Yan Chen K. Ramamurthy and Kuang-Wei Wen collaborated to write an article titled Organizations’ Information Security Policy Compliance: Stick or Carrot Approach? The article suggests internal security threats are most commonly seen in the forms of insider security breaches or employee negligence. The authors discuss results from research and surveys conducted by external control groups and through their own control groups used to determine what control methodology best motivates employees to follow an organizations security policies.
During their analysis of the data the authors discovered with each set of results in favor of punishment or reward there were opposing results …show more content…
The authors reviewed information from government agencies, universities and health care institutions from different studies in both the United States and the United Kingdom. Upon evaluation for the studies concerning information security policies the authors determined Employees do not appear to have motivation to follow an organizations security policies. Which leads to the writings targeted purpose of determining the best methodologies used as control measures for security policy …show more content…
The GDT is a theory used in the area of criminal justice which strives to discourage criminal behavior through publicized display of individual punishments. The authors analyze results for instances where punishment is used and the effect it has on the businesses and employees alike. The analysis also reflected the effects rewards have on the organization and their employees. After these evaluations of the reward and punishment control mechanisms used independently they conduct their own research using both of these elements together.
By using the research from other studies, analyzing the information and determining these studies of the control mechanism used independently are in effective by themselves they use the essence of evaluative essay writing. When attempting to consider the gaps in the theories of punishment verses reward, they look at the alternative of implementing the two control methods together. This leads them to the next step of introducing a third element, certainty of control implementing the use of critical essay construction in their writing.