StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Evaluation of Article about Dynamic for Computer Crimes - Essay Example

Cite this document
Summary
"Evaluation of Article about Dynamic for Computer Crimes" paper focuses on the article titled “Understanding the Offender/Environment Dynamic for Computer Crimes: Assessing the Feasibility of Applying Criminological Theory to the IS Security Context by Williamson, R…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Evaluation of Article about Dynamic for Computer Crimes
Read Text Preview

Extract of sample "Evaluation of Article about Dynamic for Computer Crimes"

Using the collapse of the Barings Bank, the case analyzes how perpetrators of computer crimes utilize the organizational environments to commit the crimes. Understanding the relationship between staff who perpetrate various forms of computer abuse and the organizational environment is fundamental to the prevention of such crimes thereby protecting the interests of the company. Applying such theories of criminology as a routine activity, environmental criminology, and the rational choice perspective show the behavior of employees and their relationship with the organization's environment develops patterns on the kinds of computer abuses they are likely to commit.

By observing such patterns, organizations can easily prevent crimes before they occur. Major conclusions The article concludes that the three theories; the routine activity theory, environmental criminology, and rational perspectives all contend that the organizational environment plays a significant role in the commission of such crimes and that the management of organizations must develop appropriate relationships with the environments to safeguard both their resources and the privacy of the employees.

The routine activity theory, for example, develops the concept of targets. Routine activities with computers at the place of work help reveal the weaknesses that perpetrators often exploit before they commit crimes. Strengths and weaknesses of the article The main strength of the article is the utilization of the Barings Bank case study. The case study shows the importance of enhancing the safety of information systems in an organization. Using the case, the article applies the three theories thus showing the nature of the relationship that exists between the staff and the organization environment.

Despite the strengths, the article has several other weaknesses key among which is the application of the three theories since they sound repetitive. The routine theory, for example, explains the behavior of employees at an organization thereby showing the features of both the victims and perpetrators. Environmental criminology does the same a feature that makes either redundant. Were the conclusions properly drawn and supported? How? And Which ones, if any, were not? Show why not. The author of the article draws a systematic conclusion by proving the application of each theory in the Barings Bank case.

He concludes that criminals often use the knowledge of the environment coupled with their understanding of the operations of the organization to commit a crime. Such is a fundamental conclusion that proves that the relationship between the staff and their environment plays an integral role in the commission of computer crimes and that understanding the relationship can help management prevent the commission of the crimes. He does the same with the two other conclusions including on the application of the rational choice perspective.

Using Leeson from the Barings Bank case as an example, he proves that offenders often behave rationally as they strive to benefit themselves through unlawful dealings. The author concludes the article by providing several suggestions for future studies. Such is an ideal way of concluding his research since he began by acknowledging the inadequacy of information on the topic.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Article evaluation Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Article evaluation Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1700702-article-evaluation
(Article Evaluation Essay Example | Topics and Well Written Essays - 500 Words)
Article Evaluation Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1700702-article-evaluation.
“Article Evaluation Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1700702-article-evaluation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Evaluation of Article about Dynamic for Computer Crimes

How Has the Introduction of the Computers And IT to Markets Changed the Way Stocks And Bonds Trade

Evolution of computer technology in the last decade of 20th century has changed the whole world forever.... computer technology and internet has changed the dynamics of global financial markets and this will be explained in great detail.... The study will help identify possible effects of development of information technology and computer on the financial markets, specifically on bond trading and stock trading....
12 Pages (3000 words) Research Paper

Cybercrime Threats in St. Louis County

The changing trends in corporate defenses that counter several web crimes.... Cyber security is a process that is carried out to protect computer systems from attacks, including protecting data from unauthorized access, use, transfer, disclosure, or modification and this could either be intentional or accidental....
9 Pages (2250 words) Research Paper

Chinese Versus American National Cyber Security

This paper ''Chinese Versus American National Cyber Security'' tells that Cybercrime is a reality that has hit the information networks in a world driven by computer and internet technology.... With the rapid development of technology in the world, countries are experiencing more economic losses from cyber-attack....
11 Pages (2750 words) Research Proposal

Hacking: Definition, Types, and Facts

Unauthorized and illegal activities that are perpetrated via computer are referred to as computer crimes.... An example of a computer crime is the use of various techniques to corrupt or compromise data stored in a computer system.... In particular, hacking involves network security compromising, interference with the security network of computer systems, and the creation of malicious software often regarded as viruses.... For the purpose of this paper, Hacking is defined as 'unauthorized access to a computer network' (Kumar, 2012, P....
9 Pages (2250 words) Essay

The Analysis of Various Dimensions of Cybercrimes and Possible Solutions to This Problem

Cyber-crimes are also known as digital crimes.... These facts establish the high requirement and relevance of understanding cyber-crime in order to control and prevent these crimes.... These categories are the prevention of cyber-crimes, the control of cyber-crimes and the investigation of cybercrimes.... esearch questionsThe main research questions to be answered by this research are given as follows:- Why are cyber-crimes committed?...
5 Pages (1250 words) Research Proposal

Mastery of Research Concepts

An in-depth analysis of counties in Texas that focus on these issues indicates that Texas's crimes drop rate was due to an increase in the jail and prison populace.... A rise in wealth and improved income led to the decrease of property crimes (Nachmias & Nachmias, 2004).... The researcher gives possible reasons as to why the crime rate is dropping but he does not answer how these attributes are connected to the crimes.... It is hard to establish a relationship between the variables and the crimes due to the lack of concrete proof to his suggestions....
10 Pages (2500 words) Research Paper

An Assessment of Risks in Romania

This paper "An Assessment of Risks in Romania" is going to talk about some of the ten risks that have the potential of facing.... The minimum flow rate of the Danube River was recorded in the stream lower part with a rate of about 1600cm/s compared with the monthly multi-annual mean value of 5....
18 Pages (4500 words) Term Paper

Crime Prevention Program

SCP is defined as those interventions designed to prevent the occurrence of crimes, especially by reducing opportunities and increasing risk.... Apparently, the SCP comprises specially customized measures to reduce the opportunity for specific crimes.... The emergence of CCTV, electronic alarms, swipe cards, computer chips for identification, password, and screening devises, secured parking systems, hidden cameras are the product of the growing concern to quickly respond to the crime problem....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us