To read this content please select one of the options below:

A holistic model of computer abuse within organizations

Jintae Lee (Operations and Information Systems Division, College of Business and Administration, University of Colorado at Boulder, Boulder, Colorado, USA)
Younghwa Lee (Operations and Information Systems Division, College of Business and Administration, University of Colorado at Boulder, Boulder, Colorado, USA)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 May 2002

3618

Abstract

Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in organizations. They are based on the general deterrence theory, which posits that when an organization implements countermeasures that threaten abusers, its computer abuse problems would be deterred. However, computer abuse problems persist in many organizations despite these measures. This article proposes a new model of computer abuse that extends the traditional model with the social criminology theories. Focusing on computer abuse within organizations, the model explains the phenomenon through social lenses such as social bonds and social learning. The new model contributes to our theoretical body of knowledge on computer abuse by providing a new angle for approaching the problem. It suggests to practitioners that both technical and social solutions should be implemented to reduce the pervasive computer abuse problems.

Keywords

Citation

Lee, J. and Lee, Y. (2002), "A holistic model of computer abuse within organizations", Information Management & Computer Security, Vol. 10 No. 2, pp. 57-63. https://doi.org/10.1108/09685220210424104

Publisher

:

MCB UP Ltd

Copyright © 2002, MCB UP Limited

Related articles