메뉴 건너뛰기




Volumn 1, Issue 1, 2006, Pages 25-40

Legal issues alone are not enough to manage computer fraud committed by employees

Author keywords

Computer fraud; Employees and legalisations; Security

Indexed keywords


EID: 84870224179     PISSN: 19018401     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (85)
  • 1
    • 84875515215 scopus 로고
    • Computer crimes-a study of different types of offences and offenders
    • Singapore, 27-29 May 1992 Elsevier Science Publishers B.V. (North Holland)
    • Angerfelt, B. (1992). Computer crimes-a study of different types of offences and offenders. Eighth IFIP International Symposium on Computer Security, IFIP Sec '92, Singapore, 27-29 May 1992, Elsevier Science Publishers B.V. (North Holland).
    • (1992) Eighth IFIP International Symposium on Computer Security, IFIP Sec '92
    • Angerfelt, B.1
  • 4
    • 33749323733 scopus 로고    scopus 로고
    • Audit Commission, London, Audit Commission Publications, HMSO
    • Audit Commission (2001). Your business@ risk: an update of IT abuse 2001, London, Audit Commission Publications, HMSO.
    • (2001) Your business@ risk: An update of IT abuse 2001
  • 5
    • 84875513843 scopus 로고    scopus 로고
    • Audit Commission Report, London, HMSO
    • Audit Commission Report, (2005). ICT Fraud and Abuse 2005. London, HMSO.
    • (2005) ICT Fraud and Abuse 2005
  • 6
    • 84875486676 scopus 로고
    • Report of the Board of Banking Supervision: Inquiry into the Circumstances of the Collapse of Barings
    • HMSO. Extract from the conclusion of the Bank of England Report on the collapse of Barings
    • Bank of England Report, 1995, "Report of the Board of Banking Supervision: Inquiry into the Circumstances of the Collapse of Barings", HMSO. Extract from the conclusion of the Bank of England Report on the collapse of Barings. http://www.forex.com/members/regulation/boebar/boe.htm
    • (1995) Bank of England Report
  • 7
    • 13444285413 scopus 로고
    • Los Angeles, National Center for Computer Crime Data
    • BloomBecker, J. (1986). Computer crime law reporter. Los Angeles, National Center for Computer Crime Data.
    • (1986) Computer crime law reporter
    • BloomBecker, J.1
  • 10
    • 84965878455 scopus 로고
    • On theory and action for corporate crime control
    • (April)
    • Braithwaite, J. and Geis, G. (1982). "On theory and action for corporate crime control", Crime and Delinquency (April): 292-314.
    • (1982) Crime and Delinquency , pp. 292-314
    • Braithwaite, J.1    Geis, G.2
  • 12
    • 2342497078 scopus 로고    scopus 로고
    • CSI/F.B.I. San Francisco, CSI
    • CSI/FBI (2003). Computer Crime Security Survey. San Francisco, CSI: http://www.gocsi.com/
    • (2003) Computer Crime Security Survey
  • 15
    • 84875497244 scopus 로고    scopus 로고
    • The role of individual characteristics on the effectiveness of IS security countermeasures
    • D'Arcy and Hovav, New York
    • D'Arcy and Hovav (2004). The role of individual characteristics on the effectiveness of IS security countermeasures. Tenth Americas Conference on Information Systems (AMCIS) 2004, New York: 1-8.
    • (2004) Tenth Americas Conference on Information Systems (AMCIS) 2004 , pp. 1-8
  • 18
    • 0004040956 scopus 로고
    • Milton Keynes, Open University Press
    • Croall, H. (1992). White collar crime. Milton Keynes, Open University Press.
    • (1992) White collar crime
    • Croall, H.1
  • 21
    • 0003982595 scopus 로고    scopus 로고
    • Managing information system security
    • Macmillan Press
    • Dhillon, G. (1997). Managing information system security, Macmillan Press.
    • (1997)
    • Dhillon, G.1
  • 23
    • 0035063716 scopus 로고    scopus 로고
    • Violation of safeguard by trusted personnel and understanding related information security concerns
    • Dhillon, G. (2001). "Violation of safeguard by trusted personnel and understanding related information security concerns. " Computers & Security 20 (2): 165-172.
