메뉴 건너뛰기




Volumn 10, Issue 2, 2002, Pages 57-63

A holistic model of computer abuse within organizations

Author keywords

Computer security; Computers; Theory

Indexed keywords

COMPUTERS; INFORMATION TECHNOLOGY; INTERNET; SECURITY OF DATA;

EID: 0036064934     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220210424104     Document Type: Article
Times cited : (147)

References (53)
  • 1
    • 0028811312 scopus 로고
    • Testing the leading crime theories: an alternative strategy focusing on motivational process
    • Agnew, R. (1995), “Testing the leading crime theories: an alternative strategy focusing on motivational process”, Journal of Research in Crime and Delinquency, Vol. 32 No. 4, pp. 363-98.
    • (1995) Journal of Research in Crime and Delinquency , vol.32 , Issue.4 , pp. 363-398
    • Agnew, R.1
  • 5
    • 22844455759 scopus 로고    scopus 로고
    • Male and female delinquent's attachment and effects of attachments on severity of self-reported delinquency
    • Anderson, B., Homes, M.D. and Ostresh, E. (1999), “Male and female delinquent's attachment and effects of attachments on severity of self-reported delinquency” Crime Justice and Behavior, Vol. 26 No. 4, pp. 435-52.
    • (1999) Crime Justice and Behavior , vol.26 , Issue.4 , pp. 435-452
    • Anderson, B.1    Homes, M.D.2    Ostresh, E.3
  • 6
    • 0002305454 scopus 로고
    • From intentions to actions: a theory of planned behavior
    • Kuhl, J. and Beckman, J. (Eds) Springer, Heidelberg
    • Ajzen, I. (1985), “From intentions to actions: a theory of planned behavior”, in Kuhl, J. and Beckman, J. (Eds), Action-control: From Cognition to Behavior, pp. 11-39, Springer, Heidelberg.
    • (1985) Action-control: From Cognition to Behavior , pp. 11-39
    • Ajzen, I.1
  • 8
    • 0001156375 scopus 로고
    • Managing computer crime: a research outlook
    • Backhouse, J. and Dhillon, G. (1995), “Managing computer crime: a research outlook”, Computers & Security, Vol. 14 No. 7, pp. 645-51.
    • (1995) Computers & Security , vol.14 , Issue.7 , pp. 645-651
    • Backhouse, J.1    Dhillon, G.2
  • 9
    • 0002520483 scopus 로고    scopus 로고
    • Modeling IT ethics: a study of situational ethics
    • Banerjee, D., Cronan, T.P. and Jones, T.W. (1998), “Modeling IT ethics: a study of situational ethics”, MIS Quarterly, Vol. 22 No.1, pp. 31-60.
    • (1998) MIS Quarterly , vol.22 , Issue.1 , pp. 31-60
    • Banerjee, D.1    Cronan, T.P.2    Jones, T.W.3
  • 10
    • 0027804413 scopus 로고
    • Information systems security design methods: implications for information systems development
    • Baskerville, R. (1993), “Information systems security design methods: implications for information systems development”, ACM Computing Surveys, Vol. 25 No. 4, pp. 375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 12
    • 28844460781 scopus 로고
    • Predicting dishonest actions using the theory of planned behavior
    • Beck, L. and Ajzen, I. (1991), “Predicting dishonest actions using the theory of planned behavior”, Journal of Research in Personality, Vol. 25, pp. 285-301.
    • (1991) Journal of Research in Personality , vol.25 , pp. 285-301
    • Beck, L.1    Ajzen, I.2
  • 13
    • 0032325831 scopus 로고    scopus 로고
    • Predicting unethical behavior: a comparison of the theory of reasoned action and the theory of planned behavior
    • Chang, M.K. (1998), “Predicting unethical behavior: a comparison of the theory of reasoned action and the theory of planned behavior”, Journal of Business Ethics, pp. 1825-34.
    • (1998) Journal of Business Ethics , pp. 1825-1834
    • Chang, M.K.1
  • 14
    • 0029506317 scopus 로고
    • Ethics and information technology use: a factor analysis of attitudes to computer use
    • Cogner, S., Loch, K.D. and Helft, B.L. (1995), “Ethics and information technology use: a factor analysis of attitudes to computer use”, Information Systems Journal, pp. 161-84.
    • (1995) Information Systems Journal , pp. 161-184
    • Cogner, S.1    Loch, K.D.2    Helft, B.L.3
  • 16
    • 0032327732 scopus 로고    scopus 로고
