• Title/Summary/Keyword: deterrence theory

Search Result 29, Processing Time 0.031 seconds

A Study on the Non-linear Relationship between Asymmetric Interdependence and Conflict (불균형적 상호의존성과 갈등간 비선형적 관계에 대한 연구)

  • Kim, Jong-Keun;Kim, Jae-Wook
    • Journal of Distribution Research
    • /
    • v.10 no.2
    • /
    • pp.49-72
    • /
    • 2005
  • As interdependence and conflict are important to the understanding of channel interactions, many researchers have studied their relationship. Identifying the relationship between interdependence and conflict will help understanding an exchange relationship. In social science, the relationship between interdependence and conflict is explained by two contradictory theories, and there are also inconsistent results in marketing science. The authors suggest non-linear relations between asymmetric interdependence and conflict, based on bilateral deterrence theory and conflict spiral theory. Using survey data from industrial market, we demonstrate that there is an inverted U-shaped relationship between asymmetric interdependence and interfirm conflict. The result show, as the magnitude of interdependence is high. the hypothesis on the non-linear relationship between asymmetric interdependence and conflicts is acceptable on both suppliers and distributors. Finally, we discuss several theoretical implications and suggest limitations and future research issues.

  • PDF

A Path Way to Increase the Intention to Comply with Information Security Policy of Employees (조직 구성원들의 정보보안 정책 준수행위 의도에 관한 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.119-128
    • /
    • 2012
  • This study is to identify the factors that influence an intention to information security policy compliance of employees. To do this, this study is based on three theoretical backgrounds because of the lack of holistic perspective. Research results show that detection certainty and individual attachment have a positive effect on information security policy compliance intention. Detection certainty is influenced by security awareness education and training. Finally, response cost has a negative effect on information security policy compliance intention.

A Study on the Improvement of Information Protection Policy to Prevent the Misuse of Personal Information : Based on the Results of the Monitoring Personal Information Misuse in Financial Companies (개인정보 오남용 예방을 위한 정보보호정책 개선에 관한 연구 : 금융회사의 개인정보 오남용 모니터링 결과 중심으로)

  • Kim, Young-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1437-1446
    • /
    • 2019
  • As a result of various personal information leakage incidents, the government implemented enhanced privacy protection measures, and financial companies are making efforts to periodically check whether personal information is misused according to government measures, but the problem of misuse of personal information is still not improved. The purpose of this study is to analyze the results of field experiments using the monitoring system for misuse of personal information and to suggest ways to improve the misuse problem. Based on the specific deterrence theory, this study examined the effects of misuse prevention according to the method of dealing with misusers, and analyzed the relationship between the duties of misusers and their years of service and misuse. It is expected that the analysis results of this study will be used for effective policy establishment.

Factors Affecting Deviation Broadcasting Intentions of Internet Personal Broadcasting Jockey: From the Perspective of the Social Pressure of Viewers (인터넷 개인 방송 진행자들의 일탈 방송의도에 영향을 미치는 요인: 시청자의 사회적 압력 관점에서)

  • Chae, Seong Wook;Song, Hye Ji
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.169-192
    • /
    • 2022
  • With the spread of Internet personal broadcasting service, the number of personal broadcasting hosts (BJs: Broadcasting Jockeys) and viewers is increasing, and immediate communication between them is also actively taking place. This study examines whether the mechanism to suppress deviant behavior of BJ works effectively and how viewers interacting with BJs affect the intentions of deviant behaviors of BJs. Through the structural equation model, the effect of formal and informal sanctions of deterrence theory on BJs' intention of deviant broadcasting through their policy compliance attitude was investigated. The moderating effect of social pressure on the relationship between BJs' policy compliance attitude and their deviant broadcasting intention was confirmed. A total of 234 data were analyzed by surveying Africa TV BJs. As a result of the analysis, it was found that informal as well as formal sanctions increased the BJs' attitude toward policy compliance. However, it was confirmed that the social pressure perceived by BJs from Internet personal broadcasting viewers reduced the effect of policy compliance attitudes on reducing deviant broadcasting intentions.