    • (2001) Computers & Security , vol.20 , Issue.2 , pp. 165-172
    • Dhillon, G.1
  • 28
    • 85024291756 scopus 로고    scopus 로고
    • News track: Latest computer security numbers
    • Fox, R. (1998). "News track: Latest computer security numbers. " Communications of the ACM 41(11): 9-16.
    • (1998) Communications of the ACM , vol.41 , Issue.11 , pp. 9-16
    • Fox, R.1
  • 30
    • 84875491096 scopus 로고    scopus 로고
    • Just 37 get security cert
    • London
    • Goodwin, B. (2000). "Just 37 get security cert. " Computer Weekly. London: 2.
    • (2000) Computer Weekly , pp. 2
    • Goodwin, B.1
  • 33
    • 0000917858 scopus 로고    scopus 로고
    • The effects of codes of ethics and personal denial of responsibility on computer abuse and judgments and intentions
    • Harrington, S. J. (1996). "The effects of codes of ethics and personal denial of responsibility on computer abuse and judgments and intentions. " MIS Quarterly (20) 3: 257-278.
    • (1996) MIS Quarterly , vol.3 , Issue.20 , pp. 257-278
    • Harrington, S.J.1
  • 35
    • 84875546527 scopus 로고    scopus 로고
    • The process of criminalization: The case of computer crime laws
    • R. C. Hollinger (ed). Dartmouth, Dartmouth Publishing Company Limited
    • Hollinger, R. C. and L. Lanza-Kaduce (1997). The process of criminalization: the case of computer crime laws. Crime, deviance and the computer. R. C. Hollinger (ed). Dartmouth, Dartmouth Publishing Company Limited: 59-84.
    • (1997) Crime, deviance and the computer , pp. 59-84
    • Hollinger, R.C.1    Lanza-Kaduce, L.2
  • 38
    • 0004197846 scopus 로고
    • Englewood Cliffs, Prentice-Hall
    • Johnson, D. G. (1994). Computer ethics. Englewood Cliffs, Prentice-Hall.
    • (1994) Computer ethics
    • Johnson, D.G.1
  • 39
    • 84976680568 scopus 로고
    • Accountability and computer decision systems
    • Johnson, D. G., and Mulvey, J.M. (1995). "Accountability and computer decision systems. " Communications of the ACM 38 (12): 58-64.
    • (1995) Communications of the ACM , vol.38 , Issue.12 , pp. 58-64
    • Johnson, D.G.1    Mulvey, J.M.2
  • 41
    • 84875547856 scopus 로고
    • Dealing with computer misuse-the need for an international approach
    • Singapore, 27-29 May 1992 Elsevier Science Publishers B.V. (North Holland)
    • Jones, M. R. (1992). Dealing with computer misuse-the need for an international approach. Eighth IFIP International Symposium on Computer Security, IFIP Sec '92, Singapore, 27-29 May 1992, Elsevier Science Publishers B.V. (North Holland).
    • (1992) Eighth IFIP International Symposium on Computer Security, IFIP Sec '92
    • Jones, M.R.1
  • 44
    • 26044473699 scopus 로고    scopus 로고
    • Managing Computer Misuse
    • Special Issue: ISTAS '97: Computers and Society at a Time of Sweeping Change, a Sage Referred Journal
    • Kesar, S., and Rogerson, S. (1998). "Managing Computer Misuse" Social Science Computer Review (SCCORE), Special Issue: ISTAS '97: Computers and Society at a Time of Sweeping Change, a Sage Referred Journal 16 (3): 240-251.
    • (1998) Social Science Computer Review (SCCORE) , vol.16 , Issue.3 , pp. 240-251
    • Kesar, S.1    Rogerson, S.2
  • 45
    • 24344435754 scopus 로고
    • The computer virus threat: A survey of current criminal statues
    • Kluth, D. J. (1990). "The computer virus threat: a survey of current criminal statues. " Hameline Law Review 13(Spring): 297-312.
    • (1990) Hameline Law Review , vol.13 , Issue.SPRING , pp. 297-312
    • Kluth, D.J.1
  • 46
    • 84976745037 scopus 로고
    • Ethical concepts and information technology
    • Laudon, K. C. (1995). "Ethical concepts and information technology. " Communications of the ACM 38 (12): 33-39.
