메뉴 건너뛰기




Volumn 41, Issue 6, 2004, Pages 707-718

An integrative model of computer abuse based on social control and general deterrence theories

Author keywords

Computer abuse; End user computing; Organizational trust; Social issues; Telecommunications

Indexed keywords

BEHAVIORAL RESEARCH; INFORMATION MANAGEMENT; ONLINE SYSTEMS; PUBLIC POLICY; SALES; SECURITY OF DATA; SOCIAL ASPECTS; SOCIETIES AND INSTITUTIONS; TELECOMMUNICATION;

EID: 2342489402     PISSN: 03787206     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.im.2003.08.008     Document Type: Article
Times cited : (205)

References (72)
  • 1
    • 0025775038 scopus 로고
    • A longitudinal test of social control theory and delinquency
    • Agnew R. A longitudinal test of social control theory and delinquency. Journal of Research in Crime and Delinquency. 28(2):1991;126-156.
    • (1991) Journal of Research in Crime and Delinquency , vol.28 , Issue.2 , pp. 126-156
    • Agnew, R.1
  • 2
    • 84984313122 scopus 로고
    • Foundation for a general strain theory of crime and delinquency
    • Agnew R. Foundation for a general strain theory of crime and delinquency. Criminology. 30(1):1992;47-87.
    • (1992) Criminology , vol.30 , Issue.1 , pp. 47-87
    • Agnew, R.1
  • 3
    • 0027163518 scopus 로고
    • Why do they do it?: An examination of the intervening mechanisms between social control variables and delinquency
    • Agnew R. Why do they do it?: an examination of the intervening mechanisms between social control variables and delinquency. Journal of Research in Crime and Delinquency. 30(3):1993;245-266.
    • (1993) Journal of Research in Crime and Delinquency , vol.30 , Issue.3 , pp. 245-266
    • Agnew, R.1
  • 4
    • 0028811312 scopus 로고
    • Testing the leading crime theories: An alternative strategy focusing on motivational processes
    • Agnew R. Testing the leading crime theories: an alternative strategy focusing on motivational processes. Journal of Research in Crime and Delinquency. 32(4):1995;363-398.
    • (1995) Journal of Research in Crime and Delinquency , vol.32 , Issue.4 , pp. 363-398
    • Agnew, R.1
  • 8
    • 22844455759 scopus 로고    scopus 로고
    • Male and female delinquent's attachment and effects of attachments on severity of self-reported delinquency
    • Anderson B., Homes M.D., Ostresh E. Male and female delinquent's attachment and effects of attachments on severity of self-reported delinquency. Crime Justice and Behavior. 26(4):1999;435-452.
    • (1999) Crime Justice and Behavior , vol.26 , Issue.4 , pp. 435-452
    • Anderson, B.1    Homes, M.D.2    Ostresh, E.3
  • 10
    • 84948894637 scopus 로고
    • An examination of the validity of two models of attitude
    • Bagozzi R.P. An examination of the validity of two models of attitude. Multivariate Behavioral Research. 16:1992;323-359.
    • (1992) Multivariate Behavioral Research , vol.16 , pp. 323-359
    • Bagozzi, R.P.1
  • 12
    • 2342616489 scopus 로고    scopus 로고
    • Comparative fit indexes in structural models
    • P.M. Bentler, Comparative fit indexes in structural models, Psychological Bulletin 58, 65-79.
    • Psychological Bulletin , vol.58 , pp. 65-79
    • Bentler, P.M.1
  • 13
    • 0021605916 scopus 로고
    • Control criticism of train theory: An assessment of theoretical and empirical adequacy
    • Bernard T.J. Control criticism of train theory: an assessment of theoretical and empirical adequacy. Journal of Research in Crime and Delinquency. 21:1984;353-372.
    • (1984) Journal of Research in Crime and Delinquency , vol.21 , pp. 353-372
    • Bernard, T.J.1
  • 14
    • 1642487476 scopus 로고    scopus 로고
    • How Secure are You?
    • August
    • S. Breidenbach, How Secure are You?, Information Week, August 2000, pp. 71-78.
    • (2000) Information Week , pp. 71-78
    • Breidenbach, S.1
  • 16
    • 0003132671 scopus 로고
    • The growth of scientific knowledge: Theories of deviance as a case study
    • A. Lewis Caser (Ed.), Javanovich, Harcourt Brace, NY
    • S. Cole, The growth of scientific knowledge: theories of deviance as a case study, in A. Lewis Caser (Ed.), The Idea of Social Structure: Papers in Honor of Robert K. Merton, Javanovich, Harcourt Brace, NY, 1975.
    • (1975) The Idea of Social Structure: Papers in Honor of Robert K. Merton
    • Cole, S.1
  • 17
    • 0041033341 scopus 로고    scopus 로고
    • Testing control theory and differential association: A reanalysis of the Richmond youth project data
    • Costello B.J., Vowell P.R. Testing control theory and differential association: a reanalysis of the Richmond youth project data. Criminology. 37(4):1999;815-840.
