{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T20:35:12Z","timestamp":1774730112962,"version":"3.50.1"},"reference-count":53,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2002,10,1]],"date-time":"2002-10-01T00:00:00Z","timestamp":1033430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002,10,1]]},"abstract":"<jats:p>It is commonplace to say that the 11 September attacks have changed everything. A global revolution is changing business, and business is changing the world. With unsettling speed, two forces are converging; a new generation of business leaders is rewriting the rules of business, and a new breed of fast companies is challenging the corporate status quo. The Internet is an information superhighway, touching almost every aspect of the economy from government agencies, financial institutions, businesses, and professional organizations. With the year 2002 and its increasing number of court cases on Internet\u2010related issues, the courts are obviously still struggling with the question of intellectual property rights in an open source code environment supporting e\u2010commerce. By modeling and classifying the risks associated with cybersecurity issues, firms and specific individuals should not become a casualty of this cyberwar, nor become paranoid about the risks \u2010\u2010 be informed and follow common business sense practices, policies, and procedures.<\/jats:p>","DOI":"10.1108\/09685220210436976","type":"journal-article","created":{"date-parts":[[2002,9,18]],"date-time":"2002-09-18T15:17:56Z","timestamp":1032362276000},"page":"178-183","source":"Crossref","is-referenced-by-count":49,"title":["Issues in cybersecurity; understanding the potential risks associated with hackers\/crackers"],"prefix":"10.1108","volume":"10","author":[{"given":"Alan D.","family":"Smith","sequence":"first","affiliation":[]},{"given":"William T.","family":"Rupp","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021419564581000_B1","doi-asserted-by":"crossref","unstructured":"Bandura, A. (2001), \u201cSocial cognitive theory of mass communication\u201d, Media Psychology, Vol. 3 No. 3, pp. 265\u201099.","DOI":"10.1207\/S1532785XMEP0303_03"},{"key":"key2022021419564581000_B2","unstructured":"Blackburn, R. (1993), The Psychology of Criminal Conduct: Theory, Research and Practice, John Wiley & Sons, Toronto."},{"key":"key2022021419564581000_B3","doi-asserted-by":"crossref","unstructured":"Chantler, A. (1996a), \u201cThe changing definition and image of hackers in popular discourse\u201d, International Journal of the Sociology of Law, Vol. 24, pp. 229\u201051.","DOI":"10.1006\/ijsl.1996.0015"},{"key":"key2022021419564581000_B4","unstructured":"Chantler, N. (1996b), Profile of a Computer Hacker, Infowar."},{"key":"key2022021419564581000_B5","unstructured":"Denning, D. (1998), Information Warfare and Security, Addison\u2010Wesley, Reading, MA."},{"key":"key2022021419564581000_B6","unstructured":"Dunn, L. (2001), \u201cCybercrime skyrockets, say security reports: incidents double in 2000 and are still climbing, but who\u2019s playing cybercop?\u201d, Medill News Service, 6 July, available at: www.idg.net\/go.cgi?id=506588."},{"key":"key2022021419564581000_B7","unstructured":"Ewen, R. (1980), An Introduction to Theories of Personality, Academic Press, New York, NY."},{"key":"key2022021419564581000_B8","doi-asserted-by":"crossref","unstructured":"Eysenck, M.W. (2000), \u201cA cognitive approach to trait anxiety\u201d, European Journal of Personality, Vol. 14 No. 5, special issue, pp. 463\u201076.","DOI":"10.1002\/1099-0984(200009\/10)14:5<463::AID-PER393>3.0.CO;2-3"},{"key":"key2022021419564581000_B9","doi-asserted-by":"crossref","unstructured":"Eysenck, S. and Eysenck, H. (1977), \u201cPersonality differences between prisoners and controls\u201d, Psychological Reports, Vol. 40.","DOI":"10.2466\/pr0.1977.40.3c.1023"},{"key":"key2022021419564581000_B10","doi-asserted-by":"crossref","unstructured":"Feldman, P. (1993), The Psychology of Crime \u2013 A Social Science Textbook, Cambridge University Press, Cambridge, MA.","DOI":"10.1017\/CBO9780511527821"},{"key":"key2022021419564581000_B11","unstructured":"Garfinkel, S. and Spafford, G. (1996), Practical UNIX and Internet Security, 2d ed., O\u2019Reilly and Associates, Sebastopol, CA."