-
2
-
-
18844450234
-
The deterrent effect of criminal sanctions: reviewing the evidence
-
Sage Publications Beverly Hills, CA
-
Anderson, L.S. (1979), “The deterrent effect of criminal sanctions: reviewing the evidence”, in Ed. Brentingham, P.J. and Ed. Kress, J.M. (Eds), Structure, Law, and Power, Sage Publications, Beverly Hills, CA.
-
(1979)
Structure, Law, and Power
-
-
Anderson, L.S.1
-
3
-
-
0347892655
-
Hack attack: cyberthieves siphon millions from US firms
-
Anthes, G.H. (1996), “Hack attack: cyberthieves siphon millions from US firms”, Computerworld, Vol. 30 No. 16, p. 81.
-
(1996)
Computerworld
, vol.30
, Issue.16
, pp. 81
-
-
Anthes, G.H.1
-
4
-
-
0001156375
-
Managing computer crime: a research outlook
-
Backhouse, J. and Dhillon, G. (1995), “Managing computer crime: a research outlook”, Computers & Security, Vol. 14 No. 7, pp. 645-651.
-
(1995)
Computers & Security
, vol.14
, Issue.7
, pp. 645-651
-
-
Backhouse, J.1
Dhillon, G.2
-
5
-
-
0027804413
-
Information systems security design methods: implications for information systems development
-
Baskerville, R. (1993), “Information systems security design methods: implications for information systems development”, ACM Computing Surveys, Vol. 25 No. 4, pp. 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
6
-
-
0003435516
-
-
National Academy of Sciences Washington, DC
-
Blumstein, A., Cohen, J. and Nagin, D. (Eds.) (1978), Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates, National Academy of Sciences, Washington, DC.
-
(1978)
Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates
-
-
Blumstein, A.1
Cohen, J.2
Nagin, D.3
-
7
-
-
84983854374
-
Punishment and crime: an examination of some empirical evidence
-
Chiricos, T.G. and Waldo, G.P. (1970), “Punishment and crime: an examination of some empirical evidence”, Social Problems, Vol. 18 No. 2, pp. 200-217.
-
(1970)
Social Problems
, vol.18
, Issue.2
, pp. 200-217
-
-
Chiricos, T.G.1
Waldo, G.P.2
-
8
-
-
0032620196
-
Cyberspace security management
-
Chou, D.C., Yen, D.C., Lin, B. and Cheng, P.H. (1999), “Cyberspace security management”, Industrial Management & Data Systems, Vol. 99 No. 8, pp. 353-361.
-
(1999)
Industrial Management & Data Systems
, vol.99
, Issue.8
, pp. 353-361
-
-
Chou, D.C.1
Yen, D.C.2
Lin, B.3
Cheng, P.H.4
-
9
-
-
2342445688
-
Factors affecting the success of business-to-business international internet marketing (B-to-B IIM): an empirical study of UK companies
-
Eid, R. and Trueman, M. (2004), “Factors affecting the success of business-to-business international internet marketing (B-to-B IIM): an empirical study of UK companies”, Industrial Management & Data Systems, Vol. 104 No. 1, pp. 16-30.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.1
, pp. 16-30
-
-
Eid, R.1
Trueman, M.2
-
10
-
-
84992947461
-
Information systems misuse and computer crime: an analysis of demographic factors and the awareness of university computer usage policies
-
Foltz, C.B., Cronan, T.P. and Jones, T.W. (2004), “Information systems misuse and computer crime: an analysis of demographic factors and the awareness of university computer usage policies”, working paper, University of Arkansas, Fort Smith, AR.
-
(2004)
working paper, University of Arkansas, Fort Smith, AR.
-
-
Foltz, C.B.1
Cronan, T.P.2
Jones, T.W.3
-
12
-
-
0000917858
-
The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
-
Harrington, S.J. (1996), “The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions”, MIS Quarterly, Vol. 20 No. 3, pp. 257-278.
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.J.1
-
13
-
-
0032620195
-
Identifying and controlling computer crime and employee fraud
-
Haugen, S. and Selin, J.R. (1999), “Identifying and controlling computer crime and employee fraud”, Industrial Management & Data Systems, Vol. 99 No. 8, pp. 340-344.
-
(1999)
Industrial Management & Data Systems
, vol.99
, Issue.8
, pp. 340-344
-
-
Haugen, S.1
Selin, J.R.2
-
14
-
-
18844426291
-
Deviance, deterrence, and knowledge of sanctions
-
Columbia University Press New York, NY
-
Henshel, R.L. and Carey, S.H. (1975), “Deviance, deterrence, and knowledge of sanctions”, in Ed. Henshel, R.L. and Ed. Silverman, R.A. (Eds), Perception in Criminology, Columbia University Press, New York, NY, pp. 54-73.
