Corpus ID: 37659206

The Role of Individual Characteristics on Insider Abuse Intentions

@inproceedings{Warkentin2012TheRO,
  title={The Role of Individual Characteristics on Insider Abuse Intentions},
  author={M. Warkentin and Maranda E. McBride and Lemuria Carter and A. Johnston},
  booktitle={AMCIS},
  year={2012}
}
  • M. Warkentin, Maranda E. McBride, +1 author A. Johnston
  • Published in AMCIS 2012
  • Psychology, Computer Science
  • Insiders represent a major threat to the security of an organization’s information resources (Warkentin & Willison, 2009; Stanton et al., 2005). Previous research has explored the role of protection motivation or of deterrence in promoting compliant behavior, but these factors have not been studied together. Furthermore, other individual differences, such as the Big Five personality factors may serve as critical influences on cybersecurity compliance. In this study we use a factorial survey… CONTINUE READING
    19 Citations

    Figures, Tables, and Topics from this paper

    Identifying and predicting the factors affecting end-users' risk-taking behavior
    • 6
    • PDF
    Malicious Insider Threat Detection: A Conceptual Model
    • 1
    • PDF
    Risk as affect: The affect heuristic in cybersecurity
    • PDF
    Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
    • 154
    • PDF

    References

    SHOWING 1-10 OF 58 REFERENCES
    Personality and IT security: An application of the five-factor model
    • 47
    Beyond Deterrence: An Expanded View of Employee Computer Abuse
    • 371
    • PDF
    Fear Appeals and Information Security Behaviors: An Empirical Study
    • 837
    • PDF
    The expanded security action cycle: a temporal analysis
    • 7
    • PDF
    If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
    • 319
    • PDF
    Individual perceptions and the social construction of hate crimes: A factorial survey
    • 38
    Impact of Negative Message Framing on Security Adoption
    • 22
    Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
    • 1,259
    • PDF
    Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations
    • 693
    • Highly Influential