    • Extending the theory of planned behavior: a review and avenues for further research
    • Conner, M. and Armitage, C.J. (1998), “Extending the theory of planned behavior: a review and avenues for further research”, Journal of Applied Social Psychology, Vol. 28, pp. 1429-64.
    • (1998) Journal of Applied Social Psychology , vol.28 , pp. 1429-1464
    • Conner, M.1    Armitage, C.J.2
  • 17
    • 0000726810 scopus 로고    scopus 로고
    • The theory of planned behavior and health behaviors
    • Conner, M. and Norman, P. (Eds) Open University Press, Buckingham
    • Conner, M. and Sparks, P. (1996), “The theory of planned behavior and health behaviors”, in Conner, M. and Norman, P. (Eds), Predicting Health Behavior, pp. 121-62, Open University Press, Buckingham.
    • (1996) Predicting Health Behavior , pp. 121-162
    • Conner, M.1    Sparks, P.2
  • 18
    • 0041033341 scopus 로고    scopus 로고
    • Testing control theory and differential association: a reanalysis of the Richmond youth project data
    • Costello, B.J. and Vowell, P.R. (1999), “Testing control theory and differential association: a reanalysis of the Richmond youth project data”, Criminology, Vol. 37 No. 4, pp. 815-40.
    • (1999) Criminology , vol.37 , Issue.4 , pp. 815-840
    • Costello, B.J.1    Vowell, P.R.2
  • 19
    • 0005734158 scopus 로고    scopus 로고
    • The role of the auditor in the prevention and detection of business fraud: SAS No. 82
    • available at: wcr.sonoma.edu/v2n1/v2n1.html
    • Farrell, B.R. and Franco, J.R. (1999), “The role of the auditor in the prevention and detection of business fraud: SAS No. 82”, Western Criminology Review, Vol. 2 No. 1, available at: wcr.sonoma.edu/v2n1/v2n1.html
    • (1999) Western Criminology Review , vol.2 , Issue.1
    • Farrell, B.R.1    Franco, J.R.2
  • 20
    • 0034340147 scopus 로고    scopus 로고
    • Environmental ethical decision making in the US metal-finishing industry
    • Flannery, B.L. and May, D.R. (2000), “Environmental ethical decision making in the US metal-finishing industry”, Academy of Management Journal, Vol. 43 No. 4, pp. 642-62.
    • (2000) Academy of Management Journal , vol.43 , Issue.4 , pp. 642-662
    • Flannery, B.L.1    May, D.R.2
  • 21
    • 0005766289 scopus 로고    scopus 로고
    • Morality and computers: attitudes and differences in moral judgments
    • Gattiker, U.E. and Kelley, H. (1999), “Morality and computers: attitudes and differences in moral judgments”, Information Systems Research, Vol. 10 No. 3, pp. 233-54.
    • (1999) Information Systems Research , vol.10 , Issue.3 , pp. 233-254
    • Gattiker, U.E.1    Kelley, H.2
  • 22
    • 0001823869 scopus 로고
    • Security concerns of systems users: a study of perceptions of the adequacy of security measures
    • Goodhue, D.L. and Straub, D.W. (1991), “Security concerns of systems users: a study of perceptions of the adequacy of security measures”, Information & Management, Vol. 20 No. 1, pp. 13-27.
    • (1991) Information & Management , vol.20 , Issue.1 , pp. 13-27
    • Goodhue, D.L.1    Straub, D.W.2
  • 24
    • 0000917858 scopus 로고    scopus 로고
    • The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
    • Harrington, S. (1996), “The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions”, MIS Quarterly, Vol. 20 No. 3, pp. 257-78.
    • (1996) MIS Quarterly , vol.20 , Issue.3 , pp. 257-278
    • Harrington, S.1
  • 25
    • 0003991890 scopus 로고
    • University of California Press, Berkeley, CA
    • Hirschi, T. (1969), Causes of Delinquency, University of California Press, Berkeley, CA.
    • (1969) Causes of Delinquency
    • Hirschi, T.1
  • 26
    • 0002042413 scopus 로고
    • The 9 to 5 underground: are you policing computer abuses?
    • Hoffer, J.A. and Straub, D.W. (1989), “The 9 to 5 underground: are you policing computer abuses?”, Sloan Management Review, Vol. 30 No. 4, pp. 35-44.
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35-44
    • Hoffer, J.A.1    Straub, D.W.2
  • 27
    • 0343001536 scopus 로고
    • Crime by computer: correlates of software piracy and unauthorized account access
