Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Positive alternatives: a report on an ACM panel on hacking
Communications of the ACM
Computer abuse and security: Update on an empirical pilot study
ACM SIGSAC Review
Computers and Security
Information systems security: management success factors
Computers and Security
Communications of the ACM
Hardware protection against software piracy
Communications of the ACM
Fighting Computer Crime
Computer ethics: a model of the influences on the individual's ethical decision making
ACM SIGCPR Computer Personnel
Communications of the ACM
Considerations for an effective telecommunications-use policy
Communications of the ACM
Factors motivating software piracy: a longitudinal study
ICIS '99 Proceedings of the 20th international conference on Information Systems
Does electronic monitoring of employee internet usage work?
Communications of the ACM - Internet abuse in the workplace and Game engines in scientific research
The evaluation of IT ethical scenarios using a multidimensional scale
ACM SIGMIS Database
Advanced topics in information resources management
An integrative model of computer abuse based on social control and general deterrence theories
Information and Management
Something for nothing: management rejection of open source software in Australia's top firms
Information and Management
Password security: an empirical study
Journal of Management Information Systems
Understanding the perpetration of employee computer crime in the organisational context
Information and Organization
The linkage between reporting quality and performance in IS projects
Information and Management
Threats and countermeasures for information system security: A cross-industry study
Information and Management
Computers in Human Behavior
Gaining Access with Social Engineering: An Empirical Study of the Threat
Information Systems Security
Structural equation model for EDI controls: Controls design perspective
Expert Systems with Applications: An International Journal
Information Systems Research
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
Information Systems Research
Information security management standards: Problems and solutions
Information and Management
Something for nothing: management rejection of open source software in Australia's top firms
Information and Management
The fight against digital piracy: An experiment
Telematics and Informatics
Information security culture: a behaviour compliance conceptual framework
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Information systems resources and information security
Information Systems Frontiers
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Journal of Management Information Systems
In defense of the realm: understanding the threats to information security
International Journal of Information Management: The Journal for Information Professionals
An integrative study of information systems security effectiveness
International Journal of Information Management: The Journal for Information Professionals
Explaining investors' reaction to internet security breach using deterrence theory
International Journal of Electronic Finance
Protecting Organizational Information Resources
Information Resources Management Journal
A Methodology for Managing Information-Based Risk
Information Resources Management Journal
Information Resources Management Journal
A Composite Framework for Behavioral Compliance with Information Security Policies
Journal of Organizational and End User Computing
A Composite Framework for Behavioral Compliance with Information Security Policies
Journal of Organizational and End User Computing
Information security strategies: towards an organizational multi-strategy perspective
Journal of Intelligent Manufacturing
Hi-index | 0.03 |
As information systems (IS) managers and computer security administrators attempt to address what may be a serious and persistent problem of computer abuse in organizations, two important aspects must be considered: discovery of abuse incidents and discipline of perpetrators. This field study examines how IS managers address these two activities.Data for the study were gathered using victimization surveys of 1,063 randomly selected members of the DPMA (Data Processing Management Association). Results of the study suggest that purposeful detection of abuse incidents is used less than other methods of discovering abuse. Furthermore, the results show that certain perpetrators are able to hide their identities and abusive activities. Based on these results, the study conclusions present a model that shows how security efforts should be managed in terms of security effort allocations and disciplinary actions.