skip to main content
10.1145/2656434.2656436acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Insider hacking: applying situational crime prevention to a new white-collar crime

Published: 13 October 2014 Publication History

Abstract

Insider hacking consists of cybercrimes against entities initiated by individuals who hold a legitimate trust relationship with that entity. The responsibility of preventing insider hacking falls to information technology (IT) or information security departments staffed by computing professionals. The same can be said about research into the prevention of insider hacking, computing centric academics/professionals do the work. While this seems logical, established behavioral methods for reducing crime have largely been ignored. In this paper, the author places insider hacking into the context of the white-collar criminology literature then pulls from crime science, applying a situational crime prevention model to inform future research on insider hacking.

References

[1]
Benson, M. L., & Simpson, S. S. 2009. White-Collar Crime: An Opportunity Perspective. New York, NY: Routledge.
[2]
Cappelli, D., & Shimeall, T. J. 2009. Common Sense Guide to Prevention and Detection of Insider Threats 3rd Edition. Pittsburgh, PA.
[3]
Clarke, R. V. 1980. "Situational" crime prevention: Theory and practice. British Journal of Criminology, (20), 136--147.
[4]
Clarke, R. V. 1997. Situational Crime Prevention: Successful Case Studies. Guilderland, NY: Harrow and Heston.
[5]
Computer Fraud and Abuse Act (CFAA) (1986). Pub. L. No. 99--474, 100 Stat. 1213 (Oct. 16, 1986), codified at 18 U.S.C. §1030
[6]
Edelhertz, H. 1970. The Nature, Impact, and Prosecution of White-Collar Crime. Washington, DC: U.S. Department of Justice.
[7]
Electronic Communications Privacy Act (ECPA) (1986). Pub. L. No. 99--508, 100 Stat. 1848 (Oct. 21, 1986), codified at 18 U.S.C. 3121
[8]
Felson, M. 2002. Crime and Everyday Life. Thousand Oaks, CA: Pine Forge Press.
[9]
Fischer, L. F. (2003). Characterizing information systems insider offenders. In Proceedings of the 45th Annual Conference of the International Military Testing Association (Pensacola, FL, November 03-06, 2003). IMTA, Seoul, South Korea, 289--296.
[10]
Omnibus Crime Control and Safe Streets Act (1968). Pub. L. 90--351, 82 Stat. 197 (June 19, 1968), codified at 42 U.S.C. 3711
[11]
Silowash, G., & Shimeall, T. J. 2012. Common Sense Guide to Mitigating Insider Threats 4th Edition. Pittsburgh, PA.
[12]
Sutherland, E. H. 1940. White-collar criminality. American Sociological Review, 5(1), 1--12.
[13]
Willison, R., & Siponen, M. 2009. Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. Communications of the ACM, 52(9), 133--137.

Cited By

View all
  • (2024)Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimesJournal of Cybersecurity10.1093/cybsec/tyae02010:1Online publication date: 19-Nov-2024
  • (2023)A Machine Learning Framework & Development for Insider Cyber-crime Threats Detection2023 International Conference on Smart Applications, Communications and Networking (SmartNets)10.1109/SmartNets58706.2023.10215718(1-6)Online publication date: 25-Jul-2023
  • (2022)Situational Crime Prevention (SCP) techniques to prevent and control cybercrimesComputers and Security10.1016/j.cose.2022.102611115:COnline publication date: 1-Apr-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
RIIT '14: Proceedings of the 3rd annual conference on Research in information technology
October 2014
98 pages
ISBN:9781450327114
DOI:10.1145/2656434
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 October 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. crime science
  2. criminology
  3. cybercrime
  4. cybersecurity
  5. insider hacking
  6. situational crime prevention
  7. white-collar crime

Qualifiers

  • Research-article

Conference

SIGITE/RIIT'14
Sponsor:
SIGITE/RIIT'14: SIGITE/RIIT 2014
October 15 - 18, 2014
Georgia, Atlanta, USA

Acceptance Rates

RIIT '14 Paper Acceptance Rate 14 of 39 submissions, 36%;
Overall Acceptance Rate 51 of 116 submissions, 44%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)35
  • Downloads (Last 6 weeks)4
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimesJournal of Cybersecurity10.1093/cybsec/tyae02010:1Online publication date: 19-Nov-2024
  • (2023)A Machine Learning Framework & Development for Insider Cyber-crime Threats Detection2023 International Conference on Smart Applications, Communications and Networking (SmartNets)10.1109/SmartNets58706.2023.10215718(1-6)Online publication date: 25-Jul-2023
  • (2022)Situational Crime Prevention (SCP) techniques to prevent and control cybercrimesComputers and Security10.1016/j.cose.2022.102611115:COnline publication date: 1-Apr-2022
  • (2021)Ciberseguridad en la justicia digital: recomendaciones para el caso colombianoRevista UIS Ingenierías10.18273/revuin.v20n3-202100220:3Online publication date: 10-May-2021
  • (2018)Situational Crime Prevention and the Mitigation of Cloud Computing ThreatsSecurity and Privacy in Communication Networks10.1007/978-3-319-78816-6_16(218-233)Online publication date: 25-Apr-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media