2,872 research outputs found

    Electronic Monitoring in Workplace: Synthesis and Theorizing

    Get PDF

    THE EFFECT OF PREVENTIVE AND DETERRENT SOFTWARE PIRACY STRATEGIES ON PRODUCER PROFITS

    Get PDF
    In an attempt to protect their intellectual property and compete effectively in an increasingly dynamic marketplace, software producers have employed a number of preventive and deterrent measures to counter software piracy. Conventional wisdom suggests that reducing piracy will force consumers to legitimately acquire software, thus increasing firm profits. In this paper, we develop an analytical model, using Buchanan\u27s economic theory of clubs, to test the implications of anti-piracy measures on producer profits. Our results suggest that deterrent measures can potentially increase profits. Empirical results are also presented which support the assumptions of the analytical model

    Design and Implementation of Distributed Databases for Improving Law Enforcement in Developing Countries

    Get PDF
    Huge populations and low per capita incomes are the norm in developing countries. Apart from the other impacts, these two features make law enforcement in developing countries a colossal task. The absence of databases on citizens - their credit histories and felony records, is a serious impediment to normal Government activity and regulation. This lack of control can have serious consequences, domestic and international, if not checked immediately. In this paper, we propose that the rapid advance in telecommunications and computer technologies could be used very effectively in creating infrastructures in developing countries to improve the enforcement of law and order

    Psychological Profiling of Hacking Potential

    Get PDF
    This paper investigates the psychological traits of individuals’ attraction to engaging in hacking behaviors (both ethical and illegal/unethical) upon entering the workforce. We examine the role of the Dark Triad, Opposition to Authority and Thrill-Seeking traits as regards the propensity of an individual to be interested in White Hat, Black Hat, and Grey Hat hacking. A new set of scales were developed to assist in the delineation of the three hat categories. We also developed a scale to measure each subject’s perception of the probability of being apprehended for violating privacy laws. Engaging in criminal activity involves a choice where there are consequences and opportunities, and individuals perceive them differently, but they can be deterred if there is a likelihood of punishment, and the punishment is severe. The results suggest that individuals that are White Hat, Grey Hat and Black Hat hackers score high on the Machiavellian and Psychopathy scales. We also found evidence that Grey Hatters oppose authority, Black Hatters score high on the thrill-seeking dimension and White Hatters, the good guys, tend to be Narcissists. Thrill-seeking was moderately important for White Hat hacking and Black hat hacking. Opposition to Authority was important for Grey Hat hacking. Narcissism was not statistically significant in any of the models. The probability of being apprehended had a negative effect on Grey Hat and Black Hat hacking. Several suggestions will be made on what organizations can do to address insider threats
    corecore