Corpus ID: 7334959

Using Situational Crime Prevention Theory to Explain the Effectiveness of Information Systems Security

  title={Using Situational Crime Prevention Theory to Explain the Effectiveness of Information Systems Security},
  author={Nicole Beebe and V. Rao},
  • Nicole Beebe, V. Rao
  • Published 2005
  • Political Science
  • Information is an intangible organizational asset of enormous value in the information age. Information systems (IS) security technologies play an important role in protecting that information from unauthorized disclosure, modification, and use. As such, the factors that influence the effectiveness of IS security strategies need to be understood. The existing theory base for studying IS security effectiveness is limited to three major perspectives since the mid-1980s: Straub’s extension of… CONTINUE READING

    Figures and Tables from this paper.

    Cyber-crime Science = Crime Science + Information Security
    • 22
    • Highly Influenced
    • PDF
    Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations
    • 8
    • PDF
    A conceptual opportunity-based framework to mitigate the insider threat
    • 8
    • Highly Influenced
    • PDF
    An Insider Threat Neutralization Mitigation Model Predicated On Cognitive Dissonance (ITNMCD)
    • 5
    • Highly Influenced
    • PDF
    A framework of opportunity-reducing techniques to mitigate the insider threat
    • 4
    • PDF
    A Historical Review of Computer User's Illegal Behavior Based on Containment Theory
    • 2
    • Highly Influenced
    • PDF


    Publications referenced by this paper.
    Effective IS Security: An Empirical Study
    • 697
    Situational Crime Prevention
    • 680
    • Highly Influential
    • PDF
    Causes of Delinquency.
    • 7,276
    • PDF
    Understanding the offender/environment dynamic for computer crimes
    • 48
    • PDF
    Issues in cybersecurity; understanding the potential risks associated with hackers/crackers
    • 85
    Crime Prevention Through Environmental Design
    • 494
    Computer crimes: theorizing about the enemy within
    • 131
    Managing and controlling computer misuse
    • 120