Matches in SemOpenAlex for { <https://semopenalex.org/work/W2186936840> ?p ?o ?g. }
Showing items 1 to 88 of
88
with 100 items per page.
- W2186936840 startingPage "794" @default.
- W2186936840 abstract "(ProQuest: ... denotes formula omitted.)IntroductionSituational crime prevention (SCP) is a practical application of routine activity theory (RAT) that reduces the frequency of likely criminal opportunities (Felson & Clarke, 1998). Cohen and Felson (1979) originally proposed RAT when attempting to analyze the increase in crime rates following World War II. Specifically, these researchers developed a criminal theory that focused on the environmental 'opportunities for crime' to occur characterizing the temporal and spatial attributes of a criminal transgression. Their model stated that a criminal act possessed three fundamental variables: (1) a suitable target, (2) a motivated offender, and (3) the absence of a capable guardian. Essentially, when a potential criminal opportunity arises the act will occur at a juncture in time and space between a motivated offender and a suitable for victimization. This crime will ultimately take place in a location that lacks a capable guardian to protect the 'suitable target,' which is considered to be either a vulnerable person or one's unguarded property. Thus, the absence of any one of these three situational factors should theoretically make the commission of a crime impossible (Davis, 2002). As a result, routine activity theory is considered to be a macro-level theory applicable to numerous types of crime as it seeks to explain the criminal victimization process and not a criminal's specific motivations (Akers & Sellers, 2009).Information Security (IS) officers can use SCP to reduce the possible motives for an offender to engage in crime by: increasing the effort and risks of a crime; reducing the potential rewards and provocations; and removing the excuses for committing a crime (Willison & Siponen, 2009). SCP achieves these goals through a preventative technique called target that identifies the specific situational exploits that allow criminals to commit an offense in a particular area (Felson & Clarke, 1998, p.27). Applications of hardening include: installing entry-phones to apartment buildings to regulate access; visible security cameras and guards to deter crime; rapid clean up of graffiti to deny the visual benefit to an offender; and requiring registration at the front desk of a hotel to discourage people from leaving without paying.Willison and Siponen (2009) applied SCP methodology to the information technology (IT) divisions of corporations in an effort to deter employees from stealing valuable information from the company. An effective way of applying SCP techniques is through the creation of 'crime scripts'4 that outline the various steps potential offenders would need to execute in order to circumvent security measures and gain access to the restricted areas of an organization. Consequently, these scripts allow security officers to devise countermeasures for each step preventing these would-be offenders from taking advantage of ambiguities in an organization's security procedures. For example, if an offender knew where a coworker wrote down their passwords they could potentially access the employee's account without their knowledge. To deter this scenario from unfolding, a crime script would recommend that the company respond by reducing the number of passwords employees have to remember, incorporate biometric technology into login procedures, or mandate that the staff attend refresher classes on basic security protocols. Thus, incorporating SCP practices into corporate security procedures can be advantageous in reducing the number of deliberate and accidental security breaches.Highlighting the current procedures for security threats within corporations, Willison (2008) found that roughly fifty percent of the security breaches reported in the 2004 CSI/FBI Computer Crime Security Survey and the 2006 Global Security Survey occurred within the victimized organization. Furthermore, it was discovered that much of the literature on IS does not employ a concrete analytical theory in their research. …" @default.
- W2186936840 created "2016-06-24" @default.
- W2186936840 creator A5017848417 @default.
- W2186936840 creator A5020632042 @default.
- W2186936840 creator A5052971963 @default.
- W2186936840 date "2011-01-01" @default.
- W2186936840 modified "2023-09-23" @default.
- W2186936840 title "Organizational Data Breaches 2005-2010: Applying SCP to the Healthcare and Education Sectors" @default.
- W2186936840 cites W1548342198 @default.
- W2186936840 cites W1548852720 @default.
- W2186936840 cites W1576604406 @default.
- W2186936840 cites W1663973292 @default.
- W2186936840 cites W1988520084 @default.
- W2186936840 cites W2030538258 @default.
- W2186936840 cites W2088047416 @default.
- W2186936840 cites W2151306275 @default.
- W2186936840 cites W2974222084 @default.
