{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T22:28:29Z","timestamp":1762295309573,"version":"3.41.0"},"reference-count":109,"publisher":"Association for Computing Machinery (ACM)","issue":"SI","license":[{"start":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T00:00:00Z","timestamp":1524614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMIS Database"],"published-print":{"date-parts":[[2018,4,25]]},"abstract":"<jats:p>Criminal organizational insider computer abuse (ICA) research has focused on factors that influence either ICA intentions, or actual behavior during the ICA process. However, we argue that this research has not correctly conceptualized the decision-making processes involved in ICA. Thus, our first aim is to demonstrate this opportunity by leveraging the rational choice perspective (RCP) from criminology. The RCP advances an \"event\" stage, in which choices are made leading up to and during the criminal act. However, the RCP also acknowledges a preceding \"initial involvement\" stage, which encompasses those factors that lead an individual to consider participation in crime. RCP explains that if, during the initial involvement stage, an individual becomes motivated and decides that future criminal behavior is the most suitable course of action, then he or she will have reached a state of \"readiness.\" It is only after an individual has become readied, and at a later time, does the individual make event decisions in the perpetration of a specific crime. Consequently, extant ICA research has overlooked consideration of why-prior to the crime-an individual initially considers engaging in such criminal activity in the first instance. Notably, this consideration should not to be conflated with intentions. We argue that there needs to be a clear distinction between those motivational factors that would lead to the consideration of such engagement at the initial involvement stage, and those factors that would lead an individual at the event stage to perpetrate a crime. We thus propose a revised version of the extended security action cycle (ESAC), which reflects these criminal decision-making stages. Moreover, we provide a means through which to identify and understand the relationship among those factors that may motivate an individual during the initial involvement stage by drawing on the life course perspective (LCP). With a focus on time, context, and process, the LCP offers a framework in which four key principles are inscribed. Through examples drawn from the LCP and white-collar crime literature, we illustrate how these principles can provide a basis for conceptualizing factors that motivate ICA and open up new avenues for future research\/theory development.<\/jats:p>","DOI":"10.1145\/3210530.3210537","type":"journal-article","created":{"date-parts":[[2018,4,27]],"date-time":"2018-04-27T16:00:21Z","timestamp":1524844821000},"page":"81-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives"],"prefix":"10.1145","volume":"49","author":[{"given":"Robert","family":"Willison","sequence":"first","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Paul Benjamin","family":"Lowry","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1992.tb01093.x"},{"key":"e_1_2_1_2_1","volume-title":"US cybersecurity: Progress stalled: Key findings from the 2015 US State of Cybercrime Survey.","author":"Anonymous","year":"2015","unstructured":"Anonymous ( 2015 ). US cybersecurity: Progress stalled: Key findings from the 2015 US State of Cybercrime Survey. Retrieved from http:\/\/www.pwc.com\/us\/en\/increasing-it-effectiveness\/publications\/assets\/2015-us-cybercrime-survey.pdf Anonymous (2015). US cybersecurity: Progress stalled: Key findings from the 2015 US State of Cybercrime Survey. Retrieved from http:\/\/www.pwc.com\/us\/en\/increasing-it-effectiveness\/publications\/assets\/2015-us-cybercrime-survey.pdf"},{"issue":"1","key":"e_1_2_1_3_1","first-page":"643","article-title":"The risk propensity and rationality of computer hackers","volume":"4","author":"Bachmann M.","year":"2010","unstructured":"Bachmann , M. ( 2010 ). The risk propensity and rationality of computer hackers . International Journal of Cyber Criminology , 4 ( 1&2 ), 643 -- 656 . Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4(1&2), 643--656.","journal-title":"International Journal of Cyber Criminology"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1068\/a36198"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.006"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1985.tb00365.x"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0047-2352(88)90049-9"},{"key":"e_1_2_1_8_1","first-page":"121","volume-title":"H. Pontell&D","author":"Benson M. L.","year":"2000","unstructured":"Benson , M. L. and Kerley , K. R . ( 2000 ). Life course theory and white-collar crime . In H. Pontell&D . Shichor (Eds.), Contemporary Issues in Crime and Criminal Justice: Essays in Honor of Gilbert Geis (pp. 121 -- 136 ). Upper Saddle River , New Jersey : Prentice Hall . Benson, M. L. and Kerley, K. R. (2000). Life course theory and white-collar crime. In H. Pontell&D. Shichor (Eds.), Contemporary Issues in Crime and Criminal Justice: Essays in Honor of Gilbert Geis (pp. 121--136). Upper Saddle River, New Jersey: Prentice Hall."