-
(1975)
Perception in Criminology
, pp. 54-73
-
-
Henshel, R.L.1
Carey, S.H.2
-
15
-
-
84928507306
-
Computer hackers follow a Guttman-like progression
-
Hollinger, R.C. (1988), “Computer hackers follow a Guttman-like progression”, Sociology and Social Research, Vol. 72 No. 3, pp. 199-200.
-
(1988)
Sociology and Social Research
, vol.72
, Issue.3
, pp. 199-200
-
-
Hollinger, R.C.1
-
16
-
-
0343001536
-
Crime by computer: correlates of software piracy and unauthorized account access
-
Hollinger, R.C. (1992), “Crime by computer: correlates of software piracy and unauthorized account access”, Security Journal, Vol. 2 No. 1, pp. 2-12.
-
(1992)
Security Journal
, vol.2
, Issue.1
, pp. 2-12
-
-
Hollinger, R.C.1
-
17
-
-
2342418367
-
Impact of computer disasters on information management: a study
-
Kundu, S.C. (2004), “Impact of computer disasters on information management: a study”, Industrial Management & Data Systems, Vol. 104 No. 2, pp. 136-143.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.2
, pp. 136-143
-
-
Kundu, S.C.1
-
18
-
-
3943056788
-
Who's spying now?
-
Lang, C. (1995), “Who's spying now?”, Netguide, Vol. 2 No. 7, pp. 44-50.
-
(1995)
Netguide
, vol.2
, Issue.7
, pp. 44-50
-
-
Lang, C.1
-
19
-
-
0009056377
-
General deterrence: a review of the empirical evidence
-
National Academy of Sciences Washington, DC
-
Nagin, D. (1978), “General deterrence: a review of the empirical evidence”, Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates, National Academy of Sciences, Washington, DC, pp. 93-139.
-
(1978)
Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates
, pp. 93-139
-
-
Nagin, D.1
-
21
-
-
0030521693
-
Sanction threats and appeals to morality: testing a rational choice model of corporate crime
-
Paternoster, R. and Simpson, S. (1996), “Sanction threats and appeals to morality: testing a rational choice model of corporate crime”, Law and Society Review, Vol. 30 No. 3, pp. 549-583.
-
(1996)
Law and Society Review
, vol.30
, Issue.3
, pp. 549-583
-
-
Paternoster, R.1
Simpson, S.2
-
22
-
-
18844379696
-
The sad and increasingly deplorable state of internet security
-
Piscitello, D. and Kent, S. (2003), “The sad and increasingly deplorable state of internet security”, Business Communications Review, Vol. 33 No. 2, pp. 49-53.
-
(2003)
Business Communications Review
, vol.33
, Issue.2
, pp. 49-53
-
-
Piscitello, D.1
Kent, S.2
-
23
-
-
0042484572
-
2002 CSI/FBI computer crime and security survey
-
Power, R. (2002), “2002 CSI/FBI computer crime and security survey”, Computer Security Issues & Trends, Vol. 8 No. 1, pp. 1-22.
-
(2002)
Computer Security Issues & Trends
, vol.8
, Issue.1
, pp. 1-22
-
-
Power, R.1
-
24
-
-
1642568988
-
Computer fraud – what can be done about it?
-
Romney, M. (1995), “Computer fraud – what can be done about it?”, The CPA Journal, Vol. 65 No. 5, pp. 30-33.
-
(1995)
The CPA Journal
, vol.65
, Issue.5
, pp. 30-33
-
-
Romney, M.1
-
25
-
-
0035780792
-
Perceived security and world wide web purchase intention
-
Salisbury, W.D., Pearson, R.A., Pearson, A.W. and Miller, D.W. (2001), “Perceived security and world wide web purchase intention”, Industrial Management & Data Systems, Vol. 101 No. 4, pp. 165-176.
-
(2001)
Industrial Management & Data Systems
, vol.101
, Issue.4
, pp. 165-176
-
-
Salisbury, W.D.1
Pearson, R.A.2
Pearson, A.W.3
Miller, D.W.4
-
26
-
-
1642568985
-
Hackers are ubiquitous, malicious, and taken far too lightly, experts say
-
Schwartz, K.D. (1997), “Hackers are ubiquitous, malicious, and taken far too lightly, experts say”, Government Computer News, Vol. 16 No. 23, pp. 81-82.
