Opportunities for Computer Abuse: Assessing a Crime Specific Approach in the Case of Barings Bank
نویسنده
چکیده
..................................................................................................................................... 3 Acknowledgements .................................................................................................................... 4 List of Figures ............................................................................................................................ 9 Chapter One: Research Issues ......................................................................... 10 1.1 Motivations and Scope of the Research .............................................................................. 10 1.2 Definitions of IS and IS Security ........................................................................................ 12 1.3 Current Status of IS Security Research on Opportunity ..................................................... 14 1.4 Objectives of the Research .................................................................................................. 14 1.5 Thesis Structure ................................................................................................................... 15 Chapter Two: Literature Review .................................................................... 18 2.1 Opportunity as a Motivational Factor ................................................................................. 18 2.2 Opportunity Formation Through Deficient Security .......................................................... 19 2.2.1 Organisational Complacency Towards IS Security ................................................... 20 2.2.2 Erroneous Perceptions of IS Security Risks ............................................................... 22 2.2.3 Technical Perspective of IS Security .......................................................................... 23 2.2.4 Funding of IS Security ................................................................................................ 24 2.2.5 Assessing Risks ........................................................................................................... 25 2.2.6 The Interrelated Nature of Security Controls ............................................................. 26 2.2.7 Implementation of Inappropriate Controls ................................................................. 27 2.2.8 Safeguard Implementation .......................................................................................... 30 2.2.9 Compliance Reviews .................................................................................................. 31 2.3 Deficiencies in Existing Notions of Opportunity ................................................................ 35 2.4 Conclusion ........................................................................................................................... 36 Chapter Three: Theoretical Framework .......................................................... 38 3.1 SCP ....................................................................................................................................... 38 3.1.1 Situational Crime Prevention Defined ....................................................................... 40 3.1.2 Theoretical Origins of SCP ......................................................................................... 42 3.2 The Rational Choice Perspective ........................................................................................ 44
منابع مشابه
Modeling the operational risk in Iranian commercial banks: case study of a private bank
The Basel Committee on Banking Supervision from the Bank for International Settlement classifies banking risks into three main categories including credit risk, market risk, and operational risk. The focus of this study is on the operational risk measurement in Iranian banks. Therefore, issues arising when trying to implement operational risk models in Iran are discussed, and ...
متن کاملEvaluating the Performance of an Ambidextrous Bank Using an Agent-based Modeling Approach: A Case Study of Sepah Bank
Banks are the financial institutions that collect assets from various sources and allocate them to the sectors that require liquidity. Therefore, banks are an inherent element in the system of every country. As private banks enter financial markets, the demand for diverse banking services increases dramatically. Banks seek to use various techniques to improve their performance in attracting cus...
متن کاملThe explanatioan of the relationship between the physical factors and the quality of the concept secondary domain with the level of social security of residents in residential settings in crime prevention based on the approach CPTED (Case study: Resi
Abstract Human beings have needs, security is one of the most important human needs that plays an important role in his/her and society's happiness and health, and housing is one of the basic needs of humans after food and clothing. But this need has become a serious problem due to the increasingly growth of demand for housing at the result of the increasing population and urbanization of cont...
متن کاملWhite Collar Crime: Qualitative Explanation of Contexts and Motives
White-collar crime is a controversial term about which there is no consensus. A comprehensive explanation of white-collar crime needs integrated theories that join various factors. White collar crime is an encompassing phrase which refers to a wide range of crimes. Corporate crime, organizational crime, state crime, and state-corporate crime are the most common types of white-collar crime. Esse...
متن کاملThe application of super efficiency technics in measuring the efficiency of bank branches (Case study: Melli Bank of Gilan Province)
In today's competitive world, many manufacturing and service firms, including banks, have been forced to use new managerial approaches, and methods for assessing organizational performance. The Data Envelopment Analysis (DEA) approach is one of these approaches, which has been used to evaluate the performance of organizations since 1978. The purpose of this research is to use the technology sup...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002