    • (1995) Communications of the ACM , vol.38 , Issue.12 , pp. 33-39
    • Laudon, K.C.1
  • 48
    • 84875503185 scopus 로고    scopus 로고
    • White-collar crime in the news
    • Liverpool, July
    • Levi, M. (1999). White-collar crime in the news. British Criminology Conference, Liverpool, July.
    • (1999) British Criminology Conference
    • Levi, M.1
  • 49
    • 84875530915 scopus 로고
    • Computer crime
    • Lloyd. C. Reed (ed), London, Blackstone
    • Lloyd (1990). Computer crime. Computer law. C. Reed (ed), London, Blackstone.
    • (1990) Computer law
  • 50
    • 0036173202 scopus 로고    scopus 로고
    • Insider threat prediction tool: Evaluating the probability of IT misuse
    • Magklaras, G. B., and Furnell, S.M. (2003). "Insider threat prediction tool: evaluating the probability of IT misuse. " Computers & Security 21 (1): 62-73.
    • (2003) Computers & Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.B.1    Furnell, S.M.2
  • 51
    • 24344460927 scopus 로고    scopus 로고
    • A preliminary model of end user sophistication for insider threat prediction in IT systems
    • 16th December 2004
    • Magklaras, G. B., and Furnell, S.M. (2005). "A preliminary model of end user sophistication for insider threat prediction in IT systems. " Computers & Security. 16th December 2004, http://www.sciencedirect.com/science.
    • (2005) Computers & Security
    • Magklaras, G.B.1    Furnell, S.M.2
  • 52
    • 0000997408 scopus 로고    scopus 로고
    • Unique ethical problems in information technology
    • Maner, W. (1996). "Unique ethical problems in information technology. " Science and Engineering Ethics 2 (2): 137-154.
    • (1996) Science and Engineering Ethics , vol.2 , Issue.2 , pp. 137-154
    • Maner, W.1
  • 55
    • 27844572798 scopus 로고    scopus 로고
    • White-collar crime
    • M. Maguire, R. Morgan and R. Reiner. Oxford, Clarendon Press
    • Nelken, D. (1997). White-collar crime. The Oxford Handbook of criminology. M. Maguire, R. Morgan and R. Reiner. Oxford, Clarendon Press.
    • (1997) The Oxford Handbook of criminology
    • Nelken, D.1
  • 56
    • 0027961711 scopus 로고
    • Computing and accountability
    • Nissenbaum, H. (1994). "Computing and accountability. " Communications of the ACM: 37 (1): 74-80.
    • (1994) Communications of the ACM , vol.37 , Issue.1 , pp. 74-80
    • Nissenbaum, H.1
  • 57
    • 33748811786 scopus 로고
    • Ethical standards for information systems: A case for unified code
    • Oz, E. (1992). "Ethical standards for information systems: a case for unified code. " MIS Quarterly 16(4): 423-433.
    • (1992) MIS Quarterly , vol.16 , Issue.4 , pp. 423-433
    • Oz, E.1
  • 58
    • 34249866520 scopus 로고
    • New York, Charles Scribner's Sons
    • Parker, D. B. (1976). Crime by computer. New York, Charles Scribner's Sons.
    • (1976) Crime by computer
    • Parker, D.B.1
  • 62
    • 0006733347 scopus 로고    scopus 로고
    • Modeling the relative importance of ethical behaviour criteria: A simulation of information systems professional ethical decisions
    • Pearson, J. M., L. Crosby, J.P. Shim (1996). "Modeling the relative importance of ethical behaviour criteria: a simulation of information systems professional ethical decisions. " Journal of Strategic Information Systems (5) 4: 275-291.
    • (1996) Journal of Strategic Information Systems , vol.4 , Issue.5 , pp. 275-291
    • Pearson, J.M.1    Crosby, L.2    Shim, J.P.3
  • 65
    • 0042484572 scopus 로고    scopus 로고
    • Computer crime and security survey
    • San Francisco, USA
    • Power, R. (2001). "Computer crime and security survey". Computer Security Institute (VII) 1, San Francisco, USA.
