메뉴 건너뛰기




Volumn 16, Issue 4, 2006, Pages 304-324

Understanding the perpetration of employee computer crime in the organisational context

Author keywords

Criminology; Employee computer crime; IS security; Perpetration

Indexed keywords


EID: 33750683067     PISSN: 14717727     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infoandorg.2006.08.001     Document Type: Article
Times cited : (88)

References (68)
  • 1
    • 33750725059 scopus 로고    scopus 로고
    • Audit Commission. (1998). Ghost in the machine: An analysis of IT Fraud and abuse. London: Audit Commission Publications.
  • 2
    • 0001156375 scopus 로고
    • Managing computer crime: a research outlook
    • Backhouse J., and Dhillon G. Managing computer crime: a research outlook. Computers and Security 14 7 (1995) 645-651
    • (1995) Computers and Security , vol.14 , Issue.7 , pp. 645-651
    • Backhouse, J.1    Dhillon, G.2
  • 3
    • 84933494181 scopus 로고
    • The rationality of sexual offending: testing a deterrence/rational choice conception of sexual assault
    • Bachman R., Paternoster R., and Ward S. The rationality of sexual offending: testing a deterrence/rational choice conception of sexual assault. Law and Society Review 26 2 (1992) 343-372
    • (1992) Law and Society Review , vol.26 , Issue.2 , pp. 343-372
    • Bachman, R.1    Paternoster, R.2    Ward, S.3
  • 4
    • 85197144511 scopus 로고
    • Social learning analysis of aggression
    • Ribes-Inesta E., and Bandura A. (Eds), Lawrence Erlbaum Associates, Publishers, Hillsdale, NJ
    • Bandura A. Social learning analysis of aggression. In: Ribes-Inesta E., and Bandura A. (Eds). Analysis of delinquency and aggression (1976), Lawrence Erlbaum Associates, Publishers, Hillsdale, NJ 202-232
    • (1976) Analysis of delinquency and aggression , pp. 202-232
    • Bandura, A.1
  • 7
    • 33745455297 scopus 로고
    • Who are the computer criminals?
    • Becker J. Who are the computer criminals?. ACM SIGCAS Computers and Society 12 1 (1981) 18-20
    • (1981) ACM SIGCAS Computers and Society , vol.12 , Issue.1 , pp. 18-20
    • Becker, J.1
  • 8
    • 33750716821 scopus 로고    scopus 로고
    • CSI/FBI. (2004). Computer crime and security survey. San Francisco: CSI.
  • 9
    • 77956151290 scopus 로고    scopus 로고
    • Campbell, M. (1988). Ethics and computer security: Cause and effect. In: Proceedings of the 1988 ACM sixteenth annual conference on computer science. Atlanta, Georgia. United States.
  • 10
    • 0001323143 scopus 로고
    • Situational crime prevention: Theory and practice
    • Clarke R. Situational crime prevention: Theory and practice. British Journal of Criminology 20 2 (1980) 136-147
    • (1980) British Journal of Criminology , vol.20 , Issue.2 , pp. 136-147
    • Clarke, R.1
  • 11
    • 0347405262 scopus 로고
    • Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime
    • Cardinali R. Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime. Work Study 44 8 (1995) 11-17
    • (1995) Work Study , vol.44 , Issue.8 , pp. 11-17
    • Cardinali, R.1
  • 14
    • 0001244215 scopus 로고
    • Modelling offender's decisions : a framework for policy and research
    • Tonry M., and Morris N. (Eds), The University of Chicago, Chicago, IL
    • Clarke R., and Cornish D. Modelling offender's decisions : a framework for policy and research. In: Tonry M., and Morris N. (Eds). Crime and justice: An annual review of research Vol. 6 (1985), The University of Chicago, Chicago, IL 147-185
    • (1985) Crime and justice: An annual review of research , vol.6 , pp. 147-185