A study on the Relationship between Cyberloafing Characteristic and Cognitive Dissonance

  • Chang, Hwal-Sik;Jung, Dae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.73-80
    • /
    • 2015
  • Cyberloafing is a term used to describe the actions of employees who use their Internet access at work for personal use while pretending to do legitimate work. This research that this puts the foundation on the general deterrence theory, social control theory, and Triandis model compares the individual characteristic including the group norm, self-control, perceived value among many factors having an effect on the personal ethical decision-making besides the general principles of ethics and stipulated regulation like the severity of sanction together. It was exposed to have the effect that the severity of punishment, self control, and perceived value notes to the internet abuse action. Therefore, the education and rules of punishment which is consistent along with the theoretical thesis supporting the groping of the preparation plan that is active in the various ethic problems has to be built. It is necessary that the company devises the internet application in the appropriate range, that is the partial the affirmation feeling which and it can allow officially. According to the cognitive dissonance, since this will have to allow with the positive direction can move to the misuse action with the intention differently, it can draw a conclusion.

Internal and External Factors of Knowledge Leakage Intention: From Tacit Knowledge Perspective (지식유출 의도의 내재적 및 외재적 요인에 대한 연구: 암묵적 지식 관점에서)

  • Kim, Yong-Tae;Koo, Yunmo;Lee, Jae-Nam
    • Knowledge Management Research
    • /
    • v.20 no.4
    • /
    • pp.75-97
    • /
    • 2019
  • In the rapidly changing business environment, knowledge has been recognized as a core asset for sustaining an organization's competitive advantage. In addition, knowledge sharing is one of the key elements of knowledge management, emphasizing external knowledge sharing beyond initial internal knowledge sharing. However, while knowledge management research emphasizes knowledge sharing, which is a positive aspect, research on preventing knowledge leakage that can have negative consequences is relatively lacking. Companies have tried to minimize the negative effects of knowledge management but many knowledge leakage accidents are still occurring. Therefore, this study aims to examine the effects of external factors based on deterrence theory and internal factors based on self-determination theory on knowledge leakage intention focusing on tacit knowledge. The results of the empirical analysis of 100 data sets collected through a scenario-based survey show that certainty of sanctions, social disapproval, and competence are found to have a significant effect on reducing tacit knowledge leakage intention. Furthermore, informal sanctions have a greater impact on tacit knowledge leakage intention than formal sanctions and external factors have a greater effect on tacit knowledge leakage intention than internal factors.

A Study on the Factors for Violation of Information Security Policy in Financial Companies : Moderating Effects of Perceived Customer Information Sensitivity (금융회사 정보보안정책의 위반에 영향을 주는 요인 연구 : 지각된 고객정보 민감도에 따른 조절효과)

  • Lee, Jeong-Ha;Lee, Sang-Yong Tom
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.225-251
    • /
    • 2015
  • This paper analyzed factors for employees to violate information security policy in financial companies based on the theory of reasoned action (TRA), general deterrence theory (GDT), and information security awareness and moderating effects of perceived sensitivity of customer information. Using the 376 samples that were collected through both online and offline surveys, statistical tests were performed. We found that the perceived severity of sanction and information security policy support to information policy violation attitude and subjective norm but the perceived certainty of sanction and general information security awareness support to only subjective norm. Also, the moderating effects of perceived sensitivity of customer information against information policy violation attitude and subjective norm were supported. Academic implications of this study are expected to be the basis for future research on information security policy violations of financial companies; Employees' perceived sanctions and information security policy awareness have an impact on the subjective norm significantly. Practical implications are that it can provide a guide to establish information security management strategies for information security compliance; when implementing information security awareness training for employees to deter violations by emphasizing the sensitivity of customer information, a company should make their employees recognize that the customer information is very sensitive data.

A Study on Intention to Pirate Digital Video by an Integrated Model of TPB, TIB, and Neutralization (TPB, TIB 및 중화기술의 통합적 모형에 의한 디지털 영상물 불법복제 의도에 관한 연구)

  • Noh, Gyoung-Soo;Sim, Wan-Jun;Shin, Ho-Kyun
    • The Journal of Information Systems
    • /
    • v.23 no.4
    • /
    • pp.197-219
    • /
    • 2014
  • Despite of continuous efforts to crack down on piracy using penalties and regulations, this unauthorized piracy market is still enormous. Since the moral hazard about this phenomenon is pervasive and continually upsets the major intellectual property markets, an alternative plan is required. The purpose of this study is to provide an objective insight for factors that affect people's digital video piracy behavior. The following two research propositions were the focus: what psychological factors affect piracy behavior and how are these factors related to one another? In order to accomplish the research aims, we reviewed literatures on the current state of piracy in South Korea, characteristics of digital contents, studies on criminal psychology and behavioral theories. Previous research in the fields of criminal theory indicated that neutralization, a form of rationalization, would help explain digital piracy intentions. Thus, this study developed a model that explains effects of neutralization techniques and tested the possibility of an integrated model with other behavioral theory such as TPB and TIB. Empirical results of the study(368 sample collected) showed that all the factors in TPB including Attitude to Piracy(+), Subjective Norm(-), Perceived Behavioral Control(+) had a significant impact on Piracy Intention. Moreover, two neutralization techniques, Condemn the Condemners(+) and Appeal to Higher Loyalties(+), had a significant effect on Piracy Intention. In addition, Past Behavior had strong impacts on Attitude(+), Perceived Behavioral Control(+) and Piracy Intention(+). In terms of Expected Profit, it had an impact on Attitude to Piracy positively. These findings suggest implications for protecting the current intellectual property markets, with many stakeholders in movies and media industries. There are some limitations as followed: first, the study did not consider other neutralization techniques, low level of deterrence and the other expected results despite the possibility of their effects. Second, the study needs improvements through longitudinal research because the cross-sectional research could not rule out the alternative explanations.

