Advanced Search
MyIDEAS: Login

Opportunities for computer abuse

Contents:

Author Info

  • Willison, Robert

    (Department of Informatics, Copenhagen Business School)

  • Backhouse, James

    (Department of Informatics, Copenhagen Business School)

Registered author(s):

    Abstract

    Systems risk refers to the likelihood that an IS is inadequately guarded against certain types of damage or loss. While risks are posed by acts of God, hackers and viruses, consideration should also be given to the ‘insider’ threat of dishonest employees, intent on undertaking some form of computer abuse. Against this backdrop, a number of researchers have addressed the extent to which security managers are cognizant of the very nature of systems risk. In particular, they note how security practitioners’ knowledge of local threats, which form part of such risk, is often fragmented. This contributes to situations where risk reducing efforts are often less than effective. Security efforts are further complicated given that the task of managing systems risk requires input from a number of departments including, for example, HR, compliance, IS/IT and physical security. In a bid to complement existing research, but also offer a fresh perspective, this paper addresses systems risk from the offender’s perspective. If systems risk entails the likelihood that an IS is inadequately protected, this text considers those conditions, within the organisational context, which offer a criminal opportunity for the offender. To achieve this goal a model known as the ‘Crime Specific Opportunity Structure’ is advanced. Focussing on the opportunities for computer abuse, the model addresses the nature of such opportunities with regards to the organisational context and the threats posed by rogue employees. Drawing on a number of criminological theories, it is believed the model may help inform managers about local threats and, by so doing, enhance safeguard implementation.

    Download Info

    If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
    File URL: http://openarchive.cbs.dk/cbsweb/handle/10398/6453
    Download Restriction: no

    Bibliographic Info

    Paper provided by Copenhagen Business School, Department of Informatics in its series Working Papers with number 2005-10.

    as in new window
    Length: 44 pages
    Date of creation: 18 Sep 2005
    Date of revision:
    Handle: RePEc:hhs:cbsinf:2005_010

    Contact details of provider:
    Postal: Department of Informatics, Copenhagen Business School, Howitzvej 60, DK-2000 Frederiksberg, Denmark
    Phone: +45 3815 3815
    Email:
    Web page: http://www.cbs.dk/departments/inf/
    More information through EDIRC

    Related research

    Keywords: None;

    Find related papers by JEL classification:

    This paper has been announced in the following NEP Reports:

    References

    References listed on IDEAS
    Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
    as in new window
    1. E. Ray Canterbery, 1984. "Introduction," Journal of Post Keynesian Economics, M.E. Sharpe, Inc., vol. 7(1), pages 4-6, October.
    Full references (including those not matched with items on IDEAS)

    Citations

    Lists

    This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

    Statistics

    Access and download statistics

    Corrections

    When requesting a correction, please mention this item's handle: RePEc:hhs:cbsinf:2005_010. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Lars Nondal).

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If references are entirely missing, you can add them using this form.

    If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.