-
(1997)
Government Computer News
, vol.16
, Issue.23
, pp. 81-82
-
-
Schwartz, K.D.1
-
27
-
-
0030668250
-
A social learning theory analysis of computer crime among college students
-
Skinner, W.F. and Fream, A.M. (1997), “A social learning theory analysis of computer crime among college students”, The Journal of Research in Crime and Delinquency, Vol. 34 No. 4, pp. 495-518.
-
(1997)
The Journal of Research in Crime and Delinquency
, vol.34
, Issue.4
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
28
-
-
0036955834
-
The role of trust, quality, value and risk in conducting e-business
-
So, M.W.C. and Sculli, D. (2002), “The role of trust, quality, value and risk in conducting e-business”, Industrial Management & Data Systems, Vol. 102 No. 9, pp. 503-512.
-
(2002)
Industrial Management & Data Systems
, vol.102
, Issue.9
, pp. 503-512
-
-
So, M.W.C.1
Sculli, D.2
-
29
-
-
0023293621
-
Computer-related embezzlement
-
Solarz, A. (1987), “Computer-related embezzlement”, Computers & Security, Vol. 6 No. 1, pp. 49-53.
-
(1987)
Computers & Security
, vol.6
, Issue.1
, pp. 49-53
-
-
Solarz, A.1
-
30
-
-
0004279306
-
-
Course Technologies Cambridge, MA
-
Stair, R.M. and Reynolds, G.W. (1998), Principles of Information Systems: A Managerial Approach, 3rd ed., Course Technologies, Cambridge, MA.
-
(1998)
Principles of Information Systems: A Managerial Approach
-
-
Stair, R.M.1
Reynolds, G.W.2
-
31
-
-
84992934364
-
State of California
-
Perception in Criminology, Columbia University Press New York, NY
-
State of California (1975), “Public knowledge of criminal penalties”, in Ed. Henshel, R.L. and Ed. Silverman, R.A. (Eds), Perception in Criminology, Columbia University Press, New York, NY, pp. 74-90.
-
(1975)
Public knowledge of criminal penalties
, pp. 74-90
-
-
-
32
-
-
1542626402
-
Deterring computer abuse: the effectiveness of deterrent countermeasures in the computer security environment
-
Straub, D.W. (1986), “Deterring computer abuse: the effectiveness of deterrent countermeasures in the computer security environment”, dissertation, Indiana University Graduate School of Business, South Bend, IN.
-
(1986)
dissertation, Indiana University Graduate School of Business, South Bend, IN.
-
-
Straub, D.W.1
-
33
-
-
85139144524
-
Controlling computer abuse: an empirical study of effective security countermeasures
-
Straub, D.W. (1987), “Controlling computer abuse: an empirical study of effective security countermeasures”, Proceedings of the International Conference on Information Systems, Pittsburgh, PA, December, pp. 277-289.
-
(1987)
Proceedings of the International Conference on Information Systems
-
-
Straub, D.W.1
-
34
-
-
0000280419
-
Effective IS security: an empirical study
-
Straub, D.W. (1990), “Effective IS security: an empirical study”, Information Systems Research, Vol. 1 No. 3, pp. 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
35
-
-
84993066149
-
Computer abuse and computer security administration: a study of contemporary information security methods
-
Straub, D.W. and Hoffer, J.A. (1988), “Computer abuse and computer security administration: a study of contemporary information security methods”, IRMIS working paper No. W801, Institute for Research on the Management of Information Systems, Indiana University, Bloomington, IN.
-
(1988)
IRMIS working paper No. W801, Institute for Research on the Management of Information Systems, Indiana University, Bloomington, IN.
-
-
Straub, D.W.1
Hoffer, J.A.2
-
36
-
-
84935665607
-
Perceptual research on general deterrence: a critical review
-
Williams, K.R. and Hawkins, R. (1986), “Perceptual research on general deterrence: a critical review”, Law and Society Review, Vol. 20 No. 4, pp. 545-572.
-
(1986)
Law and Society Review
, vol.20
, Issue.4
, pp. 545-572
-
-
Williams, K.R.1
Hawkins, R.2
-
37
-
-
0022178828
-
Computer crime: risk management and computer security
-
Wong, K. (1985), “Computer crime: risk management and computer security”, Computers & Security, Vol. 4 No. 4, pp. 287-295.
-
(1985)
Computers & Security
, vol.4
, Issue.4
, pp. 287-295
-
-
Wong, K.1
|