Reference Hub6
Protecting Organizational Information Resources

Protecting Organizational Information Resources

Michael D. Wybo, Detmar W. Straub Jr.
Copyright: © 1989 |Volume: 2 |Issue: 4 |Pages: 16
ISSN: 1040-1628|EISSN: 1533-7979|EISBN13: 9781466637337|DOI: 10.4018/irmj.1989100101
Cite Article Cite Article

MLA

Wybo, Michael D., and Detmar W. Straub Jr. "Protecting Organizational Information Resources." IRMJ vol.2, no.4 1989: pp.1-16. http://doi.org/10.4018/irmj.1989100101

APA

Wybo, M. D. & Straub Jr., D. W. (1989). Protecting Organizational Information Resources. Information Resources Management Journal (IRMJ), 2(4), 1-16. http://doi.org/10.4018/irmj.1989100101

Chicago

Wybo, Michael D., and Detmar W. Straub Jr. "Protecting Organizational Information Resources," Information Resources Management Journal (IRMJ) 2, no.4: 1-16. http://doi.org/10.4018/irmj.1989100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper presents an overview of the empirical evidence concerning the nature of computer abuse against organizations and viable control mechanisms. A model of perpetrator motivation is presented and General Deterrence Theory is proposed as an appropriate theoretical basis for the design and implementation of computer abuse countermeasures. In this theoretical context, specific actions that computer security specialists, information systems managers, and EDP auditors can take to reduce the likelihood of computer abuse in their organizations are proposed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.