Changes

Jump to navigation Jump to search
m
Line 1: Line 1: −
== Acronym ==
+
==Acronym==
    
Acronyms are not commonly used for accountability theory.
 
Acronyms are not commonly used for accountability theory.
   −
== Alternate name(s) ==
+
==Alternate name(s)==
    
Felt Accountability Theory, Accountability Model
 
Felt Accountability Theory, Accountability Model
   −
== Main dependent construct(s)/factor(s) ==
+
==Main dependent construct(s)/factor(s)==
 
Accountability is “is a process in which a person has a potential obligation to explain his/her actions to another party who has the right to pass judgment on those actions and to administer potential positive or negative consequences in response to them” (Vance, Lowry and Eggett 2015, p. 347).
 
Accountability is “is a process in which a person has a potential obligation to explain his/her actions to another party who has the right to pass judgment on those actions and to administer potential positive or negative consequences in response to them” (Vance, Lowry and Eggett 2015, p. 347).
   −
== Main independent construct(s)/factor(s) ==
+
==Main independent construct(s)/factor(s)==
    
Identifiability, expectation of evaluation, awareness of monitoring, social presence
 
Identifiability, expectation of evaluation, awareness of monitoring, social presence
   −
== Originating area ==
+
==Originating area==
    
Organization science; Management
 
Organization science; Management
   −
== Level of analysis ==
+
==Level of analysis==
    
Individual; organizational
 
Individual; organizational
== Concise description of theory ==
+
==Concise description of theory==
 
As explained by Vance, Lowry and Eggett (2015), accountability theory explains how the perceived need to justify one’s behaviors to another party causes one to consider and feel accountable for the process by which decisions and judgments have been reached. In turn, this perceived need to account for a decision-making process and outcome increases the likelihood that one will think deeply and systematically about one’s procedural behaviors. This theory was originally developed by Tetlock, Lerner, and colleagues and has been effectively applied in organizational research.
 
As explained by Vance, Lowry and Eggett (2015), accountability theory explains how the perceived need to justify one’s behaviors to another party causes one to consider and feel accountable for the process by which decisions and judgments have been reached. In turn, this perceived need to account for a decision-making process and outcome increases the likelihood that one will think deeply and systematically about one’s procedural behaviors. This theory was originally developed by Tetlock, Lerner, and colleagues and has been effectively applied in organizational research.
    
Importantly, as explained carefully by Vance, Lowry, and Eggett (2013), a useful way to understand accountability is to distinguish between its two most prevalent uses: (1) as a virtue and (2) as a mechanism. As a virtue, accountability is seen as a quality in which a person displays a willingness to accept responsibility, a desirable trait in public officials, government agencies, or firms; hence, in this use, accountability is a positive feature of an entity. As a mechanism, accountability is seen as a process in which a person has a potential obligation to explain his or her actions to another party who has the right to pass judgment on the actions as well as to subject the person to potential consequences for his or her actions. Accountability theory focuses on the process of accountability.
 
Importantly, as explained carefully by Vance, Lowry, and Eggett (2013), a useful way to understand accountability is to distinguish between its two most prevalent uses: (1) as a virtue and (2) as a mechanism. As a virtue, accountability is seen as a quality in which a person displays a willingness to accept responsibility, a desirable trait in public officials, government agencies, or firms; hence, in this use, accountability is a positive feature of an entity. As a mechanism, accountability is seen as a process in which a person has a potential obligation to explain his or her actions to another party who has the right to pass judgment on the actions as well as to subject the person to potential consequences for his or her actions. Accountability theory focuses on the process of accountability.
   −
Accountability theory proposes several mechanisms that increase accountability perceptions. For example, “even the simplest accountability manipulation necessarily implicates several empirically distinguishable submanipulations” (Lerner and Tetlock 1999, p. 255), including the presence of another person, identifiability, and expectation of evaluation. Recent research has shown that IT design artifacts of systems can manipulate the four core components of accountability theory and thus improve employees’ felt accountability toward organizational system security without disruptive interventions or traininging (Vance et al. 2013; 2015): (1) identifiability, (2) expectation of evaluation, (3) awareness of monitoring, and (4) social presence.
+
Accountability theory proposes several mechanisms that increase accountability perceptions. For example, “even the simplest accountability manipulation necessarily implicates several empirically distinguishable submanipulations” (Lerner and Tetlock 1999, p. 255), including the presence of another person, identifiability, and expectation of evaluation. Recent research has shown that IT design artifacts of systems can manipulate the four core components of accountability theory and thus improve employees’ felt accountability toward organizational system security without disruptive interventions or training (Vance et al. 2013; 2015): (1) identifiability, (2) expectation of evaluation, (3) awareness of monitoring, and (4) social presence.
    