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022427892029003001"},{"key":"e_1_2_1_10_1","series-title":"Vol. 2","volume-title":"Criminal Careers and 'Career Criminals'","author":"Blumstein A.","year":"1986","unstructured":"Blumstein , A. ( 1986 ). Criminal Careers and 'Career Criminals' ( Vol. 2 ) . Washington, DC : National Research Council . Blumstein, A. (1986). Criminal Careers and 'Career Criminals' (Vol. 2). Washington, DC: National Research Council."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1988.tb00829.x"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"e_1_2_1_13_1","first-page":"38","volume-title":"T. J. Holt&B","author":"Bossler A. M.","year":"2011","unstructured":"Bossler , A. M. and Burrus , G. W . ( 2011 ). The general theory of crime and computer hacking: Low self-control hackers . In T. J. Holt&B . H. Schell (Eds.), Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications ( pp. 38 -- 67 ). Hershey, Pennsylvania : Information Science Reference . Bossler, A. M. and Burrus, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers. In T. J. Holt&B. H. Schell (Eds.), Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications (pp. 38--67). Hershey, Pennsylvania: Information Science Reference."},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","DOI":"10.4159\/9780674028845","volume-title":"The Ecology of Human Development","author":"Bronfenbrenner U.","year":"1979","unstructured":"Bronfenbrenner , U. ( 1979 ). The Ecology of Human Development . Cambridge, Massachusetts : Harvard University Press . Bronfenbrenner, U. (1979). The Ecology of Human Development. Cambridge, Massachusetts: Harvard University Press."},{"key":"e_1_2_1_15_1","volume-title":"Insider threat study: Illicit cyber activity in the banking and finance sector.","author":"Cappelli D.","year":"2004","unstructured":"Cappelli , D. , Keeney , M. , Kowalski , E. , Moore , A. , and Randazzo , M . ( 2004 ). Insider threat study: Illicit cyber activity in the banking and finance sector. Retrieved from http:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?assetid=50287 Cappelli, D., Keeney, M., Kowalski, E., Moore, A., and Randazzo, M. (2004). Insider threat study: Illicit cyber activity in the banking and finance sector. Retrieved from http:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?assetid=50287"},{"key":"e_1_2_1_16_1","volume-title":"Sabotage, Fraud).","author":"Cappelli D. M.","year":"2012","unstructured":"Cappelli , D. M. , Moore , A. , and Trzeciak , R . ( 2012 ). The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft , Sabotage, Fraud). Boston, Massachusetts : Addison-Wesley Professional . Cappelli, D. M., Moore, A., and Trzeciak, R. (2012). The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Boston, Massachusetts: Addison-Wesley Professional."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/0007131032000080221"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.09.009"},{"key":"e_1_2_1_19_1","first-page":"147","volume-title":"M. Tonry&N","author":"Clarke R.","year":"1985","unstructured":"Clarke , R. and Cornish , D . ( 1985 ). Modelling offender's decisions: A framework for policy and research . In M. Tonry&N . Morris (Eds.), Crime and Justice: An Annual Review of Research (Vol . 6) (pp. 147 -- 185 ). Chicago, Illinois : University of Chicago Press. Clarke, R. and Cornish, D. (1985). Modelling offender's decisions: A framework for policy and research. In M. Tonry&N. Morris (Eds.), Crime and Justice: An Annual Review of Research (Vol. 6) (pp. 147--185). Chicago, Illinois: University of Chicago Press."},{"key":"e_1_2_1_20_1","series-title":"Vol. 6","doi-asserted-by":"crossref","DOI":"10.4324\/9781315007274","volume-title":"Delinquency and Opportunity: A Study of Delinquent Gangs","author":"Cloward R. A.","year":"2013","unstructured":"Cloward , R. A. and Ohlin , L. E . ( 2013 ). Delinquency and Opportunity: A Study of Delinquent Gangs ( Vol. 6 ) . New York, New York : Routledge . Cloward, R. A. and Ohlin, L. E. (2013). Delinquency and Opportunity: A Study of Delinquent Gangs (Vol. 6). New York, New York: Routledge."