메뉴 건너뛰기




Volumn 105, Issue 2, 2005, Pages 137-146

Have you met your organization's computer usage policy?

Author keywords

Computer crime; Educational policy; Information systems

Indexed keywords

COMPUTER CRIME; COMPUTER SOFTWARE; COMPUTER SYSTEMS; CURRICULA; EDUCATION; INFORMATION TECHNOLOGY; STUDENTS;

EID: 18844456006     PISSN: 02635577     EISSN: None     Source Type: Journal    
DOI: 10.1108/02635570510583280     Document Type: Article
Times cited : (28)

References (37)
  • 2
    • 18844450234 scopus 로고
    • The deterrent effect of criminal sanctions: reviewing the evidence
    • Sage Publications Beverly Hills, CA
    • Anderson, L.S. (1979), “The deterrent effect of criminal sanctions: reviewing the evidence”, in Ed. Brentingham, P.J. and Ed. Kress, J.M. (Eds), Structure, Law, and Power, Sage Publications, Beverly Hills, CA.
    • (1979) Structure, Law, and Power
    • Anderson, L.S.1
  • 3
    • 0347892655 scopus 로고    scopus 로고
    • Hack attack: cyberthieves siphon millions from US firms
    • Anthes, G.H. (1996), “Hack attack: cyberthieves siphon millions from US firms”, Computerworld, Vol. 30 No. 16, p. 81.
    • (1996) Computerworld , vol.30 , Issue.16 , pp. 81
    • Anthes, G.H.1
  • 4
    • 0001156375 scopus 로고
    • Managing computer crime: a research outlook
    • Backhouse, J. and Dhillon, G. (1995), “Managing computer crime: a research outlook”, Computers & Security, Vol. 14 No. 7, pp. 645-651.
    • (1995) Computers & Security , vol.14 , Issue.7 , pp. 645-651
    • Backhouse, J.1    Dhillon, G.2
  • 5
    • 0027804413 scopus 로고
    • Information systems security design methods: implications for information systems development
    • Baskerville, R. (1993), “Information systems security design methods: implications for information systems development”, ACM Computing Surveys, Vol. 25 No. 4, pp. 375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 7
    • 84983854374 scopus 로고
    • Punishment and crime: an examination of some empirical evidence
    • Chiricos, T.G. and Waldo, G.P. (1970), “Punishment and crime: an examination of some empirical evidence”, Social Problems, Vol. 18 No. 2, pp. 200-217.
    • (1970) Social Problems , vol.18 , Issue.2 , pp. 200-217
    • Chiricos, T.G.1    Waldo, G.P.2
  • 9
    • 2342445688 scopus 로고    scopus 로고
    • Factors affecting the success of business-to-business international internet marketing (B-to-B IIM): an empirical study of UK companies
    • Eid, R. and Trueman, M. (2004), “Factors affecting the success of business-to-business international internet marketing (B-to-B IIM): an empirical study of UK companies”, Industrial Management & Data Systems, Vol. 104 No. 1, pp. 16-30.
    • (2004) Industrial Management & Data Systems , vol.104 , Issue.1 , pp. 16-30
    • Eid, R.1    Trueman, M.2
  • 10
    • 84992947461 scopus 로고    scopus 로고
    • Information systems misuse and computer crime: an analysis of demographic factors and the awareness of university computer usage policies
    • Foltz, C.B., Cronan, T.P. and Jones, T.W. (2004), “Information systems misuse and computer crime: an analysis of demographic factors and the awareness of university computer usage policies”, working paper, University of Arkansas, Fort Smith, AR.
    • (2004) working paper, University of Arkansas, Fort Smith, AR.
    • Foltz, C.B.1    Cronan, T.P.2    Jones, T.W.3
  • 12
    • 0000917858 scopus 로고    scopus 로고
    • The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
