Weitere Kapitel dieses Buchs durch Wischen aufrufen
There are persuasive arguments for thinking that institutional processes have enormous power to explain cyberattacks. This chapter examines how macro- and micro-level institutions provide regulative, normative, and cognitive legitimacy to hackers’, organizations’, and governments’ actions that facilitate or hinder cyberattacks. More specifically, we analyze institutions at supra-national, national, professional, industry, organizational, informal network, and intra-organizational levels in terms of their impacts on cyberinfrastructure, network, and computer attacks.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Acohido, B., & Swartz, J. (2005, December 15). Meth addicts’ other habit: Online theft. USA Today.
Adams, J. (2001). Virtual defense. Foreign Affairs, 80(3), 98–112. CrossRef
Aguilar-Millan, S., Foltz, J. E., Jackson, J., & Oberg, A. (2008). The globalization of crime. Futurist, 42(6), 41–50.
Antariksa. (2001, July). I am a thief, not a hacker: Indonesia’s electronic underground. Latitudes Magazine, 12–17.
Atkinson, A. (1991). Principles of political ecology. London: Belhaven Press.
Axelrod, R. (1997). The complexity of cooperation. New Jersey: Princeton University Press.
Backoff, J. F., & Martin, C. L., Jr. (1991). Historical perspectives: Development of the codes of ethics in the legal, medical and accounting professions. Journal of Business Ethics, 10, 99–110. CrossRef
Baumol, W. J. (1990). Entrepreneurship: Productive, unproductive, and destructive. Journal of Political Economy, 98(5), 893–921. CrossRef
Bednarz, A. (2004, November 29). Profiling cybercriminals: A promising but immature science. Network World. http://www.nwfusion.com/supp/2004/cybercrime/112904profile.html?page=2. Accessed 5 October 2006.
Benedict, R. (1946). The chrysanthemum and the sword; Patterns of Japanese culture. Boston: Houghton Mifflin.
Berger, P. L., & Luckmann, T. (1967). The social construction of reality: A treatise in the sociology of knowledge. New York: Doubleday.
Bickers, C. (2001). Combat on the web. Far Eastern Economic Review, August 16, 30–33.
Bieje, P.R., & Groenewegen, J. (1992). A network analysis of markets. Journal of Economic Issues, 26(1), 87–114.
Blackwell, B. S. (2000). Perceived sanction threats, gender, and crime: A test and elaboration of power-control theory, criminology. Beverly Hills, 38(2), 439–489.
Blau, J. (2004, May 26). Russia – A happy haven for hackers. http://www.computerweekly.com/Article130839.htm. Accessed 5 October 2006.
Bowker, A. L. (2000). The advent of the computer delinquent. FBI Law Enforcement, 69(12), 7–11.
Bresser, R. K. F., & Millonig, K. (2003). Institutional capital: Competitive advantage in light of the new institutionalism in organization theory. Schmalenbach Business Review, 55(3), 220–241.
Carson, S. J., Timothy, M. D., Grahame, R. D., & George, J. (1999). Understanding institutional designs within marketing value systems. Journal of Marketing, 63, 115–130. CrossRef
Castles, S. (2005). Nation and empire: Hierarchies of citizenship in the new global order. International Politics, 42(2), 203. CrossRef
Chung, K. H. (2004). Business groups in Japan and Korea: Theoretical boundaries and future direction. International Journal of Political Economy, 34(3), 67–98.
Clark, R., & Davis, W. L. (1995). A human capital perspective on criminal careers. Journal of Applied Business Research, 11(3), 58–64.
Comité Européen Des Assurances. (2004, February). Terrorist acts against computer installations and the role of the Internet in the context of international terrorism property insurance committee. IT Risks Insurance Sub-committee. http://www.cea.assur.org/cea/v1.1/actu/pdf/uk/annexe180.pdf. Accessed 5 October 2006.
Davis, L., & North, D. C. (1971). Institutional change and American economic growth. Cambridge: Cambridge University Press. CrossRef
de Kloet, J. (2002). Digitisation and its Asian discontents: The internet, politics and hacking in China and Indonesia. First Monday, 7(9). http://firstmonday.org/issues/issue7_9/kloet/index.html. Accessed 5 October 2006.
Deinhart, J. W. (2000). Business, institutions, and ethics. New York: Oxford University Press.
Deloitte Touche Tohmatsu. (2002). Australian computer crime and security survey. http://www.4law.co.il/346.pdf. Accessed 5 October 2006.
Denning, D. E. (2000). Acktivism: An emerging threat to diplomacy. American Foreign Service Association. http://www.afsa.org/fsj/sept00/Denning.cfm. Accessed 5 October 2006.