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1987.tb00826.x"},{"key":"e_1_2_1_22_1","first-page":"1","volume-title":"D. Cornish&R","author":"Cornish D. B.","year":"2013","unstructured":"Cornish , D. B. and Clarke , R. V . ( 2013 ). Introduction . In D. Cornish&R .Clarke (Eds.), The Reasoning Criminal: Rational Choice Perspectives on Offending (pp. 1 -- 16 ). New York , New York : Transaction . Cornish, D. B. and Clarke, R. V. (2013). Introduction. In D. Cornish&R.Clarke (Eds.), The Reasoning Criminal: Rational Choice Perspectives on Offending (pp. 1--16). New York, New York: Transaction."},{"key":"e_1_2_1_23_1","first-page":"90","article-title":"Future directions for behavioral information security research","volume":"32","author":"Crossler R. E.","year":"2013","unstructured":"Crossler , R. E. , Johnston , A. C. , Lowry , P. B. , Hu , Q. , Warkentin , M. , and Baskerville , R. ( 2013 ). Future directions for behavioral information security research . Computers&Security , 32 ( February ), 90 -- 101 . Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., and Baskerville, R. (2013). Future directions for behavioral information security research. Computers&Security, 32(February), 90--101.","journal-title":"Computers&Security"},{"key":"e_1_2_1_24_1","volume-title":"Insider threat study: Illicit cyber activity involving fraud in the U.S. financial services sector","author":"Cummings A.","year":"2012","unstructured":"Cummings , A. , Lewellen , T. , McIntire , D. , Moore , A. , and Trzeciak , R . ( 2012 ). Insider threat study: Illicit cyber activity involving fraud in the U.S. financial services sector . Special Report Carnegie Mellon University\/SEI- 2012-SR-004, 2012. Retrieved from http:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?assetid=27971# Cummings, A., Lewellen, T., McIntire, D., Moore, A., and Trzeciak, R. (2012). Insider threat study: Illicit cyber activity involving fraud in the U.S. financial services sector. Special Report Carnegie Mellon University\/SEI-2012-SR-004, 2012. Retrieved from http:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?assetid=27971#"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2012.00383.x"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290971"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-008-9909-7"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.2307\/2094576"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01106621"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.2307\/2786971"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8624.1998.tb06128.x"},{"key":"e_1_2_1_34_1","volume-title":"12th Annual Global Information Security Survey: Outpacing Change: Ernst&Young","author":"Ernst","year":"2010","unstructured":"Ernst &Young ( 2010 ). 12th Annual Global Information Security Survey: Outpacing Change: Ernst&Young . Ernst&Young (2010). 12th Annual Global Information Security Survey: Outpacing Change: Ernst&Young."},{"key":"e_1_2_1_35_1","volume-title":"J. Giele&G","author":"Giele J.","year":"1998","unstructured":"Giele , J. and Elder , G . ( 1998 ). Life course research: Development of a field . In J. Giele&G . Elder (Eds.), Methods of Life Course Research: Qualitative and Quantitative Approaches. Thousand Oaks , California : SAGE. Giele, J. and Elder, G. (1998). Life course research: Development of a field. In J. Giele&G. Elder (Eds.), Methods of Life Course Research: Qualitative and Quantitative Approaches. Thousand Oaks, California: SAGE."},{"issue":"11","key":"e_1_2_1_36_1","first-page":"1618","article-title":"A life course perspective on migration and mental health among Asian immigrants: the role of human agency","volume":"73","author":"Gong F.","year":"2011","unstructured":"Gong , F. , Xu , J. , Fujishiro , K. , and Takeuchi , D. T. ( 2011 ). A life course perspective on migration and mental health among Asian immigrants: the role of human agency . Social Science&Medicine , 73 ( 11 ), 1618 -- 1626 . Gong, F., Xu, J., Fujishiro, K., and Takeuchi, D. T. (2011). A life course perspective on migration and mental health among Asian immigrants: the role of human agency. Social Science&Medicine, 73(11), 1618--1626.","journal-title":"Social Science&Medicine"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.08.001"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280208"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.04.004"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.2307\/249656"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"e_1_2_1_42_1","volume-title":"Causes of Delinquency","author":"Hirschi T.","year":"2002","unstructured":"Hirschi , T. ( 2002 ). Causes of Delinquency . New Brunswick, New Jersey : Transaction . Hirschi, T. (2002). Causes of Delinquency. New Brunswick, New Jersey: Transaction."