-
1
-
-
0028811312
-
Testing the leading crime theories: an alternative strategy focusing on motivational process
-
Agnew, R. (1995), “Testing the leading crime theories: an alternative strategy focusing on motivational process”, Journal of Research in Crime and Delinquency, Vol. 32 No. 4, pp. 363-98.
-
(1995)
Journal of Research in Crime and Delinquency
, vol.32
, Issue.4
, pp. 363-398
-
-
Agnew, R.1
-
4
-
-
0018503050
-
Social learning and deviant behavior: a specific test of a general theory
-
Akers, R.L., Krohn, M.D., Lanza-Kaduce, L. and Radosevich, M. (1979), “Social learning and deviant behavior: a specific test of a general theory”, American Sociological Review, Vol. 44, pp. 636-55.
-
(1979)
American Sociological Review
, vol.44
, pp. 636-655
-
-
Akers, R.L.1
Krohn, M.D.2
Lanza-Kaduce, L.3
Radosevich, M.4
-
5
-
-
22844455759
-
Male and female delinquent's attachment and effects of attachments on severity of self-reported delinquency
-
Anderson, B., Homes, M.D. and Ostresh, E. (1999), “Male and female delinquent's attachment and effects of attachments on severity of self-reported delinquency” Crime Justice and Behavior, Vol. 26 No. 4, pp. 435-52.
-
(1999)
Crime Justice and Behavior
, vol.26
, Issue.4
, pp. 435-452
-
-
Anderson, B.1
Homes, M.D.2
Ostresh, E.3
-
6
-
-
0002305454
-
From intentions to actions: a theory of planned behavior
-
Kuhl, J. and Beckman, J. (Eds) Springer, Heidelberg
-
Ajzen, I. (1985), “From intentions to actions: a theory of planned behavior”, in Kuhl, J. and Beckman, J. (Eds), Action-control: From Cognition to Behavior, pp. 11-39, Springer, Heidelberg.
-
(1985)
Action-control: From Cognition to Behavior
, pp. 11-39
-
-
Ajzen, I.1
-
8
-
-
0001156375
-
Managing computer crime: a research outlook
-
Backhouse, J. and Dhillon, G. (1995), “Managing computer crime: a research outlook”, Computers & Security, Vol. 14 No. 7, pp. 645-51.
-
(1995)
Computers & Security
, vol.14
, Issue.7
, pp. 645-651
-
-
Backhouse, J.1
Dhillon, G.2
-
9
-
-
0002520483
-
Modeling IT ethics: a study of situational ethics
-
Banerjee, D., Cronan, T.P. and Jones, T.W. (1998), “Modeling IT ethics: a study of situational ethics”, MIS Quarterly, Vol. 22 No.1, pp. 31-60.
-
(1998)
MIS Quarterly
, vol.22
, Issue.1
, pp. 31-60
-
-
Banerjee, D.1
Cronan, T.P.2
Jones, T.W.3
-
10
-
-
0027804413
-
Information systems security design methods: implications for information systems development
-
Baskerville, R. (1993), “Information systems security design methods: implications for information systems development”, ACM Computing Surveys, Vol. 25 No. 4, pp. 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
12
-
-
28844460781
-
Predicting dishonest actions using the theory of planned behavior
-
Beck, L. and Ajzen, I. (1991), “Predicting dishonest actions using the theory of planned behavior”, Journal of Research in Personality, Vol. 25, pp. 285-301.
-
(1991)
Journal of Research in Personality
, vol.25
, pp. 285-301
-
-
Beck, L.1
Ajzen, I.2
-
13
-
-
0032325831
-
Predicting unethical behavior: a comparison of the theory of reasoned action and the theory of planned behavior
-
Chang, M.K. (1998), “Predicting unethical behavior: a comparison of the theory of reasoned action and the theory of planned behavior”, Journal of Business Ethics, pp. 1825-34.
-
(1998)
Journal of Business Ethics
, pp. 1825-1834
-
-
Chang, M.K.1
-
14
-
-
0029506317
-
Ethics and information technology use: a factor analysis of attitudes to computer use
-
Cogner, S., Loch, K.D. and Helft, B.L. (1995), “Ethics and information technology use: a factor analysis of attitudes to computer use”, Information Systems Journal, pp. 161-84.
