-
1
-
-
0025775038
-
A longitudinal test of social control theory and delinquency
-
Agnew R. A longitudinal test of social control theory and delinquency. Journal of Research in Crime and Delinquency. 28(2):1991;126-156.
-
(1991)
Journal of Research in Crime and Delinquency
, vol.28
, Issue.2
, pp. 126-156
-
-
Agnew, R.1
-
2
-
-
84984313122
-
Foundation for a general strain theory of crime and delinquency
-
Agnew R. Foundation for a general strain theory of crime and delinquency. Criminology. 30(1):1992;47-87.
-
(1992)
Criminology
, vol.30
, Issue.1
, pp. 47-87
-
-
Agnew, R.1
-
3
-
-
0027163518
-
Why do they do it?: An examination of the intervening mechanisms between social control variables and delinquency
-
Agnew R. Why do they do it?: an examination of the intervening mechanisms between social control variables and delinquency. Journal of Research in Crime and Delinquency. 30(3):1993;245-266.
-
(1993)
Journal of Research in Crime and Delinquency
, vol.30
, Issue.3
, pp. 245-266
-
-
Agnew, R.1
-
4
-
-
0028811312
-
Testing the leading crime theories: An alternative strategy focusing on motivational processes
-
Agnew R. Testing the leading crime theories: an alternative strategy focusing on motivational processes. Journal of Research in Crime and Delinquency. 32(4):1995;363-398.
-
(1995)
Journal of Research in Crime and Delinquency
, vol.32
, Issue.4
, pp. 363-398
-
-
Agnew, R.1
-
7
-
-
0003888032
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
I. Ajzen, M. Fishbein, Understanding Attitudes and Predicting Social Behavior, Prentice-Hall, Englewood Cliffs, NJ, 1980.
-
(1980)
Understanding Attitudes and Predicting Social Behavior
-
-
Ajzen, I.1
Fishbein, M.2
-
8
-
-
22844455759
-
Male and female delinquent's attachment and effects of attachments on severity of self-reported delinquency
-
Anderson B., Homes M.D., Ostresh E. Male and female delinquent's attachment and effects of attachments on severity of self-reported delinquency. Crime Justice and Behavior. 26(4):1999;435-452.
-
(1999)
Crime Justice and Behavior
, vol.26
, Issue.4
, pp. 435-452
-
-
Anderson, B.1
Homes, M.D.2
Ostresh, E.3
-
10
-
-
84948894637
-
An examination of the validity of two models of attitude
-
Bagozzi R.P. An examination of the validity of two models of attitude. Multivariate Behavioral Research. 16:1992;323-359.
-
(1992)
Multivariate Behavioral Research
, vol.16
, pp. 323-359
-
-
Bagozzi, R.P.1
-
12
-
-
2342616489
-
Comparative fit indexes in structural models
-
P.M. Bentler, Comparative fit indexes in structural models, Psychological Bulletin 58, 65-79.
-
Psychological Bulletin
, vol.58
, pp. 65-79
-
-
Bentler, P.M.1
-
13
-
-
0021605916
-
Control criticism of train theory: An assessment of theoretical and empirical adequacy
-
Bernard T.J. Control criticism of train theory: an assessment of theoretical and empirical adequacy. Journal of Research in Crime and Delinquency. 21:1984;353-372.
-
(1984)
Journal of Research in Crime and Delinquency
, vol.21
, pp. 353-372
-
-
Bernard, T.J.1
-
14
-
-
1642487476
-
How Secure are You?
-
August
-
S. Breidenbach, How Secure are You?, Information Week, August 2000, pp. 71-78.
-
(2000)
Information Week
, pp. 71-78
-
-
Breidenbach, S.1
-
16
-
-
0003132671
-
The growth of scientific knowledge: Theories of deviance as a case study
-
A. Lewis Caser (Ed.), Javanovich, Harcourt Brace, NY
-
S. Cole, The growth of scientific knowledge: theories of deviance as a case study, in A. Lewis Caser (Ed.), The Idea of Social Structure: Papers in Honor of Robert K. Merton, Javanovich, Harcourt Brace, NY, 1975.
-
(1975)
The Idea of Social Structure: Papers in Honor of Robert K. Merton
-
-
Cole, S.1
-
17
-
-
0041033341
-
Testing control theory and differential association: A reanalysis of the Richmond youth project data
-
Costello B.J., Vowell P.R. Testing control theory and differential association: a reanalysis of the Richmond youth project data. Criminology. 37(4):1999;815-840.
-
(1999)
Criminology
, vol.37
, Issue.4
, pp. 815-840
-
-
Costello, B.J.1
Vowell, P.R.2
-
18
-
-
0003746870
-
-
Doctoral dissertation, MIT Sloan School of Management, Cambridge, MA
-
F. D. Davis, A technology acceptance model for empirically testing new end-user information systems: theory and results, Doctoral dissertation, MIT Sloan School of Management, Cambridge, MA, 1986.
