IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v13y2021i9p5263-d550615.html
   My bibliography  Save this article

Social Controls and Bonds of Public Information Consumer on Sustainable Utilization and Provision for Computing

Author

Listed:
  • Kumju Hwang

    (Department of Business Administration, Chung-Ang University, Seoul 06974, Korea)

  • Hyemi Um

    (Department of Knowledge-Based Management, Chung-Ang University, Seoul 06974, Korea)

Abstract

In public areas, employees are both consumers and producers in information. For sustainable usage of information, employees should be aware of information systems security (ISS). Information systems security (ISS) is critical in further developing public sector information systems, such as e-government. Most ISS breaches are committed by insiders rather than outsiders. This study investigates the applicability of adult social bond theory, which proposes social controls in the form of social bonds that provide deterrence based on the potential shame an employee would feel from committing an ISS breach. The proposed research model consists of four antecedents for adult social bonds: commitment, attachment, belief and job stability. Individual ISS compliance is set as the dependent variance and deterrence and shame are set as the mediators between social bonds and compliance. Analysis of 672 data points largely supports the research model, proving the applicability to ISS of social bonds and social control. Belief seems to have the strongest effect on individual compliance. Implications are discussed and further studies are proposed.

Suggested Citation

  • Kumju Hwang & Hyemi Um, 2021. "Social Controls and Bonds of Public Information Consumer on Sustainable Utilization and Provision for Computing," Sustainability, MDPI, vol. 13(9), pages 1-20, May.
  • Handle: RePEc:gam:jsusta:v:13:y:2021:i:9:p:5263-:d:550615
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/13/9/5263/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/13/9/5263/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Lemuria Carter & Vishanth Weerakkody, 2008. "E-government adoption: A cultural comparison," Information Systems Frontiers, Springer, vol. 10(4), pages 473-482, September.
    2. Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
    3. Myeonggil Choi & Changhan Lee, 2015. "Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations," Sustainability, MDPI, vol. 7(9), pages 1-20, August.
    4. John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
    5. Jack Shih-Chieh Hsu & Sheng-Pao Shih & Yu Wen Hung & Paul Benjamin Lowry, 2015. "The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness," Information Systems Research, INFORMS, vol. 26(2), pages 282-300, June.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Rao Faizan Ali & P.D.D. Dominic & Kashif Ali, 2020. "Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees," Sustainability, MDPI, vol. 12(20), pages 1-27, October.
    2. Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
    3. Paul Lowry & Clay Posey & Tom Roberts & Rebecca Bennett, 2014. "Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse," Journal of Business Ethics, Springer, vol. 121(3), pages 385-401, May.
    4. Murilo Catussi Almeida & Adilson Carlos Yoshikuni & Rajeev Dwivedi & Cláudio Luís Carvalho Larieira, 2022. "Do Leadership Styles Influence Employee Information Systems Security Intention? A Study of the Banking Industry," Global Journal of Flexible Systems Management, Springer;Global Institute of Flexible Systems Management, vol. 23(4), pages 535-550, December.
    5. Amanda M. Y. Chu & Mike K. P. So, 2020. "Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective," Sustainability, MDPI, vol. 12(8), pages 1-25, April.
    6. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    7. Zhenjiao Chen & Yaqing Liu, 2020. "The Effects of Leadership and Reward Policy on Employees’ Electricity Saving Behaviors: An Empirical Study in China," IJERPH, MDPI, vol. 17(6), pages 1-15, March.
    8. Garín-Muñoz, Teresa & López, Rafael & Pérez-Amaral, Teodosio & Herguera, Iñigo & Valarezo, Angel, 2019. "Models for individual adoption of eCommerce, eBanking and eGovernment in Spain," Telecommunications Policy, Elsevier, vol. 43(1), pages 100-111.
    9. Kai-Lung Hui & Ping Fan Ke & Yuxi Yao & Wei T. Yue, 2019. "Bilateral Liability-Based Contracts in Information Security Outsourcing," Information Systems Research, INFORMS, vol. 30(2), pages 411-429, June.
    10. Kostas Zafiropoulos & Ioannis Karavasilis & Vasiliki Vrana, 2012. "Assessing the Adoption of e-Government Services by Teachers in Greece," Future Internet, MDPI, vol. 4(2), pages 1-17, May.
    11. Jae Kyu Lee & Younghoon Chang & Hun Yeong Kwon & Beopyeon Kim, 2020. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach," Information Systems Frontiers, Springer, vol. 22(1), pages 45-57, February.
    12. Florentina NEAMTU & Bogdan NICHIFOR, 2013. "Impact Factors In Assimilation And Operationalization Of The Concept Of E-Government," Public Administration and Reginal Studies, "Dunarea de Jos" University of Galati, Faculty of Juridical, Social and Political Sciences, issue 2, pages 53-61.
    13. Eric Jardine, 2020. "The Case against Commercial Antivirus Software: Risk Homeostasis and Information Problems in Cybersecurity," Risk Analysis, John Wiley & Sons, vol. 40(8), pages 1571-1588, August.
    14. Xiaotong Li, 2022. "An evolutionary game‐theoretic analysis of enterprise information security investment based on information sharing platform," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(3), pages 595-606, April.
    15. V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
    16. Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
    17. A. J. Burns & Clay Posey & James F. Courtney & Tom L. Roberts & Prabhashi Nanayakkara, 2017. "Organizational information security as a complex adaptive system: insights from three agent-based models," Information Systems Frontiers, Springer, vol. 19(3), pages 509-524, June.
    18. Silva, Leiser & Hsu, Carol & Backhouse, James & McDonnell, Aidan, 2016. "Resistance and power in a security certification scheme: the case of c:cure," LSE Research Online Documents on Economics 68348, London School of Economics and Political Science, LSE Library.
    19. Sumantra Sarkar & Anthony Vance & Balasubramaniam Ramesh & Menelaos Demestihas & Daniel Thomas Wu, 2020. "The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context," Information Systems Research, INFORMS, vol. 31(4), pages 1240-1259, December.
    20. Ali Hammad & Intikhab Ahmad & Syed Muhammad Sikander & Md Amjad Hossain Reyad & Syed Mazahir Kazmi, 2019. "Ascendants That Influence the Adoption of E-government Services among Citizen of Pakistan," Business and Economic Research, Macrothink Institute, vol. 9(2), pages 72-91, June.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:13:y:2021:i:9:p:5263-:d:550615. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.