Dingwerth, K. (2005). The democratic legitimacy of public-private rule making: What can we learn from the world commission on dams? Global Governance, 11(1), 65–83.
Donaldson, T. (1996). Values in tension: Ethics away from home. Harvard Business Review, 74(5), 48–57.
Dowling, J., & Pfeffer, J. (1975). Organizational legitimacy: Social values and organizational behavior. Pacific Sociological Review, 18, 122–136.
Duk-kun, B. (2003, November 19). Largest Internet hacking ring uncovered. The Korea Times.
Duncan, R. (1994). Who wants to stop the church: Homosexual rights, legislation, public policy, and religious freedom. Notre Dame Law Review, 69, 393.
Ehrlich, I. (1996). Crime, punishment, and the market for offenses. Journal of Economic Perspectives, 10(1), 43–67.
Elsbach, K. D. (2002). Intraorganizational Institutions. Blackwell Companion to Organizations, 37–57.
Engardio, P., Puliyenthuruthel, J., & Kripalani, M. (2004, August 16). Fortress India? Business Week, 3896, 42–43.
Fest, G. (2005, September 1). Offshoring: Feds take fresh look at India BPOs; Major theft has raised more than a few eyebrows. Bank Technology News, 18(9), 1.
Finckenauer, J. O. (2005). Problems of definition: What is organized crime? Trends in Organized Crime, 8(3), 63–83. CrossRef
Foreign Policy. (2005, March/April). Caught in the net: Australian teens, 92.
Freud, S. (1949/1930). Civilization and its discontents. London: Hogarth Press and Institute of Psycho-Analysis.
Gabrys, E. D. (2002). The international dimensions of cyber-crime, Part 2. Information Systems Security, 11(5), 24–32. CrossRef
Galtung, J. (1958). The social functions of a prison. Social Problems, 6, 127–140. CrossRef
Gehlen, A. (1957/1980). Man in the age of technology (Reprint). New York: Columbia University Press.
George, E., Chattopadhyay, P., Sitkin, S. B., & Barden, J. (2006). Cognitive underpinnings of institutional persistence and change: A framing perspective. Academy of Management Review, 31(2), 347–385.
Giddens, A. (1984). The constitution of society: Outline of the theory of structuration. Berkely, CA: University of California Press.
Gomez, J. (2002). Internet politics: Surveillance and intimidation in Singapore. Bangkok and Singapore: Think Centre (Asia).
Granovetter, M. (1985). Economic action and social structure: The problem of embeddedness. American Journal of Sociology, 91(3), 481–510. CrossRef
Grasmick, H. G., & Robert, J. B. (1990). Conscience, significant others, and rational choice: Extending the deterrence model. Law and Society Review, 24, 837–862. CrossRef
Grow, B., & Bush, J. (2005, May 30). Hacker hunters. Business Week.
Hamner, K. M. (1992). Gay-bashing: A social identity analysis of violence against lesbians and gay men. In G. M. Herek & K. Berrill (Eds.), Hate crimes: Confronting violence against lesbians and gay men (pp. 179–190). Newbury Park, CA: Sage.
Harris, N. (2006). Reintegrative shaming, shame, and criminal justice. Journal of Social Issues, 62(2), 327–346. CrossRef
Havely, J. (2000, February 16). Online’s when states go to cyber-war. BBC News.
Hawkins, J. D., Herrenkohl, T., Farrington, D. P., Brewer, D., Catalano, R., & Harachi, T. W. (1998). A review of predictors of youth violence. In R. Loeber & D. P, Harrington (Eds.), Serious & violent juvenile offenders: Risk factors and successful interventions (pp. 106–146). Thousand Oaks, CA: Sage.
Hayek, F. A. (1979). Law, legislation and liberty (3 vols.). Chicago: University of Chicago Press.
Henkin, L. (1979). How nations behave. New York: Council on Foreign Relations.
Hoffman, A. J. (1999). Institutional evolution and change: Environmentalism and the US chemical industry. Academy of Management Journal, 42(4), 351–371. CrossRef
Holm, P. (1995). The dynamics of institutionalization: Transformation processes in Norwegian fisheries. Administrative Science Quarterly, 40(3), 398–422. CrossRef
Homer-Dixon, T. (2002, January/February). The rise of complex terrorism. Foreign Policy, 128, 52–62. CrossRef
Howard, J. A., & Pike, K. C. (1986). Ideological investment in cognitive processing: The influence of social statuses on attribution. Social Psychology, 49, 154–167. CrossRef
Hu, V. T. (2001). Nondiscrimination or secular orthodoxy? Religious freedom and breach of contract at Tufts University. Texas Review of Law & Politics, 6(1), 289–333.
Ismail, I. (2008, February 18). Understanding cybercriminals. New Straits Times (Malaysia), 12.
