IS

Straub Jr., Detmar W.

Topic Weight Topic Terms
0.288 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.150 problems issues major involved legal future technological impact dealing efforts current lack challenges subsystem related
0.149 article information author discusses comments technology paper presents states explains editor's authors issue focuses topics
0.142 piracy goods digital property intellectual rights protection presence legal consumption music consumers enforcement publisher pirate
0.140 time use size second appears form larger benefits combined studies reasons selected underlying appear various
0.137 usage use self-efficacy social factors individual findings influence organizations beliefs individuals support anxiety technology workplace
0.137 privacy information concerns individuals personal disclosure protection concern consumers practices control data private calculus regulation
0.134 mis problems article systems management edp managers organizations ;br> data survey application examines need experiences
0.124 satisfaction information systems study characteristics data results using user related field survey empirical quality hypotheses

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Collins, Rosann Webb 1
computer security 1 computer crime 1 computer ethics 1 copyright infringement 1
commercial databases 1 general deterrence theory 1 information security 1 intellectual property rights 1
individual rights to privacy 1 information liabilities 1 Legal aspects of computing 1 protection of the information resource 1
protecting the information resource 1 proprietary databases 1 software piracy 1

Articles (2)

Effective IS Security: An Empirical Study. (Information Systems Research, 1990)
Authors: Abstract:
    Information security has not been a high priority for most managers. Many permit their installations to be either lightly protected or wholly unprotected, apparently willing to risk major losses from computer abuse. This study, based on the criminological theory of general deterrence, investigates whether a management decision to invest in IS security results in more effective control of computer abuse. Data gathered through a survey of 1,211 randomly selected organizations indicates that security countermeasures that include deterrent administrative procedures and preventive security software will result in significantly lower computer abuse. Knowledge about these relationships is useful for making key decisions about the security function.
Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy. (MIS Quarterly, 1990)
Authors: Abstract:
    The article discusses key issues and laws relevant to information use in organizations and proposes specific methods for dealing with legal liability. The author explains that the legal status of information in its electronic forms of programs and the rights of individuals to keep private some information about themselves is not clearly defined in the patchwork of old and new legislation on Computer-based information. The author states that as information usage in organizations increases there will be a need to decrease the information liabilities of managers and their organizations. The discussion within the article focuses on the protection of intellectual property rights concerning programs and the protection of individual rights to privacy of information stored in computer-based systems. INSETS: Scenario 1.;Scenario 2..