Access the full text.
Sign up today, get DeepDyve free for 14 days.
R. Power (2001)
CSI/FBI computer crime and security survey, 17
T. Madden, P. Ellen, I. Ajzen (1992)
A Comparison of the Theory of Planned Behavior and the Theory of Reasoned ActionPersonality and Social Psychology Bulletin, 18
J. Doll, I. Ajzen (1992)
Accessibility and stability of predictors in the theory of planned behavior.Journal of Personality and Social Psychology, 63
(2008)
Commentary: use of employer's e-mail in attorney-client communication raises privilege concerns
C. Fornell, D. Larcker (1981)
Evaluating structural equation models with unobservable variables and measurement error.Journal of Marketing Research, 18
L. Beck, I. Ajzen (1991)
Predicting dishonest actions using the theory of planned behaviorJournal of Research in Personality, 25
R. Haines, Lori Leonard (2007)
Individual characteristics and ethical decision-making in an IT contextInd. Manag. Data Syst., 107
(2003)
Formulating an effective computer use policy
Micki Krause, Harold Tipton (1997)
Handbook of Information Security Management
D. Straub, William Nance (1990)
Discovering and Disciplining Computer Abuse in Organizations: A Field StudyMIS Q., 14
(2004)
Behind the numbers: the FBI cyber-crime survey results
M. Siegrist (2000)
The Influence of Trust and Perceptions of Risks and Benefits on the Acceptance of Gene TechnologyRisk Analysis, 20
(2004)
Student awareness of university computer usage policies: is a single exposure enough?
Jintae Lee, Younghwa Lee (2002)
A holistic model of computer abuse within organizationsInf. Manag. Comput. Secur., 10
(2007)
Firefighters put on suspension: technician finds sexual images on Timberlake district's computers
(1974)
General deterrence: research and theory
D. Straub (1987)
Controlling Computer Abuse: am Empirical Study of Effective Security Countermeasures
(1996)
Hack attack: cyberthieves siphon millions from US firms
(1995)
Computer fraud – what can be done about it?
I. Ajzen (1988)
Attitudes, Personality and Behavior
M. Siegrist, G. Cvetkovich (2000)
Perception of Hazards: The Role of Social Trust and KnowledgeRisk Analysis, 20
T. Earle, G. Cvetkovich (1995)
Social Trust: Toward a Cosmopolitan Society
Shirley Taylor, P. Todd (1995)
Understanding Information Technology Usage: A Test of Competing ModelsInf. Syst. Res., 6
T. Scott, R. Voss (1994)
Ethics and the 7 “P's” of computer use policies
Lori Leonard, T. Cronan (2005)
Attitude toward ethical behavior in computer use: a shifting modelInd. Manag. Data Syst., 105
Incapacitative Effects, A. Blumstein, Jacqueline Cohen, D. Nagin (1980)
Deterrence and incapacitation : estimating the effects of criminal sanctions on crime ratesContemporary Sociology, 9
(1975)
Public knowledge of criminal penalties
M. Siegrist, G. Cvetkovich, Claudia Roth (2000)
Salient Value Similarity, Social Trust, and Risk/Benefit PerceptionRisk Analysis, 20
P. Robert, S. Clairet, M. Benoit, J. Koutaich, C. Bertogliati, O. Tible, H. Caci, M. Borg, P. Brocker, P. Bédoucha (2002)
The Apathy Inventory: assessment of apathy and awareness in Alzheimer's disease, Parkinson's disease and mild cognitive impairmentInternational Journal of Geriatric Psychiatry, 17
V. Venkatesh, Michael Morris, G. Davis, Fred Davis (2003)
User Acceptance of Information Technology: Toward a Unified ViewInstitutions & Transition Economics: Microeconomic Issues eJournal
K. Cook (2001)
Trust in Society
J. Backhouse, G. Dhillon (1995)
Managing computer crime: a research outlookComput. Secur., 14
Colin Martin (2009)
Go figureNature Structural &Molecular Biology, 17
(1986)
Deterring computer abuse: the effectiveness of deterrent countermeasures in the computer security environment
R. Sitgreaves (1979)
Psychometric theory (2nd ed.).Psyccritiques, 24
(1975)
Some minimum requirements for legal sanctioning systems with special emphasis on detection
Purpose – This paper aims to improve understanding of individuals' awareness and perceptions of computer usage policies (CUPs) and why individuals elect not to read these policies. Design/methodology/approach – MBA students were asked to complete an online survey evaluating their behavioral intention to read CUPs, as well as their performance of this behavior. Factors contributing to the intention to read policies were also examined. The resulting data were analyzed with Smart PLS. Findings – Results suggest that three factors influence individual intention to read CUPs. These factors include attitude, apathy, and social trust. The model explained about 70 percent of individual intention to read CUPs and about 44 percent of the variability in actually reading these policies. Research limitations/implications – The sample is limited to MBA students from a single university. Practical implications – Although written policy statements are often considered the cornerstone of computer security, many individuals elect not to read these policies. Thus, other methods of communication must be used. Originality/value – This paper examines the reasons individuals elect not to read CUPs. Given the importance of these policies as deterrents to information systems misuse and computer crime, understanding why individuals fail to read policies is a critical first step in enhancing user knowledge of computer security.
Industrial Management & Data Systems – Emerald Publishing
Published: Jun 27, 2008
Keywords: Information systems; Crimes; Computers; Individual behaviour; Business policy
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.