Computer crime—risk management and computer security
Computers and Security
Computer abuse and security: Update on an empirical pilot study
ACM SIGSAC Review
Deviancy by bits and bytes: computer abusers and control measures
Proceedings of the 2nd IFIP international conference on Computer security: a global challenge
The management of end user computing
Communications of the ACM
Fighting Computer Crime
Computer Crime
Accounting and Information Systems
Accounting and Information Systems
Methodology for the optimization of resources in the detection of computer fraud
Methodology for the optimization of resources in the detection of computer fraud
Hi-index | 0.00 |
This paper presents an overview of the empirical evidence concerning the nature of computer abuse against organizations and viable control mechanisms. A model of perpetrator motivation is presented and General Deterrence Theory is proposed as an appropriate theoretical basis for the design and implementation of computer abuse countermeasures. In this theoretical context, specific actions that computer security specialists, information systems managers, and EDP auditors can take to reduce the likelihood of computer abuse in their organizations are proposed.