-
1
-
-
1242286351
-
-
Anonymous. USAToday. WWW Document, accessed 1/10/2004
-
Anonymous (2001). Chinese hackers call truce in China-US Cyberwar. USAToday. WWW Document, accessed 1/10/2004, http://www.usatoday.com/tech/news/2001-05-09-chinese-hackers-truce.htm .
-
(2001)
Chinese Hackers Call Truce in China-US Cyberwar
-
-
-
2
-
-
1242308732
-
-
ASIS, American Society for Industrial Security, WWW Document, accessed 09/12/2001,
-
ASIS, (2001). Professional Development. American Society for Industrial Security, WWW Document, accessed 09/12/2001, http://www.asisonline.org/education/index/xml .
-
(2001)
Professional Development
-
-
-
3
-
-
1242308581
-
Turning the computer into a criminal
-
August, R. S. (1983). Turning the computer into a criminal. Barrister, 13.
-
(1983)
Barrister
, vol.13
-
-
August, R.S.1
-
4
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville R. Information systems security design methods. Implications for information systems development ACM Computing Surveys. 25(4):1993;375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
7
-
-
0013323815
-
Introduction
-
Blumstein A. C., & D. Nagin (Eds.), Report of the Panel of Deterrence and Incapacitation, National Academy of Sciences, Washington, DC2
-
Blumstein, A. (1978). Introduction. In Blumstein, A. C., & D. Nagin (Eds.), Deterrence and Incapacitation: Estimating the Effects of Crime Sanctions on Criminal Rates. Report of the Panel of Deterrence and Incapacitation, National Academy of Sciences, Washington, DC2.
-
(1978)
Deterrence and Incapacitation: Estimating the Effects of Crime Sanctions on Criminal Rates
-
-
Blumstein, A.1
-
8
-
-
0031673674
-
Catapults and grappling hooks: The tools and techniques on information warfare
-
Boulanger A. Catapults and grappling hooks. The tools and techniques on information warfare IBM Systems Journal. 37(1):1998;106-114.
-
(1998)
IBM Systems Journal
, vol.37
, Issue.1
, pp. 106-114
-
-
Boulanger, A.1
-
9
-
-
55249089317
-
Key issues in information systems: 1986
-
Brancheau J., Wetherbe J.C. Key issues in information systems. 1986 MIS Quarterly. 11(1):1987;23-45.
-
(1987)
MIS Quarterly
, vol.11
, Issue.1
, pp. 23-45
-
-
Brancheau, J.1
Wetherbe, J.C.2
-
11
-
-
0004888748
-
An information security education initiative for engineering and computer science
-
Monterey, CA: Naval Postgraduate School
-
Chin, S. -K., Irvine, C., & Frinke, D. (1997). An information security education initiative for engineering and computer science. In Naval postgraduate school technical report npscs-97-003. Monterey, CA: Naval Postgraduate School.
-
(1997)
Naval Postgraduate School Technical Report
, vol.NPSCS-97-003
-
-
Chin, S.-K.1
Irvine, C.2
Frinke, D.3
-
12
-
-
1242331231
-
Enterprise security - Built on sound policies
-
December
-
Clyde, R. A. (1999). Enterprise security - built on sound policies. Enterprise Systems Journal, December, 69-72.
-
(1999)
Enterprise Systems Journal
, pp. 69-72
-
-
Clyde, R.A.1
-
13
-
-
1242331232
-
-
Washington, DC: US Department of Justice, Bureau of Justice Statistics
-
Colton K.W., Tien J.M., Tvedt S., Dunn B., Barnett A.R. Electronic fund transfer systems and crime. 1982;US Department of Justice, Bureau of Justice Statistics, Washington, DC.
-
(1982)
Electronic Fund Transfer Systems and Crime
-
-
Colton, K.W.1
Tien, J.M.2
Tvedt, S.3
Dunn, B.4
Barnett, A.R.5
-
14
-
-
0000543643
-
Estimating trait, method, and error variance: Generalizing across 70 construct validation studies
-
Cote J., Buckley M.R. Estimating trait, method, and error variance. Generalizing across 70 construct validation studies Journal of Marketing Research. 24:1987;315-318.
-
(1987)
Journal of Marketing Research
, vol.24
, pp. 315-318
-
-
Cote, J.1
Buckley, M.R.2
-
15
-
-
1242263740
-
A CPA's guide to the top issues in technology
-
Cryton S.H., Tie R. A CPA's guide to the top issues in technology. Journal of Accountancy. 191(5):2001;71-77.
