skip to main content
research-article

Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives

Published:25 April 2018Publication History
Skip Abstract Section

Abstract

Criminal organizational insider computer abuse (ICA) research has focused on factors that influence either ICA intentions, or actual behavior during the ICA process. However, we argue that this research has not correctly conceptualized the decision-making processes involved in ICA. Thus, our first aim is to demonstrate this opportunity by leveraging the rational choice perspective (RCP) from criminology. The RCP advances an "event" stage, in which choices are made leading up to and during the criminal act. However, the RCP also acknowledges a preceding "initial involvement" stage, which encompasses those factors that lead an individual to consider participation in crime. RCP explains that if, during the initial involvement stage, an individual becomes motivated and decides that future criminal behavior is the most suitable course of action, then he or she will have reached a state of "readiness." It is only after an individual has become readied, and at a later time, does the individual make event decisions in the perpetration of a specific crime. Consequently, extant ICA research has overlooked consideration of why-prior to the crime-an individual initially considers engaging in such criminal activity in the first instance. Notably, this consideration should not to be conflated with intentions. We argue that there needs to be a clear distinction between those motivational factors that would lead to the consideration of such engagement at the initial involvement stage, and those factors that would lead an individual at the event stage to perpetrate a crime. We thus propose a revised version of the extended security action cycle (ESAC), which reflects these criminal decision-making stages. Moreover, we provide a means through which to identify and understand the relationship among those factors that may motivate an individual during the initial involvement stage by drawing on the life course perspective (LCP). With a focus on time, context, and process, the LCP offers a framework in which four key principles are inscribed. Through examples drawn from the LCP and white-collar crime literature, we illustrate how these principles can provide a basis for conceptualizing factors that motivate ICA and open up new avenues for future research/theory development.

References

  1. Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47--88.Google ScholarGoogle ScholarCross RefCross Ref
  2. Anonymous (2015). US cybersecurity: Progress stalled: Key findings from the 2015 US State of Cybercrime Survey. Retrieved from http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2015-us-cybercrime-survey.pdfGoogle ScholarGoogle Scholar
  3. Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4(1&2), 643--656.Google ScholarGoogle Scholar
  4. Bailey, A., Blake, M., and Cooke, T. (2004). Migration, care, and the linked lives of dual-earner households. Environment and Planning A, 36(9), 1617--1632.Google ScholarGoogle ScholarCross RefCross Ref
  5. Barlow, J. B., Warkentin, M., Ormond, D., and Dennis, A. R. (2013). Don't make excuses! Discouraging neutralization to reduce IT policy violation. Computers&Security, forthcoming. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Benson, M. L. (1985). Denying the guilty mind: Accounting for involvement in a white-collar crime. Criminology, 23(4), 583--607.Google ScholarGoogle ScholarCross RefCross Ref
  7. Benson, M. L. and Cullen, F. T. (1988). The special sensitivity of white-collar offenders to prison: a critique and research agenda. Journal of Criminal Justice, 16(3), 207--215.Google ScholarGoogle ScholarCross RefCross Ref
  8. Benson, M. L. and Kerley, K. R. (2000). Life course theory and white-collar crime. In H. Pontell&D. Shichor (Eds.), Contemporary Issues in Crime and Criminal Justice: Essays in Honor of Gilbert Geis (pp. 121--136). Upper Saddle River, New Jersey: Prentice Hall.Google ScholarGoogle Scholar
  9. Benson, M. L. and Moore, E. (1992). Are white-collar and common offenders the same? An empirical and theoretical critique of a recently proposed general theory of crime. Journal of Research in Crime and Delinquency, 29(3), 251--272.Google ScholarGoogle ScholarCross RefCross Ref
  10. Blumstein, A. (1986). Criminal Careers and 'Career Criminals' (Vol. 2). Washington, DC: National Research Council.Google ScholarGoogle Scholar
  11. Blumstein, A., Cohen, J., and Farrington, D. P. (1988). Criminal career research: Its value for criminology*. Criminology, 26(1), 1--35.Google ScholarGoogle ScholarCross RefCross Ref
  12. Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., and Polak, P. (2015). What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837--864. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Bossler, A. M. and Burrus, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers. In T. J. Holt&B. H. Schell (Eds.), Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications (pp. 38--67). Hershey, Pennsylvania: Information Science Reference.Google ScholarGoogle Scholar