Jepperson, R. (1991). Institutions, institutional effects, and institutionalism. In W. W. Powell & P. J. DiMaggio (Eds.), The new institutionalism in organizational analysis (pp. 143–163). Chicago: University of Chicago Press.
Kahan, D. M. (1996). What do alternative sanctions mean? 63 U. Chicago Law Review, 591, 603–604.
Kalipeni, E., & Deborah, F. (1999). Environmental change in the Blantyre Fuelwood project area in Malawi: A political ecology perspective. Politics and Life Sciences, 18(1), 37–54.
Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149(4), 1003–1114. CrossRef
Kelman, S. (1987). Making public policy: A hopeful view of American government. New York: Basic Books.
Kravets, D. (2009, September 14). New York Times reforms online ad sales after malware scam. wired.com. http://www.wired.com/threatlevel/2009/09/nyt-revamps-online-ad-sales-after-malware-scam/. Accessed 27 October 2009.
Kwong, K. K., Yau, O. H. M., Lee, J. S. Y., Sin, L. Y. M., & Tse, A. C. B. (2003). The effects of attitudinal and demographic factors on intention to buy pirated CDs: The case of Chinese consumers. Journal of Business Ethics, 47(3), 223–235. CrossRef
Lenzner, R., & Vardi, N. (2004, September 20). The next threat. Forbes, 174(5), 15–21.
Levi, M. (2002). The organization of serious crimes. Oxford handbook of criminology (pp. 878–913). Oxford: Oxford University Press.
Lewis, H. B. (1971). Shame and guilt in neurosis. New York: International Universities Press.
Lewis, M. (1992). Shame: The exposed self. New York: Free Press.
Lucas, P. (2004). Outsourcing: The good, the bad & the ugly. Collections & Credit Risk, 9(12), 22–24.
Lyons, C. J. (2006). Stigma or sympathy? Attributions of fault to hate crime victims and offenders. Social Psychology Quarterly, 69(1), 39–60. CrossRef
Macy, M. W., & Willer, R. (2002). From factors to actors: Computational sociology and agent-based modeling. Annual Review of Sociology, 28, 143–166. CrossRef
Maltz, M. (1994). Defining organized crime. In R. J. Kelly, K.-L. Chin, & R. Schatzberg (Eds.), Handbook of organized crime in the United States. Westport, CT and London: Greenwood Press.
Mead, M. (1937). Cooperation and competition among primitive peoples. New York: McGraw-Hill.
Mittelman, J. H., & Johnston, R. (1999). The globalization of organized crime, the courtesan state, and the corruption of civil society. Global Governance, 5(1), 103–126.
Mol, A. P. J., & Van Den Burg, S. (2004). Local governance of environmental flows in global modernity. Local Environment, 9(4), 317–324. CrossRef
Moore, S. (1979). The structure of a national elite network. American Sociological Review, 44, 673–691. CrossRef
Natividad, K. F. (2008). Stepping it up and taking it to the streets: Changing civil and criminal copyright enforcement tactics. Berkeley Technology Law Journal, 2008 Annual Review, 23(1), 469–501.
North, D. C. (1990). Institutions, institutional change and economic performance. Cambridge, UK: Cambridge University Press.
North, D. C. (1994). Economic performance through time. American Economic Review, 84(3), 359–368.
North, D. C. (1996). Epilogue: Economic performance through time. In L. J. Alston, T. Eggertsson & D. C. North (Eds.), Empirical studies in institutional change (pp. 342–355). Cambridge, PA: Cambridge University Press.
Oppong, J. R., & Kalipeni, E. (2005). The geography of landmines and implications for health and disease in Africa: A political ecology approach. Africa Today, 52(1), 2–26. CrossRef
Oxley, J. E., & Yeung, B. (2001). E-commerce readiness: Institutional environment and international competitiveness. Journal of International Business Studies, 32(4), 705–723. CrossRef
Paetzold, R. L., Dipboye, R.L., & Elsbach, K. D. (2008). A new look at stigmatization in and of organizations. Academy of Management Review, 33(1), 186–193.
Parker, D. B. (1998). Fighting computer crime: A new framework for protecting information. New York: John Wiley & Sons, Inc.
Parto, S. (2005). Economic activity and institutions: Taking stock. Journal of Economic Issues, 39(1), 21–52.
Perera, R. (2000, November 26). Executives call for delay in cybercrime pact. CNN.com. http://www.cnn.com/2000/TECH/. Accessed 5 October 2006.
Piore, A. (2003, December 22). Computer Geeks: Hacking for dollars. Newsweek International. http://www.msnbc.msn.com/id/3706599/site/newsweek/print/1/displaymode/1098. Accessed 5 October 2006.
