Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Unauthorized Computer Access). Showing records 1 – 3 of 3 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


NSYSU

1. Wang, Yu-ching. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.

Degree: Master, Information Management, 2012, NSYSU

Unauthorized computer access by employees is the most common hacking behavior in every company. Hence, it is necessary to first understand why an employee engages to commit it and then find effective methods of prevention to reduce the crime rate. Many studies on computer hacking has discussed the reasons for the behavior, for example: neutralization theory, differential association theory and containment theory. However, those theories and perspectives were adopted independently in past research. In this study, we combine those perspectives and create an integrated model to explain the employeeâs intention to commit unauthorized computer access. Data collected from 351employees in Taiwan confirmed our hypotheses and were tested against the research model. The results support the theoretical model in explaining how neutralization theory and containment theory may affect an employeeâs intention to commit unauthorized computer access. Finally, we found that neutralization is the most important factor to take into account when organizations develop and implement security policies or education which can decrease employeesâ intentions to commit unauthorized computer access. Advisors/Committee Members: Tung-Chin Lin (committee member), Jen-Ruei Fu (chair), Jack Shih-Chieh Hsu (committee member), Cathy S. Lin (chair).

Subjects/Keywords: Differential Association Theory; Neutralization Theory; Unauthorized Computer Access; Containment Theory; Computer Hacking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Y. (2012). A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Yu-ching. “A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.” 2012. Thesis, NSYSU. Accessed December 03, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Yu-ching. “A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.” 2012. Web. 03 Dec 2020.

Vancouver:

Wang Y. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. [Internet] [Thesis]. NSYSU; 2012. [cited 2020 Dec 03]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Y. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Youngstown State University

2. Steh, Stephen R. Unauthorized Access Crimes.

Degree: MSin Criminal Justice, Department of Criminal Justice, 2009, Youngstown State University

This paper examines the concept of unauthorized access crimes statutes in the fifty states and the federal system in order to determine the concept of what exactly the crime of unauthorized access constitutes. This paper will also determine whether these same crimes could be prosecuted under preexisting statutes that were already in effect in the United States criminal codes prior to the invention of the computer. Through a review of previous literature on the subject of computer crime laws, and more specifically unauthorized access laws, additional insight as to the purpose and intent of these laws will also be drawn. Case law on unauthorized access and any related criminal activity will also be examined. This information will help to determine whether the intentions of the legislatures have been to criminalize what is commonly referred to as hacking. Advisors/Committee Members: Wagner, Patricia (Advisor).

Subjects/Keywords: Computer Science; Criminology; Law; Technology; computer crime; hacking; unauthorized access; legislation and case law

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Steh, S. R. (2009). Unauthorized Access Crimes. (Masters Thesis). Youngstown State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817

Chicago Manual of Style (16th Edition):

Steh, Stephen R. “Unauthorized Access Crimes.” 2009. Masters Thesis, Youngstown State University. Accessed December 03, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

MLA Handbook (7th Edition):

Steh, Stephen R. “Unauthorized Access Crimes.” 2009. Web. 03 Dec 2020.

Vancouver:

Steh SR. Unauthorized Access Crimes. [Internet] [Masters thesis]. Youngstown State University; 2009. [cited 2020 Dec 03]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Council of Science Editors:

Steh SR. Unauthorized Access Crimes. [Masters Thesis]. Youngstown State University; 2009. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817

