Abstract
Criminal organizational insider computer abuse (ICA) research has focused on factors that influence either ICA intentions, or actual behavior during the ICA process. However, we argue that this research has not correctly conceptualized the decision-making processes involved in ICA. Thus, our first aim is to demonstrate this opportunity by leveraging the rational choice perspective (RCP) from criminology. The RCP advances an "event" stage, in which choices are made leading up to and during the criminal act. However, the RCP also acknowledges a preceding "initial involvement" stage, which encompasses those factors that lead an individual to consider participation in crime. RCP explains that if, during the initial involvement stage, an individual becomes motivated and decides that future criminal behavior is the most suitable course of action, then he or she will have reached a state of "readiness." It is only after an individual has become readied, and at a later time, does the individual make event decisions in the perpetration of a specific crime. Consequently, extant ICA research has overlooked consideration of why-prior to the crime-an individual initially considers engaging in such criminal activity in the first instance. Notably, this consideration should not to be conflated with intentions. We argue that there needs to be a clear distinction between those motivational factors that would lead to the consideration of such engagement at the initial involvement stage, and those factors that would lead an individual at the event stage to perpetrate a crime. We thus propose a revised version of the extended security action cycle (ESAC), which reflects these criminal decision-making stages. Moreover, we provide a means through which to identify and understand the relationship among those factors that may motivate an individual during the initial involvement stage by drawing on the life course perspective (LCP). With a focus on time, context, and process, the LCP offers a framework in which four key principles are inscribed. Through examples drawn from the LCP and white-collar crime literature, we illustrate how these principles can provide a basis for conceptualizing factors that motivate ICA and open up new avenues for future research/theory development.
- Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47--88.Google ScholarCross Ref
- Anonymous (2015). US cybersecurity: Progress stalled: Key findings from the 2015 US State of Cybercrime Survey. Retrieved from http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2015-us-cybercrime-survey.pdfGoogle Scholar
- Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4(1&2), 643--656.Google Scholar
- Bailey, A., Blake, M., and Cooke, T. (2004). Migration, care, and the linked lives of dual-earner households. Environment and Planning A, 36(9), 1617--1632.Google ScholarCross Ref
- Barlow, J. B., Warkentin, M., Ormond, D., and Dennis, A. R. (2013). Don't make excuses! Discouraging neutralization to reduce IT policy violation. Computers&Security, forthcoming. Google ScholarDigital Library
- Benson, M. L. (1985). Denying the guilty mind: Accounting for involvement in a white-collar crime. Criminology, 23(4), 583--607.Google ScholarCross Ref
- Benson, M. L. and Cullen, F. T. (1988). The special sensitivity of white-collar offenders to prison: a critique and research agenda. Journal of Criminal Justice, 16(3), 207--215.Google ScholarCross Ref
- Benson, M. L. and Kerley, K. R. (2000). Life course theory and white-collar crime. In H. Pontell&D. Shichor (Eds.), Contemporary Issues in Crime and Criminal Justice: Essays in Honor of Gilbert Geis (pp. 121--136). Upper Saddle River, New Jersey: Prentice Hall.Google Scholar
- Benson, M. L. and Moore, E. (1992). Are white-collar and common offenders the same? An empirical and theoretical critique of a recently proposed general theory of crime. Journal of Research in Crime and Delinquency, 29(3), 251--272.Google ScholarCross Ref
- Blumstein, A. (1986). Criminal Careers and 'Career Criminals' (Vol. 2). Washington, DC: National Research Council.Google Scholar
- Blumstein, A., Cohen, J., and Farrington, D. P. (1988). Criminal career research: Its value for criminology*. Criminology, 26(1), 1--35.Google ScholarCross Ref
- Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., and Polak, P. (2015). What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837--864. Google ScholarDigital Library
- Bossler, A. M. and Burrus, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers. In T. J. Holt&B. H. Schell (Eds.), Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications (pp. 38--67). Hershey, Pennsylvania: Information Science Reference.Google Scholar
- Bronfenbrenner, U. (1979). The Ecology of Human Development. Cambridge, Massachusetts: Harvard University Press.Google Scholar
