Understanding the perpetration of employee computer crime in the organisational context

Information and Organization - Tập 16 - Trang 304-324 - 2006
Robert Willison1
1Copenhagen Business School, Howitzvej 60, DK-2000 Frederiksberg, Denmark

Tài liệu tham khảo

Audit Commission. (1998). Ghost in the machine: An analysis of IT Fraud and abuse. London: Audit Commission Publications. Backhouse, 1995, Managing computer crime: a research outlook, Computers and Security, 14, 645, 10.1016/0167-4048(95)00024-0 Bachman, 1992, The rationality of sexual offending: testing a deterrence/rational choice conception of sexual assault, Law and Society Review, 26, 343, 10.2307/3053901 Bandura, 1976, Social learning analysis of aggression, 202 Bandura, 1977 Baskerville, 1998, Diversity in information systems action research methods, European Journal of Information Systems, 7, 235, 10.1057/palgrave.ejis.3000298 Becker, 1981, Who are the computer criminals?, ACM SIGCAS Computers and Society, 12, 18, 10.1145/957893.957898 CSI/FBI. (2004). Computer crime and security survey. San Francisco: CSI. Campbell, M. (1988). Ethics and computer security: Cause and effect. In: Proceedings of the 1988 ACM sixteenth annual conference on computer science. Atlanta, Georgia. United States. Clarke, 1980, Situational crime prevention: Theory and practice, British Journal of Criminology, 20, 136, 10.1093/oxfordjournals.bjc.a047153 Cardinali, 1995, Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime, Work Study, 44, 11, 10.1108/00438029510147745 1992 1997 Clarke, 1985, Modelling offender’s decisions : a framework for policy and research, Vol. 6, 147 Clarke, 2000, Rational Choice, 27 Clarke, 1997, A revised classification of situational crime prevention techniques, 21 Cornish, 1994, Crime as scripts, 30 Cornish, 1994, The procedural analysis of offending and its relevance for situational prevention, Vol. 3, 151 Cornish, 1986, Situational prevention, displacement of crime and rational choice theory, 1 Cornish, 1989, Crime specialisation, crime displacement and rational choice theory, 103 Cornish, 2003, Opportunities, precipitators and criminal decisions: a reply to Wortley’s critique of situational crime prevention, Vol. 16, 151 DTI/PWC. (2004). Information security breaches survey. London: PWC. Dhillon, 2001, Computer crimes: theorizing about the enemy within, Computers and Security, 20, 715, 10.1016/S0167-4048(01)00813-6 Dhillon, 2004, Computer crime at CEFORMA: a case study, International Journal of Information Management, 24, 551, 10.1016/j.ijinfomgt.2004.08.009 Ekblom, 1994, Proximal circumstances: a mechanism-based classification of crime prevention, Vol. 2, 185 Ernst & Young. (2004). Global information security survey. Felson, 2002 Gardner, 1985 Graesser, 1979, Recognition memory for typical and atypical actions in scripted activities: tests of a script pointer+tag hypothesis, Journal of Verbal Learning and Verbal Behavior, 18, 319, 10.1016/S0022-5371(79)90182-8 Goodhue, 1991, Security concerns of systems users: a study of perceptions of the adequacy of security measures, Information and Management, 20, 13, 10.1016/0378-7206(91)90024-V Gottfredson, 1990 Harrington, 1996, The effects of ethics and personal denial of responsibility on computer abuse judgements and intentions, MIS Quarterly, 20, 257, 10.2307/249656 Hewstone, 1989 Hoffer, 1989, The 9 to 5 underground: are you policing computer crimes?, Sloan Management Review, 30, 35 ISO BS17799. (2005). Information technology – security techniques – codes of practice for information security management. Switzerland: International Organization for Standardization. Kesar, 1998, Developing ethical practices to minimize computer misuse, Social Science Computer Review, 16, 240, 10.1177/089443939801600302 Klepper, 1989, Tax compliance and perceptions of the risks of detection and criminal prosecution, Law and Society Review, 23, 209, 10.2307/3053715 Lacoste, 2003, Crime and innovation: a script analysis of patterns in check forgery, Vol. 16, 169 Loch, 1992, Threats to information systems: today’s reality, yesterday’s understanding, MIS Quarterly, 17, 173, 10.2307/249574 Mathiassen, 2002, Collaborative research practice, Information, Technology and People, 14, 321, 10.1108/09593840210453115 Nagin, 1993, Enduring individual differences and rational choice theories of crime, Law and Society Review, 27, 467, 10.2307/3054102 Nakamura, 1985, Script processing in a natural situation, Memory and Cognition, 13, 140, 10.3758/BF03197006 Newman, 1997, Introduction: towards a theory of situational crime prevention, 1 Newman, 2003 Parker, 1976 Parker, 1981 Parker, 1998 Paternoster, 1989, Decisions to participate in and desist from four types of common delinquency, Law and Society Review, 23, 7, 10.2307/3053879 Paternoster, 1996, Sanction threats and appeals to morality: testing a rational choice model of corporate crime, Law and Society Review, 30, 549, 10.2307/3054128 Peltier, 2004, Risk analysis and risk management, Information Systems Security, 13, 44, 10.1201/1086/44640.13.4.20040901/83732.7 Poyner, 1991 Sherizen, 1995, Can computer crime be deterred?, Security Journal, 6, 177, 10.1016/0955-1662(94)00121-9 Smith, 2000, Crime and public transport, Vol. 27, 169 Straub, 1986, Computer abuse and computer security: update on an empirical study, Security, Audit, and Control Review, 4, 21 Straub, D. (1986b). Deterring computer abuse: the effectiveness of deterrent countermeasures in the computer security environment. Unpublished doctoral dissertation, Indiana University Graduate School of Business. Straub, 1990, Effective IS security: an empirical study, Information Systems Research, 1, 255, 10.1287/isre.1.3.255 Straub, 1992, Deterring highly motivated computer abusers: a field experiment in computer security, 309 Straub, 1990, Discovering and disciplining computer abuse in organisations: a field study, MIS Quarterly, 14, 45, 10.2307/249307 Straub, 1998, Coping with systems risks: security planning models for management decision making, MIS Quarterly, 22, 441, 10.2307/249551 Sykes, 1957, Techniques of neutralisation: a theory of delinquency, American Sociological Review, 22, 664, 10.2307/2089195 Taylor, 1981, Schematic bases of social information processing, Vol. 1, 89 Tremblay, 2001, Bodyswitching and related adaptations in the resale of stolen vehicles, British Journal of Criminology, 41, 561, 10.1093/bjc/41.4.561 Willison, R. (2002). Opportunities for computer abuse: assessing a crime specific approach in the case of Barings Bank. Unpublished PhD Thesis. University of London. Willison, 2006, Understanding the offender/context dynamic for computer crimes, Information, Technology and People, 19, 170, 10.1108/09593840610673810 Willison, 2006, Opportunities for computer crime: considering systems risk from a criminological perspective, European Journal of Information Systems, 15, 403, 10.1057/palgrave.ejis.3000592 Wilson, 1975 Wood, 2002 Wortley, R. (1996). Guilt, shame and situational crime prevention. In R. Homel (Ed.), The politics and practice of situational crime prevention (pp.115–132, Vol. 5). Crime Prevention Studies.