    • Clarke, R.1    Cornish, D.2
  • 16
    • 0002999357 scopus 로고    scopus 로고
    • A revised classification of situational crime prevention techniques
    • Lab S. (Ed), Anderson Publishing Co, Cincinnati
    • Clarke R., and Homel R. A revised classification of situational crime prevention techniques. In: Lab S. (Ed). Crime prevention at a crossroads (1997), Anderson Publishing Co, Cincinnati 21-35
    • (1997) Crime prevention at a crossroads , pp. 21-35
    • Clarke, R.1    Homel, R.2
  • 17
    • 0004895387 scopus 로고
    • Crime as scripts
    • Zahm D., and Cromwell P. (Eds), Florida Statistical Analysis Center, Florida Criminal Justice Executive Institute, Florida Department of Law Enforcement, Tallahassee, FL
    • Cornish D. Crime as scripts. In: Zahm D., and Cromwell P. (Eds). Proceedings of the international seminar on environmental criminology and crime analysis (1994), Florida Statistical Analysis Center, Florida Criminal Justice Executive Institute, Florida Department of Law Enforcement, Tallahassee, FL 30-45
    • (1994) Proceedings of the international seminar on environmental criminology and crime analysis , pp. 30-45
    • Cornish, D.1
  • 18
    • 0038830409 scopus 로고
    • The procedural analysis of offending and its relevance for situational prevention
    • Clarke R. (Ed), Criminal Justice Press, Monsey, NY
    • Cornish D. The procedural analysis of offending and its relevance for situational prevention. In: Clarke R. (Ed). Crime prevention studies Vol. 3 (1994), Criminal Justice Press, Monsey, NY 151-196
    • (1994) Crime prevention studies , vol.3 , pp. 151-196
    • Cornish, D.1
  • 19
    • 0039910857 scopus 로고
    • Situational prevention, displacement of crime and rational choice theory
    • Heal K., and Laycock G. (Eds), H.M.S.O, London
    • Cornish D., and Clarke R. Situational prevention, displacement of crime and rational choice theory. In: Heal K., and Laycock G. (Eds). Situational crime prevention: From theory into practice (1986), H.M.S.O, London 1-16
    • (1986) Situational crime prevention: From theory into practice , pp. 1-16
    • Cornish, D.1    Clarke, R.2
  • 20
    • 0348006597 scopus 로고
    • Crime specialisation, crime displacement and rational choice theory
    • Wegener H., Losel F., and Haisch J. (Eds), Springer-Verlag, New York
    • Cornish D., and Clarke R. Crime specialisation, crime displacement and rational choice theory. In: Wegener H., Losel F., and Haisch J. (Eds). Criminal behavior and the justice system: Psychological perspective (1989), Springer-Verlag, New York 103-117
    • (1989) Criminal behavior and the justice system: Psychological perspective , pp. 103-117
    • Cornish, D.1    Clarke, R.2
  • 21
    • 18844419105 scopus 로고    scopus 로고
    • Opportunities, precipitators and criminal decisions: a reply to Wortley's critique of situational crime prevention
    • Smith M., and Cornish D. (Eds), Criminal Justice Press, Monsey, NY
    • Cornish D., and Clarke R. Opportunities, precipitators and criminal decisions: a reply to Wortley's critique of situational crime prevention. In: Smith M., and Cornish D. (Eds). Theory for practice in situational crime prevention: Crime prevention studies Vol. 16 (2003), Criminal Justice Press, Monsey, NY 151-196
    • (2003) Theory for practice in situational crime prevention: Crime prevention studies , vol.16 , pp. 151-196
    • Cornish, D.1    Clarke, R.2
  • 22
    • 33750717810 scopus 로고    scopus 로고
    • DTI/PWC. (2004). Information security breaches survey. London: PWC.