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.12.005"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2891387.2891390"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953122.1953142"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1334496"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/02681102.2013.814040"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"e_1_2_1_49_1","volume-title":"Insider threat study: Computer systems sabotage in critical infrastructure sectors.","author":"Keeney M.","year":"2005","unstructured":"Keeney , M. , Kowalski , E. , Cappelli , D. , Moore , A. , Shimeall , T. , and Rogers , S . ( 2005 ). Insider threat study: Computer systems sabotage in critical infrastructure sectors. Retrieved from http:\/\/www.cert.org\/insider_threat\/insidercross.html Keeney, M., Kowalski, E., Cappelli, D., Moore, A., Shimeall, T., and Rogers, S. (2005). Insider threat study: Computer systems sabotage in critical infrastructure sectors. Retrieved from http:\/\/www.cert.org\/insider_threat\/insidercross.html"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018726708094909"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/135943299398348"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/07418825.2010.482536"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.09.002"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.008"},{"key":"e_1_2_1_56_1","first-page":"28","volume-title":"M. Anandarajan&C","author":"Lee Z.","year":"2004","unstructured":"Lee , Z. , Lee , Y. , and Kim , Y . ( 2004 b). Personal web page usage in organizations . In M. Anandarajan&C . A. Simmers (Eds.), Personal Web Usage in the Workplace : A Guide to Effective Human Resources Management ( pp. 28 -- 45 ). Hershey, Pennsylvania : Information Science Publishing . Lee, Z., Lee, Y., and Kim, Y. (2004b). Personal web page usage in organizations. In M. Anandarajan&C. A. Simmers (Eds.), Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management (pp. 28--45). Hershey, Pennsylvania: Information Science Publishing."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.2307\/249574"},{"key":"e_1_2_1_58_1","volume-title":"Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda. European Journal of Information Systems, forthcoming","author":"Lowry P. B.","year":"2017","unstructured":"Lowry , P. B. , Dinev , T. , and Willison , R . ( 2017 a). Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda. European Journal of Information Systems, forthcoming . Lowry, P. B., Dinev, T., and Willison, R. (2017a). Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda. European Journal of Information Systems, forthcoming."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12063"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-013-1705-3"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0671"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.015"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017472"},{"key":"e_1_2_1_64_1","doi-asserted-by":"crossref","DOI":"10.1525\/9780520341371","volume-title":"Into One's Own: From Youth to Adulthood in the United States 1920--1975","author":"Modell J.","year":"1989","unstructured":"Modell , J. ( 1989 ). Into One's Own: From Youth to Adulthood in the United States 1920--1975 . Berkeley, California : University of California Press. Modell, J. (1989). Into One's Own: From Youth to Adulthood in the United States 1920--1975. Berkeley, California: University of California Press."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.04.005"},{"issue":"1","key":"e_1_2_1_66_1","first-page":"1","article-title":"Perceptions of peer-to-peer file sharing among university students","volume":"11","author":"Moore R.","year":"2004","unstructured":"Moore , R. and McMullan , E. C. ( 2004 ). Perceptions of peer-to-peer file sharing among university students . Journal of Criminal Justice and Popular Culture , 11 ( 1 ), 1 -- 19 . Moore, R. and McMullan, E. C. (2004). Perceptions of peer-to-peer file sharing among university students. Journal of Criminal Justice and Popular Culture, 11(1), 1--19.","journal-title":"Journal of Criminal Justice and Popular Culture"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.08.009"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.2307\/800696"},{"issue":"1","key":"e_1_2_1_69_1","first-page":"7","article-title":"Decisions to participate in and desist from four types of common delinquency: Deterrence and the rational choice perspective","volume":"23","author":"Paternoster R.","year":"1989","unstructured":"Paternoster , R. ( 1989 b). Decisions to participate in and desist from four types of common delinquency: Deterrence and the rational choice perspective . Law&Society Review , 23 ( 1 ), 7 -- 40 . Paternoster, R. (1989b). Decisions to participate in and desist from four types of common delinquency: Deterrence and the rational choice