A holistic model of computer abuse within organizations

被引:90
|
作者
Lee, Jintae [1 ]
Lee, Younghwa [1 ]
机构
[1] Operations and Info. Syst. Division, College of Business and Admin., University of Colorado at Boulder, Boulder, CO, United States
来源
关键词
Computers - Information technology - Internet - Security of data;
D O I
10.1108/09685220210424104
中图分类号
学科分类号
摘要
Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective In preventing computer abuse in organizations. They are based on the general deterrence theory, which posits that when an organization implements countermeasures that threaten abusers, its computer abuse problems would be deterred. However, computer abuse problems persist in many organizations despite these measures. This article proposes a new model of computer abuse that extends the traditional model with the social criminology theories. Focusing on computer abuse within organizations, the model explains the phenomenon through social lenses such as social bonds and social learning. The new model contributes to our theoretical body of knowledge on computer abuse by providing a new angle for approaching the problem. It suggests to practitioners that both technical and social solutions should be implemented to reduce the pervasive computer abuse problems.
引用
收藏
页码:57 / 63
相关论文
共 50 条
  • [1] Computer Security within Organizations
    Dhillon, Gurpreet
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 1994, 3 (03) : 241 - 242
  • [2] Holistic Strategy-Based Threat Model for Organizations
    Meinig, Michael
    Sukmana, Muhammad I. H.
    Torkura, Kennedy A.
    Meinel, Christoph
    10TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2019) / THE 2ND INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40 2019) / AFFILIATED WORKSHOPS, 2019, 151 : 100 - 107
  • [3] A model of emotion and computer abuse
    Kim, Jongwoo
    Park, Eun Hee
    Baskerville, Richard L.
    INFORMATION & MANAGEMENT, 2016, 53 (01) : 91 - 108
  • [4] DISCOVERING AND DISCIPLINING COMPUTER ABUSE IN ORGANIZATIONS - A FIELD-STUDY
    STRAUB, DW
    NANCE, WD
    MIS QUARTERLY, 1990, 14 (01) : 45 - 60
  • [5] An emote opportunity model of computer abuse
    Baskerville, Richard
    Park, Eun Hee
    Kim, Jongwoo
    INFORMATION TECHNOLOGY & PEOPLE, 2014, 27 (02) : 155 - 181
  • [6] Developing a Holistic Model for Assessing the ICT Impact on Organizations: A Managerial Perspective
    Saleem, Farrukh
    Salim, Naomie
    Altalhi, Abdulrahman H.
    AL-Ghamdi, Abdullah AL-Malaise
    Ullah, Zahid
    ul Qayyum, Noor
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2019, 25 (02): : 259 - 277
  • [7] The CEFP as a model for integrating evaluation within organizations
    Patton, MQ
    CANCER PRACTICE, 2001, 9 : S11 - S16
  • [8] Assessing strategic leadership in organizations: Using bibliometric data to develop a holistic model
    Fernandes, Cristina I.
    Veiga, Pedro M.
    Ferreira, Joao J.
    Rammal, Hussain G.
    Pereira, Vijay
    JOURNAL OF BUSINESS RESEARCH, 2022, 141 : 646 - 655
  • [9] A HOLISTIC APPROACH FOR ACHIEVING ORGANIZATIONS EXCELLENCE
    Petcu , Andreea Jenica
    Rizea , Carmen Ionela
    Draghici, Mihai
    Geambazi, Petris
    MANAGEMENT OF TECHNOLOGICAL CHANGES, BOOK 1, 2011, : 61 - 64
  • [10] Health Belief Model and Organizational Employee Computer Abuse
    Silic, Mario
    Njavro, Mato
    Silic, Dario
    Oblakovic, Goran
    HCI IN BUSINESS, GOVERNMENT, AND ORGANIZATIONS, 2018, 10923 : 187 - 205