3,153 research outputs found

    Electronic Monitoring in Workplace: Synthesis and Theorizing

    Get PDF

    THE EFFECT OF PREVENTIVE AND DETERRENT SOFTWARE PIRACY STRATEGIES ON PRODUCER PROFITS

    Get PDF
    In an attempt to protect their intellectual property and compete effectively in an increasingly dynamic marketplace, software producers have employed a number of preventive and deterrent measures to counter software piracy. Conventional wisdom suggests that reducing piracy will force consumers to legitimately acquire software, thus increasing firm profits. In this paper, we develop an analytical model, using Buchanan\u27s economic theory of clubs, to test the implications of anti-piracy measures on producer profits. Our results suggest that deterrent measures can potentially increase profits. Empirical results are also presented which support the assumptions of the analytical model

    Design and Implementation of Distributed Databases for Improving Law Enforcement in Developing Countries

    Get PDF
    Huge populations and low per capita incomes are the norm in developing countries. Apart from the other impacts, these two features make law enforcement in developing countries a colossal task. The absence of databases on citizens - their credit histories and felony records, is a serious impediment to normal Government activity and regulation. This lack of control can have serious consequences, domestic and international, if not checked immediately. In this paper, we propose that the rapid advance in telecommunications and computer technologies could be used very effectively in creating infrastructures in developing countries to improve the enforcement of law and order

    Dark Traits and Hacking Potential

    Get PDF
    This paper investigates the psychological traits of individuals' attraction to engaging in hacking behaviors (both ethical and illegal/unethical) upon entering the workforce. A new set of scales have been developed to assist in the delineation of the three hat categories. We have also developed a scale to measure each subject's perception of the probability of being apprehended for violating privacy laws. The results suggest that white hat, grey hat, and black hat hackers score high on the Machiavellian and psychopathy scales. We also found evidence that grey hatters oppose authority, black hatters score high in the thrill-seeking dimension, and white hatters, the good guys, tend to be narcissists. Thrill-seeking was moderately important for white hat and black hat hacking, and opposition to authority was significant for grey hat hacking. Narcissism was not statistically significant in any of the models. A perceived probability of being apprehended had a negative effect on both grey hat and black hat hacking. Additional models were explored to examine the relationships among the research variables

    Primary and Secondary Control as Antecedents to the Dark Traits in Predicting Attraction to Hacking Behavior

    Get PDF
    The current study examines the relationship between the need for control, the Dark Triad personality traits, and hacking intent. We surveyed 523 individuals using a scenario design and investigated the role of both primary and secondary control as antecedents to Machiavellianism, psychopathy, and narcissism leading to both white- (i.e., ethical) and black-hat hacking interest. Our findings suggest that primary control is a significant antecedent to all three dark personality traits such that a higher intrinsic need for control is positively associated with Machiavellianism, narcissism, and psychopathy. Secondary control, however, has comparatively different effects on dark personality traits, demonstrating a negative effect only on psychopathy. Both Machiavellianism and psychopathy predicted both white- and black-hat hacking interests along with the perceived probability of apprehension. Overall, our findings suggest that primary control drives all three dark personality traits, yet only two of the three dark personality traits – Machiavellianism and psychopathy – are related to hacking interest
    corecore