- Cappelli, D., Keeney, M., Kowalski, E., Moore, A., and Randazzo, M. (2004). Insider threat study: Illicit cyber activity in the banking and finance sector. Retrieved from http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=50287Google Scholar
- Cappelli, D. M., Moore, A., and Trzeciak, R. (2012). The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Boston, Massachusetts: Addison-Wesley Professional. Google ScholarDigital Library
- Charles, N. and James, E. (2003). Gender and work orientations in conditions of job insecurity. The British Journal of Sociology, 54(2), 239--257.Google ScholarCross Ref
- Cheng, L., Li, Y., Li, W., Holm, E., and Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers&Security, 39, Part B(0), 447--459. Google ScholarDigital Library
- Clarke, R. and Cornish, D. (1985). Modelling offender's decisions: A framework for policy and research. In M. Tonry&N. Morris (Eds.), Crime and Justice: An Annual Review of Research (Vol. 6) (pp. 147--185). Chicago, Illinois: University of Chicago Press.Google Scholar
- Cloward, R. A. and Ohlin, L. E. (2013). Delinquency and Opportunity: A Study of Delinquent Gangs (Vol. 6). New York, New York: Routledge.Google Scholar
- Cornish, D. and Clarke, R. (1987). Understanding crime displacement: An application of rational choice theory. Criminology, 25(4), 933--947.Google ScholarCross Ref
- Cornish, D. B. and Clarke, R. V. (2013). Introduction. In D. Cornish&R.Clarke (Eds.), The Reasoning Criminal: Rational Choice Perspectives on Offending (pp. 1--16). New York, New York: Transaction.Google Scholar
- Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., and Baskerville, R. (2013). Future directions for behavioral information security research. Computers&Security, 32(February), 90--101.Google ScholarDigital Library
- Cummings, A., Lewellen, T., McIntire, D., Moore, A., and Trzeciak, R. (2012). Insider threat study: Illicit cyber activity involving fraud in the U.S. financial services sector. Special Report Carnegie Mellon University/SEI-2012-SR-004, 2012. Retrieved from http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=27971#Google Scholar
- D'Arcy, J. and Devaraj, S. (2012). Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43(6), 1091--1124.Google ScholarCross Ref
- D'Arcy, J. and Hovav, A. (2007). Deterring internal information systems misuse. Communications of the ACM, 50(10), 113--117. Google ScholarDigital Library
- D'Arcy, J. and Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89(1), 59--71.Google ScholarCross Ref
- D'Arcy, J., Hovav, A., and Galletta, D. (2009a). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79--98. Google ScholarDigital Library
- D'Arcy, J., Hovav, A., and Galletta, D. F. (2009b). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20(1), 79--98. Google ScholarDigital Library
- Denzin, N. (1977). Notes on the criminogenic hypothesis: a case study of the American liquor industry. American Sociological Review, 42(6), 905--920.Google ScholarCross Ref
- Elder, G. (1987). War mobilization and the life course: a cohort of World War II veterans. Sociological Forum, 2(3), 449--472.Google ScholarCross Ref
- Elder, G. (1994). Time, human agency, and social change: perspectives on the life course. Social Psychology Quarterly, 57(1), 4--15.Google ScholarCross Ref
- Elder, G. (1998). The life course as development theory. Child Development, 69(1), 1--12.Google ScholarCross Ref
- Ernst&Young (2010). 12th Annual Global Information Security Survey: Outpacing Change: Ernst&Young.Google Scholar
- Giele, J. and Elder, G. (1998). Life course research: Development of a field. In J. Giele&G. Elder (Eds.), Methods of Life Course Research: Qualitative and Quantitative Approaches. Thousand Oaks, California: SAGE.Google Scholar
- Gong, F., Xu, J., Fujishiro, K., and Takeuchi, D. T. (2011). A life course perspective on migration and mental health among Asian immigrants: the role of human agency. Social Science&Medicine, 73(11), 1618--1626.Google Scholar
- Guo, K. H. and Yuan, Y. (2012). The effects of multilevel sanctions on information security violations: a mediating model. Information&Management, 49(6), 320--326. Google ScholarDigital Library
- Guo, K. H., Yuan, Y., Archer, N. P., and Connelly, C. E. (2011). Understanding nonmalicious security violations in the workplace: a composite behavior model. Journal of Management Information Systems, 28(2), 203--236. Google ScholarDigital Library
- Hansen, J. V., Lowry, P. B., Meservy, R., and McDonald, D. (2007). Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems, 43(4), 1362--1374. Google ScholarDigital Library
- Harrington, S. J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20(3), 257--278. Google ScholarDigital Library