3. Mačužić, Vladimir. Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi.

Degree: 2018, Univerza v Mariboru

V magistrskem delu raziskujemo pojav in razvoj Wi-Fi tehnologije in kibernetske kriminalitete ter potrebo po učinkovitih varnostnih nastavitvah računalniških sistemov z namenom preprečevanja nepooblaščenega dostopanja do poslovnih podatkov. V magistrskem delu je prikazana problematika varnosti Wi-Fi tehnologije in varnostnih nastavitev računalniških sistemov gostinskih lokalov, ki uporabnikom predstavljajo dodatno tveganje za nepooblaščeno dostopanje do poslovnih podatkov. V delu so predstavljeni ukrepi in rešitve za izboljšanje varnosti Wi-Fi tehnologije in varnostnih nastavitev računalniških sistemov. Predstavljeni so tudi načini ozaveščanja uporabnikov glede kibernetske kriminalitete in varnosti, ki bodo uporabnikom omogočili bolj rigorozno nastavitev varnostnih protokolov, ter percepcije kibernetskega prostora kot vse bolj razvijajočega se segmenta, polnega inovativnih groženj. S študijem in analiziranjem literature smo opisali in predstavili Wi-Fi tehnologijo ter njene varnostne slabosti. Prav tako smo predstavili kibernetsko kriminaliteto, nepooblaščene vdore v računalniške in druge informacijske sisteme ter akterje, ki izvajajo nepooblaščene vdore. Z analitično metodo smo predstavili trenutno stanje moderne Wi-Fi tehnologije in varnosti ter prikazali najbolj znane primere nepooblaščenih vdorov v zadnjih letih. Nadalje smo s pomočjo kvantitativne metode oziroma ankete prišli do spoznanj, da so potrebni dodatni varnostni mehanizmi in ozaveščanje uporabnikov z namenom vzpostavitve učinkovite digitalne varnosti. S pomočjo raziskovanja potrebe po boljši ozaveščenosti lastnikov gostinskih lokalov glede kibernetske varnosti in neučinkovitih varnostnih mehanizmov le-teh pričakujemo, da bodo lastniki gostinskih lokalov kibernetske grožnje razumeli kot realne in vseprisotne.

This master's thesis is comprised of the exploration of the Wi-Fi phenomenon, its development and security. The thesis also explores the need for effective computer systems security measures with the primary goal of preventing unauthorized accesses to sensitive business data and information. The ever-increasing problem of Wi-Fi security, as well as inadequate security measures relating to computer systems of the users, in this case the owners of cafés, is also incorporated in the thesis, as it is the main cause for their vulnerability. Because of the latter reasons, we have introduced additional measures and solutions, which can effectively ensure higher Wi-Fi security, as well as better computer systems security settings and mechanisms. Additionally, we have introduced awareness-raising solutions regarding cybercrime and security, which, if taken into consideration, can enable the users to take more rigorous security mechanisms into play. That way the users can perceive the ever-changing cyberspace as an element that is full of different threats. By studying and analyzing relevant literature, we described and presented Wi-Fi technology and its vulnerabilities. Also, we described cybercrime, unauthorized accesses to computer and other relevant…

Advisors/Committee Members: Bernik, Igor.

Subjects/Keywords: brezžična omrežja; Wi-Fi; podatki; poslovni podatki; nepooblaščeni vdori; informacijska varnost; gostinski lokali; magistrska dela; cybercrime; Wi-Fi technology; awareness level; computer systems; unauthorized access; info:eu-repo/classification/udc/004.056(043.2)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mačužić, V. (2018). Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=69856 ; https://dk.um.si/Dokument.php?id=124122&dn= ; https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl

Chicago Manual of Style (16th Edition):

Mačužić, Vladimir. “Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi.” 2018. Masters Thesis, Univerza v Mariboru. Accessed December 03, 2020. https://dk.um.si/IzpisGradiva.php?id=69856 ; https://dk.um.si/Dokument.php?id=124122&dn= ; https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl.

MLA Handbook (7th Edition):

Mačužić, Vladimir. “Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi.” 2018. Web. 03 Dec 2020.

Vancouver:

Mačužić V. Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi. [Internet] [Masters thesis]. Univerza v Mariboru; 2018. [cited 2020 Dec 03]. Available from: https://dk.um.si/IzpisGradiva.php?id=69856 ; https://dk.um.si/Dokument.php?id=124122&dn= ; https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl.

Council of Science Editors:

Mačužić V. Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi. [Masters Thesis]. Univerza v Mariboru; 2018. Available from: https://dk.um.si/IzpisGradiva.php?id=69856 ; https://dk.um.si/Dokument.php?id=124122&dn= ; https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl

.