Using Accountability to Reduce Access Policy Violations in Information Systems

被引:151
|
作者
Vance, Anthony [1 ]
Lowry, Paul Benjamin [2 ]
Eggett, Denis [3 ,4 ]
机构
[1] Brigham Young Univ, Marriott Sch Management, Provo, UT 84602 USA
[2] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
[3] Brigham Young Univ, Provo, UT 84602 USA
[4] Pacific NW Natl Lab, Richland, WA 99352 USA
关键词
access policy violations; accountability; accountability theory; awareness; evaluation; factorial survey method; identifiability; information security; monitoring; social presence; ETHICAL DECISION-MAKING; SOCIAL PRESENCE; INTERACTIVITY MODEL; RATIONAL CHOICE; COMPUTER; COMMUNICATION; CUES; ANONYMITY; DEINDIVIDUATION; IDENTIFIABILITY;
D O I
10.2753/MIS0742-1222290410
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access policy violations by organizational insiders are a major security concern for organizations because these violations commonly result in fraud, unauthorized disclosure, theft of intellectual property, and other abuses. Given the operational demands of dynamic organizations, current approaches to curbing access policy violations are insufficient. This study presents a new approach for reducing access policy violations, introducing both the theory of accountability and the factorial survey to the information systems field. We identify four system mechanisms that heighten an individual's perception of accountability: identifiability, awareness of logging, awareness of audit, and electronic presence. These accountability mechanisms substantially reduce intentions to commit access policy violations. These results not only point to several avenues for future research on access policy violations but also suggest highly practical design-artifact solutions that can be easily implemented with minimal impact on organizational insiders.
引用
收藏
页码:263 / 289
页数:27
相关论文
共 50 条
  • [31] Accountability policy forms in European education systems: An introduction
    Barbana, Samir
    Dumay, Xavier
    Dupriez, Vincent
    EUROPEAN EDUCATIONAL RESEARCH JOURNAL, 2020, 19 (02): : 87 - 93
  • [32] Using Geographic Information Systems to Simulate Patient Access Areas
    Doi, Shunsuke
    Inoue, Takashi
    Ide, Hiroo
    Nakamura, Toshihito
    Fujita, Shinsuke
    Suzuki, Takahiro
    Takabayashi, Katsuhiko
    E-HEALTH - FOR CONTINUITY OF CARE, 2014, 205 : 1120 - 1124
  • [33] Using geographic information systems to understand health care access
    Phillips, RL
    Kinman, EL
    Schnitzer, PG
    Lindbloom, EJ
    Ewigman, B
    ARCHIVES OF FAMILY MEDICINE, 2000, 9 (10) : 971 - 978
  • [34] Uncovering Information Flow Policy Violations in C Programs (Extended Abstract)
    Cassel, Darion
    Huang, Yan
    Jia, Limin
    COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 26 - 46
  • [35] Assessment of a policy to reduce placement of prosthetic hemodialysis access
    Gibson, KD
    Caps, MT
    Kohler, TR
    Hatsukami, TS
    Gillen, DL
    Aldassy, M
    Sherrard, DJ
    Stehman-Breen, CO
    KIDNEY INTERNATIONAL, 2001, 59 (06) : 2335 - 2345
  • [36] Impact of negative emotions on violations of information security policy and possible mitigations
    Zhen, Jie
    Xie, Zongxiao
    Dong, Kunxiang
    Chen, Lin
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2022, 41 (11) : 2342 - 2354
  • [37] Assessment and Strategies to Reduce Light Pollution using Geographic Information Systems
    Elsahragty, Mohamed
    Kim, Jin-Lee
    DEFINING THE FUTURE OF SUSTAINABILITY AND RESILIENCE IN DESIGN, ENGINEERING AND CONSTRUCTION, 2015, 118 : 479 - 488
  • [38] Fairness in Information Access Systems
    Ekstrand, Michael D.
    Das, Anubrata
    Burke, Robin
    Diaz, Fernando
    FOUNDATIONS AND TRENDS IN INFORMATION RETRIEVAL, 2022, 16 (1-2): : 1 - 174
  • [39] Mobile access into information systems
    Kozel, Tomas
    Slaby, Antonin
    PROCEEDINGS OF THE ITI 2008 30TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2008, : 851 - 856
  • [40] Detecting violations of access control and information flow policies in data flow diagrams
    Seifermann, Stephan
    Heinrich, Robert
    Werle, Dominik
    Reussner, Ralf
    JOURNAL OF SYSTEMS AND SOFTWARE, 2022, 184