    • (1999) Criminology , vol.37 , Issue.4 , pp. 815-840
    • Costello, B.J.1    Vowell, P.R.2
  • 19
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use and user acceptance of information technology
    • Davis F.D. Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly. 13(3):1989;319-339.
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-339
    • Davis, F.D.1
  • 20
    • 84936823933 scopus 로고
    • User acceptance of computer technology: A comparison of two theoretical models
    • Davis F.D., Bagozzi R.P., Warshaw P.R. User acceptance of computer technology: a comparison of two theoretical models. Management Science. 35(8):1989;982-1003.
    • (1989) Management Science , vol.35 , Issue.8 , pp. 982-1003
    • Davis, F.D.1    Bagozzi, R.P.2    Warshaw, P.R.3
  • 21
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon G., Backhouse J. Information system security management in the new millennium. Communications of the ACM. 43(7):2000;125-128.
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 22
    • 84993016651 scopus 로고    scopus 로고
    • The second annual global information security survey
    • Dinnie G. The second annual global information security survey. Information Management & Computer Security. 7(3):1999;112-120.
    • (1999) Information Management & Computer Security , vol.7 , Issue.3 , pp. 112-120
    • Dinnie, G.1
  • 23
    • 0028847197 scopus 로고
    • Informal sanction threats and corporate crime: Additive versus multiplicative models
    • Elis L., Simpson S.S. Informal sanction threats and corporate crime: additive versus multiplicative models. Journal of Research in Crime and Delinquency. 32(4):1995;399-424.
    • (1995) Journal of Research in Crime and Delinquency , vol.32 , Issue.4 , pp. 399-424
    • Elis, L.1    Simpson, S.S.2
  • 25
    • 0034158883 scopus 로고    scopus 로고
    • Information security management: A hierarchical framework for various approaches
    • Eloff M.M., von Solms S.H. Information security management: a hierarchical framework for various approaches. Computer and Security. 19(3):2000;243-256.
    • (2000) Computer and Security , vol.19 , Issue.3 , pp. 243-256
    • Eloff, M.M.1    Von Solms, S.H.2
  • 26
  • 28
    • 0040661360 scopus 로고
    • Security-related behavior of PC users in organizations
    • Frank J., Shamir B., Briggs W. Security-related behavior of PC users in organizations. Information and Management. 21(3):1991;127-135.
    • (1991) Information and Management , vol.21 , Issue.3 , pp. 127-135
    • Frank, J.1    Shamir, B.2    Briggs, W.3
  • 31
    • 0003991890 scopus 로고
    • University of California Press, Berkeley, CA
    • T. Hirschi, Causes of Delinquency, University of California Press, Berkeley, CA, 1969.
    • (1969) Causes of Delinquency
    • Hirschi, T.1
  • 32
    • 0002042413 scopus 로고
    • The 9 to 5 underground: Are you policing computer crimes?
    • Hoffer J.A., Straub D.W. The 9 to 5 underground: are you policing computer crimes? Sloan Management Review. 30(4):1989;35-44.
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35-44
    • Hoffer, J.A.1    Straub, D.W.2
  • 34
    • 2342596122 scopus 로고
    • Dis-integrated theory: A critical analysis of attempts to save strain theory
    • Atlanta, GA
    • G. F. Jensen, Dis-integrated theory: a critical analysis of attempts to save strain theory, in: Proceedings of the American Society of Criminology, Atlanta, GA, 1986.
    • (1986) Proceedings of the American Society of Criminology
    • Jensen, G.F.1
  • 35
    • 2342465798 scopus 로고
    • Computer infectors: Prevention, detection, and recovery
    • Joseph G.W., Blanton J.E. Computer infectors: Prevention, detection, and recovery. Information and Management. 23(4):1991;205-216.
    • (1991) Information and Management , vol.23 , Issue.4 , pp. 205-216
    • Joseph, G.W.1    Blanton, J.E.2
  • 40
    • 84984053688 scopus 로고
    • Social control and delinquency: An examination of the elements of the social bond
    • Krohn M.D., Massey J.L. Social control and delinquency: an examination of the elements of the social bond. Sociological Quarterly. 21:1980;529-543.
    • (1980) Sociological Quarterly , vol.21 , pp. 529-543
    • Krohn, M.D.1    Massey, J.L.2
  • 42
    • 0033148488 scopus 로고    scopus 로고
    • Value strategy rather than quality strategy: A case of business to business professional service
    • Lapierre J., Filiatrault P., Chebet J. Value strategy rather than quality strategy: a case of business to business professional service. Journal of Business Research. 45:1999;235-246.
    • (1999) Journal of Business Research , vol.45 , pp. 235-246