  • 23
    • 0035658603 scopus 로고    scopus 로고
    • Computer crimes: theorizing about the enemy within
    • Dhillon G., and Moores S. Computer crimes: theorizing about the enemy within. Computers and Security 20 8 (2001) 715-723
    • (2001) Computers and Security , vol.20 , Issue.8 , pp. 715-723
    • Dhillon, G.1    Moores, S.2
  • 25
    • 0040608410 scopus 로고
    • Proximal circumstances: a mechanism-based classification of crime prevention
    • Clarke R. (Ed), Criminal Justice Press, Monsey, NY
    • Ekblom P. Proximal circumstances: a mechanism-based classification of crime prevention. In: Clarke R. (Ed). Crime prevention studies Vol. 2 (1994), Criminal Justice Press, Monsey, NY 185-232
    • (1994) Crime prevention studies , vol.2 , pp. 185-232
    • Ekblom, P.1
  • 26
    • 33750733554 scopus 로고    scopus 로고
    • Ernst & Young. (2004). Global information security survey.
  • 29
    • 0000849930 scopus 로고
    • Recognition memory for typical and atypical actions in scripted activities: tests of a script pointer + tag hypothesis
    • Graesser A., Gordon S., and Sawyer J. Recognition memory for typical and atypical actions in scripted activities: tests of a script pointer + tag hypothesis. Journal of Verbal Learning and Verbal Behavior 18 3 (1979) 319-332
    • (1979) Journal of Verbal Learning and Verbal Behavior , vol.18 , Issue.3 , pp. 319-332
    • Graesser, A.1    Gordon, S.2    Sawyer, J.3
  • 30
    • 0001823869 scopus 로고
    • Security concerns of systems users: a study of perceptions of the adequacy of security measures
    • Goodhue D., and Straub D. Security concerns of systems users: a study of perceptions of the adequacy of security measures. Information and Management 20 1 (1991) 13-27
    • (1991) Information and Management , vol.20 , Issue.1 , pp. 13-27
    • Goodhue, D.1    Straub, D.2
  • 32
    • 0000917858 scopus 로고    scopus 로고
    • The effects of ethics and personal denial of responsibility on computer abuse judgements and intentions
    • Harrington S. The effects of ethics and personal denial of responsibility on computer abuse judgements and intentions. MIS Quarterly 20 3 (1996) 257-277
    • (1996) MIS Quarterly , vol.20 , Issue.3 , pp. 257-277
    • Harrington, S.1
  • 34
    • 0002042413 scopus 로고
    • The 9 to 5 underground: are you policing computer crimes?
    • Hoffer J., and Straub D. The 9 to 5 underground: are you policing computer crimes?. Sloan Management Review 30 4 (1989) 35-43
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35-43
    • Hoffer, J.1    Straub, D.2
  • 35
    • 33750743370 scopus 로고    scopus 로고
    • ISO BS17799. (2005). Information technology - security techniques - codes of practice for information security management. Switzerland: International Organization for Standardization.
  • 36
    • 26044473699 scopus 로고    scopus 로고
    • Developing ethical practices to minimize computer misuse
    • Kesar S., and Rogerson S. Developing ethical practices to minimize computer misuse. Social Science Computer Review 16 3 (1998) 240-251
    • (1998) Social Science Computer Review , vol.16 , Issue.3 , pp. 240-251
    • Kesar, S.1    Rogerson, S.2
  • 37
    • 84935413493 scopus 로고
    • Tax compliance and perceptions of the risks of detection and criminal prosecution
    • Klepper S., and Nagin D. Tax compliance and perceptions of the risks of detection and criminal prosecution. Law and Society Review 23 2 (1989) 209-240
    • (1989) Law and Society Review , vol.23 , Issue.2 , pp. 209-240
    • Klepper, S.1    Nagin, D.2
  • 38
    • 33750684609 scopus 로고    scopus 로고
    • Crime and innovation: a script analysis of patterns in check forgery
    • Smith M., and Cornish D. (Eds), Criminal Justice Press, Monsey, NY
    • Lacoste J., and Tremblay P. Crime and innovation: a script analysis of patterns in check forgery. In: Smith M., and Cornish D. (Eds). Theory for practice in situational crime prevention Vol. 16 (2003), Criminal Justice Press, Monsey, NY 169-196
    • (2003) Theory for practice in situational crime prevention , vol.16 , pp. 169-196