},{"key":"key2022021419564581000_B12","unstructured":"Goodell, J. (1996), The Cyber Thief and the Samurai, Dell Publishing, New York, NY."},{"key":"key2022021419564581000_B13","doi-asserted-by":"crossref","unstructured":"Hollin, C. (1989), Psychology and Crime: An Introduction to Criminological Psychology, Routledge, New York, NY.","DOI":"10.4324\/9780203329368"},{"key":"key2022021419564581000_B14","unstructured":"Hollinger, R. (1988), \u201cComputer hackers follow a guttman\u2010like progression\u201d, Social Sciences Review, Vol. 72, pp. 199\u2010200, available at: www.fcc.gov\/Bureaus\/Mass_Media\/News_Releases\/2001 and http:\/\/public. iastate.edu"},{"key":"key2022021419564581000_B15","unstructured":"Hutchinson, S. (1997), \u201cComputer crime in Canada\u201d, unpublished manuscript from Marc Rogers, University of Manitoba, Winnipeg."},{"key":"key2022021419564581000_B16","unstructured":"Kohlberg, L. (1994), \u201cStage and sequence: the cognitive\u2010developmental approach to socialization\u201d, in Puka, B. (Ed.), Defining Perspectives in Moral Development, Garland Publishing, New York, NY, pp. 1\u2010134."},{"key":"key2022021419564581000_B17","unstructured":"Kohlberg, L. and Puka, B. (Eds) (1994), \u201cKohlberg\u2019s original study of moral development\u201d, in Moral Development: A Compendium, Vol. 3, Garland Publishing, New York, NY."},{"key":"key2022021419564581000_B18","unstructured":"Landreth, B. (1985), Out of the Inner Circle, Microsoft Press, Bellevue, WA."},{"key":"key2022021419564581000_B19","unstructured":"McDonald, D.W., Reich, J.C. and Bain, S.E. (1996), \u201cIntellectual property and privacy issues on the Internet\u201d, South Dakota Business Review, Vol. 55 No. 2, pp. 1, 4."},{"key":"key2022021419564581000_B20","unstructured":"Neonsurge and the Rhino9 Team (2000), \u201cThe Windows NT wardoc: a study in remote NT penetration\u201d, available at: http:\/\/rhino9. ml.org"},{"key":"key2022021419564581000_B21","unstructured":"Post, J. (1996), \u201cThe dangerous information systems insider: psychological perspectives\u201d, available at: www.gocsi.com\/preleas2"},{"key":"key2022021419564581000_B22","unstructured":"Raymond, E.S. (2001), \u201cHow to become a hacker\", available at: www.tuxedo.org\/\u223cesr\/faqs\/hacker\u2010howto.html"},{"key":"key2022021419564581000_B23","unstructured":"Rogers, M. (2001), \u201cA social leaning theory and moral disengagement analysis of criminal computer behavior: an exploratory study\u201d, University of Manitoba, Winnipeg."},{"key":"key2022021419564581000_B24","doi-asserted-by":"crossref","unstructured":"Skinner, W. and Fream, A. (1997), \u201cA social learning theory analysis of computer crime among college students\u201d, Journal of Research in Crime and Delinquency, Vol. 34, pp. 495\u2010518.","DOI":"10.1177\/0022427897034004005"},{"key":"key2022021419564581000_B25","unstructured":"Swanson, S. (2001a), \u201cBusiness culture is obstacle to cybersecurity\u201d, Informationweek.com"},{"key":"key2022021419564581000_B26","unstructured":"Swanson, S. (2001b), \u201cInternet too unsafe for Feds\u201d, Informationweek.com"},{"key":"key2022021419564581000_B27","doi-asserted-by":"crossref","unstructured":"Albanese, J. (1984), \u201cCorporate criminology: explaining deviance of business and political organizations\u201d, Journal of Criminal Justice, Vol. 12, pp. 11\u201019.","DOI":"10.1016\/0047-2352(84)90003-5"},{"key":"key2022021419564581000_B28","unstructured":"Atanasov, M. (2001), \u201cThe truth about Internet fraud\u201d, Smart Business."},{"key":"key2022021419564581000_B29","unstructured":"Babcock, C. (2001), \u201cI\u2010deluge of security threats overwhelms I\u2010managers\u201d, Interactive iWeek."},{"key":"key2022021419564581000_B30","unstructured":"Beaucar Vlahos, K. (2001), \u201cFBI seeking to wiretap Internet\u201d, FOXNews.com"},{"key":"key2022021419564581000_B31","unstructured":"Campbell, D. (2000), \u201cThe spy in your server\u201d, Guardian Unlimited."},{"key":"key2022021419564581000_B32","unstructured":"Deloitte Consulting (2001), Deloitte Consulting Launches e\u2010Outlooks for the Year Ahead,  press release."