Rasmussen, E. (1996). Stigma and self-fulfilling expectations of criminality. Journal of Law and Economics, 39, 519–543. CrossRef
Romania Gateway. (2003). Romania emerges as nexus of cybercrime. http://ro-gateway.ro/node/185929/comnews/item?item_id=223937. Accessed 5 October 2006.
Schneiberg, M., King, M., & Smith, T. (2008). Social movements and organizational form: Cooperative alternatives to corporations in the American insurance, dairy, and grain industries. American Sociological Review, 73(4), 635–667. CrossRef
Schneider, A. (1999). US neo-conservatism: Cohort and cross-cultural perspective. The International Journal of Sociology and Social Policy, 19(12), 56–86. CrossRef
Scott, R. (1987). The adolescence of institutional theory. Administrative Science Quarterly, 32, 493–511. CrossRef
Scott, R. (1995). Institutions and organizations. Thousand Oaks, CA: Sage.
Scott, R. (2001). Institutions and organizations. Thousand Oaks, CA: Sage.
Scott, W. R., Ruef, M., Mendel, P. J., & Caronna, C. A. (2000). Institutional change and healthcare organizations: From professional dominance to managed care. Chicago, IL: University of Chicago Press.
Shilts, R. (1991, January 1). The queering of America. The Advocate, 32–38
Sjostrand, S. E. (1992). On the rationale behind “irrational” institutions. Journal of Economic Issues, 26(4), 1007–1040.
Skorodumova, O. (2004). Hackers as information space phenomenon. Social Sciences, 35(4), 105–113.
Smith, T. (2003, October 27). Technology; Brazil Becomes a Cybercrime Lab. http://query.nytimes.com/gst/fullpage.html?res=9F02E3DA1131F934A15753C1A9659C8B63&sec=&spon=&pagewanted=2. Accessed 5 October 2006.
Smith, J., & Wiest, D. (2005). The uneven geography of global civil society: National and global influences on transnational association. Social Forces, 84(2), 621–651. CrossRef
Smith, N. C., Simpson, S. S., & Chun-Yao, H. (2007). Why managers fail to do the right thing: An empirical study of unethical and illegal conduct. Business Ethics Quarterly, 17(4), 633–667.
Snidal, D. (1996). Political economy and international institutions. International Review of Law and Economics, 16(1), 121–137. CrossRef
Stephens, H. (2006). Hosting Terror. Foreign Policy, 155, 92.
Stewart, J. (2006). White collar crime: Fraud, bribery and corruption—all alive and well? Credit Control, 27(4/5), 50–60.
Strang, D., & Sine, W. D. (2002). Interorganizational institutions. In J. Baum (Ed.), Companion to organizations (pp. 497–519). Oxford: Blackwell.
Tajfel, H., & Turner, J. C. (1986). The social identity theory of intergroup behavior. In S. Worchel & W. G. Austin (Eds.), Psychology of intergroup relations (pp. 7–24). Chicago, IL: Nelson-Hall.
Tarrow, S. (2001). Transnational politics: Contention and institutions in international politics. Annual Review of Political Science, 4, 1–20. CrossRef
The Economist. (2005, September 10). Business: Busy signals; Indian call centres. The Economist, 376(8443), 66.
The FBI Law Enforcement Bulletin. (2007). Legitimizing criminal justice policies and practices, speech of Mark H. Moore as part of the Perspectives on Crime and Justice Series of the National Institute of Justice – Transcript.
Vardi, N. (2005, July 25). Chinese take out. Forbes, 54.
Vassilev, R. (2003). De-development problems in Bulgaria. East European Quarterly, 37(3), 345.
Webb, J. W., Tihanyi, L., Ireland, R. D., & Sirmon, D. G. (2009). You say illegal, I say legitimate: Entrepreneurship in the informal economy. Academy of Management Review, 34(3), 492–510.
Williams, P. (2001, August 13). Organized crime and cybercrime: Synergies, trends, and responses. Office of International Information Programs, US Department of State, http://usinfo.state.gov. Accessed 5 October 2006.
Wolverton, T. (2001, November 8). Court shields Yahoo from French laws. CNET News. http://news.cnet.com/2100-1017-275564.html. Accessed 5 October 2006.
Zaheer, S., & Zaheer, A. (1997). Country effects on information seeking in global electronic networks. Journal of International Business Studies, 28(1), 77–100. CrossRef
Zucker, L. (1991). The role of institutionalization in cultural persistence. In W. W. Powell & P. J. DiMaggio (Eds.), The new institutionalism in organizational analysis (pp. 83–107). Chicago: University of Chicago Press.
- An Institutional Perspective on Cybercrimes
Dr. Nir Kshetri
- Springer Berlin Heidelberg
- Chapter 3