Access the full text.
Sign up today, get DeepDyve free for 14 days.
Jon Ølnes (1994)
Development of security policiesComput. Secur., 13
D. Cornish, R. Clarke (1987)
UNDERSTANDING CRIME DISPLACEMENT: AN APPLICATION OF RATIONAL CHOICE THEORYCriminology, 25
M. Felson (1994)
Crime and Everyday Life: Insights and Implications for Society
H. Scarr, J. Pinsky, D. Wyatt (1973)
Patterns of burglary
I. Symonds (1994)
Security in distributed and client/server systems - A management viewComput. Secur., 13
D. Walsh (1978)
Shoplifting: Controlling a Major Crime
Dean Adams (1996)
Open for business - Securely!Comput. Secur., 15
C. Wood (1997)
Policies alone do not constitute a sufficient awareness effortComputers & Security, 16
Keith Osborne (1998)
Auditing the IT security functionComput. Secur., 17
T. Hirschi (1970)
Causes of Delinquency.British medical journal, 2 4674
R. Light, C. Nee, H. Ingham (1993)
Car Theft: The Offender's Perspective
R. Quinney, James Wilson (1976)
Thinking about Crime.Contemporary Sociology, 5
R. Clarke (1983)
Situational Crime PreventionCrime and Justice, 19
A. Hawley (1950)
Human Ecology: A Theory of Community Structure
D. Lester (1991)
Crime as Opportunity: A Test of the Hypothesis with European Homicide RatesBritish Journal of Criminology, 31
Ross Anderson (1994)
Why cryptosystems failCommun. ACM, 37
T. Mulhall (1997)
Where have all the hackers gone? A study in motivation, deterrence, and crime displacement: Part 1 - introduction & methodologyComput. Secur., 16
R. Whaley, P. Cromwell (1999)
In Their Own Words: Criminals on Crime
R. Lejeune (1977)
The Management of a MuggingJournal of Contemporary Ethnography, 6
R. Clarke (1980)
“Situational” Crime Prevention: Theory and PracticeBritish Journal of Criminology, 20
Lawrence Cohen, M. Felson (1979)
Social Change and Crime Rate Trends: A Routine Activity ApproachAmerican Sociological Review, 44
A. Warman (1993)
Computer Security within Organizations
P. Brantingham, P. Brantingham (1975)
THE SPATIAL PATTERNING OF BURGLARYHoward Journal of Criminal Justice, 14
I. Waller, Norman Okihiro (1978)
Burglary: The victim and the public
This paper examines the concept of criminal opportunity. More precisely, it focuses on the nature of such opportunities that are to be found within an IS context, and the threat posed by dishonest staff who may act on them. Although hackers and their activities may be given ample column space in the lay press, the potential threat posed by dishonest staff should not be underestimated. The 1998 NCC Business Information Survey reports that the greatest risk of security breaches arose from the activities of personnel within organisations, accounting for nearly 52 per cent of all physical and logistical security breaches detected. Similarly, the 1998 CSIFBI Survey found that the largest single source of financial loss almost 37 per cent was attributable to unauthorised insider access. These facts are not lost on security practitioners who, as a rule of thumb, work on the principle that 25 per cent of people are dishonest whenever possible, 25 per cent are always honest and 50 per cent can be either, depending on the nature of security controls and personal motivation.
Journal of Financial Crime – Emerald Publishing
Published: Jan 1, 2000
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.