  14. Bronfenbrenner, U. (1979). The Ecology of Human Development. Cambridge, Massachusetts: Harvard University Press.Google ScholarGoogle Scholar
  15. Cappelli, D., Keeney, M., Kowalski, E., Moore, A., and Randazzo, M. (2004). Insider threat study: Illicit cyber activity in the banking and finance sector. Retrieved from http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=50287Google ScholarGoogle Scholar
  16. Cappelli, D. M., Moore, A., and Trzeciak, R. (2012). The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Boston, Massachusetts: Addison-Wesley Professional. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Charles, N. and James, E. (2003). Gender and work orientations in conditions of job insecurity. The British Journal of Sociology, 54(2), 239--257.Google ScholarGoogle ScholarCross RefCross Ref
  18. Cheng, L., Li, Y., Li, W., Holm, E., and Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers&Security, 39, Part B(0), 447--459. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Clarke, R. and Cornish, D. (1985). Modelling offender's decisions: A framework for policy and research. In M. Tonry&N. Morris (Eds.), Crime and Justice: An Annual Review of Research (Vol. 6) (pp. 147--185). Chicago, Illinois: University of Chicago Press.Google ScholarGoogle Scholar
  20. Cloward, R. A. and Ohlin, L. E. (2013). Delinquency and Opportunity: A Study of Delinquent Gangs (Vol. 6). New York, New York: Routledge.Google ScholarGoogle Scholar
  21. Cornish, D. and Clarke, R. (1987). Understanding crime displacement: An application of rational choice theory. Criminology, 25(4), 933--947.Google ScholarGoogle ScholarCross RefCross Ref
  22. Cornish, D. B. and Clarke, R. V. (2013). Introduction. In D. Cornish&R.Clarke (Eds.), The Reasoning Criminal: Rational Choice Perspectives on Offending (pp. 1--16). New York, New York: Transaction.Google ScholarGoogle Scholar
  23. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., and Baskerville, R. (2013). Future directions for behavioral information security research. Computers&Security, 32(February), 90--101.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Cummings, A., Lewellen, T., McIntire, D., Moore, A., and Trzeciak, R. (2012). Insider threat study: Illicit cyber activity involving fraud in the U.S. financial services sector. Special Report Carnegie Mellon University/SEI-2012-SR-004, 2012. Retrieved from http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=27971#Google ScholarGoogle Scholar
  25. D'Arcy, J. and Devaraj, S. (2012). Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43(6), 1091--1124.Google ScholarGoogle ScholarCross RefCross Ref
  26. D'Arcy, J. and Hovav, A. (2007). Deterring internal information systems misuse. Communications of the ACM, 50(10), 113--117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D'Arcy, J. and Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89(1), 59--71.Google ScholarGoogle ScholarCross RefCross Ref
  28. D'Arcy, J., Hovav, A., and Galletta, D. (2009a). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. D'Arcy, J., Hovav, A., and Galletta, D. F. (2009b). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20(1), 79--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Denzin, N. (1977). Notes on the criminogenic hypothesis: a case study of the American liquor industry. American Sociological Review, 42(6), 905--920.Google ScholarGoogle ScholarCross RefCross Ref
  31. Elder, G. (1987). War mobilization and the life course: a cohort of World War II veterans. Sociological Forum, 2(3), 449--472.Google ScholarGoogle ScholarCross RefCross Ref
  32. Elder, G. (1994). Time, human agency, and social change: perspectives on the life course. Social Psychology Quarterly, 57(1), 4--15.Google ScholarGoogle ScholarCross RefCross Ref
  33. Elder, G. (1998). The life course as development theory. Child Development, 69(1), 1--12.Google ScholarGoogle ScholarCross RefCross Ref
  34. Ernst&Young (2010). 12th Annual Global Information Security Survey: Outpacing Change: Ernst&Young.Google ScholarGoogle Scholar
  35. Giele, J. and Elder, G. (1998). Life course research: Development of a field. In J. Giele&G. Elder (Eds.), Methods of Life Course Research: Qualitative and Quantitative Approaches. Thousand Oaks, California: SAGE.Google ScholarGoogle Scholar
  36. Gong, F., Xu, J., Fujishiro, K., and Takeuchi, D. T. (2011). A life course perspective on migration and mental health among Asian immigrants: the role of human agency. Social Science&Medicine, 73(11), 1618--1626.Google ScholarGoogle Scholar