- Herath, T. and Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 28(2), 106--125.Google ScholarCross Ref
- Hirschi, T. (2002). Causes of Delinquency. New Brunswick, New Jersey: Transaction.Google Scholar
- Hovav, A. and D'Arcy, J. (2012). Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea. Information&Management, 49(2), 99--110. Google ScholarDigital Library
- Hsu, J., Shih, S.-P., Hung, Y. W., and Lowry, P. B. (2015). The role of extra-role behaviors and social controls in information security policy effectiveness. Information Systems Research, 26(2), 282--300.Google ScholarCross Ref
- Hu, Q., Xu, Z., Dinev, T., and Ling, H. (2011). Does deterrence work in reducing information security policy abuse by employees? Communications of the ACM, 54(6), 54--60. Google ScholarDigital Library
- James, T. L., Lowry, P. B., Wallace, L., and Warkentin, M. (2017). The effect of belongingness on obsessive-compulsive disorder in the use of online social networks. Journal of Management Information Systems, forthcoming(Google ScholarCross Ref
- Jenkins, J. L., Grimes, M., Proudfoot, J., and Lowry, P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time warnings. Information Technology for Development, 20(2), 196--213. Google ScholarDigital Library
- Johnston, A. C., Warkentin, M., and Siponen, M. T. (2015). An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS quarterly, 39(1), 113--134. Google ScholarDigital Library
- Keeney, M., Kowalski, E., Cappelli, D., Moore, A., Shimeall, T., and Rogers, S. (2005). Insider threat study: Computer systems sabotage in critical infrastructure sectors. Retrieved from http://www.cert.org/insider_threat/insidercross.htmlGoogle Scholar
- Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., and Greer, C. (2013). Information disclosure on mobile devices: re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12), 1163--1173. Google ScholarDigital Library
- Kelan, E. (2008). Gender, risk and employment insecurity: the masculine breadwinner subtext. Human Relations, 61(9), 1171--1202.Google ScholarCross Ref
- Kinnunen, U., Mauno, S., Natti, J., and Happonen, M. (1999). Perceived job insecurity: a longitudinal study among Finnish employees. European Journal of Work and Organizational Psychology, 8(2), 243--260.Google ScholarCross Ref
- Klenowski, P., Copes, H., and Mullins, C. (2011). Gender identity, and accounts: how white collar offenders do gender when making sense of their crimes. Justice Quarterly, 28(1), 46--69.Google ScholarCross Ref
- Lai, F., Li, D., and Hsieh, C.-T. (2012). Fighting identity theft: the coping perspective. Decision Support Systems, 52(2), 353--363. Google ScholarDigital Library
- Lee, S. M., Lee, S. G., and Yoo, S. (2004a). An integrative model of computer abuse based on social control and general deterrence theories. Information&Management, 41(6), 707--718. Google ScholarDigital Library
- Lee, Z., Lee, Y., and Kim, Y. (2004b). Personal web page usage in organizations. In M. Anandarajan&C. A. Simmers (Eds.), Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management (pp. 28--45). Hershey, Pennsylvania: Information Science Publishing.Google Scholar
- Loch, K. D., Carr, H. H., and Warkentin, M. E. (1992). Threats to information systems: Today's reality, yesterday's understanding. MIS Quarterly, 16(2), 173--186.Google ScholarCross Ref
- Lowry, P. B., Dinev, T., and Willison, R. (2017a). Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda. European Journal of Information Systems, forthcoming.Google Scholar
- Lowry, P. B., Posey, C., Bennett, R. J., and Roberts, T. L. (2015). Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust. Information Systems Journal, 25(3), 193--230. Google ScholarDigital Library
- Lowry, P. B., Posey, C., Roberts, T. L., and Bennett, R. J. (2014). Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse. Journal of Business Ethics, 121(3), 385--401.Google ScholarCross Ref
- Lowry, P. B., Zhang, J., Wang, C., and Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning (SSSL) model. Information Systems Research, 27(4), 962--986.Google ScholarDigital Library
- Lowry, P. B., Zhang, J., and Wu, T. (2017b). Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework. Computers in Human Behavior, 68(March), 104--120. Google ScholarDigital Library
- Mahmood, M. A., Siponen, M., Straub, D., Rao, H. R., and Raghu, T. S. (2010). Moving toward black hat research in information systems security: an editorial introduction to the special issue. MIS Quarterly, 34(3), 431--433. Google ScholarCross Ref
- Modell, J. (1989). Into One's Own: From Youth to Adulthood in the United States 1920--1975. Berkeley, California: University of California Press.Google Scholar
- Moody, G. D. and Siponen, M. (2013). Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work. Information&Management, 50(6), 322--335. Google ScholarDigital Library
