Protecting Organizational Information Resources

Protecting Organizational Information Resources

Michael D. Wybo (University of Minnesota, USA) and Detmar W. Straub Jr. (University of Minnesota, USA)
Copyright: © 1989 |Pages: 16
DOI: 10.4018/irmj.1989100101
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

This paper presents an overview of the empirical evidence concerning the nature of computer abuse against organizations and viable control mechanisms. A model of perpetrator motivation is presented and General Deterrence Theory is proposed as an appropriate theoretical basis for the design and implementation of computer abuse countermeasures. In this theoretical context, specific actions that computer security specialists, information systems managers, and EDP auditors can take to reduce the likelihood of computer abuse in their organizations are proposed.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 31: 4 Issues (2018): 1 Released, 3 Forthcoming
Volume 30: 4 Issues (2017)
Volume 29: 4 Issues (2016)
Volume 28: 4 Issues (2015)
Volume 27: 4 Issues (2014)
Volume 26: 4 Issues (2013)
Volume 25: 4 Issues (2012)
Volume 24: 4 Issues (2011)
Volume 23: 4 Issues (2010)
Volume 22: 4 Issues (2009)
Volume 21: 4 Issues (2008)
Volume 20: 4 Issues (2007)
Volume 19: 4 Issues (2006)
Volume 18: 4 Issues (2005)
Volume 17: 4 Issues (2004)
Volume 16: 4 Issues (2003)
Volume 15: 4 Issues (2002)
Volume 14: 4 Issues (2001)
Volume 13: 4 Issues (2000)
Volume 12: 4 Issues (1999)
Volume 11: 4 Issues (1998)
Volume 10: 4 Issues (1997)
Volume 9: 4 Issues (1996)
Volume 8: 4 Issues (1995)
Volume 7: 4 Issues (1994)
Volume 6: 4 Issues (1993)
Volume 5: 4 Issues (1992)
Volume 4: 4 Issues (1991)
Volume 3: 4 Issues (1990)
Volume 2: 4 Issues (1989)
Volume 1: 1 Issue (1988)
View Complete Journal Contents Listing