},{"key":"key2022021419564581000_B33","unstructured":"Deloitte Consulting (2001), \u201cDeloitte Consulting monthly reports on insights into emerging issues that will affect businesses \u2013 the new economy\u201d, e\u2010Views."},{"key":"key2022021419564581000_B34","unstructured":"Fisher, D. (2001), \u201cAiming at security\u201d, eWeek, available at: http:\/\/eWeek.com"},{"key":"key2022021419564581000_B35","unstructured":"Gibson, S. (2001), \u201cReporter\u2019s notebook: disaster recovery\u201d, eWeek."},{"key":"key2022021419564581000_B36","unstructured":"Guardian Unlimited (2000), \u201cInternet monitoring \u2018time bomb\u2019 for e\u2010commerce\u201d."},{"key":"key2022021419564581000_B37","unstructured":"Jesdanun, A. (2001), \u201cOnline ads becoming intrusive\u201d, Canton Repository, 23 December, p. D\u201013, available at: www.cantonrep.com\/cantonrep01\/menus.php?external= repsearch_detail.php2ID=23918"},{"key":"key2022021419564581000_B38","unstructured":"Kaufman, C., Perlman, R. and Spencer, M. (1995), Network Security: Private Communication in a Public World, PTR Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022021419564581000_B39","unstructured":"Konicki, S. (2001), \u201cIT on high alert\u201d, Informationweek.com"},{"key":"key2022021419564581000_B40","unstructured":"Kontzer, T. (2001), \u201cEDS sees security interest at the top\u201d, Informationweek.com"},{"key":"key2022021419564581000_B41","unstructured":"Levitt, J. (1998), \u201cThe keys to security\u201d, Informationweek.com"},{"key":"key2022021419564581000_B42","unstructured":"Longstaff, T.A. and Ellis, J.T. (1997), \u201cSecurity of the Internet\u201d, The Froehlich\/Kent Encyclopedia of Telecommunications, Vol. 15, Marcel Dekker, New York, NY, pp. 231\u201055."},{"key":"key2022021419564581000_B43","unstructured":"Mandel, M.J. (2001), \u201cWhy markets misbehave\u201d, BusinessWeek, No. 3754, 22 October, p. 95."},{"key":"key2022021419564581000_B44","doi-asserted-by":"crossref","unstructured":"Matseuda, R. (1988), \u201cThe current state of differential association\u201d, Crime and Delinquency, Vol. 34, pp. 277\u2010306.","DOI":"10.1177\/0011128788034003005"},{"key":"key2022021419564581000_B45","unstructured":"Ricciuti, M. (1999), \u201cMicrosoft admits privacy problems, plans fix\u201d, News.com"},{"key":"key2022021419564581000_B46","unstructured":"Rubenfeld, J. (2001), \u201cPrivacy exposed\u201d, The Washington Post."},{"key":"key2022021419564581000_B47","unstructured":"Schulman, A. (2001), \u201cThe extent of systematic monitoring of employee e\u2010mail and Internet use\u201d, Workplace Surveillance Project at Foundation."},{"key":"key2022021419564581000_B48","unstructured":"Stahl, S. (2001), \u201cA question of balance:  collabortion vs security\u201d,  Informationweek.com, available at: http:\/\/informationweek.com\/"},{"key":"key2022021419564581000_B49","unstructured":"Stoll, C. (1989), The Cuckoo\u2019s Egg: Tracking a Spy Through the Maze of Computer Espionage, Doubleday, New York, NY."},{"key":"key2022021419564581000_B50","unstructured":"Strang, R.J. (2000), \u201cScript: how secure is the Internet\u201d, interview."},{"key":"key2022021419564581000_B51","unstructured":"Sullivan, B. (2001), \u201cSecurity survey\u201d, Computerworld."},{"key":"key2022021419564581000_B52","doi-asserted-by":"crossref","unstructured":"Yee, D. (1999), \u201cDevelopment, ethical trading and free software\u201d, First Monday, Vol. 4 No. 12, December .","DOI":"10.5210\/fm.v4i12.709"},{"key":"key2022021419564581000_B53","unstructured":"Zaino, J. (2001), \u201cPrivacy practices are worth another look\u201d, Informationweek.com, available at:  http:\/\/informationweek.com\/"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220210436976","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220210436976\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220210436976\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:39Z","timestamp":1753402119000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/10\/4\/178-183\/171739"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,10,1]]},"references-count":53,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2002,10,1]]}},"alternative-id":["10.1108\/09685220210436976"],"URL":"https:\/\/doi.org\/10.1108\/09685220210436976","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[2002,10,1]]}}}