''Identifiability'' is a person’s “knowledge that his outputs could be linked to him” and thus reveal his/her true identity (Williams, Harkins and Latane 1981, p. 309)
 
''Identifiability'' is a person’s “knowledge that his outputs could be linked to him” and thus reveal his/her true identity (Williams, Harkins and Latane 1981, p. 309)
Line 35: Line 35:     
''Social presence'' is the awareness of other users in the system (Vance, Lowry, and Eggett 2015).
 
''Social presence'' is the awareness of other users in the system (Vance, Lowry, and Eggett 2015).
== Diagram/schematic of theory ==
+
==Diagram/schematic of theory==
 
   
 
   
 
[[File:Accountability_figure1.jpg]]
 
[[File:Accountability_figure1.jpg]]
Line 41: Line 41:  
'''Figure 1. Overview of Accountability Theory Adapted to Preventing Access Policy Violations by Vance, Lowry, and Eggett (2015, p. 348).'''
 
'''Figure 1. Overview of Accountability Theory Adapted to Preventing Access Policy Violations by Vance, Lowry, and Eggett (2015, p. 348).'''
   −
== Originating author(s) ==
+
==Originating author(s)==
 
P. E. Tetlock developed the initial concepts and mechanisms on accountability through several key papers.   
 
P. E. Tetlock developed the initial concepts and mechanisms on accountability through several key papers.   
   Line 47: Line 47:     
Anthony Vance and Paul Benjamin Lowry later re-contexualized accountability for use with deterring security access policy violations with organizational employees by designing system features that promote accountability in end-users.
 
Anthony Vance and Paul Benjamin Lowry later re-contexualized accountability for use with deterring security access policy violations with organizational employees by designing system features that promote accountability in end-users.
== Seminal articles ==
+
==Seminal articles==
 
Lerner, J. S., and Tetlock, P. E. 1999. “Accounting for the Effects of Accountability,” Psychological Bulletin (125:2), pp. 255-275
 
Lerner, J. S., and Tetlock, P. E. 1999. “Accounting for the Effects of Accountability,” Psychological Bulletin (125:2), pp. 255-275
   Line 54: Line 54:  
Tetlock, P. E. 1983b. “Accountability and the Perseverance of First Impressions,” Social Psychology Quarterly (46:4), pp. 285-292.
 
Tetlock, P. E. 1983b. “Accountability and the Perseverance of First Impressions,” Social Psychology Quarterly (46:4), pp. 285-292.
   −
== Other key references outside of IS ==
+
==Other key references outside of IS==
    
Tetlock, P. E. 1985. “Accountability: A Social Check on the Fundamental Attribution Error,” Social Psychology Quarterly (48:3), pp. 227-236.
 
Tetlock, P. E. 1985. “Accountability: A Social Check on the Fundamental Attribution Error,” Social Psychology Quarterly (48:3), pp. 227-236.
Line 72: Line 72:  
Tetlock, P. E., Skitka, L., and Boettger, R. 1989. “Social and Cognitive Strategies for Coping with Accountability: Conformity, Complexity, and Bolstering,” Journal of Personality andSocial Psychology (57:4), pp. 632-640.
 
Tetlock, P. E., Skitka, L., and Boettger, R. 1989. “Social and Cognitive Strategies for Coping with Accountability: Conformity, Complexity, and Bolstering,” Journal of Personality andSocial Psychology (57:4), pp. 632-640.
   −
== Leading IS Articles that Contextualized Accountability Theory to IS context ==
+
==Leading IS Articles that Contextualized Accountability Theory to IS context==
 
Anthony Vance, Paul Benjamin Lowry, and Dennis Eggett (2015). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2549000 A new approach to the problem of access policy violations: Increasing perceptions of accountability through the user interface],” MIS Quarterly (MISQ), vol. 39(2), pp. 345–366.
 