    • (2001) Computer Security Institute , vol.1 , Issue.7
    • Power, R.1
  • 68
    • 0038422202 scopus 로고    scopus 로고
    • Eds. London, Blackstine Press Limited
    • Reed, C. and J. Angel. Eds. Computer law. London, Blackstine Press Limited
    • Computer law
    • Reed, C.1    Angel, J.2
  • 69
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz, E. E. (2002). "A framework for understanding and predicting insider attacks. " Computers & Security 21 (6): 526-531.
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 70
    • 84925911469 scopus 로고
    • Towards sociology of organisational crime
    • Schrager, L. S., and Short, J. F. (1977). "Towards sociology of organisational crime. " Social problems 25 (4): 407-419.
    • (1977) Social problems , vol.25 , Issue.4 , pp. 407-419
    • Schrager, L.S.1    Short, J.F.2
  • 71
    • 30244512684 scopus 로고
    • Computer-related crime: An international problem in need of an international solution
    • Shackelford, S. (1992). "Computer-related crime: an international problem in need of an international solution. " Texas International Law Journal 27: 479-505.
    • (1992) Texas International Law Journal , vol.27 , pp. 479-505
    • Shackelford, S.1
  • 73
    • 84875519714 scopus 로고
    • The case study: A vital yet misunderstood research method for management
    • Cardiff
    • Smith, N. C. (1988). The case study: a vital yet misunderstood research method for management. British Academy of Management Conference, Cardiff.
    • (1988) British Academy of Management Conference
    • Smith, N.C.1
  • 74
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risks: Security planning models for management decision making
    • Straub, D. W., and Welke, R. J. (1998). "Coping with systems risks: security planning models for management decision making. " MIS Quarterly 22 (4): 441-464.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-464
    • Straub, D.W.1    Welke, R.J.2
  • 75
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D. W. (1990). "Effective IS security: an empirical study. " Information System Research 1 (2): 255-277.
    • (1990) Information System Research , vol.1 , Issue.2 , pp. 255-277
    • Straub, D.W.1
  • 78
    • 84875543828 scopus 로고
    • Computer crime: Computer hacking and misuse is now a criminal offence
    • Rigby, A. (1994). "Computer crime: computer hacking and misuse is now a criminal offence. " Solicitors Journal 138: 624-5.
    • (1994) Solicitors Journal , vol.138 , pp. 624-625
    • Rigby, A.1
  • 80
    • 84981982436 scopus 로고
    • Causes of disaster: Sloppy management
    • Turner, B. A. (1994). "Causes of disaster: sloppy management. " British Journal of Management 5(5): 215-219.
    • (1994) British Journal of Management , vol.5 , Issue.5 , pp. 215-219
    • Turner, B.A.1
  • 81
    • 0002861365 scopus 로고
    • Ethical beliefs of MIS professional: The frequency and opportunity for unethical behaviour
    • Vitell, S. J. and D. L. Davies (1990). "Ethical beliefs of MIS professional: the frequency and opportunity for unethical behaviour. " Journal of Business Ethics 9(1):63-70.
    • (1990) Journal of Business Ethics , vol.9 , Issue.1 , pp. 63-70
    • Vitell, S.J.1    Davies, D.L.2
  • 82
    • 84875499145 scopus 로고    scopus 로고
    • Computer crime
    • C. Reed and J. Angel (eds). London, Blackstone Press Limited
    • Walden, I. (2000). Computer crime. Computer law. C. Reed and J. Angel (eds). London, Blackstone Press Limited: 277-298.
    • (2000) Computer law , pp. 277-298
    • Walden, I.1
  • 83
    • 0033745066 scopus 로고    scopus 로고
    • Partner in crime
    • Walsh, A. (2000). "Partner in crime. " The Computer Bulletin 2(5):6-7
    • (2000) The Computer Bulletin , vol.2 , Issue.5 , pp. 6-7
    • Walsh, A.1
  • 84
    • 84875511925 scopus 로고
    • Retrospect and prospect: Fashions in criminal justice theory and practice
    • D. Gottfredson and R. Clarke. Eds. Aldershot, Avebury
    • Wilkins, L. (1990). Retrospect and prospect: fashions in criminal justice theory and practice. Policy and theory in criminal justice. D. Gottfredson and R. Clarke. Eds. Aldershot, Avebury: 14-26. 84.
    • (1990) Policy and theory in criminal justice , pp. 14-26
    • Wilkins, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.