Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement
Author
Abstract
Suggested Citation
DOI: 10.1287/mnsc.2021.4027
Download full text from publisher
References listed on IDEAS
- Michael Workman & John Gathegi, 2007. "Punishment and ethics deterrents: A study of insider security contravention," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 58(2), pages 212-222, January.
- Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
- HOLMSTROM, Bengt, 1979. "Moral hazard and observability," LIDAM Reprints CORE 379, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Atanu Lahiri & Debabrata Dey, 2018. "Versioning and Information Dissemination: A New Perspective," Information Systems Research, INFORMS, vol. 29(4), pages 965-983, December.
- Detmar W. Straub, 1990. "Effective IS Security: An Empirical Study," Information Systems Research, INFORMS, vol. 1(3), pages 255-276, September.
- Anastasia Danilov & Dirk Sliwka, 2017. "Can Contracts Signal Social Norms? Experimental Evidence," Management Science, INFORMS, vol. 63(2), pages 459-476, February.
- Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
- Soomro, Zahoor Ahmed & Shah, Mahmood Hussain & Ahmed, Javed, 2016. "Information security management needs more holistic approach: A literature review," International Journal of Information Management, Elsevier, vol. 36(2), pages 215-225.
- Tejaswini Herath & H Raghav Rao, 2009. "Protection motivation and deterrence: a framework for security policy compliance in organisations," European Journal of Information Systems, Taylor & Francis Journals, vol. 18(2), pages 106-125, April.
- Sam Ransbotham & Sabyasachi Mitra, 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise," Information Systems Research, INFORMS, vol. 20(1), pages 121-139, March.
- Jack Shih-Chieh Hsu & Sheng-Pao Shih & Yu Wen Hung & Paul Benjamin Lowry, 2015. "The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness," Information Systems Research, INFORMS, vol. 26(2), pages 282-300, June.
- Bengt Holmstrom, 1979.
"Moral Hazard and Observability,"
Bell Journal of Economics, The RAND Corporation, vol. 10(1), pages 74-91, Spring.
- Bengt Holmstrom, 1997. "Moral Hazard and Observability," Levine's Working Paper Archive 1205, David K. Levine.
- Karthik Kannan & Mohammad S. Rahman & Mohit Tawarmalani, 2016. "Economic and Policy Implications of Restricted Patch Distribution," Management Science, INFORMS, vol. 62(11), pages 3161-3182, November.
- John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Sabyasachi Mitra & Sam Ransbotham, 2015. "Information Disclosure and the Diffusion of Information Security Attacks," Information Systems Research, INFORMS, vol. 26(3), pages 565-584, September.
- Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
- A. J. Burns & Tom L. Roberts & Clay Posey & Paul Benjamin Lowry & Bryan Fuller, 2023. "Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse," Information Systems Research, INFORMS, vol. 34(1), pages 342-362, March.
- Eun Hee Park & Jongwoo Kim & Lynn Wiles, 2023. "The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information," Information Technology and Management, Springer, vol. 24(2), pages 177-193, June.
- John D’Arcy & Idris Adjerid & Corey M. Angst & Ante Glavas, 2020. "Too Good to Be True: Firm Social Performance and the Risk of Data Breach," Information Systems Research, INFORMS, vol. 31(4), pages 1200-1223, December.
- Qian Tang & Andrew B. Whinston, 2020. "Do Reputational Sanctions Deter Negligence in Information Security Management? A Field Quasi‐Experiment," Production and Operations Management, Production and Operations Management Society, vol. 29(2), pages 410-427, February.
- Li, Yuanxiang John & Hoffman, Elizabeth, 2023. "Designing an incentive mechanism for information security policy compliance: An experiment," Journal of Economic Behavior & Organization, Elsevier, vol. 212(C), pages 138-159.
- Paul Lowry & Clay Posey & Tom Roberts & Rebecca Bennett, 2014. "Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse," Journal of Business Ethics, Springer, vol. 121(3), pages 385-401, May.
- Hugo Hopenhayn & Arantxa Jarque, 2006.
"Moral Hazard and Persistence,"
2006 Meeting Papers
670, Society for Economic Dynamics.
- Hugo A. Hopenhayn & Arantxa Jarque, 2007. "Moral hazard and persistence," Working Paper 07-07, Federal Reserve Bank of Richmond.
- Calcagno, R. & Renneboog, L.D.R., 2004.
"Capital Structure and Managerial Compensation : The Effects of Renumeration Seniority,"
Discussion Paper
2004-120, Tilburg University, Center for Economic Research.
- Calcagno, R. & Renneboog, L.D.R., 2004. "Capital Structure and Managerial Compensation : The Effects of Remuneration Seniority," Other publications TiSEM afd90cc1-f881-4875-bbcd-e, Tilburg University, School of Economics and Management.