perspective. Law&Society Review, 23(1), 7--40.","journal-title":"Law&Society Review"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.5555\/1289800.1289806"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1177\/1043986204263770"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1177\/1043986204263770"},{"issue":"1","key":"e_1_2_1_73_1","first-page":"24","article-title":"When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse","volume":"7","author":"Posey C.","year":"2011","unstructured":"Posey , C. , Bennett , R. J. , Roberts , T. L. , and Lowry , P. B. ( 2011 ). When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse . Journal of Information System Security , 7 ( 1 ), 24 -- 47 . Posey, C., Bennett, R. J., Roberts, T. L., and Lowry, P. B. (2011). When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse. Journal of Information System Security, 7(1), 24--47.","journal-title":"Journal of Information System Security"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1138374"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.09"},{"key":"e_1_2_1_76_1","volume-title":"Eye of the storm. Key findings from the 2012 global state of information security survey.","author":"Pw C","year":"2012","unstructured":"Pw C ( 2012 ). Eye of the storm. Key findings from the 2012 global state of information security survey. Retrieved from http:\/\/www.cen7dias.es\/BOLETINES\/330\/pwc.pdf PwC (2012). Eye of the storm. Key findings from the 2012 global state of information security survey. Retrieved from http:\/\/www.cen7dias.es\/BOLETINES\/330\/pwc.pdf"},{"key":"e_1_2_1_77_1","volume-title":"The global state of information security survey.","author":"Pw C","year":"2014","unstructured":"Pw C ( 2014 ). The global state of information security survey. Retrieved from http:\/\/www.pwc.com\/gx\/en\/consulting-services\/information-security-survey\/download.jhtml PwC (2014). The global state of information security survey. Retrieved from http:\/\/www.pwc.com\/gx\/en\/consulting-services\/information-security-survey\/download.jhtml"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1080\/01639620600605333"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.2307\/1388924"},{"key":"e_1_2_1_80_1","volume-title":"Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk. Journal of Internet Social Networking&Virtual Communities","author":"Salleh N.","year":"2012","unstructured":"Salleh , N. , Hussein , R. , Mohamed , N. , Karim , N. S. A. , Ahlan , A. R. , and Aditiawarman , U . ( 2012 ). Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk. Journal of Internet Social Networking&Virtual Communities , 2012(article ID 281869), 1--11. Salleh, N., Hussein, R., Mohamed, N., Karim, N. S. A., Ahlan, A. R., and Aditiawarman, U. (2012). Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk. Journal of Internet Social Networking&Virtual Communities, 2012(article ID 281869), 1--11."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017475"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-50244"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1.3.255"},{"key":"e_1_2_1_84_1","volume-title":"Deterring computer abuse: The effectiveness of deterrent countermeasures in the computer security environment. Unpublished D.B.A","author":"Straub D. W., Jr.","year":"1986","unstructured":"Straub , D. W., Jr. ( 1986 ). Deterring computer abuse: The effectiveness of deterrent countermeasures in the computer security environment. Unpublished D.B.A ., Indiana University , Graduate School of Business, Bloomington, IN. Straub, D. W., Jr. (1986). Deterring computer abuse: The effectiveness of deterrent countermeasures in the computer security environment. Unpublished D.B.A., Indiana University, Graduate School of Business, Bloomington, IN."},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"e_1_2_1_86_1","volume-title":"R. Binstock&L","author":"Streib G.","year":"1990","unstructured":"Streib , G. and Binstock , R . ( 1990 ). Aging and the social sciences: changes in the field . In R. Binstock&L . George (Eds.), Handbook of Aging and the Social Sciences. New York , New York : Academic Press . Streib, G. and Binstock, R. (1990). Aging and the social sciences: changes in the field. In R. Binstock&L. George (Eds.), Handbook of Aging and the Social Sciences. New York, New York: Academic Press."