-
(1995)
Information Systems Journal
, pp. 161-184
-
-
Cogner, S.1
Loch, K.D.2
Helft, B.L.3
-
16
-
-
0032327732
-
Extending the theory of planned behavior: a review and avenues for further research
-
Conner, M. and Armitage, C.J. (1998), “Extending the theory of planned behavior: a review and avenues for further research”, Journal of Applied Social Psychology, Vol. 28, pp. 1429-64.
-
(1998)
Journal of Applied Social Psychology
, vol.28
, pp. 1429-1464
-
-
Conner, M.1
Armitage, C.J.2
-
17
-
-
0000726810
-
The theory of planned behavior and health behaviors
-
Conner, M. and Norman, P. (Eds) Open University Press, Buckingham
-
Conner, M. and Sparks, P. (1996), “The theory of planned behavior and health behaviors”, in Conner, M. and Norman, P. (Eds), Predicting Health Behavior, pp. 121-62, Open University Press, Buckingham.
-
(1996)
Predicting Health Behavior
, pp. 121-162
-
-
Conner, M.1
Sparks, P.2
-
18
-
-
0041033341
-
Testing control theory and differential association: a reanalysis of the Richmond youth project data
-
Costello, B.J. and Vowell, P.R. (1999), “Testing control theory and differential association: a reanalysis of the Richmond youth project data”, Criminology, Vol. 37 No. 4, pp. 815-40.
-
(1999)
Criminology
, vol.37
, Issue.4
, pp. 815-840
-
-
Costello, B.J.1
Vowell, P.R.2
-
19
-
-
0005734158
-
The role of the auditor in the prevention and detection of business fraud: SAS No. 82
-
available at: wcr.sonoma.edu/v2n1/v2n1.html
-
Farrell, B.R. and Franco, J.R. (1999), “The role of the auditor in the prevention and detection of business fraud: SAS No. 82”, Western Criminology Review, Vol. 2 No. 1, available at: wcr.sonoma.edu/v2n1/v2n1.html
-
(1999)
Western Criminology Review
, vol.2
, Issue.1
-
-
Farrell, B.R.1
Franco, J.R.2
-
20
-
-
0034340147
-
Environmental ethical decision making in the US metal-finishing industry
-
Flannery, B.L. and May, D.R. (2000), “Environmental ethical decision making in the US metal-finishing industry”, Academy of Management Journal, Vol. 43 No. 4, pp. 642-62.
-
(2000)
Academy of Management Journal
, vol.43
, Issue.4
, pp. 642-662
-
-
Flannery, B.L.1
May, D.R.2
-
21
-
-
0005766289
-
Morality and computers: attitudes and differences in moral judgments
-
Gattiker, U.E. and Kelley, H. (1999), “Morality and computers: attitudes and differences in moral judgments”, Information Systems Research, Vol. 10 No. 3, pp. 233-54.
-
(1999)
Information Systems Research
, vol.10
, Issue.3
, pp. 233-254
-
-
Gattiker, U.E.1
Kelley, H.2
-
22
-
-
0001823869
-
Security concerns of systems users: a study of perceptions of the adequacy of security measures
-
Goodhue, D.L. and Straub, D.W. (1991), “Security concerns of systems users: a study of perceptions of the adequacy of security measures”, Information & Management, Vol. 20 No. 1, pp. 13-27.
-
(1991)
Information & Management
, vol.20
, Issue.1
, pp. 13-27
-
-
Goodhue, D.L.1
Straub, D.W.2
-
24
-
-
0000917858
-
The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
-
Harrington, S. (1996), “The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions”, MIS Quarterly, Vol. 20 No. 3, pp. 257-78.
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.1
-
25
-
-
0003991890
-
-
University of California Press, Berkeley, CA
-
Hirschi, T. (1969), Causes of Delinquency, University of California Press, Berkeley, CA.
-
(1969)
Causes of Delinquency
-
-
Hirschi, T.1
-
26
-
-
0002042413
-
The 9 to 5 underground: are you policing computer abuses?
-
Hoffer, J.A. and Straub, D.W. (1989), “The 9 to 5 underground: are you policing computer abuses?”, Sloan Management Review, Vol. 30 No. 4, pp. 35-44.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-44
-
-
Hoffer, J.A.1
Straub, D.W.2
-
27
-
-
0343001536
-
Crime by computer: correlates of software piracy and unauthorized account access
-
Hollinger, R.C. (1993), “Crime by computer: correlates of software piracy and unauthorized account access”, Security Journal, Vol. 4 No. 1, pp. 2-12.