-
(2001)
Journal of Accountancy
, vol.191
, Issue.5
, pp. 71-77
-
-
Cryton, S.H.1
Tie, R.2
-
17
-
-
84986142544
-
Security survey: Is it safe?
-
Davis, B. (1997). Security survey: Is it safe?, Information Week.
-
(1997)
Information Week
-
-
Davis, B.1
-
18
-
-
1242263747
-
-
Pamphlet. Ernst & Young, 1400 Pillsbury Center, Minneapolis, MS 55402
-
Ernst, & Whinney (1990). Ernst & Whinney 1989 computer security survey report. Pamphlet. Ernst & Young, 1400 Pillsbury Center, Minneapolis, MS 55402.
-
(1990)
Ernst & Whinney 1989 Computer Security Survey Report
-
-
-
22
-
-
1242308738
-
Computer crime and abuse by is employees: Something to worry about?
-
Harrington S.J. Computer crime and abuse by is employees. Something to worry about? Journal of Systems Management. 46(2):1995;6-11.
-
(1995)
Journal of Systems Management
, vol.46
, Issue.2
, pp. 6-11
-
-
Harrington, S.J.1
-
23
-
-
0000917858
-
The effects of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
-
Harrington S.J. The effects of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly. 20(3):1996;257-278.
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.J.1
-
24
-
-
0011418384
-
Integrating data security into the systems development life cycle
-
Hayam A., Oz E. Integrating data security into the systems development life cycle. Journal of Systems Management. 44(8):1993;16-20.
-
(1993)
Journal of Systems Management
, vol.44
, Issue.8
, pp. 16-20
-
-
Hayam, A.1
Oz, E.2
-
25
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crimes?
-
Hoffer J.A., Straub D.W. Jr. The 9 to 5 underground. Are you policing computer crimes? Sloan Management Review. 30(4):1989;35-42.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-42
-
-
Hoffer, J.A.1
Straub, D.W.Jr.2
-
27
-
-
1242286365
-
Security policies: How much is enough?
-
Hulme, G. V. (2001). Security policies: How much is enough? Information Week.
-
(2001)
Information Week
-
-
Hulme, G.V.1
-
28
-
-
0001080103
-
Personal computing acceptance factors in small firms: A structural equation model
-
Igbaria M., Zinatelli N., Cragg P., Cavaye A. Personal computing acceptance factors in small firms. A structural equation model MIS Quarterly. 21(2):1997;279-305.
-
(1997)
MIS Quarterly
, vol.21
, Issue.2
, pp. 279-305
-
-
Igbaria, M.1
Zinatelli, N.2
Cragg, P.3
Cavaye, A.4
-
30
-
-
3242849223
-
Integrating Security into the Curriculum
-
December, 25-30
-
Irvine, C. E., Chin, S. -K., & Frincke, D. (1998). Integrating Security into the Curriculum. IEEE Computer, December, 25-30.
-
(1998)
IEEE Computer
-
-
Irvine, C.E.1
Chin, S.-K.2
Frincke, D.3
-
33
-
-
1242331235
-
Computer crime: How deep does it go
-
Leinfuss, E. (1986). Computer crime: How deep does it go. MIS Week, 41(7).
-
(1986)
MIS Week
, vol.41
, Issue.7
-
-
Leinfuss, E.1
-
34
-
-
84952126179
-
Cheating behavior, situational influence, and moral development
-
Leming J.S. Cheating behavior, situational influence, and moral development. Journal of Educational Research. 71:1978;214-217.
-
(1978)
Journal of Educational Research
, vol.71
, pp. 214-217
-
-
Leming, J.S.1
-
35
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch K.D., Carr H.H., Warkentin M.E. Threats to information systems. Today's reality, yesterday's understanding MIS Quarterly. 16(2):1992;173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
36
-
-
0018012506
-
Management policies and procedures needed for effective computer security
-
Fall
-
Madnick, S. (1978). Management policies and procedures needed for effective computer security. Sloan Management Review, Fall, 61-74.
-
(1978)
Sloan Management Review
, pp. 61-74
-
-
Madnick, S.1
-
38
-
-
1242331237
-
Guarding computer data
-
McFadden P.J. Guarding computer data. Journal of Accountancy. 184(1):1997;77-79.
-
(1997)
Journal of Accountancy
, vol.184
, Issue.1
, pp. 77-79
-
-
Mcfadden, P.J.1
-
39
-
-
24044502721
-
Information systems management issues for the 1990s
-
Niederman F., Brancheau J.C., Wetherbe J.C. Information systems management issues for the 1990s. MIS Quarterly. 15(4):1991;475-495.
