Abstract
This paper assesses issues concerning management of computer-related crime. It argues that organizations that focus exclusively on formal regulatory measures in business management fall short of protecting their resources. The argument is conducted by analyzing the pre and post computer-related crime situation at the Malaria Research Center. Findings from the case study suggest that ethical managerial behavior can not be cultivated by strict rule structures but through self-regulation. The paper uses Gottfredson and Hirschi’s (1990) theory to evaluate the case. In a final synthesis the paper illustrates how inappropriate control measures can adversely affect the integrity of an organization.
Chapter PDF
Similar content being viewed by others
Key words
References
Aubert, V. (1977). White collar crime and social structure. The Free Press, New York.
Audit Commission, (1994) Opportunity makes a thief. Analysis of computer abuse, The Audit Commission for Local Authorities and the National Health Service in England and Wales.
Ball, L. (1990). Computer crime. In: The information technology revolution. T. Forester, Ed. Basil Blackwell, Oxford.
Bologna, J. (1984). Computer fraud: the basics of prevention and detection. Butterworth, London.
Braithwaite, J. (1985). White collar crime. Annual Review of Sociology (11): 1–25.
Brown, R. K., (1991) Security overview and threat, National Computer Security Educators, Information Resource Management College, National Defense University, Washington DC, Tutorial Track, NCSC.
Carroll, J. (1982). Committing a crime: the offenders decision. In: The criminal justice system: a social psychological analysis. V. Konecni and E. Ebbesen, Eds. Freeman and Company, San Francisco.
Chen, D. (1998) Man Charged With Sabotage of Computers. New York Times, February 18, 1998.
Clarke, M. (1990). Business crime: its nature and control. Polity Press, Cambridge.
Clarke, R. and D. Cornish (1985). Modeling offenders decisions: a framework for research policy. Crime and Justice-An annual review of research 6: 147–185.
Clinard, M. B. (1983). Corporate ethics and crime. Sage Publications, Beverly Hills.
Clinard, M. B. and P. C. Yeager (1980). Corporate crime. The Free Press, New York
Cressey, D. (1986). Why managers commit fraud. Australian and New Zealand Journal of Criminology (19): 195–209.
Croall, H. (1992). white collar crime. Open University Press, Milton Keynes, UK.
Dhillon, G. (1997). Managing information system security. Macmillan, London.
Dhillon, G. (1998). Choosing appropriate organizational controls: managing the informtion assets. In: Effective utilization and management of emerging information technologies. M. Khosrowpour, Ed. 473–477. Idea Group Publication, Hershey PA.
Dhillon, G. (1999). Computer crime: interpreting violation of safeguards by trusted personnel. In: Managing information technology resources in organizations in the next millennium. M. Khosrowpour, Ed. 602–606. Idea Group Publishing, Hershey.
Evans, T. D., F. T. Cullen, et al. (1997). The social consequences of self-control: testing the general theory of crime. Criminology 35(3): 475–504.
Forester, T. and P. Morrison (1994). Computer ethics: cautionary tales and ethical dilemmas in computing. The MIT Press, Cambridge.
Gottfredson, M. R. and T. Hirschi (1990). A general theory of crime. Stanford University Press, Stanford, California.
Hearnden, K. (1990). Computer crime and people. In: A handbook of computer crime. K. Hearnden, Ed. Kogan Page, London.
Hester, S. and P. Eglin (1992). A sociology of crime. Routledge, London.
Hitchings, J. (1996). A practical solution to the complex human issues of information security design. In: Information systems security: facing the information society of the 21st century. S. K. Katsikas and D. Gritzalis, Eds. 3–12. Chapman & Hall, London.
Hollinger, R. and J. Clark (1983). Deterrence in the workplace: perceived certainty, perceived severity and employee theft. Social Forces 62(2): 398–418.
Jones, T. M. (1991). Ethical decision making by individuals in organizations: an issue-contingent model. Academy of Management Review 16(2): 366–395.
Madon, S. (1991). The impact of computer-based information systems on rural development: a case study in India. Pb.D. Thesis. University of London,.
McClaughlin, T. (1976). A proposal for a behavioral approach to decrease shoplifting. Corrective and Social Psychiatry 22: 12–14.
McNees, M. e. a. (1976). Shoplifting prevention: providing information through signs. Journal of Applied Behavioral Analysis 9: 339–405.
Mintzberg, H. (1983). Power in and around organizations. Prentice-Hall, Englewood Cliffs.
Orlikowski, W. J. and J. J. Baroudi (1991). Studying information technology in organizations: research approaches and assumptions. Information Systems Research 2(1): 1–28.
Parker, D. (1983). Fighting computer crime. Charles Scribner’s Sons, New York.
Scraton, P. and N. South (1984). The ideological construction of the hidden economy. Contemporary Crises (8).
Serafeimidis, V. (1997). Interpreting the evaluation of information systems investments: conceptual and operational explorations. Ph.D. thesis In: Information Systems Department.: London School of Economics and Political Science, University of London, London.
Sieber, U. (1986). The international handbook on computer crime. John Wiley & Sons, Chichester.
Symons, V. J. (1991). A review of information systems evaluation: content, context and process. European Journal of Information Systems 1(3): 205–212.
Taylor, I., P. Walton, et al. (1992). The new criminology: for a social theory of deviance. Routledge, London.
Walsham, G. (1993). Interpreting information systems in organizations. John Wiley & Sons, Chichester.
Walsham, G. (1995). Interpretive case studies in IS research: nature and method. European Journal of Information Systems 4(2): 74–81.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Dhillon, G., Silva, L. (2001). Interpreting Computer-related Crime at the Malaria Research Center. In: Eloff, J.H.P., Labuschagne, L., von Solms, R., Dhillon, G. (eds) Advances in Information Security Management & Small Systems Security. IFIP International Federation for Information Processing, vol 72. Springer, Boston, MA. https://doi.org/10.1007/0-306-47007-1_13
Download citation
DOI: https://doi.org/10.1007/0-306-47007-1_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7506-7
Online ISBN: 978-0-306-47007-3
eBook Packages: Springer Book Archive