Managing and controlling computer misuse

Article Properties
Abstract
Cite
Dhillon, Gurpreet. “Managing and Controlling Computer Misuse”. Information Management &Amp; Computer Security, vol. 7, no. 4, 1999, pp. 171-5, https://doi.org/10.1108/09685229910292664.
Dhillon, G. (1999). Managing and controlling computer misuse. Information Management &Amp; Computer Security, 7(4), 171-175. https://doi.org/10.1108/09685229910292664
Dhillon G. Managing and controlling computer misuse. Information Management & Computer Security. 1999;7(4):171-5.
Description

How can organizations better protect themselves from computer-related fraud? This paper addresses the critical issue of computer misuse, arguing that a pragmatic and balanced approach to security controls is essential for minimizing losses. By reviewing real-world security breaches, the paper advocates for a holistic strategy that encompasses technical, formal, and informal interventions. The paper suggests that organizations often focus too heavily on technical solutions, neglecting the importance of employee training, clear policies, and a strong security culture. It emphasizes the need to consider the human element in security and to implement a multi-layered approach that addresses both technological and behavioral vulnerabilities. This analysis offers practical guidance for organizations seeking to improve their cybersecurity posture. By adopting a balanced approach that incorporates technical safeguards with human-centered strategies, businesses can effectively mitigate the risks of computer misuse and protect their valuable assets.

This paper appears in Information Management & Computer Security. Its focus aligns perfectly with the journal's interest in practical approaches to securing information and computer systems. By addressing organizational strategies and human factors, the study contributes valuable insights for professionals in information security management.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled Cyber attacks against supply chain management systems: a short note and was published in 2000. The most recent citation comes from a 2023 study titled Cyber attacks against supply chain management systems: a short note . This article reached its peak citation in 2006 , with 5 citations.It has been cited in 23 different journals, 4% of which are open access. Among related journals, the Computers & Security cited this research the most, with 4 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year