS Exploit In Organizations en_US
dc.type D.B.A. en_US
dc.contributor.committeeChair Raja, M.K. en_US
dc.degree.department Business Administration en_US
dc.degree.discipline Business Administration en_US
dc.degree.grantor University of Texas at Arlington en_US
dc.degree.level doctoral en_US
dc.degree.name D.B.A. en_US
dc.identifier.externalLink https://www.uta.edu/ra/real/editprofile.php?onlyview=1&pid=1033
dc.identifier.externalLinkDescription Link to Research Profiles

Files in this item

Files Size Format View
umi-uta-1340.pdf 660.1Kb PDF View/Open
660.1Kb PDF View/Open

This item appears in the following Collection(s)

Show simple item record

Browse

My Account

Statistics

About Us