- W2186936840 cites W3124344091 @default.
- W2186936840 cites W562532382 @default.
- W2186936840 cites W569918000 @default.
- W2186936840 cites W2113250443 @default.
- W2186936840 hasPublicationYear "2011" @default.
- W2186936840 type Work @default.
- W2186936840 sameAs 2186936840 @default.
- W2186936840 citedByCount "5" @default.
- W2186936840 countsByYear W21869368402014 @default.
- W2186936840 countsByYear W21869368402015 @default.
- W2186936840 countsByYear W21869368402016 @default.
- W2186936840 countsByYear W21869368402017 @default.
- W2186936840 countsByYear W21869368402021 @default.
- W2186936840 crossrefType "journal-article" @default.
- W2186936840 hasAuthorship W2186936840A5017848417 @default.
- W2186936840 hasAuthorship W2186936840A5020632042 @default.
- W2186936840 hasAuthorship W2186936840A5052971963 @default.
- W2186936840 hasConcept C144024400 @default.
- W2186936840 hasConcept C144133560 @default.
- W2186936840 hasConcept C15744967 @default.
- W2186936840 hasConcept C17744445 @default.
- W2186936840 hasConcept C199539241 @default.
- W2186936840 hasConcept C204614032 @default.
- W2186936840 hasConcept C2776034101 @default.
- W2186936840 hasConcept C2776348852 @default.
- W2186936840 hasConcept C2776680780 @default.
- W2186936840 hasConcept C2776876444 @default.
- W2186936840 hasConcept C73484699 @default.
- W2186936840 hasConcept C9114305 @default.
- W2186936840 hasConceptScore W2186936840C144024400 @default.
- W2186936840 hasConceptScore W2186936840C144133560 @default.
- W2186936840 hasConceptScore W2186936840C15744967 @default.
- W2186936840 hasConceptScore W2186936840C17744445 @default.
- W2186936840 hasConceptScore W2186936840C199539241 @default.
- W2186936840 hasConceptScore W2186936840C204614032 @default.
- W2186936840 hasConceptScore W2186936840C2776034101 @default.
- W2186936840 hasConceptScore W2186936840C2776348852 @default.
- W2186936840 hasConceptScore W2186936840C2776680780 @default.
- W2186936840 hasConceptScore W2186936840C2776876444 @default.
- W2186936840 hasConceptScore W2186936840C73484699 @default.
- W2186936840 hasConceptScore W2186936840C9114305 @default.
- W2186936840 hasIssue "1" @default.
- W2186936840 hasLocation W21869368401 @default.
- W2186936840 hasOpenAccess W2186936840 @default.
- W2186936840 hasPrimaryLocation W21869368401 @default.
- W2186936840 hasRelatedWork W1566775544 @default.
- W2186936840 hasRelatedWork W1974266312 @default.
- W2186936840 hasRelatedWork W1982981577 @default.
- W2186936840 hasRelatedWork W2047126521 @default.
- W2186936840 hasRelatedWork W2060736252 @default.
- W2186936840 hasRelatedWork W210940361 @default.
- W2186936840 hasRelatedWork W2200276915 @default.
- W2186936840 hasRelatedWork W2204345663 @default.
- W2186936840 hasRelatedWork W2357875128 @default.
- W2186936840 hasRelatedWork W2481942972 @default.
- W2186936840 hasRelatedWork W2788502553 @default.
- W2186936840 hasRelatedWork W2916723046 @default.
- W2186936840 hasRelatedWork W3033132618 @default.
- W2186936840 hasRelatedWork W3101750701 @default.
- W2186936840 hasRelatedWork W3124413171 @default.
- W2186936840 hasRelatedWork W3142735151 @default.
- W2186936840 hasRelatedWork W3174140016 @default.
- W2186936840 hasRelatedWork W3187795353 @default.
- W2186936840 hasRelatedWork W3201255140 @default.
- W2186936840 hasRelatedWork W248734966 @default.
- W2186936840 hasVolume "5" @default.
- W2186936840 isParatext "false" @default.
- W2186936840 isRetracted "false" @default.
- W2186936840 magId "2186936840" @default.
- W2186936840 workType "article" @default.