An Empirical Investigation of Relationship Between Interdependence and Conflict in Co-marketing Alliance (공동마케팅제휴에 있어 상호의존성과 갈등의 관계에 대한 연구)

  • Yi, Ho Taek;Cho, Young Wook;Kim, Ju Young
    • Asia Marketing Journal
    • /
    • v.13 no.3
    • /
    • pp.79-102
    • /
    • 2011
  • Researchers in channel dyads have devoted much attention to relationship between interdependence (i.e. interdependence enymmetry and total interdependence) and conflict that promote channel performance. In social science, in spite of the inconsistent results in marketing practice, there are two contradictory theories explain the relationship between interdependence and conflict - bilateral deterrence theory and conflict spiral theory. The authors apply these theories to co-marketing alliance situation in terms that this relationship is also incorporated both company's dependence, either from one company's perspective or each partner about its respective dependence. Using survey data and archival data from 181 companies enlisted in a telecommunication membership program, the authors find out the relationship between interdependence and conflict as well as investigate the antecedents of interdependence - transaction age, transaction frequency, the numbers of alliance partner, and co-marketing alliance specific assets according to previous researches. Using PLS analysis, the authors demonstrate that, with increasing total interdependence in a telecommunication membership program, two co-marketing partners' conflict level is increased in accord with the author's conflict spiral theory predictions. As expected, higher interdependence asymmetry has negative value to level of conflict even though this result is not statistically significant. Other findings can be summarized as follows. In the perspective of telecommunication company, transaction age, transaction frequency, and co-marketing alliance specific assets have influence on its dependence on a partner as independent variables. To the contrary, in a partner's perspective, transaction frequency, co-marketing alliance specific assets and the numbers of alliance partner have significantly impact on its dependence on a telecommunication company. In direct effect analysis, it is shown that transaction age, frequency and co-marketing alliance specific assets have direct influence on conflict. This results suggest that it is more useful for a telecommunication company to select a co-marketing partner which is frequently used by customers and earned high rates of mileage. In addition, the results show that dependence of a telecommunication company on a co-marketing partner is more significantly effected to co-marketing alliance conflict than partner's one. It provide an effective conflict management strategy to a telecommunication company for controling customer's usage rate or having the co-marketing partner deposit high level of alliance specific investment (i.e. mileage). To a co-marketing partner of telecommunication company, it is required control the percentage of co-marketing sales in total sales revenue or seek various co-marketing partners in order for co-marketing conflict management. The research implications, limitation and future research of these results are discussed.

  • PDF

The Employee's Information Security Policy Compliance Intention : Theory of Planned Behavior, Goal Setting Theory, and Deterrence Theory Applied (조직구성원의 정보보안 정책 준수의도: 계획된 행동이론, 목표설정이론, 억제이론의 적용)

  • Hwang, In-Ho;Lee, Hye-Young
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.155-166
    • /
    • 2016
  • In accordance with the increase of the importance of information security, organizations are making continuous investments to develop policies and adapt technology for information security. Organization should provide systemized support to enhance employees' security compliance intention in order to increase the degree of organization's internal security. This research suggests security policy goal setting and sanction enforcement as a method to improve employees' security compliance in planning and enforcing organization's security policy, and verifies the influencing relationship of Theory of Planned Behavior which explains employee's security compliance intention. We use structural equation modeling to verify the research hypotheses, and conducted a survey on the employees of organization with information security policy. We verified the hypotheses based on 346 responses. The result shows that the degree of goal setting and sanction enforcement has positive influence on self-efficacy and coping efficacy which are antecedents that influence employees' compliance intention. As a result, this research suggested directions for strategic approach for enhancing employee's compliance intention on organization's security policy.