CHAPTER 10
UNDERSTANDING STUDIES AND SURVEYS OF COMPUTER CRIME
M. E. Kabay
10.1.1 Value of Statistical Knowledge Base
10.1.2 Limitations on Our Knowledge of Computer Crime
10.1.3 Limitations on the Applicability of Computer Crime Statistics
10.2 BASIC RESEARCH METHODOLOGY
10.2.1 Some Fundamentals of Statistical Design and Analysis
10.2.2 Research Methods Applicable to Computer Crime
10.1 INTRODUCTION.
This chapter provides guidance for critical reading of research results about computer crime. It will also alert designers of research instruments who may lack formal training in survey design and analysis to the need for professional support in developing questionnaires and analyzing results.
10.1.1 Value of Statistical Knowledge Base.
Security specialists are often asked about computer crime; for example, customers want to know who is attacking which systems, how often, using what methods. These questions are perceived as important because they bear on the strategies of risk management; in theory, in order to estimate the appropriate level of investment in security, it would be helpful to have a sound grasp of the probability of different levels of damage. Ideally, one would want to evaluate an organization's level of risk by evaluating the experiences of other organizations with similar system and business characteristics. Such comparisons would be useful in competitive analysis and in litigation over standards of due ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.