Font Size: a A A

Cybercrime: The creation and exploration of a model

Posted on:2015-12-26Degree:D.MType:Dissertation
University:University of PhoenixCandidate:Rivard, Jeffrey PatrickFull Text:PDF
GTID:1476390020451524Subject:Management
Abstract/Summary:
The purpose of this path modeling study was to examine the relationships among computer self-efficacy, enterprise resource planning defenses, and cybercrime to enhance leadership understanding in order to prevent intrusions, taper the cybercrime pandemic, and secure infrastructure. Several elements were combined to form the foundation of this study, including: the Computer User Self-Efficacy measure, Routine Activity Theory for cybercrime, and Enterprise Resource Planning defenses for model creation and evaluation. The population consisted of 200 adult Internet users familiar with computer usage. The research indicated that the model was able to establish relationships between most elements explored. The results indicated that the model generated all significant Cronbach's alpha levels over 0.70, and illustrated several significant relationships, computer self-efficacy reaching an R2 of 0.5283 and a T-Statistic value of 10.909. In addition, the relationship with cybercrime was significant, reaching an R2 of 0.658 and T-Statistic of 17.353. A moderate relationship of cybercrime effectiveness was shown at an R2 of 0.371 and T-statistic of 5.852. The variables of anxiety and computer self-efficacy, knowledge and computer self-efficacy, Enterprise Resource Planning Defenses and cybercrime effectiveness, motivated offender's and cybercrime, suitable target's and cybercrime, capable guardian's and cybercrime, and computer self-efficacy and cybercrime effectiveness all showed significant relationships with T-Statistics ranging from 2.311 through 11.197. The variables of age and computer self-efficacy, and Enterprise Resource Planning defenses and cybercrime demonstrated no significant relationships, generating T-Statistics of 0.705 and 0.583. Recommendations include sampling a direct population for further clarity and informational revelations about that exact population to directly help a company or organization evaluate weaknesses, build understanding, and implement positive change. Further refinement of this measure contributes directly to every leaders infrastructural and technological understanding, helping refine management of both technological and human assets and resources.
Keywords/Search Tags:Enterprise resource planning defenses, Cybercrime, Computer self-efficacy, Model, Relationships
Related items