- Moore, R. and McMullan, E. C. (2004). Perceptions of peer-to-peer file sharing among university students. Journal of Criminal Justice and Popular Culture, 11(1), 1--19.Google Scholar
- Nandedkar, A. and Midha, V. (2012). It won't happen to me: an assessment of optimism bias in music piracy. Computers in Human Behavior, 28(1), 41--48. Google ScholarDigital Library
- Paternoster, R. (1989a). Absolute and restrictive deterrence in a panel of youth: Explaining the onset, persistance/desistance, and frequency of delinquent offending. Social Problems, 36(3), 289--309.Google ScholarCross Ref
- Paternoster, R. (1989b). Decisions to participate in and desist from four types of common delinquency: Deterrence and the rational choice perspective. Law&Society Review, 23(1), 7--40.Google Scholar
- Peace, A. G., Galletta, D. F., and Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153--177. Google ScholarCross Ref
- Piquero, N. and Benson, M. (2004a). White-collar crime and criminal careers: Specifying a trajectory of punctuated situational offending. Journal of Contemporary Criminal Justice, 20(2), 148--165.Google ScholarCross Ref
- Piquero, N. L. and Benson, M. L. (2004b). White-collar crime and criminal careers specifying a trajectory of punctuated situational offending. Journal of Contemporary Criminal Justice, 20(2), 148--165.Google ScholarCross Ref
- Posey, C., Bennett, R. J., Roberts, T. L., and Lowry, P. B. (2011). When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse. Journal of Information System Security, 7(1), 24--47.Google Scholar
- Posey, C., Roberts, T. L., and Lowry, P. B. (2015). The impact of organizational commitment on insiders' motivation to protect organizational information assets. Journal of Management Information Systems, 32(4), 179--214.Google ScholarCross Ref
- Posey, C., Roberts, T. L., Lowry, P. B., Bennett, R. J., and Courtney, J. (2013). Insiders' protection of organizational information assets: development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors. MIS Quarterly, '37(4), 1189--1210. Google ScholarDigital Library
- PwC (2012). Eye of the storm. Key findings from the 2012 global state of information security survey. Retrieved from http://www.cen7dias.es/BOLETINES/330/pwc.pdfGoogle Scholar
- PwC (2014). The global state of information security survey. Retrieved from http://www.pwc.com/gx/en/consulting-services/information-security-survey/download.jhtmlGoogle Scholar
- Rogers, M., Smoak, N. D., and Liu, J. (2006). Self-reported deviant computer behavior: a big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior, 27(3), 245--268.Google ScholarCross Ref
- Rothman, M. and Gandossy, R. (1982). Sad tales: the accounts of white-collar defendants and the decision to sanction. Pacific Sociological Review, 25(4), 449--473.Google ScholarCross Ref
- Salleh, N., Hussein, R., Mohamed, N., Karim, N. S. A., Ahlan, A. R., and Aditiawarman, U. (2012). Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk. Journal of Internet Social Networking&Virtual Communities, 2012(article ID 281869), 1--11.Google Scholar
- Siponen, M. and Vance, A. (2010). Neutralization: new insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487--502. Google ScholarCross Ref
- Smith, A. L., Baxter, R. J., Boss, S. R., and Hunton, J. E. (2012). The dark side of online knowledge sharing. Journal of Information Systems, 26(2), 71--91.Google ScholarCross Ref
- Straub, D. W. (1990). Effective IS security. Information Systems Research, 1(3), 255--276. Google ScholarDigital Library
- Straub, D. W., Jr. (1986). Deterring computer abuse: The effectiveness of deterrent countermeasures in the computer security environment. Unpublished D.B.A., Indiana University, Graduate School of Business, Bloomington, IN.Google Scholar
- Straub, D. W. and Welke, R. J. (1998). Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22(4), 441--469. Google ScholarDigital Library
- Streib, G. and Binstock, R. (1990). Aging and the social sciences: changes in the field. In R. Binstock&L. George (Eds.), Handbook of Aging and the Social Sciences. New York, New York: Academic Press.Google Scholar
- Sverke, M. and Hellgren, J. (2002). The nature of job insecurity: understanding employment uncertainty on the brink of a new millennium. Applied Psychology, 51(1), 23--42.Google ScholarCross Ref
- Thébaud, S. (2010). Masculinity, bargaining, and breadwinning: understanding men's housework in the cultural context of paid work. Gender&Society, 24(3), 330--354.Google ScholarCross Ref
- Vance, A., Lowry, P. B., and Eggett, D. (2013). Using accountability to reduce access policy violations in information systems. Journal of Management Information Systems, 29(4), 263--289.Google ScholarCross Ref
