{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T16:46:27Z","timestamp":1772815587249,"version":"3.50.1"},"reference-count":13,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2001,4,1]],"date-time":"2001-04-01T00:00:00Z","timestamp":986083200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2001,4]]},"DOI":"10.1016\/s0167-4048(01)00209-7","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T17:58:30Z","timestamp":1027619910000},"page":"165-172","source":"Crossref","is-referenced-by-count":58,"title":["Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns"],"prefix":"10.1016","volume":"20","author":[{"given":"Gurpreet","family":"Dhillon","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(01)00209-7_BIB1","doi-asserted-by":"crossref","unstructured":"Audit Commission, Opportunity makes a thief. Analysis of computer abuse, The Audit Commission for Local Authorities and the National Health Service in England and Wales, 1994.","DOI":"10.1016\/0960-2593(94)90128-7"},{"key":"10.1016\/S0167-4048(01)00209-7_BIB2","unstructured":"Backhouse, J. and Dhillon, G., Managing computer crime: a research outlook, Computers & Security, 14, 7, (1995), 645\u2013651."},{"key":"10.1016\/S0167-4048(01)00209-7_BIB3","doi-asserted-by":"crossref","unstructured":"Balsmeier, P. and Kelly, J., The ethics of sentencing white-collar criminals, Journal of Business Ethics, 15, 2, (1996), 143\u2013152.","DOI":"10.1007\/BF00705582"},{"key":"10.1016\/S0167-4048(01)00209-7_BIB4","doi-asserted-by":"crossref","unstructured":"Dhillon, G., Managing information system security, Macmillan, London, 1997.","DOI":"10.1007\/978-1-349-14454-9"},{"key":"10.1016\/S0167-4048(01)00209-7_BIB5","doi-asserted-by":"crossref","unstructured":"Dhillon, G., \u201cChallenges in managing information security in the new millennium,\u201d in Dhillon, G., ed., Information security management: global challenges in the new millennium, Hershey: Idea Group, 2001.","DOI":"10.4018\/978-1-878289-78-0.ch001"},{"key":"10.1016\/S0167-4048(01)00209-7_BIB6","doi-asserted-by":"crossref","unstructured":"Dhillon, G. and Backhouse, J., Information system security management in the new millennium, Communications of the ACM, 43, 7, (2000), 125\u2013128.","DOI":"10.1145\/341852.341877"},{"key":"10.1016\/S0167-4048(01)00209-7_BIB7","unstructured":"Forester, T. and Morrison, P., Computer ethics: cautionary tales and ethical dilemmas in computing, The MIT Press, Cambridge, 1994."},{"key":"10.1016\/S0167-4048(01)00209-7_BIB8","unstructured":"Hearnden, K., \u201cComputer crime and people,\u201d in Hearnden, K., ed., A handbook of computer crime, London: Kogan Page, 1990."},{"key":"10.1016\/S0167-4048(01)00209-7_BIB9","doi-asserted-by":"crossref","unstructured":"Moor, J.H., What is computer ethics, Metaphilosophy, 16, 4, (1985), 266\u2013275.","DOI":"10.1111\/j.1467-9973.1985.tb00173.x"},{"key":"10.1016\/S0167-4048(01)00209-7_BIB10","unstructured":"Oz, E., Ethics for the information age, Business and Educational Technologies, 1994."},{"key":"10.1016\/S0167-4048(01)00209-7_BIB11","unstructured":"Parker, D.B., Crime by computer, Charles Scribner's Sons, New York, 1976."},{"key":"10.1016\/S0167-4048(01)00209-7_BIB12","unstructured":"Parker, D.B.,\u201cEthical dilemmas in computer technology,\u201din Hoffman, W.M. and Moore, J.M., ed., Ethics and the management of computer technology, Cambridge, MA: Oelgeschlager, Gunn, and Hain, 1982."},{"key":"10.1016\/S0167-4048(01)00209-7_BIB13","doi-asserted-by":"crossref","unstructured":"Parker, D.B. and Nycum, S.H., Computer Crime, Communication of the ACM, 27, 4, (1984).","DOI":"10.1145\/358027.358770"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404801002097?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404801002097?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T13:55:58Z","timestamp":1580219758000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404801002097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,4]]},"references-count":13,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2001,4]]}},"alternative-id":["S0167404801002097"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(01)00209-7","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2001,4]]}}}