    • Lapierre, J.1    Filiatrault, P.2    Chebet, J.3
  • 44
    • 2342576559 scopus 로고    scopus 로고
    • The integrated computer security model based on the general trust theory
    • Lee S., Yoo S. The integrated computer security model based on the general trust theory. Journal of Management Information System Review. 12(1):2002;123-138.
    • (2002) Journal of Management Information System Review , vol.12 , Issue.1 , pp. 123-138
    • Lee, S.1    Yoo, S.2
  • 46
    • 73549114871 scopus 로고
    • Predicting User Intentions: Comparing the technology acceptance model with the theory of planned behavior
    • Mathieson K. Predicting User Intentions: Comparing the technology acceptance model with the theory of planned behavior. Information System Research. 2(3):1991;173-191.
    • (1991) Information System Research , vol.2 , Issue.3 , pp. 173-191
    • Mathieson, K.1
  • 47
    • 84913949833 scopus 로고
    • Testing control theory and differential association: A casual modeling approach
    • Matsueda R.L. Testing control theory and differential association: a casual modeling approach. American Sociological Review. 47:1982;489-504.
    • (1982) American Sociological Review , vol.47 , pp. 489-504
    • Matsueda, R.L.1
  • 48
    • 0005766298 scopus 로고    scopus 로고
    • Computer crime
    • November
    • T. McCollum, Computer crime, Nation's Business, November 1997, pp. 18-26.
    • (1997) Nation's Business , pp. 18-26
    • McCollum, T.1
  • 49
    • 43949152336 scopus 로고
    • A review of current practices for evaluating causal models in organizational behavior and human resources management research
    • Medsker G.J., Williams L.J., Holahan P.J. A review of current practices for evaluating causal models in organizational behavior and human resources management research. Journal of Management. 20:1994;439-464.
    • (1994) Journal of Management , vol.20 , pp. 439-464
    • Medsker, G.J.1    Williams, L.J.2    Holahan, P.J.3
  • 53
    • 0000802230 scopus 로고
    • The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues
    • Paternoster R. The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues. Justice Quarterly. 4:1987;173-217.
    • (1987) Justice Quarterly , vol.4 , pp. 173-217
    • Paternoster, R.1
  • 54
  • 57
    • 0040304844 scopus 로고    scopus 로고
    • Organizational offending and neoclassical criminology: Challenging the reach of a general theory of crime
    • Reed G.E., Yeager P.C. Organizational offending and neoclassical criminology: challenging the reach of a general theory of crime. Criminology. 34:1996;357-382.
    • (1996) Criminology , vol.34 , pp. 357-382
    • Reed, G.E.1    Yeager, P.C.2
  • 62
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen M. A conceptual foundation for organizational information security awareness. Information Management & Computer Security. 8(1):2000;31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1
  • 64
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub D.W. Effective IS security: an empirical study. Information Systems Research. 1(3):1990;255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 65
    • 0001823869 scopus 로고
    • Security concerns of system users: A study of perceptions of the adequacy of security
    • Straub D.W., Goodhue D.L. Security concerns of system users: a study of perceptions of the adequacy of security. Information and Management. 20(1):1991;13-27.
    • (1991) Information and Management , vol.20 , Issue.1 , pp. 13-27
    • Straub, D.W.1    Goodhue, D.L.2
  • 66
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • Straub D.W., Nance W.D. Discovering and disciplining computer abuse in organizations: a field study. MIS Quarterly. 14(1):1990;45-62.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-62
    • Straub, D.W.1    Nance, W.D.2
  • 67
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision-making
    • Straub D.W., Welke R. Coping with systems risk: security planning models for management decision-making. MIS Quarterly. 22(4):1998;441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.2
  • 70
    • 0001897127 scopus 로고    scopus 로고
    • Information Security Management: Why standards are important
    • von Solms R. Information Security Management: why standards are important. Information Management & Computer Security. 7(1):1999;50-57.
    • (1999) Information Management & Computer Security , vol.7 , Issue.1 , pp. 50-57
    • Von Solms, R.1
  • 72
    • 2342485336 scopus 로고    scopus 로고
    • http://www.emarketer.com/ereports/eprivacy_security/welcome.html, 2001.
    • (2001)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.