    • Hollinger, R.C. (1993), “Crime by computer: correlates of software piracy and unauthorized account access”, Security Journal, Vol. 4 No. 1, pp. 2-12.
    • (1993) Security Journal , vol.4 , Issue.1 , pp. 2-12
    • Hollinger, R.C.1
  • 28
    • 0030741314 scopus 로고    scopus 로고
    • School delinquency and the school social bond
    • Jenkins, P.H. (1997), “School delinquency and the school social bond”, Journal of Research in Crime and Delinquency, Vol. 34 No. 3, pp. 337-67.
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , Issue.3 , pp. 337-367
    • Jenkins, P.H.1
  • 29
    • 73549118703 scopus 로고
    • Computer abuse as organizational activities
    • Kling, R. (1980), “Computer abuse as organizational activities”, Computer/Law Journal, Vol. 2, pp. 186-96.
    • (1980) Computer/Law Journal , vol.2 , pp. 186-196
    • Kling, R.1
  • 31
    • 84984053688 scopus 로고
    • Social control and delinquent behavior: an examination of the elements of the social bonds
    • Krohn, M. and Massey, J. (1980), “Social control and delinquent behavior: an examination of the elements of the social bonds”, The Sociological Quarterly, Vol. 21, pp. 529-43.
    • (1980) The Sociological Quarterly , vol.21 , pp. 529-543
    • Krohn, M.1    Massey, J.2
  • 32
    • 84958896603 scopus 로고
    • Social learning theory and adolescent cigarette smoking: a longitudinal study
    • Krohn, M.D., Skinner, W.F., Massey, J.L. and Akers, R.L. (1985), “Social learning theory and adolescent cigarette smoking: a longitudinal study”, Social Problems, Vol. 32 No. 5, pp. 455-71.
    • (1985) Social Problems , vol.32 , Issue.5 , pp. 455-471
    • Krohn, M.D.1    Skinner, W.F.2    Massey, J.L.3    Akers, R.L.4
  • 33
    • 0032387051 scopus 로고    scopus 로고
    • Trajectories of delinquency and problem behavior: comparison of social and personal control characteristics of adjudicated boys on synchronous and non-synchronous paths
    • Le Blanc, M. and Kaspy, N. (1998), “Trajectories of delinquency and problem behavior: comparison of social and personal control characteristics of adjudicated boys on synchronous and non-synchronous paths”, Journal of Quantitative Criminology, Vol. 14 No. 2, pp. 181-214.
    • (1998) Journal of Quantitative Criminology , vol.14 , Issue.2 , pp. 181-214
    • Le Blanc, M.1    Kaspy, N.2
  • 34
    • 0000133760 scopus 로고
    • Threats to information systems: today is reality, yesterday is understanding
    • Loch, K.D., Carr H.H. and Warkentin, M.E. (1992), “Threats to information systems: today is reality, yesterday is understanding”, MIS Quarterly, Vol. 17 No. 2, pp. 173-86.
    • (1992) MIS Quarterly , vol.17 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 35
  • 36
    • 84953478040 scopus 로고
    • Evaluating and extending the theory of planned behavior
    • Stroebe, W. and Hewstone, M. (Eds) John Wiley & Sons, Chichester
    • Manstead, A.S.R. and Parker, D. (1995), “Evaluating and extending the theory of planned behavior”, in Stroebe, W. and Hewstone, M. (Eds), European Review of Social Psychology, Vol. 6, pp. 69-96, John Wiley & Sons, Chichester.
    • (1995) European Review of Social Psychology , vol.6 , pp. 69-96
    • Manstead, A.S.R.1    Parker, D.2
  • 37
    • 0005765070 scopus 로고
    • From the editor
    • Meyer, J. (1995), “From the editor”, Computer & Security, Vol. 14 No. 1, pp. 2-3.
    • (1995) Computer & Security , vol.14 , Issue.1 , pp. 2-3
    • Meyer, J.1
  • 39
    • 0001354917 scopus 로고
    • Ethical decision making in the medical profession: an application of the theory of planned behavior
    • Randall, D.M. and Gibson, A.M. (1991), “Ethical decision making in the medical profession: an application of the theory of planned behavior”, Journal of Business Ethics, Vol. 10, pp. 111-22.
    • (1991) Journal of Business Ethics , vol.10 , pp. 111-122
    • Randall, D.M.1    Gibson, A.M.2
  • 40
    • 0005692985 scopus 로고
    • Computer security: who's minding the store
    • Rose, K. and Tom, R. (1989), “Computer security: who's minding the store”, The Academy of Management Executive, Vol. 3 No. 1, pp. 63-6.