    • Harrington, S.J. (1996), “The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions”, MIS Quarterly, Vol. 20 No. 3, pp. 257-278.
    • (1996) MIS Quarterly , vol.20 , Issue.3 , pp. 257-278
    • Harrington, S.J.1
  • 13
    • 0032620195 scopus 로고    scopus 로고
    • Identifying and controlling computer crime and employee fraud
    • Haugen, S. and Selin, J.R. (1999), “Identifying and controlling computer crime and employee fraud”, Industrial Management & Data Systems, Vol. 99 No. 8, pp. 340-344.
    • (1999) Industrial Management & Data Systems , vol.99 , Issue.8 , pp. 340-344
    • Haugen, S.1    Selin, J.R.2
  • 14
    • 18844426291 scopus 로고
    • Deviance, deterrence, and knowledge of sanctions
    • Columbia University Press New York, NY
    • Henshel, R.L. and Carey, S.H. (1975), “Deviance, deterrence, and knowledge of sanctions”, in Ed. Henshel, R.L. and Ed. Silverman, R.A. (Eds), Perception in Criminology, Columbia University Press, New York, NY, pp. 54-73.
    • (1975) Perception in Criminology , pp. 54-73
    • Henshel, R.L.1    Carey, S.H.2
  • 15
    • 84928507306 scopus 로고
    • Computer hackers follow a Guttman-like progression
    • Hollinger, R.C. (1988), “Computer hackers follow a Guttman-like progression”, Sociology and Social Research, Vol. 72 No. 3, pp. 199-200.
    • (1988) Sociology and Social Research , vol.72 , Issue.3 , pp. 199-200
    • Hollinger, R.C.1
  • 16
    • 0343001536 scopus 로고
    • Crime by computer: correlates of software piracy and unauthorized account access
    • Hollinger, R.C. (1992), “Crime by computer: correlates of software piracy and unauthorized account access”, Security Journal, Vol. 2 No. 1, pp. 2-12.
    • (1992) Security Journal , vol.2 , Issue.1 , pp. 2-12
    • Hollinger, R.C.1
  • 17
    • 2342418367 scopus 로고    scopus 로고
    • Impact of computer disasters on information management: a study
    • Kundu, S.C. (2004), “Impact of computer disasters on information management: a study”, Industrial Management & Data Systems, Vol. 104 No. 2, pp. 136-143.
    • (2004) Industrial Management & Data Systems , vol.104 , Issue.2 , pp. 136-143
    • Kundu, S.C.1
  • 18
    • 3943056788 scopus 로고
    • Who's spying now?
    • Lang, C. (1995), “Who's spying now?”, Netguide, Vol. 2 No. 7, pp. 44-50.
    • (1995) Netguide , vol.2 , Issue.7 , pp. 44-50
    • Lang, C.1
  • 21
    • 0030521693 scopus 로고    scopus 로고
    • Sanction threats and appeals to morality: testing a rational choice model of corporate crime
    • Paternoster, R. and Simpson, S. (1996), “Sanction threats and appeals to morality: testing a rational choice model of corporate crime”, Law and Society Review, Vol. 30 No. 3, pp. 549-583.
    • (1996) Law and Society Review , vol.30 , Issue.3 , pp. 549-583
    • Paternoster, R.1    Simpson, S.2
  • 22
    • 18844379696 scopus 로고    scopus 로고
    • The sad and increasingly deplorable state of internet security
    • Piscitello, D. and Kent, S. (2003), “The sad and increasingly deplorable state of internet security”, Business Communications Review, Vol. 33 No. 2, pp. 49-53.
    • (2003) Business Communications Review , vol.33 , Issue.2 , pp. 49-53
    • Piscitello, D.1    Kent, S.2
  • 23
    • 0042484572 scopus 로고    scopus 로고
    • 2002 CSI/FBI computer crime and security survey
    • Power, R. (2002), “2002 CSI/FBI computer crime and security survey”, Computer Security Issues & Trends, Vol. 8 No. 1, pp. 1-22.
    • (2002) Computer Security Issues & Trends , vol.8 , Issue.1 , pp. 1-22
    • Power, R.1
  • 24
    • 1642568988 scopus 로고
    • Computer fraud – what can be done about it?