    • Lacoste, J.1    Tremblay, P.2
  • 39
    • 0000133760 scopus 로고
    • Threats to information systems: today's reality, yesterday's understanding
    • Loch K., Carr H., and Warkentin M. Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly 17 2 (1992) 173-186
    • (1992) MIS Quarterly , vol.17 , Issue.2 , pp. 173-186
    • Loch, K.1    Carr, H.2    Warkentin, M.3
  • 41
    • 85050412654 scopus 로고
    • Enduring individual differences and rational choice theories of crime
    • Nagin D., and Paternoster R. Enduring individual differences and rational choice theories of crime. Law and Society Review 27 3 (1993) 467-496
    • (1993) Law and Society Review , vol.27 , Issue.3 , pp. 467-496
    • Nagin, D.1    Paternoster, R.2
  • 43
    • 33750695932 scopus 로고    scopus 로고
    • Introduction: towards a theory of situational crime prevention
    • Newman G., Clarke R., and Shoham S.G. (Eds), Ashgate Dartmouth, Hants
    • Newman G. Introduction: towards a theory of situational crime prevention. In: Newman G., Clarke R., and Shoham S.G. (Eds). Rational choice and situational crime prevention (1997), Ashgate Dartmouth, Hants 1-23
    • (1997) Rational choice and situational crime prevention , pp. 1-23
    • Newman, G.1
  • 45
    • 34249866520 scopus 로고
    • Charles Scribner's Sons, New York
    • Parker D. Crime by computer (1976), Charles Scribner's Sons, New York
    • (1976) Crime by computer
    • Parker, D.1
  • 46
    • 0004289281 scopus 로고
    • Reston Publishing Company Inc, Reston, Virginia
    • Parker D. Computer security management (1981), Reston Publishing Company Inc, Reston, Virginia
    • (1981) Computer security management
    • Parker, D.1
  • 48
    • 84935413137 scopus 로고
    • Decisions to participate in and desist from four types of common delinquency
    • Paternoster R. Decisions to participate in and desist from four types of common delinquency. Law and Society Review 23 1 (1989) 7-40
    • (1989) Law and Society Review , vol.23 , Issue.1 , pp. 7-40
    • Paternoster, R.1
  • 49
    • 0030521693 scopus 로고    scopus 로고
    • Sanction threats and appeals to morality: testing a rational choice model of corporate crime
    • Paternoster R., and Simpson S. Sanction threats and appeals to morality: testing a rational choice model of corporate crime. Law and Society Review 30 3 (1996) 549-583
    • (1996) Law and Society Review , vol.30 , Issue.3 , pp. 549-583
    • Paternoster, R.1    Simpson, S.2
  • 50
    • 84994734251 scopus 로고    scopus 로고
    • Risk analysis and risk management
    • Peltier T. Risk analysis and risk management. Information Systems Security 13 4 (2004) 44-56
    • (2004) Information Systems Security , vol.13 , Issue.4 , pp. 44-56
    • Peltier, T.1
  • 52
    • 29444436912 scopus 로고
    • Can computer crime be deterred?
    • Sherizen S. Can computer crime be deterred?. Security Journal 6 (1995) 177-181
    • (1995) Security Journal , vol.6 , pp. 177-181
    • Sherizen, S.1
  • 53
    • 0345047114 scopus 로고    scopus 로고
    • Crime and public transport
    • Tonry M. (Ed), The University of Chicago, Chicago, IL
    • Smith M., and Clarke R. Crime and public transport. In: Tonry M. (Ed). Crime and justice: An annual review of research Vol. 27 (2000), The University of Chicago, Chicago, IL 169-233
    • (2000) Crime and justice: An annual review of research , vol.27 , pp. 169-233
    • Smith, M.1    Clarke, R.2
  • 54
    • 0013417738 scopus 로고
    • Computer abuse and computer security: update on an empirical study
    • Straub D. Computer abuse and computer security: update on an empirical study. Security, Audit, and Control Review 4 2 (1986) 21-31
    • (1986) Security, Audit, and Control Review , vol.4 , Issue.2 , pp. 21-31
    • Straub, D.1
  • 55
    • 33750722762 scopus 로고    scopus 로고
    • Straub, D. (1986b). Deterring computer abuse: the effectiveness of deterrent countermeasures in the computer security environment. Unpublished doctoral dissertation, Indiana University Graduate School of Business.