Anthony Vance, Paul Benjamin Lowry, and Dennis Eggett (2015). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2549000 A new approach to the problem of access policy violations: Increasing perceptions of accountability through the user interface],” MIS Quarterly (MISQ), vol. 39(2), pp. 345–366.
   Line 78: Line 78:     
Vance, Lowry, and Eggett (2015; 2013) uniquely contextualized accountability theory to the context of organizational security—namely for dealing with access policy violations. Access-policy violations are a growing problem with substantial costs for organizations. Although training programs and sanctions have been suggested as a means of reducing these violations, evidence shows these persist. It is thus imperative to identify additional ways to reduce access-policy violations, especially for systems providing broad access to data. They used accountability theory to develop four user-interface (UI) design artifacts that raise users’ accountability perceptions within systems and in turn decrease access-policy violations. To test their new accountability model, they uniquely applied the scenario-based factorial survey method to various graphical manipulations of a records system containing sensitive information at a large organization with over 300 end-users who use the system daily. They showed that the UI design artifacts corresponding to four submanipulations of accountability can raise accountability and reduce access policy violation intentions. Importantly, this approach increases accountability without harsh policies (e.g., threats through sanctions) or disruption intervention (e.g., training).
 
Vance, Lowry, and Eggett (2015; 2013) uniquely contextualized accountability theory to the context of organizational security—namely for dealing with access policy violations. Access-policy violations are a growing problem with substantial costs for organizations. Although training programs and sanctions have been suggested as a means of reducing these violations, evidence shows these persist. It is thus imperative to identify additional ways to reduce access-policy violations, especially for systems providing broad access to data. They used accountability theory to develop four user-interface (UI) design artifacts that raise users’ accountability perceptions within systems and in turn decrease access-policy violations. To test their new accountability model, they uniquely applied the scenario-based factorial survey method to various graphical manipulations of a records system containing sensitive information at a large organization with over 300 end-users who use the system daily. They showed that the UI design artifacts corresponding to four submanipulations of accountability can raise accountability and reduce access policy violation intentions. Importantly, this approach increases accountability without harsh policies (e.g., threats through sanctions) or disruption intervention (e.g., training).
== IS articles that use the theory ==
+
==IS articles that use the theory==
 
David Eargle, Anthony Vance, and Paul Benjamin Lowry (2013). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2529609 How moral Intensity and impulsivity moderate the influence of accountability on access policy violations in information systems],” Seventh Workshop on Information Security and Privacy 2013 (WISP 2013) at the 2013 International Conference on Information Systems (ICIS 2013), Milan, Italy, December 14 (doi: http://dx.doi.org/10.13140/2.1.3754.4644).   
 
David Eargle, Anthony Vance, and Paul Benjamin Lowry (2013). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2529609 How moral Intensity and impulsivity moderate the influence of accountability on access policy violations in information systems],” Seventh Workshop on Information Security and Privacy 2013 (WISP 2013) at the 2013 International Conference on Information Systems (ICIS 2013), Milan, Italy, December 14 (doi: http://dx.doi.org/10.13140/2.1.3754.4644).   
   Line 90: Line 90:     
Anthony Vance, Gove Allen, Braden Molyneux, and Paul Benjamin Lowry (2010). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1668117 Making systems users accountable: Using accountability to deter access policy violations],” Proceedings of the Dewald Roode Workshop on IS Security Research 2010, IFIP WG 8.11 / 11.13, Waltham, MA, October 8–9, pp. 369–391.   
 
Anthony Vance, Gove Allen, Braden Molyneux, and Paul Benjamin Lowry (2010). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1668117 Making systems users accountable: Using accountability to deter access policy violations],” Proceedings of the Dewald Roode Workshop on IS Security Research 2010, IFIP WG 8.11 / 11.13, Waltham, MA, October 8–9, pp. 369–391.   
== Links from this theory to other theories ==
+
==Links from this theory to other theories==
    
n/a
 
n/a
   −
== External links ==
+
==External links==
    
n/a
 
n/a
   −
== Original Contributor(s) ==
+
==Original Contributor(s)==
    
[http://www.cb.cityu.edu.hk/staff/pblowry Paul Benjamin Lowry]
 
[http://www.cb.cityu.edu.hk/staff/pblowry Paul Benjamin Lowry]
4

edits

Navigation menu