  37. Guo, K. H. and Yuan, Y. (2012). The effects of multilevel sanctions on information security violations: a mediating model. Information&Management, 49(6), 320--326. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Guo, K. H., Yuan, Y., Archer, N. P., and Connelly, C. E. (2011). Understanding nonmalicious security violations in the workplace: a composite behavior model. Journal of Management Information Systems, 28(2), 203--236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Hansen, J. V., Lowry, P. B., Meservy, R., and McDonald, D. (2007). Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems, 43(4), 1362--1374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Harrington, S. J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20(3), 257--278. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Herath, T. and Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 28(2), 106--125.Google ScholarGoogle ScholarCross RefCross Ref
  42. Hirschi, T. (2002). Causes of Delinquency. New Brunswick, New Jersey: Transaction.Google ScholarGoogle Scholar
  43. Hovav, A. and D'Arcy, J. (2012). Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea. Information&Management, 49(2), 99--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Hsu, J., Shih, S.-P., Hung, Y. W., and Lowry, P. B. (2015). The role of extra-role behaviors and social controls in information security policy effectiveness. Information Systems Research, 26(2), 282--300.Google ScholarGoogle ScholarCross RefCross Ref
  45. Hu, Q., Xu, Z., Dinev, T., and Ling, H. (2011). Does deterrence work in reducing information security policy abuse by employees? Communications of the ACM, 54(6), 54--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. James, T. L., Lowry, P. B., Wallace, L., and Warkentin, M. (2017). The effect of belongingness on obsessive-compulsive disorder in the use of online social networks. Journal of Management Information Systems, forthcoming(Google ScholarGoogle ScholarCross RefCross Ref
  47. Jenkins, J. L., Grimes, M., Proudfoot, J., and Lowry, P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time warnings. Information Technology for Development, 20(2), 196--213. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Johnston, A. C., Warkentin, M., and Siponen, M. T. (2015). An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS quarterly, 39(1), 113--134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Keeney, M., Kowalski, E., Cappelli, D., Moore, A., Shimeall, T., and Rogers, S. (2005). Insider threat study: Computer systems sabotage in critical infrastructure sectors. Retrieved from http://www.cert.org/insider_threat/insidercross.htmlGoogle ScholarGoogle Scholar
  50. Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., and Greer, C. (2013). Information disclosure on mobile devices: re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12), 1163--1173. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Kelan, E. (2008). Gender, risk and employment insecurity: the masculine breadwinner subtext. Human Relations, 61(9), 1171--1202.Google ScholarGoogle ScholarCross RefCross Ref
  52. Kinnunen, U., Mauno, S., Natti, J., and Happonen, M. (1999). Perceived job insecurity: a longitudinal study among Finnish employees. European Journal of Work and Organizational Psychology, 8(2), 243--260.Google ScholarGoogle ScholarCross RefCross Ref
  53. Klenowski, P., Copes, H., and Mullins, C. (2011). Gender identity, and accounts: how white collar offenders do gender when making sense of their crimes. Justice Quarterly, 28(1), 46--69.Google ScholarGoogle ScholarCross RefCross Ref
  54. Lai, F., Li, D., and Hsieh, C.-T. (2012). Fighting identity theft: the coping perspective. Decision Support Systems, 52(2), 353--363. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Lee, S. M., Lee, S. G., and Yoo, S. (2004a). An integrative model of computer abuse based on social control and general deterrence theories. Information&Management, 41(6), 707--718. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Lee, Z., Lee, Y., and Kim, Y. (2004b). Personal web page usage in organizations. In M. Anandarajan&C. A. Simmers (Eds.), Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management (pp. 28--45). Hershey, Pennsylvania: Information Science Publishing.Google ScholarGoogle Scholar
  57. Loch, K. D., Carr, H. H., and Warkentin, M. E. (1992). Threats to information systems: Today's reality, yesterday's understanding. MIS Quarterly, 16(2), 173--186.Google ScholarGoogle ScholarCross RefCross Ref
  58. Lowry, P. B., Dinev, T., and Willison, R. (2017a). Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda. European Journal of Information Systems, forthcoming.Google ScholarGoogle Scholar
  59. Lowry, P. B., Posey, C., Bennett, R. J., and Roberts, T. L. (2015). Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust. Information Systems Journal, 25(3), 193--230. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Lowry, P. B., Posey, C., Roberts, T. L., and Bennett, R. J. (2014). Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse. Journal of Business Ethics, 121(3), 385--401.Google ScholarGoogle ScholarCross RefCross Ref