- Vance, A., Lowry, P. B., and Eggett, D. (2015). A new approach to the problem of access policy violations: Increasing perceptions of accountability through the user interface. MIS Quarterly, 39(2), 345--366. Google ScholarDigital Library
- Wall, J. D., Lowry, P. B., and Barlow, J. (2016). Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess. Journal of the Association for Information Systems, 17(1), 39--76.Google ScholarCross Ref
- Warkentin, M. E. and Willison, R. (2009). Behavioral and policy issues in information systems security: the insider threat. European Journal of Information Systems, 18(2), 101--105.Google ScholarCross Ref
- Warren, T. (2007). Conceptualizing breadwinning work. Work, Employment&Society, 21(2), 317--336.Google ScholarCross Ref
- Weisburd, D. (1991). Crimes of the Middle Classes: White Collar Offenders in the Federal Courts. New Haven, Connecticut: Yale University Press.Google Scholar
- Weisburd, D. and Waring, E. (2001). White-collar Crime and Criminal Careers. New York, New York: Cambridge University Press.Google Scholar
- Weisburd, D., Waring, E., and Chayet, E. (1995). Specific deterrence in a sample of offenders convicted of white-collar crimes. Criminology, 33(4), 587--607.Google ScholarCross Ref
- Wheeler, S. (1992). The problem of white-collar crime motivation. In K. Schlegel&D. Weisburd (Eds.), White Collar Crime Reconsidered (pp. 108--123). Boston, Massachusetts: Northeastern University Press.Google Scholar
- Wheeler, S., Weisburd, D., Waring, E., and Bode, N. (1988). White collar crime and criminals. American Criminal Law Review, 25(3), 331--357.Google Scholar
- Willison, R. (2006). Understanding the perpetration of employee computer crime in the organisational context. Information and Organization, 16(4), 304--324. Google ScholarDigital Library
- Willison, R. and Backhouse, J. (2006). Opportunities for computer crime: considering systems risk from a criminological perspective. European Journal of Information Systems, 15(4), 403--414.Google ScholarCross Ref
- Willison, R. and Siponen, M. (2009). Overcoming the insider: reducing employee computer crime through situational crime prevention. Communications of the ACM, 52(9), 133--137. Google ScholarDigital Library
- Willison, R. and Warkentin, M. (2013). Beyond deterrence: an expanded view of employee computer abuse. MIS Quarterly, 37(1), 1--20. Google ScholarDigital Library
- Willison, R., Warkentin, M., and Johnston, A. C. (2018). Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives. Information Systems Journal, 28(2).Google Scholar
- Willot, S., Griffin, C., and Torrance, M. (2001). Snakes and ladders: upper-middle class male offenders talk about economic crime. Criminology, 39(2), 441--466.Google ScholarCross Ref
- Workman, M. (2007). Gaining access with social engineering: an empirical study of the threat. Information Systems Security, 16(6), 315--331. Google ScholarDigital Library
- Workman, M. (2008). Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology, 59(4), 662--674. Google ScholarDigital Library
- Workman, M., Bommer, W. H., and Straub, D. W. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6), 2799--2816. Google ScholarDigital Library
- Zhang, L., Pavur, R., York, P., and Amos, C. (2013). Testing a model of users' Web risk information seeking intention. Informing Science: The International Journal of an Emerging Transdiscipline, 16(2013), 1--18.Google Scholar
- Zhou, X. and Hou, L. (1999). Children of the cultural revolution: the state and the life course in the People's Republic of China. American Sociological Review, 64(1), 12--36.Google ScholarCross Ref
Index Terms
- Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives
Recommendations
Least-Cost Avoiders in Online Fraud and Abuse
Web users face considerable fraud, malfeasance, and economic harm that system operators could prevent or mitigate. Although the legal system can respond, regulations have mixed results. The author examines the applicable legal rules that constrain ...
Electronic data interchange adoption from technological, organisational and environmental perspectives
This study empirically examines determinants of electronic data interchange EDI adoption. The research model for this study was developed based on factors that influence EDI adoption including technological factors benefits, costs, risks, security, ...
Insider hacking: applying situational crime prevention to a new white-collar crime
RIIT '14: Proceedings of the 3rd annual conference on Research in information technologyInsider hacking consists of cybercrimes against entities initiated by individuals who hold a legitimate trust relationship with that entity. The responsibility of preventing insider hacking falls to information technology (IT) or information security ...
Comments