Personal Web usage (PWU) represents a tension between employers and employees as employers generally regard employees' PWU as negative and employees see many PWU behaviors as acceptable. Employers attempt to limit PWU primarily through electronic monitoring and Internet usage policies. Employees, however, find PWU not only permissible, but also useful and rationalize these workplace behaviors. While researchers identified many PWU behaviors, the underlying structure of the phenomenon is not clearly understood. In this article, we offer a comprehensive new definition of PWU, and develop an empirically grounded classification of PWU framed by psychological contract theory and based on two studies. Using multidimensional scaling techniques and cluster analysis, we identified four clusters of PWU behaviors-work/family, hedonic, self-development, and citizenship. The results provide information as to what constitutes the domain of PWU, and how various usages are related to one another via the dimensions of individual and organizational benefits. We offer directions for future work and suggest how our work might be useful to practitioners.
It is truly fi tting that Prentice-Hall would select Peter Grabosky to write a book on computer crime for its Masters Series in Criminology. Grabosky has emerged as one of the leading academicians in the area of computer crime. Through his numerous publications on the subject, he has provided insight into the types of computer-related crime, methodologies used by criminals who commit computer crime, and solutions to prevent future offending. His work moves well beyond the investigative domain of the law enforcement community to recognize the roles of prosecutorial and corrections agencies in addressing computer crime.Electronic Crime fi lls a void in the scholarly literature by offering a single introductory resource that addresses both the nature of and the criminal justice system ' s response to computer crime. Chapter One begins with a brief discussion of how computing and related networking technologies have changed our lives. Grabosky links this discussion to computer crime by calling attention to the capabilities computer technology afford society and how computers serve those with lawful and unlawful intentions. Chapter Two provides a brief history of computer crime. Here, Grabosky emphasizes new opportunities for crime based upon developments in computer technology. The differences between a hacker and a cracker are also explored, as is the evolution of computer crime legislation.Chapter Three examines the relationship between computer technology and crime and lays out a typology of computer crime. Grabosky categorizes computer crime by differentiating between conventional crimes that are committed with computer technology (e.g. extortion, stalking, and the production, dissemination of child pornography) and new crimes that are committed with computer technology (e.g. website defacement, denial-of-service attacks, ATM fraud, dissemination of malicious code). Chapter Three also contains a glossary of technical terms that are commonly used in the computer crime literature.Chapter Four lays out a theoretical framework to explain computer crime. Here, Grabosky uses routine activity theory as the basis for explaining why cybercrime occurs. He attributes the supply of both motivated offenders and suitable targets for victimization to an increasing Internet user population and familiarization with computer technology. Capable guardianship in cyberspace, as it pertains to routine activity theory, is discussed from the human (e.g. parents, employers, and system administrators) and technological (e.g. encryption, antivirus, and intrusion detection programs) perspectives.Chapter Five reviews past victimization research in an attempt to get at the prevalence and impact of computer crime. Grabosky calls attention to some of the methodological diffi culties in estimating the prevalence of cybercrime and associated damages, including
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.