LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Kesar, S
Languages: English
Types: Doctoral thesis
Subjects:
This research provides a "rich insight'' into the management of Information \ud Systems (IS) security within the context of computer fraud committed by employees. It \ud argues that management within organisations can impact the understanding of \ud employees (at low-level positions) as to what is 'acceptable" practice when abiding by \ud IS security policies and procedures. Therefore, the growing problem of computer fraud \ud does not occur because of "bad people', but rather because of IS security loopholes \ud within the organisation. Such loopholes can create 'suitable opportunities' where \ud employees may find that the rewards of committing an act are higher than the chances \ud of being caught.\ud This research departs from the traditional functionalist view and approaches the \ud problem of computer fraud from a socio-technical perspective to employ an interpretive \ud research approach. This constitutes a major contribution to IS security studies. It uses \ud the Crime Specific Opportunity Structure model from criminology, as the conceptual \ud framework for initial data collection of the single embedded case study. The findings of \ud the case study (at Technology Corporation) suggest that perceptions of IS security held \ud by employees at high-level positions influence how employees at low-level positions \ud comply with IS security guidelines. To illustrate this argument, this research introduces \ud the notion of "Shared Responsibility" from victimology to reduce the gap between \ud "espoused theory' and 'theory-in-use'. Although, there were no 'reported' cases of \ud computer fraud committed by employees in Technology Corporation, implications are \ud drawn on the role management's perceptions about IS security play in the context of \ud facilitation, precipitation and provocation and consequently, a working environment \ud created where k suitable opportunities' may exist for employees to commit computer \ud fraud (input type in particular).
  • No references.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article