    • (1989) The Academy of Management Executive , vol.3 , Issue.1 , pp. 63-66
    • Rose, K.1    Tom, R.2
  • 41
    • 0344613999 scopus 로고    scopus 로고
    • Software security in an Internet world: an executive summary
    • Shimeall, T.J. and McDermott, J.J. (1999), “Software security in an Internet world: an executive summary”, IEEE Software, pp. 58-62.
    • (1999) IEEE Software , pp. 58-62
    • Shimeall, T.J.1    McDermott, J.J.2
  • 42
    • 0030668250 scopus 로고    scopus 로고
    • A social learning theory analysis of computer abuse among college students
    • Skinner, W.F. and Fream, A.M. (1997), “A social learning theory analysis of computer abuse among college students”, Journal of Research in Crime and Delinquency, Vol. 34 No. 4, pp. 495-518.
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , Issue.4 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 45
    • 0031628589 scopus 로고    scopus 로고
    • Recent security surveys
    • Stephen, H. (1998), “Recent security surveys”, Computers & Security, Vol. 17 No. 3, pp. 207-10.
    • (1998) Computers & Security , vol.17 , Issue.3 , pp. 207-210
    • Stephen, H.1
  • 46
    • 0000280419 scopus 로고
    • Effective IS security: an empirical study
    • Straub, D.W. (1990), “Effective IS security: an empirical study”, Information Systems Research, Vol. 1 No. 3, pp. 255-76.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 47
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: a field study
    • Straub, D.W. and Nance, W.D. (1990), “Discovering and disciplining computer abuse in organizations: a field study”, MIS Quarterly, Vol. 14 No. 1, pp. 45-62.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-62
    • Straub, D.W.1    Nance, W.D.2
  • 48
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: security planning models for management decision making
    • Straub, D.W. and Welke, R.J. (1998), “Coping with systems risk: security planning models for management decision making”, MIS Quarterly, Vol. 22 No. 4, pp. 441-65.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-465
    • Straub, D.W.1    Welke, R.J.2
  • 49
    • 0032355201 scopus 로고    scopus 로고
    • Predicting and explaining intentions and behavior: how well are we doing?
    • Sutton, S. (1998), “Predicting and explaining intentions and behavior: how well are we doing?”, Journal of Applied Social Psychology, Vol. 28, pp. 1317-38.
    • (1998) Journal of Applied Social Psychology , vol.28 , pp. 1317-1338
    • Sutton, S.1
  • 50
    • 77957024810 scopus 로고
    • Toward a self-evaluation maintenance model of social behavior
    • Berkowitz, L. (Ed.), Academic Press, New York, NY.
    • Tesser, A. (1988), “Toward a self-evaluation maintenance model of social behavior”, in Berkowitz, L. (Ed.), Advances in Experimental Social Psychology, Vol. 21, pp. 181-227, Academic Press, New York, NY.
    • (1988) Advances in Experimental Social Psychology , vol.21 , pp. 181-227
    • Tesser, A.1
  • 51
    • 84963046788 scopus 로고
    • Modeling Sutherland's theory of differential association: toward an empirical clarification
    • Tittle, C.R., Burke, M.J. and Jackson, E.F. (1986), “Modeling Sutherland's theory of differential association: toward an empirical clarification”, Social Forces, Vol. 65, pp. 405-32.
    • (1986) Social Forces , vol.65 , pp. 405-432
    • Tittle, C.R.1    Burke, M.J.2    Jackson, E.F.3
  • 52
    • 84986105195 scopus 로고    scopus 로고
    • 1997 computer abuse and security survey
    • Thompson, D. (1998), “1997 computer abuse and security survey”, Information Management & Computer Security, Vol. 6 No. 2, pp. 78-101.
    • (1998) Information Management & Computer Security , vol.6 , Issue.2 , pp. 78-101
    • Thompson, D.1
  • 53
    • 0023996629 scopus 로고
    • Personnel: the other half of data security
    • Zajac, B.P. Jr (1988), “Personnel: the other half of data security”, Computer & Security, Vol. 7 No. 2, pp. 131-2.
    • (1988) Computer & Security , vol.7 , Issue.2 , pp. 131-132
    • Zajac, B.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.