  • 56
    • 0000280419 scopus 로고
    • Effective IS security: an empirical study
    • Straub D. Effective IS security: an empirical study. Information Systems Research 1 3 (1990) 255-276
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.1
  • 57
    • 8744241162 scopus 로고
    • Deterring highly motivated computer abusers: a field experiment in computer security
    • Gable G., and Caelli W. (Eds), Elsevier Science, Amsterdam
    • Straub D., Carlson P., and Jones E. Deterring highly motivated computer abusers: a field experiment in computer security. In: Gable G., and Caelli W. (Eds). IT security: The needs for international cooperation (1992), Elsevier Science, Amsterdam 309-324
    • (1992) IT security: The needs for international cooperation , pp. 309-324
    • Straub, D.1    Carlson, P.2    Jones, E.3
  • 58
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organisations: a field study
    • Straub D., and Nance W. Discovering and disciplining computer abuse in organisations: a field study. MIS Quarterly 14 1 (1990) 45-60
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.1    Nance, W.2
  • 59
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risks: security planning models for management decision making
    • Straub D., and Welke R. Coping with systems risks: security planning models for management decision making. MIS Quarterly 22 4 (1998) 441-469
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.1    Welke, R.2
  • 60
    • 0001155759 scopus 로고
    • Techniques of neutralisation: a theory of delinquency
    • Sykes G., and Matza D. Techniques of neutralisation: a theory of delinquency. American Sociological Review 22 6 (1957) 664-670
    • (1957) American Sociological Review , vol.22 , Issue.6 , pp. 664-670
    • Sykes, G.1    Matza, D.2
  • 61
    • 0002133262 scopus 로고
    • Schematic bases of social information processing
    • Higgins E., Herman C., and Zanna M. (Eds), Earlbaum, Hillsdale, NJ
    • Taylor S., and Crocker J. Schematic bases of social information processing. In: Higgins E., Herman C., and Zanna M. (Eds). Social cognition Vol. 1 (1981), Earlbaum, Hillsdale, NJ 89-134
    • (1981) Social cognition , vol.1 , pp. 89-134
    • Taylor, S.1    Crocker, J.2
  • 62
    • 0035631462 scopus 로고    scopus 로고
    • Bodyswitching and related adaptations in the resale of stolen vehicles
    • Tremblay P., Talon B., and Hurley D. Bodyswitching and related adaptations in the resale of stolen vehicles. British Journal of Criminology 41 4 (2001) 561-579
    • (2001) British Journal of Criminology , vol.41 , Issue.4 , pp. 561-579
    • Tremblay, P.1    Talon, B.2    Hurley, D.3
  • 63
    • 33750733238 scopus 로고    scopus 로고
    • Willison, R. (2002). Opportunities for computer abuse: assessing a crime specific approach in the case of Barings Bank. Unpublished PhD Thesis. University of London.
  • 64
    • 33745439944 scopus 로고    scopus 로고
    • Understanding the offender/context dynamic for computer crimes
    • Willison R. Understanding the offender/context dynamic for computer crimes. Information, Technology and People 19 2 (2006) 170-186
    • (2006) Information, Technology and People , vol.19 , Issue.2 , pp. 170-186
    • Willison, R.1
  • 65
    • 33749351964 scopus 로고    scopus 로고
    • Opportunities for computer crime: considering systems risk from a criminological perspective
    • Willison R., and Backhouse J. Opportunities for computer crime: considering systems risk from a criminological perspective. European Journal of Information Systems 15 4 (2006) 403-414
    • (2006) European Journal of Information Systems , vol.15 , Issue.4 , pp. 403-414
    • Willison, R.1    Backhouse, J.2
  • 68
    • 33750687838 scopus 로고    scopus 로고
    • Wortley, R. (1996). Guilt, shame and situational crime prevention. In R. Homel (Ed.), The politics and practice of situational crime prevention (pp.115-132, Vol. 5). Crime Prevention Studies.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.