CHAPTER 10

UNDERSTANDING STUDIES AND SURVEYS OF COMPUTER CRIME

M. E. Kabay

10.1 INTRODUCTION

10.1.1 Value of Statistical Knowledge Base

10.1.2 Limitations on Our Knowledge of Computer Crime

10.1.3 Limitations on the Applicability of Computer Crime Statistics

10.2 BASIC RESEARCH METHODOLOGY

10.2.1 Some Fundamentals of Statistical Design and Analysis

10.2.2 Research Methods Applicable to Computer Crime

10.3 SUMMARY

10.4 FURTHER READING

10.5 NOTES

10.1 INTRODUCTION.

This chapter provides guidance for critical reading of research results about computer crime. It will also alert designers of research instruments who may lack formal training in survey design and analysis to the need for professional support in developing questionnaires and analyzing results.

10.1.1 Value of Statistical Knowledge Base.

Security specialists are often asked about computer crime; for example, customers want to know who is attacking which systems, how often, using what methods. These questions are perceived as important because they bear on the strategies of risk management; in theory, in order to estimate the appropriate level of investment in security, it would be helpful to have a sound grasp of the probability of different levels of damage. Ideally, one would want to evaluate an organization's level of risk by evaluating the experiences of other organizations with similar system and business characteristics. Such comparisons would be useful in competitive analysis and in litigation over standards of due ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.