- Calcagno, R. & Renneboog, L.D.R., 2004. "Capital Structure and Managerial Compensation : The Effects of Renumeration Seniority," Other publications TiSEM 509b3b8c-a04b-42c3-8991-e, Tilburg University, School of Economics and Management.
- Calcagno, R. & Renneboog, L.D.R., 2004. "Capital Structure and Managerial Compensation : The Effects of Remuneration Seniority," Discussion Paper 2004-015, Tilburg University, Tilburg Law and Economic Center.
- Yaofeng Fu & Ruokun Huang & Yiran Sheng, 2017. "Labor Contract Law -An Economic View," Papers 1702.03977, arXiv.org.
- Marcelo Bianconi, 2004. "Aggregate and Idiosyncratic Risk and the Behavior of Individual Preferences under Moral Hazard," Discussion Papers Series, Department of Economics, Tufts University 0410, Department of Economics, Tufts University.
- McCausland, David & Pouliakas, Konstantinos & Theodossiou, Ioannis, 2005.
"Some are Punished and Some are Rewarded: A Study of the Impact of Performance Pay on Job Satisfaction,"
MPRA Paper
14243, University Library of Munich, Germany.
- W.D. McCausland & K. Pouliakas & I. Theodossiou, 2005. "Some are Punished and Some are Rewarded: A Study of the Impact of Performance Pay on Job Satisfaction," Labor and Demography 0505019, University Library of Munich, Germany.
- Rajesh K. Aggarwal & Andrew A. Samwick, 1999.
"Executive Compensation, Strategic Competition, and Relative Performance Evaluation: Theory and Evidence,"
Journal of Finance, American Finance Association, vol. 54(6), pages 1999-2043, December.
- Rajesh Aggarwal & Andrew A. Samwick, 1996. "Executive Compensation, Strategic Competition, and Relative Performance Evaluation: Theory and Evidence," NBER Working Papers 5648, National Bureau of Economic Research, Inc.
- Lau, Stephanie, 2011. "Investment incentives in bilateral trading," Games and Economic Behavior, Elsevier, vol. 73(2), pages 538-552.
- David Martimort & Flavio Menezes & Myrna Wooders & ELISABETTA IOSSA & DAVID MARTIMORT, 2015.
"The Simple Microeconomics of Public-Private Partnerships,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 17(1), pages 4-48, February.
- Elisabetta Iossa & David Martimort, 2008. "The Simple Micro-Economics of Public-Private Partnerships," CEIS Research Paper 139, Tor Vergata University, CEIS, revised 15 Feb 2013.
- Elisabetta Iossa & David Martimort, 2008. "The Simple Micro-Economics of Public-Private Partnerships," The Centre for Market and Public Organisation 08/199, The Centre for Market and Public Organisation, University of Bristol, UK.
- Elisabetta Iossa & David Martimort, 2015. "The Simple Microeconomics of Public-Private Partnerships," Post-Print halshs-01109351, HAL.
- Elisabetta Iossa & David Martimort, 2015. "The Simple Microeconomics of Public-Private Partnerships," PSE-Ecole d'économie de Paris (Postprint) halshs-01109351, HAL.
- Elisabetta Iossa & David Martimort, 2015. "The Simple Microeconomics of Public-Private Partnerships," PSE - Labex "OSE-Ouvrir la Science Economique" halshs-01109351, HAL.
- Tiantian Gu & Anand Venkateswaran, 2018. "Firm-supplier relations and managerial compensation," Review of Quantitative Finance and Accounting, Springer, vol. 51(3), pages 621-649, October.
- Kuang, Yu Flora & Qin, Bo, 2009. "Performance-vested stock options and interest alignment," The British Accounting Review, Elsevier, vol. 41(1), pages 46-61.
- Roussey, Ludivine & Soubeyran, Raphael, 2018.
"Overburdened judges,"
International Review of Law and Economics, Elsevier, vol. 55(C), pages 21-32.
- Ludivine Roussey & Raphaël Soubeyran, 2018. "Overburdened judges," Post-Print hal-02621924, HAL.
- Ludivine Roussey & Raphaël Soubeyran, 2018. "Overburdened judges," Working Papers halshs-01936006, HAL.
- Ludivine Roussey & Raphaël Soubeyran, 2018. "Overburdened judges," CEE-M Working Papers halshs-01936006, CEE-M, Universtiy of Montpellier, CNRS, INRA, Montpellier SupAgro.
- Ludivine Roussey & Raphaël Soubeyran, 2018. "Overburdened judges," Working Papers hal-02791013, HAL.
- Xin Qu & Majella Percy & Fang Hu & Jenny Stewart, 2022. "Can CEO equity‐based compensation limit investment‐related agency problems?," Accounting and Finance, Accounting and Finance Association of Australia and New Zealand, vol. 62(2), pages 2579-2614, June.
More about this item
Keywords
IT security; privacy; circumvention; education; enforcement; economics of IS;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ormnsc:v:68:y:2022:i:4:p:2914-2931. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.