1999
DOI: 10.1108/09685229910292664
|View full text |Cite
|
Sign up to set email alerts
|

Managing and controlling computer misuse

Abstract: This paper argues that many of the losses owing to computer‐related fraud could be avoided if organizations adopt a more pragmatic approach in dealing with such incidents. The paper suggests that in implementing controls, both within organizations and computer systems, a balanced approach be adopted. Such an approach should place equal emphasis on technical, formal and informal interventions. The argument is conducted by reviewing the nature of security breaches that have taken place in different parts of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0
3

Year Published

2004
2004
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(37 citation statements)
references
References 6 publications
0
34
0
3
Order By: Relevance
“…Many scholars have proposed a proactive approach for information security, such as [7][20]. Yet they do not have quantitative analysis on costeffectiveness of proactive approach.…”
Section: Contribution To Researchmentioning
confidence: 99%
“…Many scholars have proposed a proactive approach for information security, such as [7][20]. Yet they do not have quantitative analysis on costeffectiveness of proactive approach.…”
Section: Contribution To Researchmentioning
confidence: 99%
“…Business controls in this sense refer to operational controls. According to Dhillon (1999), increasing awareness of security issues is the most cost-effective control that an organization can implement. However, in order to ensure that the maximum return on investment is gained, special care should be taken to ensure the success of the user education programs used.…”
Section: The Human Side Of Information Securitymentioning
confidence: 99%
“…Security culture can also be defined as: The totality of patterns of behaviours in an organization that contribute to the protection of information of all kinds [4] (p.90).…”
Section: (P148)mentioning
confidence: 99%