A model of emotion and computer abuse

被引:33
|
作者
Kim, Jongwoo [1 ]
Park, Eun Hee [2 ]
Baskerville, Richard L. [3 ]
机构
[1] Univ Massachusetts, Management Sci & Informat Syst, 100 Morrissey Blvd, Boston, MA 02125 USA
[2] Old Dominion Univ, Informat Technol & Decis Sci, 2072 Constant Hall, Norfolk, VA 23529 USA
[3] Georgia State Univ, Comp Informat Syst, 35 Broad St NW, Atlanta, GA 30302 USA
关键词
Information security; Computer abuse; Emotion process model; Abuse opportunity structure; Computer security behavioral factors; SECURITY POLICY COMPLIANCE; NEGATIVE AFFECT; SOFTWARE PIRACY; SYSTEMS RISK; SELF-CONTROL; CORE AFFECT; INFORMATION; DETERRENCE; APPRAISAL; VALIDATION;
D O I
10.1016/j.im.2015.09.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internal computer abuse has received considerable research attention as a significant source of IS security incidents in organizations. We examine the effects of both organizational and individual factors on individuals' computer abuse intent. A theoretical model is developed based on two theories: abuse opportunity structure and emotion process. We empirically tested the model with 205 working professionals. We found that the abuse opportunity structure in organizations affects an individual's goal conduciveness, which in turn affects their abuse-positive affect. We also found that morality affects the abuse-positive affect, which in turn mediates the relationship between morality and abuse intent. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:91 / 108
页数:18
相关论文
共 50 条
  • [31] Emotion regulation and drug abuse: Implications for prevention and treatment
    Kelly, Thomas H.
    Bardo, Michael T.
    DRUG AND ALCOHOL DEPENDENCE, 2016, 163 : S1 - S2
  • [32] ENDING COMPUTER ABUSE BY MESH GENERATORS
    HAVAS, T
    MACHINE DESIGN, 1985, 57 (07) : 115 - 118
  • [33] Computer abuse: Vandalizing the information society
    Furnell, SM
    Warren, MJ
    INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 1997, 7 (01): : 61 - &
  • [34] COMPUTER ABUSE - A MULTIDISCIPLINARY INVESTIGATIVE APPROACH
    MOULTON, R
    POLICE CHIEF, 1983, 50 (09): : 48 - 51
  • [35] COMPUTER ABUSE - PLAN TO OUTLAW HACKING
    WEBB, B
    NATURE, 1989, 341 (6243) : 559 - 559
  • [36] COMPUTER ABUSE - THE SILICON PRY BAR
    CIRA, JE
    POLICE CHIEF, 1983, 50 (09): : 46 - 47
  • [37] COMPUTER ABUSE - PROBLEMS OF INSTRUMENTAL CONTROL
    PFUHL, EH
    DEVIANT BEHAVIOR, 1987, 8 (02) : 113 - 130
  • [38] INFORMATION ABUSE AND THE PERSONAL-COMPUTER
    WESTIN, AF
    POPULAR COMPUTING, 1982, 1 (10): : 112 - 116
  • [39] Emotion-driven reasoning model for agent-based human-computer negotiation
    Wu, Jinghua
    Zhang, Ting
    Li, Yan
    Zhou, Guangjuan
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 240
  • [40] Cognitive model - Based emotion recognition from facial expressions for live human computer interaction
    Bindu, Maringanti Hima
    Gupta, Priya
    Tiwary, U. S.
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN IMAGE AND SIGNAL PROCESSING, 2007, : 351 - 356