-
(1991)
MIS Quarterly
, vol.15
, Issue.4
, pp. 475-495
-
-
Niederman, F.1
Brancheau, J.C.2
Wetherbe, J.C.3
-
43
-
-
0039502924
-
The ethical decision-making processes of information systems workers
-
Paradice D.B., Dejoie R.M. The ethical decision-making processes of information systems workers. Journal of Business Ethics. 10(1):1991;1-22.
-
(1991)
Journal of Business Ethics
, vol.10
, Issue.1
, pp. 1-22
-
-
Paradice, D.B.1
Dejoie, R.M.2
-
45
-
-
84970235764
-
Self-reports in organizational research: Problems and prospects
-
Podsakoff P.M., Organ D.W. Self-reports in organizational research. Problems and prospects Journal of Management. 12(4):1986;531-544.
-
(1986)
Journal of Management
, vol.12
, Issue.4
, pp. 531-544
-
-
Podsakoff, P.M.1
Organ, D.W.2
-
48
-
-
0006528240
-
Profiles of strategic information systems planning
-
Segars A.H., Grover V. Profiles of strategic information systems planning. Information Systems Research. 10(3):1999;199-232.
-
(1999)
Information Systems Research
, vol.10
, Issue.3
, pp. 199-232
-
-
Segars, A.H.1
Grover, V.2
-
50
-
-
0000280419
-
Effective is security: An empirical study
-
Straub D.W. Jr. Effective is security. An empirical study Information Systems Research. 1(3):1990;255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.Jr.1
-
51
-
-
0141463342
-
Deterring cheating by student programmers: A field experiment in computer security
-
Straub D.W. Jr., Carlson P.J., Jones E.H. Deterring cheating by student programmers. A field experiment in computer security Journal of Management Systems. 5(1):1993;33-48.
-
(1993)
Journal of Management Systems
, vol.5
, Issue.1
, pp. 33-48
-
-
Straub, D.W.Jr.1
Carlson, P.J.2
Jones, E.H.3
-
52
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations
-
Straub D.W. Jr., Nance W.D. Discovering and disciplining computer abuse in organizations. MIS Quarterly. 14(1):1990;45-60.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, D.W.Jr.1
Nance, W.D.2
-
53
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub D.W. Jr., Welke R.J. Coping with systems risk. Security planning models for management decision making MIS Quarterly. 22(4):1998;441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.Jr.1
Welke, R.J.2
-
54
-
-
1242331240
-
Deviancy by bits and bytes: Computer abusers and control measures
-
J.H.F.a.E.G. Dougall. Amsterdam: Science Publishers BV North Holland
-
Straub D.W. Jr., Widom C.S. Deviancy by bits and bytes. Computer abusers and control measures Dougall J.H.F.a.E.G. Computer security: A global challenge. 1984;91-102 Science Publishers BV North Holland, Amsterdam.
-
(1984)
Computer Security: A Global Challenge
, pp. 91-102
-
-
Straub, D.W.Jr.1
Widom, C.S.2
-
55
-
-
81755175730
-
-
Sword & Shield Security Consultants, WWW Document, accessed 09/15/2001
-
Sword & Shield. (2001). Top 10 list of proactive security measures. Sword & Shield Security Consultants, WWW Document, accessed 09/15/2001, http://www.sses.net/top10.html .
-
(2001)
Top 10 List of Proactive Security Measures
-
-
-
57
-
-
0033319075
-
Integration of computer security into software engineering and computer science programs
-
Vaughn R.B., Bogess J.E. III Integration of computer security into software engineering and computer science programs. The Journal of Systems and Software. 49(2,3):1999;149-153.
-
(1999)
The Journal of Systems and Software
, vol.49
, Issue.2-3
, pp. 149-153
-
-
Vaughn, R.B.1
Bogess III, J.E.2
-
62
-
-
1242331227
-
An examination of cross-national differences in computer-related ethical decision making
-
Whitman M.E., Townsend A.M., Hendrickson A.R., Fields D.A. An examination of cross-national differences in computer-related ethical decision making. ACMSIG Computers and Society. 28(4):1998;22-27.
-
(1998)
ACMSIG Computers and Society
, vol.28
, Issue.4
, pp. 22-27
-
-
Whitman, M.E.1
Townsend, A.M.2
Hendrickson, A.R.3
Fields, D.A.4
-
64
-
-
0022178828
-
Computer crime-risk management and computer security
-
Wong, K. (1985). Computer crime-risk management and computer security. Computers and Security, 4, 287-295.
-
(1985)
Computers and Security
, vol.4
, pp. 287-295
-
-
Wong, K.1
|