Abstract
Who commits software misuse? Knowing the answer to this question will help organizations protect their information systems.
- Ajzen, I. Attitudes, Personality, and Behavior. The Dorsey Press, Chicago, IL, 1988.Google Scholar
- Anthes, G.H. Hack attack: Cyberthieves siphon millions from U.S. firms. Computerworld 30, 16 (1996), 81.Google Scholar
- Carnevale, D. Software piracy seems rampant among students in a survey at 2 universities. The Chronicle of Higher Education: Daily News (March 4, 2002).Google Scholar
- Gordon, L., Loeb, M., Lucyshyn, W., and Richardson, R. 2004 Ninth Annual CSI/FBI Computer Crime and Security Survey, Computer Security Institute, 2004.Google Scholar
- Hollinger, R.C. Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal 2, 1 (1992), 2--12.Google Scholar
- Loch, K.D., Carr, H.H., and Warkentin, M.E. Threats to information systems: Today's reality, yesterday's understanding. MIS Quarterly 16, 2 (1992), 173--186.Google ScholarCross Ref
- McAdams, A.C. Security and risk management: A fundamental business issue. The Information Management Journal 38, 4 (2004), 36--44.Google Scholar
- Olsen, F. The growing vulnerability of campus networks. The Chronicle of Higher Education 48, 27 (March 15, 2002), A35--A36.Google Scholar
- Schwartz, K.D. Hackers are ubiquitous, malicious, and taken far too lightly, experts say. Government Computer News 16, 23 (1997), 81--82.Google Scholar
- Skinner, W.F. and Fream, A.M. A social learning theory analysis of computer crime among college students. The Journal of Research in Crime and Delinquency 34, 4 (1997), 495--518.Google ScholarCross Ref
- Stair, R.M. and Reynolds, G.W. Principles of Information Systems: A Managerial Approach, 3E. Course Technologies, Cambridge, MA, 1998. Google ScholarDigital Library
- Straub, D.W. Deterring computer abuse: The effectiveness of deterrent countermeasures in the computer security environment. Dissertation, Indiana University Graduate School of Business, 1986.Google Scholar
Index Terms
- Piracy, computer crime, and IS misuse at the university
Recommendations
Computer crime
Encyclopedia of Computer ScienceBusiness, economic, and white-collar crimes have changed rapidly as computers proliferate into the activities and environments in which these crimes occur. Computers have engendered a different form of crime. The Internet (q.v.), in particular, provides ...
Comments