  61. Lowry, P. B., Zhang, J., Wang, C., and Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning (SSSL) model. Information Systems Research, 27(4), 962--986.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Lowry, P. B., Zhang, J., and Wu, T. (2017b). Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework. Computers in Human Behavior, 68(March), 104--120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Mahmood, M. A., Siponen, M., Straub, D., Rao, H. R., and Raghu, T. S. (2010). Moving toward black hat research in information systems security: an editorial introduction to the special issue. MIS Quarterly, 34(3), 431--433. Google ScholarGoogle ScholarCross RefCross Ref
  64. Modell, J. (1989). Into One's Own: From Youth to Adulthood in the United States 1920--1975. Berkeley, California: University of California Press.Google ScholarGoogle Scholar
  65. Moody, G. D. and Siponen, M. (2013). Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work. Information&Management, 50(6), 322--335. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Moore, R. and McMullan, E. C. (2004). Perceptions of peer-to-peer file sharing among university students. Journal of Criminal Justice and Popular Culture, 11(1), 1--19.Google ScholarGoogle Scholar
  67. Nandedkar, A. and Midha, V. (2012). It won't happen to me: an assessment of optimism bias in music piracy. Computers in Human Behavior, 28(1), 41--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Paternoster, R. (1989a). Absolute and restrictive deterrence in a panel of youth: Explaining the onset, persistance/desistance, and frequency of delinquent offending. Social Problems, 36(3), 289--309.Google ScholarGoogle ScholarCross RefCross Ref
  69. Paternoster, R. (1989b). Decisions to participate in and desist from four types of common delinquency: Deterrence and the rational choice perspective. Law&Society Review, 23(1), 7--40.Google ScholarGoogle Scholar
  70. Peace, A. G., Galletta, D. F., and Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153--177. Google ScholarGoogle ScholarCross RefCross Ref
  71. Piquero, N. and Benson, M. (2004a). White-collar crime and criminal careers: Specifying a trajectory of punctuated situational offending. Journal of Contemporary Criminal Justice, 20(2), 148--165.Google ScholarGoogle ScholarCross RefCross Ref
  72. Piquero, N. L. and Benson, M. L. (2004b). White-collar crime and criminal careers specifying a trajectory of punctuated situational offending. Journal of Contemporary Criminal Justice, 20(2), 148--165.Google ScholarGoogle ScholarCross RefCross Ref
  73. Posey, C., Bennett, R. J., Roberts, T. L., and Lowry, P. B. (2011). When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse. Journal of Information System Security, 7(1), 24--47.Google ScholarGoogle Scholar
  74. Posey, C., Roberts, T. L., and Lowry, P. B. (2015). The impact of organizational commitment on insiders' motivation to protect organizational information assets. Journal of Management Information Systems, 32(4), 179--214.Google ScholarGoogle ScholarCross RefCross Ref
  75. Posey, C., Roberts, T. L., Lowry, P. B., Bennett, R. J., and Courtney, J. (2013). Insiders' protection of organizational information assets: development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors. MIS Quarterly, '37(4), 1189--1210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. PwC (2012). Eye of the storm. Key findings from the 2012 global state of information security survey. Retrieved from http://www.cen7dias.es/BOLETINES/330/pwc.pdfGoogle ScholarGoogle Scholar
  77. PwC (2014). The global state of information security survey. Retrieved from http://www.pwc.com/gx/en/consulting-services/information-security-survey/download.jhtmlGoogle ScholarGoogle Scholar
  78. Rogers, M., Smoak, N. D., and Liu, J. (2006). Self-reported deviant computer behavior: a big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior, 27(3), 245--268.Google ScholarGoogle ScholarCross RefCross Ref
  79. Rothman, M. and Gandossy, R. (1982). Sad tales: the accounts of white-collar defendants and the decision to sanction. Pacific Sociological Review, 25(4), 449--473.Google ScholarGoogle ScholarCross RefCross Ref
  80. Salleh, N., Hussein, R., Mohamed, N., Karim, N. S. A., Ahlan, A. R., and Aditiawarman, U. (2012). Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk. Journal of Internet Social Networking&Virtual Communities, 2012(article ID 281869), 1--11.Google ScholarGoogle Scholar
  81. Siponen, M. and Vance, A. (2010). Neutralization: new insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487--502. Google ScholarGoogle ScholarCross RefCross Ref
  82. Smith, A. L., Baxter, R. J., Boss, S. R., and Hunton, J. E. (2012). The dark side of online knowledge sharing. Journal of Information Systems, 26(2), 71--91.Google ScholarGoogle ScholarCross RefCross Ref
  83. Straub, D. W. (1990). Effective IS security. Information Systems Research, 1(3), 255--276. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Straub, D. W., Jr. (1986). Deterring computer abuse: The effectiveness of deterrent countermeasures in the computer security environment. Unpublished D.B.A., Indiana University, Graduate School of Business, Bloomington, IN.Google ScholarGoogle Scholar
