2006
DOI: 10.1016/j.infoandorg.2006.08.001
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the perpetration of employee computer crime in the organisational context

Abstract: While hackers and viruses fuel the IS security concerns for organisations, the problems posed by employee computer crime should not be underestimated. Indeed, a growing number of IS security researchers have turned their attention to the 'insider' threat.However, to date, there has been a lack of insight into the relationship between the actual behaviour of offenders during the perpetration of computer crime, and the organisational context in which the behaviour takes place. To address this deficiency, this pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
67
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 88 publications
(67 citation statements)
references
References 39 publications
0
67
0
Order By: Relevance
“…But the greatest threat of all is the insider threat -the organizational member who is a 'trusted agent' inside the firewall (Im & Baskerville, 2005;Stanton et al, 2005;Willison, 2006;Willison & Backhouse, 2006). This employee or other constituent with a valid username and password regularly interacts with the information assets of the organization.…”
mentioning
confidence: 99%
“…But the greatest threat of all is the insider threat -the organizational member who is a 'trusted agent' inside the firewall (Im & Baskerville, 2005;Stanton et al, 2005;Willison, 2006;Willison & Backhouse, 2006). This employee or other constituent with a valid username and password regularly interacts with the information assets of the organization.…”
mentioning
confidence: 99%
“…However, any security system to protect the integrity of information and data in a telework environment is effective only to the extent that teleworkers follow security guidelines and protocols (Boss & Kirsch, 2007;Pahnila, Siponen, & Mahmood, 2007;Siponen, 2005;Willison, 2006).…”
Section: Empirical Research In Information Security and Assurancementioning
confidence: 99%
“…To assist in their development the use of what is termed a 'universal script' has been proposed. 2,8,9 In essence, this form of script provides a framework that helps to distinguish between the script's stages and, subsequently, the corresponding criminal actions. Table 2 displays the universal script framework, and an illustrative example of computer crime.…”
Section: Applying Situational Crime Prevention To Information Securitymentioning
confidence: 99%