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1111\/1464-0597.0077z"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1177\/0891243210369105"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290410"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.2.04"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00420"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.12"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1177\/0950017007076642"},{"key":"e_1_2_1_94_1","doi-asserted-by":"crossref","DOI":"10.12987\/9780300159677","volume-title":"Crimes of the Middle Classes: White Collar Offenders in the Federal Courts","author":"Weisburd D.","year":"1991","unstructured":"Weisburd , D. ( 1991 ). Crimes of the Middle Classes: White Collar Offenders in the Federal Courts . New Haven, Connecticut : Yale University Press . Weisburd, D. (1991). Crimes of the Middle Classes: White Collar Offenders in the Federal Courts. New Haven, Connecticut: Yale University Press."},{"key":"e_1_2_1_95_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511499524","volume-title":"White-collar Crime and Criminal Careers","author":"Weisburd D.","year":"2001","unstructured":"Weisburd , D. and Waring , E . ( 2001 ). White-collar Crime and Criminal Careers . New York, New York : Cambridge University Press . Weisburd, D. and Waring, E. (2001). White-collar Crime and Criminal Careers. New York, New York: Cambridge University Press."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1995.tb01191.x"},{"key":"e_1_2_1_97_1","first-page":"108","volume-title":"K. Schlegel&D","author":"Wheeler S.","year":"1992","unstructured":"Wheeler , S. ( 1992 ). The problem of white-collar crime motivation . In K. Schlegel&D . Weisburd (Eds.), White Collar Crime Reconsidered ( pp. 108 -- 123 ). Boston, Massachusetts : Northeastern University Press . Wheeler, S. (1992). The problem of white-collar crime motivation. In K. Schlegel&D. Weisburd (Eds.), White Collar Crime Reconsidered (pp. 108--123). Boston, Massachusetts: Northeastern University Press."},{"issue":"3","key":"e_1_2_1_98_1","first-page":"331","article-title":"White collar crime and criminals","volume":"25","author":"Wheeler S.","year":"1988","unstructured":"Wheeler , S. , Weisburd , D. , Waring , E. , and Bode , N. ( 1988 ). White collar crime and criminals . American Criminal Law Review , 25 ( 3 ), 331 -- 357 . Wheeler, S., Weisburd, D., Waring, E., and Bode, N. (1988). White collar crime and criminals. American Criminal Law Review, 25(3), 331--357.","journal-title":"American Criminal Law Review"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2006.08.001"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000592"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/1562164.1562198"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.01"},{"key":"e_1_2_1_103_1","volume-title":"Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives. Information Systems Journal, 28(2)","author":"Willison R.","year":"2018","unstructured":"Willison , R. , Warkentin , M. , and Johnston , A. C . ( 2018 ). Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives. Information Systems Journal, 28(2) . Willison, R., Warkentin, M., and Johnston, A. C. (2018). Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives. Information Systems Journal, 28(2)."},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.2001.tb00929.x"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701788165"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.5555\/1345501.1345514"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"e_1_2_1_108_1","volume-title":"Testing a model of users' Web risk information seeking intention. Informing Science: The International Journal of an Emerging Transdiscipline, 16(2013), 1--18","author":"Zhang L.","year":"2013","unstructured":"Zhang , L. , Pavur , R. , York , P. , and Amos , C . ( 2013 ). Testing a model of users' Web risk information seeking intention. Informing Science: The International Journal of an Emerging Transdiscipline, 16(2013), 1--18 . Zhang, L., Pavur, R., York, P., and Amos, C. (2013). Testing a model of users' Web risk information seeking intention. Informing Science: The International Journal of an Emerging Transdiscipline, 16(2013), 1--18."},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.2307\/2657275"}],"container-title":["ACM SIGMIS Database: the DATABASE for Advances in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210530.3210537","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3210530.3210537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:13Z","timestamp":1750212793000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210530.3210537"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,25]]},"references-count":109,"journal-issue":{"issue":"SI","published-print":{"date-parts":[[2018,4,25]]}},"alternative-id":["10.1145\/3210530.3210537"],"URL":"https:\/\/doi.org\/10.1145\/3210530.3210537","relation":{},"ISSN":["0095-0033","1532-0936"],"issn-type":[{"type":"print","value":"0095-0033"},{"type":"electronic","value":"1532-0936"}],"subject":[],"published":{"date-parts":[[2018,4,25]]},"assertion":[{"value":"2018-04-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}