    • Romney, M. (1995), “Computer fraud – what can be done about it?”, The CPA Journal, Vol. 65 No. 5, pp. 30-33.
    • (1995) The CPA Journal , vol.65 , Issue.5 , pp. 30-33
    • Romney, M.1
  • 26
    • 1642568985 scopus 로고    scopus 로고
    • Hackers are ubiquitous, malicious, and taken far too lightly, experts say
    • Schwartz, K.D. (1997), “Hackers are ubiquitous, malicious, and taken far too lightly, experts say”, Government Computer News, Vol. 16 No. 23, pp. 81-82.
    • (1997) Government Computer News , vol.16 , Issue.23 , pp. 81-82
    • Schwartz, K.D.1
  • 27
    • 0030668250 scopus 로고    scopus 로고
    • A social learning theory analysis of computer crime among college students
    • Skinner, W.F. and Fream, A.M. (1997), “A social learning theory analysis of computer crime among college students”, The Journal of Research in Crime and Delinquency, Vol. 34 No. 4, pp. 495-518.
    • (1997) The Journal of Research in Crime and Delinquency , vol.34 , Issue.4 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 28
    • 0036955834 scopus 로고    scopus 로고
    • The role of trust, quality, value and risk in conducting e-business
    • So, M.W.C. and Sculli, D. (2002), “The role of trust, quality, value and risk in conducting e-business”, Industrial Management & Data Systems, Vol. 102 No. 9, pp. 503-512.
    • (2002) Industrial Management & Data Systems , vol.102 , Issue.9 , pp. 503-512
    • So, M.W.C.1    Sculli, D.2
  • 29
    • 0023293621 scopus 로고
    • Computer-related embezzlement
    • Solarz, A. (1987), “Computer-related embezzlement”, Computers & Security, Vol. 6 No. 1, pp. 49-53.
    • (1987) Computers & Security , vol.6 , Issue.1 , pp. 49-53
    • Solarz, A.1
  • 31
    • 84992934364 scopus 로고
    • State of California
    • Perception in Criminology, Columbia University Press New York, NY
    • State of California (1975), “Public knowledge of criminal penalties”, in Ed. Henshel, R.L. and Ed. Silverman, R.A. (Eds), Perception in Criminology, Columbia University Press, New York, NY, pp. 74-90.
    • (1975) Public knowledge of criminal penalties , pp. 74-90
  • 33
    • 85139144524 scopus 로고
    • Controlling computer abuse: an empirical study of effective security countermeasures
    • Straub, D.W. (1987), “Controlling computer abuse: an empirical study of effective security countermeasures”, Proceedings of the International Conference on Information Systems, Pittsburgh, PA, December, pp. 277-289.
    • (1987) Proceedings of the International Conference on Information Systems
    • Straub, D.W.1
  • 34
    • 0000280419 scopus 로고
    • Effective IS security: an empirical study
    • Straub, D.W. (1990), “Effective IS security: an empirical study”, Information Systems Research, Vol. 1 No. 3, pp. 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 36
    • 84935665607 scopus 로고
    • Perceptual research on general deterrence: a critical review
    • Williams, K.R. and Hawkins, R. (1986), “Perceptual research on general deterrence: a critical review”, Law and Society Review, Vol. 20 No. 4, pp. 545-572.
    • (1986) Law and Society Review , vol.20 , Issue.4 , pp. 545-572
    • Williams, K.R.1    Hawkins, R.2
  • 37
    • 0022178828 scopus 로고
    • Computer crime: risk management and computer security
    • Wong, K. (1985), “Computer crime: risk management and computer security”, Computers & Security, Vol. 4 No. 4, pp. 287-295.
    • (1985) Computers & Security , vol.4 , Issue.4 , pp. 287-295
    • Wong, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.