Considering the Offender

OPEN ARCHIVE

Union Jack
Dannebrog

Considering the Offender

Show simple item record

dc.contributor.author Willison, Robert en_US
dc.date.accessioned 2009-02-04T10:23:46Z
dc.date.available 2009-02-04T10:23:46Z
dc.date.issued 2005-09-20T00:00:00Z en_US
dc.identifier.uri http://hdl.handle.net/10398/6462
dc.description.abstract IS security represents a growing concern for organisations. Although hackers and viruses are often the basis of such concerns, the inside threat of employee computer crime should not be underestimated. From an academic perspective, there are a modest but growing number of texts which examine the ‘insider’ problem. While attention has been given to the influence on offender actions through deterrent safeguards, there has been a lack of insight into the interactive relationship between offender choices made during the actual perpetration of computer crimes, and the context in which such crimes take place. Knowledge of this relationship would be of obvious interest to practitioners who would aim to manipulate the environment and influence offender choices accordingly. To address this oversight, this paper, therefore, advances two criminological theories which it is argued can be used to examine the stages an offender must go through in order for a crime to be committed i.e. the ‘procedural stages’ of computer crime. Hence, this paper illustrates how the two theories, entitled the rational choice perspective and situational crime prevention, can be applied to the IS domain, thereby offering a theoretical basis on which to analyse offender choices/behaviour during perpetration. Through such an analysis greater insights may be offered into selecting appropriate safeguards to prevent computer crime. en_US
dc.format.extent 38 s. en_US
dc.language eng en_US
dc.relation.ispartofseries Working paper;2005-009 en_US
dc.subject.other edb-kriminalitet en_US
dc.subject.other medarbejderkriminalitet en_US
dc.subject.other computer crime en_US
dc.title Considering the Offender en_US
dc.type wp en_US
dc.accessionstatus modt05sep 20miel en_US
dc.contributor.corporation Copenhagen Business School. CBS en_US
dc.contributor.department Institut for Informatik en_US
dc.contributor.departmentshort INF en_US
dc.contributor.departmentuk Department of Informatics en_US
dc.contributor.departmentukshort INF en_US
dc.idnumber x656503598 en_US
dc.publisher.city København en_US
dc.publisher.year 2005 en_US
dc.title.subtitle Addressing the Procedural Stages of Computer Crime in an Organisational Context en_US


Creative Commons License This work is licensed under a Creative Commons License.

Files Size Format View
09_2005.pdf 426.6Kb PDF View/Open

This item appears in the following Collection(s)

Show simple item record