Using Accountability to Reduce Access Policy Violations in Information Systems

被引:151
|
作者
Vance, Anthony [1 ]
Lowry, Paul Benjamin [2 ]
Eggett, Denis [3 ,4 ]
机构
[1] Brigham Young Univ, Marriott Sch Management, Provo, UT 84602 USA
[2] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
[3] Brigham Young Univ, Provo, UT 84602 USA
[4] Pacific NW Natl Lab, Richland, WA 99352 USA
关键词
access policy violations; accountability; accountability theory; awareness; evaluation; factorial survey method; identifiability; information security; monitoring; social presence; ETHICAL DECISION-MAKING; SOCIAL PRESENCE; INTERACTIVITY MODEL; RATIONAL CHOICE; COMPUTER; COMMUNICATION; CUES; ANONYMITY; DEINDIVIDUATION; IDENTIFIABILITY;
D O I
10.2753/MIS0742-1222290410
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access policy violations by organizational insiders are a major security concern for organizations because these violations commonly result in fraud, unauthorized disclosure, theft of intellectual property, and other abuses. Given the operational demands of dynamic organizations, current approaches to curbing access policy violations are insufficient. This study presents a new approach for reducing access policy violations, introducing both the theory of accountability and the factorial survey to the information systems field. We identify four system mechanisms that heighten an individual's perception of accountability: identifiability, awareness of logging, awareness of audit, and electronic presence. These accountability mechanisms substantially reduce intentions to commit access policy violations. These results not only point to several avenues for future research on access policy violations but also suggest highly practical design-artifact solutions that can be easily implemented with minimal impact on organizational insiders.
引用
收藏
页码:263 / 289
页数:27
相关论文
共 50 条
  • [1] Transparency, accountability, and access to information
    Reid, J
    FIXING CANADIAN DEMOCRACY, 2003, : 201 - 210
  • [2] NEUTRALIZATION: NEW INSIGHTS INTO THE PROBLEM OF EMPLOYEE INFORMATION SYSTEMS SECURITY POLICY VIOLATIONS
    Siponen, Mikko
    Vance, Anthony
    MIS QUARTERLY, 2010, 34 (03) : 487 - 502
  • [3] Neutralization: New insights into the problem of employee information systems security policy violations
    Siponen M.
    Vance A.
    MIS Quarterly: Management Information Systems, 2010, 34 (SPEC. ISSUE 3): : 487 - 502
  • [4] INCREASING ACCOUNTABILITY THROUGH USER-INTERFACE DESIGN ARTIFACTS: A NEW APPROACH TO ADDRESSING THE PROBLEM OF ACCESS-POLICY VIOLATIONS
    Vance, Anthony
    Lowry, Paul Benjamin
    Eggett, Dennis
    MIS QUARTERLY, 2015, 39 (02) : 345 - U402
  • [5] RELATIONSHIP TO INDIVIDUAL INFORMATION SECURITY POLICY VIOLATIONS
    Cappellozza, Alexandre
    da Silva, Camila Bernardo
    Medeiros, Luciana Arantes
    de Moraes, Gustavo Herminio Salati Marcondes
    Perez, Gilberto
    INFORMACAO & SOCIEDADE-ESTUDOS, 2022, 32
  • [6] THE DEVELOPMENT OF AN ACCOUNTABILITY POLICY TO REDUCE ERRORS IN LABORATORY SERVICES
    OOLEY, PW
    CISSELL, TM
    AXELROD, FB
    TRANSFUSION, 1992, 32 (08) : S87 - S87
  • [7] Access to Scientific Information: From Counting to Accountability
    Popovic, Tanja
    Araujo, John
    JOURNAL OF PUBLIC HEALTH MANAGEMENT AND PRACTICE, 2012, 18 (03): : 228 - 232
  • [8] A multi-policy access model for cooperative information systems
    Disson, E
    Boulanger, D
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VII, PROCEEDINGS, 2003, : 86 - 91
  • [9] Social accountability for information to public policy makers
    Borgonovi, E
    PONTE, 2003, 59 (10-11) : 80 - 84
  • [10] Information for Access to the Exercise of Social Control based on the Accountability
    Martinez, Leandro
    Castellano, Maria Isabel
    Castellano, Nelson
    REVISTA CICAG, 2014, 12 (01): : 162 - 175