• Corpus ID: 7334959

Using Situational Crime Prevention Theory to Explain the Effectiveness of Information Systems Security

@inproceedings{Beebe2005UsingSC,
  title={Using Situational Crime Prevention Theory to Explain the Effectiveness of Information Systems Security},
  author={Nicole Beebe and V. Srinivasan Chino Rao},
  year={2005}
}
Information is an intangible organizational asset of enormous value in the information age. Information systems (IS) security technologies play an important role in protecting that information from unauthorized disclosure, modification, and use. As such, the factors that influence the effectiveness of IS security strategies need to be understood. The existing theory base for studying IS security effectiveness is limited to three major perspectives since the mid-1980s: Straub’s extension of… 

Figures and Tables from this paper

Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations
Cyber-Situational Crime Prevention and the Breadth of Cybercrimes among Higher Education Institutions
  • S. back, J. LaPrade
  • Computer Science
    International Journal of Cybersecurity Intelligence and Cybercrime
  • 2020
TLDR
This study investigates the link between common cybersecurity measures, crime prevention activities, and cybercrimes and offers the SCP approach as a framework by which universities can seek to reduce incidents of cybercrime through the design, maintenance, and use of the built environment in the digital realm.
The Relationship Between Situational Crime Prevention Theory and Campus Employee Computer Misuse
Computer misuse is a leading problem for all industry sectors, including higher education. However, much of the current research related to computer misuse has been conducted in the business sector,
Cyber-crime Science = Crime Science + Information Security
TLDR
The main contributions of Crime Science as of today are reviewed, its application to a typical Information Security problem, namely phishing, the interdisciplinary structure of Cyber-crime Science is explored, and an agenda for research in Cyber- crime Science is presented in the form of a set of suggested research questions.
CYBER CRIMES & SECURITY
TLDR
The model concentrates on the point of view of the victims, that is, what makes each victim vulnerable, and how the cyber crime prevention strategies should be adapted according to the unique characteristics of the victim.
A Historical Review of Computer User's Illegal Behavior Based on Containment Theory
TLDR
This study proposed five propositions based on containment theory that address social control education, and offer insights in restraining computer user’s illegal behavior intention.
Solutions for counteracting human deception in social engineering attacks
TLDR
The findings offer counteractions by including education, policies, processes and continuous training in security practices, which adds to under-represented cybersecurity research regarding effective implementation for social engineering defense.
...
...

References

SHOWING 1-10 OF 27 REFERENCES
Controlling Computer Abuse: am Empirical Study of Effective Security Countermeasures
TLDR
This victimization survey of 1,211 randomly selected DPMA organizations has determined that computer abuse can be controlled through a set of deterrent administrative procedures and through preventive security software.
Understanding and Addressing Criminal Opportunity: The Application of Situational Crime Prevention to IS Security
TLDR
This paper examines the concept of criminal opportunity and the nature of such opportunities that are to be found within an IS context, and the threat posed by dishonest staff who may act on them.
Understanding the offender/environment dynamic for computer crimes
TLDR
This paper assesses the feasibility of applying criminological theory to the IS security context and notes that while one of the theories is to be found wanting in terms of conceptual sophistication, the case can be made for the further exploration of applying all three in theIS security context.
Effective IS Security: An Empirical Study
TLDR
Investigation of whether a management decision to invest in IS security results in more effective control of computer abuse indicates that security countermeasures that include deterrent administrative procedures and preventive security software will result in significantly lower computer abuse.
Situational Crime Prevention
Situational prevention seeks to reduce opportunities for specific categories of crime by increasing the associated risks and difficulties and reducing the rewards. It is composed of three main
Issues in cybersecurity; understanding the potential risks associated with hackers/crackers
TLDR
By modeling and classifying the risks associated with cybersecurity issues, firms and specific individuals should not become a casualty of this cyberwar, nor become paranoid about the risks, but be informed and follow common business sense practices, policies, and procedures.
Computer crimes: theorizing about the enemy within
Managing and controlling computer misuse
  • G. Dhillon
  • Computer Science
    Inf. Manag. Comput. Secur.
  • 1999
TLDR
It is suggested that in implementing controls, both within organizations and computer systems, a balanced approach be adopted, which should place equal emphasis on technical, formal and informal interventions.
Causes of Delinquency.
  • T. Hirschi
  • Law, Sociology
    British medical journal
  • 1950
In Causes of Delinquency, Hirschi attempts to state and test a theory of delinquency, seeing in the delinquent a person relatively free of the intimate attachments, the aspirations, and the moral
Criminological Theories: Introduction and Evaluation
PREFACE ACKNOWLEDGEMENTS INTRODUCTION TO CRIMINOLOGICAL THEORY What Is Theory? Types of Criminological Theories Theories of Making and Enforcing Criminal Law Theories of Criminal and Deviant Behavior
...
...