skip to main content
article
Free Access

Piracy, computer crime, and IS misuse at the university

Published:01 June 2006Publication History
Skip Abstract Section

Abstract

Who commits software misuse? Knowing the answer to this question will help organizations protect their information systems.

References

  1. Ajzen, I. Attitudes, Personality, and Behavior. The Dorsey Press, Chicago, IL, 1988.Google ScholarGoogle Scholar
  2. Anthes, G.H. Hack attack: Cyberthieves siphon millions from U.S. firms. Computerworld 30, 16 (1996), 81.Google ScholarGoogle Scholar
  3. Carnevale, D. Software piracy seems rampant among students in a survey at 2 universities. The Chronicle of Higher Education: Daily News (March 4, 2002).Google ScholarGoogle Scholar
  4. Gordon, L., Loeb, M., Lucyshyn, W., and Richardson, R. 2004 Ninth Annual CSI/FBI Computer Crime and Security Survey, Computer Security Institute, 2004.Google ScholarGoogle Scholar
  5. Hollinger, R.C. Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal 2, 1 (1992), 2--12.Google ScholarGoogle Scholar
  6. Loch, K.D., Carr, H.H., and Warkentin, M.E. Threats to information systems: Today's reality, yesterday's understanding. MIS Quarterly 16, 2 (1992), 173--186.Google ScholarGoogle ScholarCross RefCross Ref
  7. McAdams, A.C. Security and risk management: A fundamental business issue. The Information Management Journal 38, 4 (2004), 36--44.Google ScholarGoogle Scholar
  8. Olsen, F. The growing vulnerability of campus networks. The Chronicle of Higher Education 48, 27 (March 15, 2002), A35--A36.Google ScholarGoogle Scholar
  9. Schwartz, K.D. Hackers are ubiquitous, malicious, and taken far too lightly, experts say. Government Computer News 16, 23 (1997), 81--82.Google ScholarGoogle Scholar
  10. Skinner, W.F. and Fream, A.M. A social learning theory analysis of computer crime among college students. The Journal of Research in Crime and Delinquency 34, 4 (1997), 495--518.Google ScholarGoogle ScholarCross RefCross Ref
  11. Stair, R.M. and Reynolds, G.W. Principles of Information Systems: A Managerial Approach, 3E. Course Technologies, Cambridge, MA, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Straub, D.W. Deterring computer abuse: The effectiveness of deterrent countermeasures in the computer security environment. Dissertation, Indiana University Graduate School of Business, 1986.Google ScholarGoogle Scholar

Index Terms

  1. Piracy, computer crime, and IS misuse at the university

        Recommendations

        Reviews

        Steve Mahaney

        Misuse of computer software and data is a pressing issue for all types of organizations. It puts at risk ethics, liabilities, and confidentiality. This article reports on a survey of misuse by college students and the rates of misuse by academic level (underclassmen, upperclassmen, graduate students), age, experience with computers, gender, and familiarity with campus usage policy. The article shows that misuse increases with time in college, age, and experience with computers. Misuse is more common among males. Surprisingly, misuse is more prevalent among those who have read their campus computer usage policies. The question asked was whether they had engaged in software misuse or data misuse in their lifetime. Since once innocence is lost, it stays lost, we would expect that lifetime misuse increases with time in college, age, or experience. Had the study asked about misuse in the "last year," might we learn that more experienced people misuse computers less each year as their age and experience grow__?__ The increase in lifetime misuse is consistent from underclassmen to upperclassmen, but decreases for students at the master's level. Advanced students are not a random sample of the younger groups; selection and retention may be strongly affected by ethics and commitment to academic integrity. In some cases, the data comes from very small samples; for example, 100 percent of students with less than one year of experience with computers have not misused software. However, the sample size is nine respondents. The article would be immensely more valuable with error estimates. The observation that misuse is more prevalent among those who are familiar with usage policies is the most intriguing. This could possibly be explained by other factors, such as when the respondent read the policy, whether familiarity with policy increases a respondent's ability to identify misuse, or sampling issues. The article acknowledges that this finding is at odds with other research. The article closes with recommendations about usage policies in universities and other organizations and some suggested research questions. For upperclassmen, the sample size appears large enough (on casual inspection) to suggest that misuse is higher among those who acknowledge reading the policy. This does suggest that further research to understand and increase the effectiveness of user education and policy is merited. Online Computing Reviews Service

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 49, Issue 6
          Hacking and innovation
          June 2006
          108 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/1132469
          Issue’s Table of Contents

          Copyright © 2006 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 June 2006

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format