  85. Straub, D. W. and Welke, R. J. (1998). Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22(4), 441--469. Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Streib, G. and Binstock, R. (1990). Aging and the social sciences: changes in the field. In R. Binstock&L. George (Eds.), Handbook of Aging and the Social Sciences. New York, New York: Academic Press.Google ScholarGoogle Scholar
  87. Sverke, M. and Hellgren, J. (2002). The nature of job insecurity: understanding employment uncertainty on the brink of a new millennium. Applied Psychology, 51(1), 23--42.Google ScholarGoogle ScholarCross RefCross Ref
  88. Thébaud, S. (2010). Masculinity, bargaining, and breadwinning: understanding men's housework in the cultural context of paid work. Gender&Society, 24(3), 330--354.Google ScholarGoogle ScholarCross RefCross Ref
  89. Vance, A., Lowry, P. B., and Eggett, D. (2013). Using accountability to reduce access policy violations in information systems. Journal of Management Information Systems, 29(4), 263--289.Google ScholarGoogle ScholarCross RefCross Ref
  90. Vance, A., Lowry, P. B., and Eggett, D. (2015). A new approach to the problem of access policy violations: Increasing perceptions of accountability through the user interface. MIS Quarterly, 39(2), 345--366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Wall, J. D., Lowry, P. B., and Barlow, J. (2016). Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess. Journal of the Association for Information Systems, 17(1), 39--76.Google ScholarGoogle ScholarCross RefCross Ref
  92. Warkentin, M. E. and Willison, R. (2009). Behavioral and policy issues in information systems security: the insider threat. European Journal of Information Systems, 18(2), 101--105.Google ScholarGoogle ScholarCross RefCross Ref
  93. Warren, T. (2007). Conceptualizing breadwinning work. Work, Employment&Society, 21(2), 317--336.Google ScholarGoogle ScholarCross RefCross Ref
  94. Weisburd, D. (1991). Crimes of the Middle Classes: White Collar Offenders in the Federal Courts. New Haven, Connecticut: Yale University Press.Google ScholarGoogle Scholar
  95. Weisburd, D. and Waring, E. (2001). White-collar Crime and Criminal Careers. New York, New York: Cambridge University Press.Google ScholarGoogle Scholar
  96. Weisburd, D., Waring, E., and Chayet, E. (1995). Specific deterrence in a sample of offenders convicted of white-collar crimes. Criminology, 33(4), 587--607.Google ScholarGoogle ScholarCross RefCross Ref
  97. Wheeler, S. (1992). The problem of white-collar crime motivation. In K. Schlegel&D. Weisburd (Eds.), White Collar Crime Reconsidered (pp. 108--123). Boston, Massachusetts: Northeastern University Press.Google ScholarGoogle Scholar
  98. Wheeler, S., Weisburd, D., Waring, E., and Bode, N. (1988). White collar crime and criminals. American Criminal Law Review, 25(3), 331--357.Google ScholarGoogle Scholar
  99. Willison, R. (2006). Understanding the perpetration of employee computer crime in the organisational context. Information and Organization, 16(4), 304--324. Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Willison, R. and Backhouse, J. (2006). Opportunities for computer crime: considering systems risk from a criminological perspective. European Journal of Information Systems, 15(4), 403--414.Google ScholarGoogle ScholarCross RefCross Ref
  101. Willison, R. and Siponen, M. (2009). Overcoming the insider: reducing employee computer crime through situational crime prevention. Communications of the ACM, 52(9), 133--137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. Willison, R. and Warkentin, M. (2013). Beyond deterrence: an expanded view of employee computer abuse. MIS Quarterly, 37(1), 1--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. Willison, R., Warkentin, M., and Johnston, A. C. (2018). Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives. Information Systems Journal, 28(2).Google ScholarGoogle Scholar
  104. Willot, S., Griffin, C., and Torrance, M. (2001). Snakes and ladders: upper-middle class male offenders talk about economic crime. Criminology, 39(2), 441--466.Google ScholarGoogle ScholarCross RefCross Ref
  105. Workman, M. (2007). Gaining access with social engineering: an empirical study of the threat. Information Systems Security, 16(6), 315--331. Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. Workman, M. (2008). Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology, 59(4), 662--674. Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Workman, M., Bommer, W. H., and Straub, D. W. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6), 2799--2816. Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Zhang, L., Pavur, R., York, P., and Amos, C. (2013). Testing a model of users' Web risk information seeking intention. Informing Science: The International Journal of an Emerging Transdiscipline, 16(2013), 1--18.Google ScholarGoogle Scholar
  109. Zhou, X. and Hou, L. (1999). Children of the cultural revolution: the state and the life course in the People's Republic of China. American Sociological Review, 64(1), 12--36.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader