Midlands State University Library

Opportunities for computer crime: (Record no. 167045)

MARC details
000 -LEADER
fixed length control field 02606nam a22002537a 4500
003 - CONTROL NUMBER IDENTIFIER
control field ZW-GwMSU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240906101914.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240906b |||||||| |||| 00| 0 eng d
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER
International Standard Serial Number 0960085X
040 ## - CATALOGING SOURCE
Original cataloging agency MSU
Language of cataloging English
Transcribing agency MSU
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number T58.5 EUR
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Willison, Robert
Relator term author
245 10 - TITLE STATEMENT
Title Opportunities for computer crime:
Remainder of title considering systems risk from a criminological perspective
Statement of responsibility, etc. created by Robert Willison and James Backhouse
264 1# - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hampshire:
Name of producer, publisher, distributor, manufacturer Palgrave,
Date of production, publication, distribution, manufacture, or copyright notice 2006
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
Media type code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
Carrier type code nc
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE
Title European Journal of Information Systems
Volume/sequential designation Volume 15, number 4
520 3# - SUMMARY, ETC.
Summary, etc. Systems risk refers to the likelihood that an Information System (IS) is inadequately protected against certain types of damage or loss. While risks are posed by acts of God, hackers and viruses, consideration should also be given to the ‘insider’ threat of dishonest employees, intent on undertaking some form of computer crime. Against this backdrop, a number of researchers have addressed the extent to which security managers are cognizant of the very nature of systems risk. In particular, they note how security practitioners' knowledge of local threats, which form part of such risk, is often fragmented. This shortcoming contributes to situations where risk reducing efforts are often less than effective. Security efforts are further complicated given that the task of managing systems risk requires input from a number of departments including, for example, HR, compliance, IS/IT and physical security. To complement existing research, and also to offer a fresh perspective, this paper addresses systems risk from the offender's perspective. If systems risk entails the likelihood that an IS is inadequately protected, this text considers those conditions, within the organisational context, which offer a criminal opportunity for the offender. To achieve this goal a model known as the ‘Crime-Specific Opportunity Structure’ is advanced. Focusing on the opportunities for computer crime, the model addresses the nature of such opportunities with regards to the organisational context and the threats posed by rogue employees. Drawing on a number of criminological theories, it is believed the model may help inform managers about local threats and, by so doing, enhance safeguard implementation.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element IS security
Form subdivision Computer crime
General subdivision Criminology
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Backhouse, James
Relator term co-author
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1057/palgrave.ejis.3000592
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Journal Article
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Serial Enumeration / chronology Total Checkouts Full call number Date last seen Copy number Price effective from Koha item type Public note
    Library of Congress Classification     Main Library Main Library - Special Collections 20/12/2007 Vol. 15, no. 4 (pages 403-414)   T58.5 EUR 06/09/2024 SP1145 06/09/2024 Journal Article For in house use