An emote opportunity model of computer abuse
Access Status
Authors
Date
2014Type
Metadata
Show full item recordCitation
Source Title
ISSN
Collection
Abstract
Purpose – The purpose of this paper is to develop and evaluate an integrated computer abuse model that incorporates both organizational abuse settings and the psychological processes of the abuser. Design/methodology/approach – The paper developed an emote opportunity (EO) model through a comprehensive literature review and conducted a case study to evaluate the explanatory and prescriptive usefulness of the model. Findings – The EO model helps explain the interaction between organization-centric factors and individual-centric factors. It also helps explain how potential computer abusers elicit an emotion process component that ultimately contributes to computer abuse behaviors. The model connects both organizational external regulation processes and individual internal regulation processes to emote process components of potential abusers. Research limitations/implications – The study considers only organizational computing resources as the target of computer abuse. The model is evaluated by historical data from a computer abuse case. Future research with contemporary empirical data would further evaluate these findings. Organizations should be aware of the opportunities they create for abuse and the emotional state-of mind of potential abusers within organizations. Practical implications – Organizations should take a holistic approach that incorporates personal emotions and organizational abuse opportunity settings to prevent computer abuse. Originality/value – A multilevel, integrated EO model incorporating organizational environment and individual emotion processes provides an elaborated and holistic understanding of computer abuse. The model helps organizations consider the emotional state-of-mind of abusers as well as their organizational situation.
Related items
Showing items related by title, author, creator and subject.
-
Kim, J.; Park, E.; Baskerville, Richard (2012)What factors drive individuals to abuse information systems? Better understanding of the roots behind this individual decision could provide opportunities to reduce computer abuse by reducing the presence of these factors. ...
-
Kim, J.; Baskerville, Richard; Park, E. (2016)Internal computer abuse has received considerable research attention as a significant source of IS security incidents in organizations. We examine the effects of both organizational and individual factors on individuals’ ...
-
Hanson, Byron (2013)The Problem Leadership Development research and practice has consistently focused on specific methods and interventions to the degree that our understanding of what good leadership development looks like is much clearer. ...