-
(1993)
Security Journal
, vol.4
, Issue.1
, pp. 2-12
-
-
Hollinger, R.C.1
-
28
-
-
0030741314
-
School delinquency and the school social bond
-
Jenkins, P.H. (1997), “School delinquency and the school social bond”, Journal of Research in Crime and Delinquency, Vol. 34 No. 3, pp. 337-67.
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, Issue.3
, pp. 337-367
-
-
Jenkins, P.H.1
-
29
-
-
73549118703
-
Computer abuse as organizational activities
-
Kling, R. (1980), “Computer abuse as organizational activities”, Computer/Law Journal, Vol. 2, pp. 186-96.
-
(1980)
Computer/Law Journal
, vol.2
, pp. 186-196
-
-
Kling, R.1
-
31
-
-
84984053688
-
Social control and delinquent behavior: an examination of the elements of the social bonds
-
Krohn, M. and Massey, J. (1980), “Social control and delinquent behavior: an examination of the elements of the social bonds”, The Sociological Quarterly, Vol. 21, pp. 529-43.
-
(1980)
The Sociological Quarterly
, vol.21
, pp. 529-543
-
-
Krohn, M.1
Massey, J.2
-
32
-
-
84958896603
-
Social learning theory and adolescent cigarette smoking: a longitudinal study
-
Krohn, M.D., Skinner, W.F., Massey, J.L. and Akers, R.L. (1985), “Social learning theory and adolescent cigarette smoking: a longitudinal study”, Social Problems, Vol. 32 No. 5, pp. 455-71.
-
(1985)
Social Problems
, vol.32
, Issue.5
, pp. 455-471
-
-
Krohn, M.D.1
Skinner, W.F.2
Massey, J.L.3
Akers, R.L.4
-
33
-
-
0032387051
-
Trajectories of delinquency and problem behavior: comparison of social and personal control characteristics of adjudicated boys on synchronous and non-synchronous paths
-
Le Blanc, M. and Kaspy, N. (1998), “Trajectories of delinquency and problem behavior: comparison of social and personal control characteristics of adjudicated boys on synchronous and non-synchronous paths”, Journal of Quantitative Criminology, Vol. 14 No. 2, pp. 181-214.
-
(1998)
Journal of Quantitative Criminology
, vol.14
, Issue.2
, pp. 181-214
-
-
Le Blanc, M.1
Kaspy, N.2
-
34
-
-
0000133760
-
Threats to information systems: today is reality, yesterday is understanding
-
Loch, K.D., Carr H.H. and Warkentin, M.E. (1992), “Threats to information systems: today is reality, yesterday is understanding”, MIS Quarterly, Vol. 17 No. 2, pp. 173-86.
-
(1992)
MIS Quarterly
, vol.17
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
36
-
-
84953478040
-
Evaluating and extending the theory of planned behavior
-
Stroebe, W. and Hewstone, M. (Eds) John Wiley & Sons, Chichester
-
Manstead, A.S.R. and Parker, D. (1995), “Evaluating and extending the theory of planned behavior”, in Stroebe, W. and Hewstone, M. (Eds), European Review of Social Psychology, Vol. 6, pp. 69-96, John Wiley & Sons, Chichester.
-
(1995)
European Review of Social Psychology
, vol.6
, pp. 69-96
-
-
Manstead, A.S.R.1
Parker, D.2
-
37
-
-
0005765070
-
From the editor
-
Meyer, J. (1995), “From the editor”, Computer & Security, Vol. 14 No. 1, pp. 2-3.
-
(1995)
Computer & Security
, vol.14
, Issue.1
, pp. 2-3
-
-
Meyer, J.1
-
39
-
-
0001354917
-
Ethical decision making in the medical profession: an application of the theory of planned behavior
-
Randall, D.M. and Gibson, A.M. (1991), “Ethical decision making in the medical profession: an application of the theory of planned behavior”, Journal of Business Ethics, Vol. 10, pp. 111-22.
-
(1991)
Journal of Business Ethics
, vol.10
, pp. 111-122
-
-
Randall, D.M.1
Gibson, A.M.2
-
40
-
-
0005692985
-
Computer security: who's minding the store
-
Rose, K. and Tom, R. (1989), “Computer security: who's minding the store”, The Academy of Management Executive, Vol. 3 No. 1, pp. 63-6.
