Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in organizations. They are based on the general deterrence theory, which posits that when an organization implements countermeasures that threaten abusers, its computer abuse problems would be deterred. However, computer abuse problems persist in many organizations despite these measures. This article proposes a new model of computer abuse that extends the traditional model with the social criminology theories. Focusing on computer abuse within organizations, the model explains the phenomenon through social lenses such as social bonds and social learning. The new model contributes to our theoretical body of knowledge on computer abuse by providing a new angle for approaching the problem. It suggests to practitioners that both technical and social solutions should be implemented to reduce the pervasive computer abuse problems.
Article navigation
1 May 2002
This article was originally published in
Information Management & Computer Security
Research Article|
May 01 2002
A holistic model of computer abuse within organizations Available to Purchase
Jintae Lee;
Jintae Lee
Operations and Information Systems Division, College of Business and Administration, University of Colorado at Boulder, Boulder, Colorado, USA
Search for other works by this author on:
Younghwa Lee
Younghwa Lee
Operations and Information Systems Division, College of Business and Administration, University of Colorado at Boulder, Boulder, Colorado, USA
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 1758-5805
Print ISSN: 0968-5227
© MCB UP Limited
2002
Information Management & Computer Security (2002) 10 (2): 57–63.
Citation
Lee J, Lee Y (2002), "A holistic model of computer abuse within organizations". Information Management & Computer Security, Vol. 10 No. 2 pp. 57–63, doi: https://doi.org/10.1108/09685220210424104
Download citation file:
721
Views
Suggested Reading
Computer Crime
Industrial Management & Data Systems (July,1987)
Security issues in online games
The Electronic Library (April,2002)
Wireless online games
The Electronic Library (April,2002)
White‐collar Computer Crimes: A Threat to Auditors and Organization
Managerial Auditing Journal (May,1994)
Computer Ethics of University Students: An International Exploratory Study
Information Management & Computer Security (May,1993)
Related Chapters
Ruinous Reification: The Astructural Bias in Symbolic Interactionism
The Astructural Bias Charge: Myth or Reality?
Gender and Sexuality in Migration Processes: Theoretical and Methodological Issues
Gender and Sexuality in the Migration Trajectories: Studies between the Northern and Southern Mediterranean Shores
The Imperial Origins of Social and Political Thought
International Origins of Social and Political Theory
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
