Can a Pat on the Back Work?, The Effects of Oral and Written Rewards on IT Security

Loading...
Thumbnail Image

Persistent link to this item

Statistics
View Statistics

Journal Title

Journal ISSN

Volume Title

Title

Can a Pat on the Back Work?, The Effects of Oral and Written Rewards on IT Security

Alternative title

Published Date

2016

Publisher

Type

Presentation

Abstract

Effective activities and methods to stimulate a person’s intrinsic motivation to follow rules have been studied and developed in many contexts. Yet, there is a lack of empirical evidence to determine the best methods to stimulate employee intrinsic motivation to follow security related rules in Information Technology (IT) contexts. Employee conformance to Information Technology Security Governance (ITSG) is one of the toughest challenges for organizations today. Reports such as IBM (2014) indicate that after a security breach a company will lose about $145 per record that was breached. Target’s breach in 2013 totaled to $191 million in costs related to their breach (2015) and Home Depot estimated its 2014 breach costs at $62 million. This does not include the loss of reputation the company will also need to recover. This study attempts to develop guidelines for actions that management can take to encourage intrinsic motivation to comply with ITSG principles, which will work to prevent security breaches.

Keywords

Description

Related to

Replaces

License

Series/Report Number

Funding information

This research was supported by the Undergraduate Research Opportunities Program (UROP).

Isbn identifier

Doi identifier

Previously Published Citation

Other identifiers

Suggested citation

Guerrero, Ronny. (2016). Can a Pat on the Back Work?, The Effects of Oral and Written Rewards on IT Security. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/178381.

Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.