Computer crimes: theorizing about the enemy within

被引:47
作者
Dhillon, G [1 ]
Moores, S [1 ]
机构
[1] Univ Nevada, Coll Business, Las Vegas, NV 89154 USA
关键词
computer crime; malicious act; violation of safeguards; information security;
D O I
10.1016/S0167-4048(01)00813-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A majority of computer crimes occur because a current employee of an organization has subverted existing controls. By considering two case studies, this paper analyzes computer crimes resulting because of violations of safeguards by employees. The paper suggests that various technical, procedural and normative controls should be put in place to prevent illegal and malicious acts from taking place. Ultimately a good balance between various kinds of controls would help in instituting a cost-effective means to make both accidental and intentional misconduct difficult. This would also ensure, wherever possible, individual accountability for all potentially sensitive negative actions.
引用
收藏
页码:715 / 723
页数:9
相关论文
共 11 条
[1]  
BASKERVILLE R, 1988, DESIGNING INFORMATIO
[2]  
Dhillon G., 2001, Information security management: global challenges in the new millennium, P173
[3]   Violation of safeguards by trusted personnel and understanding related information security concerns [J].
Dhillon, G .
COMPUTERS & SECURITY, 2001, 20 (02) :165-172
[4]  
DHILLON G, 1997, MANAGING INFORMATION
[5]  
DHILLON G, 1999, INFORMATION MANAGEME, V7
[6]  
GREENWALD J, 1995, TIME
[7]  
GREENWALD J, 1994, TIME
[8]  
HIRSCH M, 1995, TOSSED NEWSWEEK, P42
[9]  
PARE TP, 1994, FORTUNE, P40
[10]  
PARKER DB, 1991, COMPUTER SECURITY AND INFORMATION INTEGRITY, P363