This research provides a "rich insight'' into the management of Information Systems (IS) security within the context of computer fraud committed by employees. It argues that management within organisations can impact the understanding of employees (at low-level positions) as to what is 'acceptable" practice when abiding by IS security policies and procedures. Therefore, the growing problem of computer fraud does not occur because of "bad people', but rather because of IS security loopholes within the organisation. Such loopholes can create 'suitable opportunities' where employees may find that the rewards of committing an act are higher than the chances of being caught. This research departs from the traditional functionalist view and appro...
Computer frauds, while less dramatic than crimes of violence, can inflict significant damage at comm...
This thesis will explore the impact of computer crime on accounting information systems. Specificall...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
This research provides a "rich insight'' into the management of Information Systems (IS) security wi...
The advent of IT has created unprecedented opportunities for the occurrence of computer crime like f...
Within the IS security field, employee computer crime has received increased attention. Indeed, a nu...
While hackers and viruses fuel the IS security concerns for organisations, the problems posed by emp...
Background: Employee computer fraud is a costly and significant problem for firms. Using the fraud t...
Fraud is one of the besetting evils of our time. While less dramatic than crimes of violence like mu...
Fraud is one of the besetting evils of our time. While less dramatic than crimes of violence like mu...
Abstract Employee violations of IS security policies is recognized as a key concern for organization...
Fraud examination has played an important role in the business environment. We examine the Fraud Dia...
There is currently a paucity of literature focusing on the relationship between the actions of staff...
Stereotype threat occurs when a member of a group can be stereotyped as having certain negative char...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
Computer frauds, while less dramatic than crimes of violence, can inflict significant damage at comm...
This thesis will explore the impact of computer crime on accounting information systems. Specificall...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
This research provides a "rich insight'' into the management of Information Systems (IS) security wi...
The advent of IT has created unprecedented opportunities for the occurrence of computer crime like f...
Within the IS security field, employee computer crime has received increased attention. Indeed, a nu...
While hackers and viruses fuel the IS security concerns for organisations, the problems posed by emp...
Background: Employee computer fraud is a costly and significant problem for firms. Using the fraud t...
Fraud is one of the besetting evils of our time. While less dramatic than crimes of violence like mu...
Fraud is one of the besetting evils of our time. While less dramatic than crimes of violence like mu...
Abstract Employee violations of IS security policies is recognized as a key concern for organization...
Fraud examination has played an important role in the business environment. We examine the Fraud Dia...
There is currently a paucity of literature focusing on the relationship between the actions of staff...
Stereotype threat occurs when a member of a group can be stereotyped as having certain negative char...
Insiders’ negligence or abuse is regarded as a leading cause of information security breaches in org...
Computer frauds, while less dramatic than crimes of violence, can inflict significant damage at comm...
This thesis will explore the impact of computer crime on accounting information systems. Specificall...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...