Difference between revisions of "Social Bond Theory"

From IS Theory
Jump to navigation Jump to search
(Created page with "Acronym Alternate name(s) Main dependent construct(s)/factor(s) Main independent construct(s)/factor(s) Concise description of theory Diagram/schematic of theory Originating a...")
 
Line 1: Line 1:
Acronym
 
Alternate name(s)
 
Main dependent construct(s)/factor(s)
 
Main independent construct(s)/factor(s)
 
Concise description of theory
 
Diagram/schematic of theory
 
Originating author(s)
 
Seminal articles
 
Originating area
 
Level of analysis
 
Links to WWW sites describing theory
 
Links from this theory to other theories
 
IS articles that use the theory
 
Contributor(s)
 
  
Date last updated
+
== Acronym ==
 +
SBT
 +
 
 +
== Alternate name(s) ==
 +
Social Control Theory
 +
 
 +
== Main dependent construct(s)/factor(s) ==
 +
Urge to indulge in antisocial or anti-establishment or deviant behaviors
 +
 
 +
== Main independent construct(s)/factor(s) ==
 +
Attachment, involvement, commitment and personal norms
 +
 
 +
== Concise description of theory ==
 +
SBT is basically a theory from criminology literature proposed by Hirschi in 1969. SBT describes the social ties an individual has with his group. It says that though a person is naturally inclined towards crime, people with stronger social ties are less interested to indulge in any antisocial or deviant behavior.  Four different types of social bonds were defined by Hirschi that ensure socialization i.e. attachment, commitment, involvement and personal norms.
 +
Attachment refers to a person’s interest in his/ her social surroundings.
 +
Commitment refers to a person’s  subjective notion and commitment towards socially accepted goals.
 +
Involvement deals with individual’s dealing with conventional activities like family, work, social gatherings.
 +
Finally individual with strong personal norms and value systems are less likely to engage in any deviant behavior. 
 +
 
 +
== Diagram/schematic of theory ==
 +
N/A
 +
 
 +
== Originating author(s) ==
 +
Travis Warner Hirschi(1969)
 +
 
 +
== Seminal articles ==
 +
 
 +
 
 +
== Originating area ==
 +
Criminology
 +
 
 +
== Level of analysis ==
 +
Individual
 +
 
 +
== Links from this theory to other theories ==
 +
N/A
 +
 
 +
== IS articles that use the theory ==
 +
Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447-459.
 +
 
 +
Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers & Security, 24(6), 472-484.
 +
 
 +
Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79
 +
 
 +
== Contributor(s) ==
 +
Monalisa Mahapatra
 +
 
 +
== Date last updated ==

Revision as of 14:06, 28 February 2017

Acronym

SBT

Alternate name(s)

Social Control Theory

Main dependent construct(s)/factor(s)

Urge to indulge in antisocial or anti-establishment or deviant behaviors

Main independent construct(s)/factor(s)

Attachment, involvement, commitment and personal norms

Concise description of theory

SBT is basically a theory from criminology literature proposed by Hirschi in 1969. SBT describes the social ties an individual has with his group. It says that though a person is naturally inclined towards crime, people with stronger social ties are less interested to indulge in any antisocial or deviant behavior. Four different types of social bonds were defined by Hirschi that ensure socialization i.e. attachment, commitment, involvement and personal norms. Attachment refers to a person’s interest in his/ her social surroundings. Commitment refers to a person’s subjective notion and commitment towards socially accepted goals. Involvement deals with individual’s dealing with conventional activities like family, work, social gatherings. Finally individual with strong personal norms and value systems are less likely to engage in any deviant behavior.

Diagram/schematic of theory

N/A

Originating author(s)

Travis Warner Hirschi(1969)

Seminal articles

Originating area

Criminology

Level of analysis

Individual

Links from this theory to other theories

N/A

IS articles that use the theory

Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447-459.

Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers & Security, 24(6), 472-484.

Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79

Contributor(s)

Monalisa Mahapatra

Date last updated