MARC details
000 -LEADER |
fixed length control field |
02606nam a22002537a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
ZW-GwMSU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240906101914.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240906b |||||||| |||| 00| 0 eng d |
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER |
International Standard Serial Number |
0960085X |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
MSU |
Language of cataloging |
English |
Transcribing agency |
MSU |
Description conventions |
rda |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
T58.5 EUR |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Willison, Robert |
Relator term |
author |
245 10 - TITLE STATEMENT |
Title |
Opportunities for computer crime: |
Remainder of title |
considering systems risk from a criminological perspective |
Statement of responsibility, etc. |
created by Robert Willison and James Backhouse |
264 1# - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Hampshire: |
Name of producer, publisher, distributor, manufacturer |
Palgrave, |
Date of production, publication, distribution, manufacture, or copyright notice |
2006 |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
Content type code |
txt |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
Media type code |
n |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
volume |
Carrier type code |
nc |
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
European Journal of Information Systems |
Volume/sequential designation |
Volume 15, number 4 |
520 3# - SUMMARY, ETC. |
Summary, etc. |
Systems risk refers to the likelihood that an Information System (IS) is inadequately protected against certain types of damage or loss. While risks are posed by acts of God, hackers and viruses, consideration should also be given to the ‘insider’ threat of dishonest employees, intent on undertaking some form of computer crime. Against this backdrop, a number of researchers have addressed the extent to which security managers are cognizant of the very nature of systems risk. In particular, they note how security practitioners' knowledge of local threats, which form part of such risk, is often fragmented. This shortcoming contributes to situations where risk reducing efforts are often less than effective. Security efforts are further complicated given that the task of managing systems risk requires input from a number of departments including, for example, HR, compliance, IS/IT and physical security. To complement existing research, and also to offer a fresh perspective, this paper addresses systems risk from the offender's perspective. If systems risk entails the likelihood that an IS is inadequately protected, this text considers those conditions, within the organisational context, which offer a criminal opportunity for the offender. To achieve this goal a model known as the ‘Crime-Specific Opportunity Structure’ is advanced. Focusing on the opportunities for computer crime, the model addresses the nature of such opportunities with regards to the organisational context and the threats posed by rogue employees. Drawing on a number of criminological theories, it is believed the model may help inform managers about local threats and, by so doing, enhance safeguard implementation. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
IS security |
Form subdivision |
Computer crime |
General subdivision |
Criminology |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Backhouse, James |
Relator term |
co-author |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://doi.org/10.1057/palgrave.ejis.3000592 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Journal Article |