-
(1989)
The Academy of Management Executive
, vol.3
, Issue.1
, pp. 63-66
-
-
Rose, K.1
Tom, R.2
-
41
-
-
0344613999
-
Software security in an Internet world: an executive summary
-
Shimeall, T.J. and McDermott, J.J. (1999), “Software security in an Internet world: an executive summary”, IEEE Software, pp. 58-62.
-
(1999)
IEEE Software
, pp. 58-62
-
-
Shimeall, T.J.1
McDermott, J.J.2
-
42
-
-
0030668250
-
A social learning theory analysis of computer abuse among college students
-
Skinner, W.F. and Fream, A.M. (1997), “A social learning theory analysis of computer abuse among college students”, Journal of Research in Crime and Delinquency, Vol. 34 No. 4, pp. 495-518.
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, Issue.4
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
43
-
-
84935167315
-
Specifying specific deterrence
-
Smith, D.A. and Garton, P.R. (1989), “Specifying specific deterrence”, American Sociological Review, Vol. 54, pp. 94-106.
-
(1989)
American Sociological Review
, vol.54
, pp. 94-106
-
-
Smith, D.A.1
Garton, P.R.2
-
45
-
-
0031628589
-
Recent security surveys
-
Stephen, H. (1998), “Recent security surveys”, Computers & Security, Vol. 17 No. 3, pp. 207-10.
-
(1998)
Computers & Security
, vol.17
, Issue.3
, pp. 207-210
-
-
Stephen, H.1
-
46
-
-
0000280419
-
Effective IS security: an empirical study
-
Straub, D.W. (1990), “Effective IS security: an empirical study”, Information Systems Research, Vol. 1 No. 3, pp. 255-76.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
47
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: a field study
-
Straub, D.W. and Nance, W.D. (1990), “Discovering and disciplining computer abuse in organizations: a field study”, MIS Quarterly, Vol. 14 No. 1, pp. 45-62.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-62
-
-
Straub, D.W.1
Nance, W.D.2
-
48
-
-
0001133137
-
Coping with systems risk: security planning models for management decision making
-
Straub, D.W. and Welke, R.J. (1998), “Coping with systems risk: security planning models for management decision making”, MIS Quarterly, Vol. 22 No. 4, pp. 441-65.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-465
-
-
Straub, D.W.1
Welke, R.J.2
-
49
-
-
0032355201
-
Predicting and explaining intentions and behavior: how well are we doing?
-
Sutton, S. (1998), “Predicting and explaining intentions and behavior: how well are we doing?”, Journal of Applied Social Psychology, Vol. 28, pp. 1317-38.
-
(1998)
Journal of Applied Social Psychology
, vol.28
, pp. 1317-1338
-
-
Sutton, S.1
-
50
-
-
77957024810
-
Toward a self-evaluation maintenance model of social behavior
-
Berkowitz, L. (Ed.), Academic Press, New York, NY.
-
Tesser, A. (1988), “Toward a self-evaluation maintenance model of social behavior”, in Berkowitz, L. (Ed.), Advances in Experimental Social Psychology, Vol. 21, pp. 181-227, Academic Press, New York, NY.
-
(1988)
Advances in Experimental Social Psychology
, vol.21
, pp. 181-227
-
-
Tesser, A.1
-
51
-
-
84963046788
-
Modeling Sutherland's theory of differential association: toward an empirical clarification
-
Tittle, C.R., Burke, M.J. and Jackson, E.F. (1986), “Modeling Sutherland's theory of differential association: toward an empirical clarification”, Social Forces, Vol. 65, pp. 405-32.
-
(1986)
Social Forces
, vol.65
, pp. 405-432
-
-
Tittle, C.R.1
Burke, M.J.2
Jackson, E.F.3
-
52
-
-
84986105195
-
1997 computer abuse and security survey
-
Thompson, D. (1998), “1997 computer abuse and security survey”, Information Management & Computer Security, Vol. 6 No. 2, pp. 78-101.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.2
, pp. 78-101
-
-
Thompson, D.1
-
53
-
-
0023996629
-
Personnel: the other half of data security
-
Zajac, B.P. Jr (1988), “Personnel: the other half of data security”, Computer & Security, Vol. 7 No. 2, pp. 131-2.
-
(1988)
Computer & Security
, vol.7
, Issue.2
, pp. 131-132
-
-
Zajac, B.P.1
|