-
(1986)
A Technology Acceptance Model for Empirically Testing New End-user Information Systems: Theory and Results
-
-
Davis, F.D.1
-
19
-
-
55249087535
-
Perceived usefulness, perceived ease of use and user acceptance of information technology
-
Davis F.D. Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly. 13(3):1989;319-339.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-339
-
-
Davis, F.D.1
-
20
-
-
84936823933
-
User acceptance of computer technology: A comparison of two theoretical models
-
Davis F.D., Bagozzi R.P., Warshaw P.R. User acceptance of computer technology: a comparison of two theoretical models. Management Science. 35(8):1989;982-1003.
-
(1989)
Management Science
, vol.35
, Issue.8
, pp. 982-1003
-
-
Davis, F.D.1
Bagozzi, R.P.2
Warshaw, P.R.3
-
21
-
-
0002698747
-
Information system security management in the new millennium
-
Dhillon G., Backhouse J. Information system security management in the new millennium. Communications of the ACM. 43(7):2000;125-128.
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
22
-
-
84993016651
-
The second annual global information security survey
-
Dinnie G. The second annual global information security survey. Information Management & Computer Security. 7(3):1999;112-120.
-
(1999)
Information Management & Computer Security
, vol.7
, Issue.3
, pp. 112-120
-
-
Dinnie, G.1
-
23
-
-
0028847197
-
Informal sanction threats and corporate crime: Additive versus multiplicative models
-
Elis L., Simpson S.S. Informal sanction threats and corporate crime: additive versus multiplicative models. Journal of Research in Crime and Delinquency. 32(4):1995;399-424.
-
(1995)
Journal of Research in Crime and Delinquency
, vol.32
, Issue.4
, pp. 399-424
-
-
Elis, L.1
Simpson, S.S.2
-
24
-
-
0003663529
-
-
Sage, Beverly Hill, CA
-
D.S. Elliott, D. Huizinga, S. Ageton, Explaining Delinquency and Drug Use, Sage, Beverly Hill, CA, 1985.
-
(1985)
Explaining Delinquency and Drug Use
-
-
Elliott, D.S.1
Huizinga, D.2
Ageton, S.3
-
25
-
-
0034158883
-
Information security management: A hierarchical framework for various approaches
-
Eloff M.M., von Solms S.H. Information security management: a hierarchical framework for various approaches. Computer and Security. 19(3):2000;243-256.
-
(2000)
Computer and Security
, vol.19
, Issue.3
, pp. 243-256
-
-
Eloff, M.M.1
Von Solms, S.H.2
-
27
-
-
0003551671
-
-
Addison-Wesley, Reading, MA
-
M. Fishbein, I. Ajzen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Addison-Wesley, Reading, MA, 1975.
-
(1975)
Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
28
-
-
0040661360
-
Security-related behavior of PC users in organizations
-
Frank J., Shamir B., Briggs W. Security-related behavior of PC users in organizations. Information and Management. 21(3):1991;127-135.
-
(1991)
Information and Management
, vol.21
, Issue.3
, pp. 127-135
-
-
Frank, J.1
Shamir, B.2
Briggs, W.3
-
31
-
-
0003991890
-
-
University of California Press, Berkeley, CA
-
T. Hirschi, Causes of Delinquency, University of California Press, Berkeley, CA, 1969.
-
(1969)
Causes of Delinquency
-
-
Hirschi, T.1
-
32
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crimes?
-
Hoffer J.A., Straub D.W. The 9 to 5 underground: are you policing computer crimes? Sloan Management Review. 30(4):1989;35-44.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-44
-
-
Hoffer, J.A.1
Straub, D.W.2
-
33
-
-
2342572613
-
-
Academic Press, New York
-
K. Hsaio, D. Kerr, S. Madnick, Computer Security, Academic Press, New York, 1979.
-
(1979)
Computer Security
-
-
Hsaio, K.1
Kerr, D.2
Madnick, S.3
-
34
-
-
2342596122
-
Dis-integrated theory: A critical analysis of attempts to save strain theory
-
Atlanta, GA
-
G. F. Jensen, Dis-integrated theory: a critical analysis of attempts to save strain theory, in: Proceedings of the American Society of Criminology, Atlanta, GA, 1986.
-
(1986)
Proceedings of the American Society of Criminology
-
-
Jensen, G.F.1
-
35
-
-
2342465798
-
Computer infectors: Prevention, detection, and recovery
-
Joseph G.W., Blanton J.E. Computer infectors: Prevention, detection, and recovery. Information and Management. 23(4):1991;205-216.
-
(1991)
Information and Management
, vol.23
, Issue.4
, pp. 205-216
-
-
Joseph, G.W.1
Blanton, J.E.2
-
37
-
-
0004033506
-
-
Scientific Software, Chicago, IL
-
K.G. Jöreskog, D. Sörbom, New Features in PRELIS 2, Scientific Software, Chicago, IL, 1993.
-
(1993)
New Features in PRELIS
, vol.2
-
-
Jöreskog, K.G.1
Sörbom, D.2
-
38
-
-
0003707947
-
-
Scientific Software, Chicago, IL
-
K.G. Jöreskog, D. Sörbom, New Features in PRELIS 8, Scientific Software, Chicago, IL, 1993.
-
(1993)
New Features in PRELIS
, vol.8
-
-
Jöreskog, K.G.1
Sörbom, D.2
-
39
-
-
0003744563
-
-
Scientific Software, Chicago, IL
-
K.G. Jöreskog, D. Sörbom, LISREL 8: Structural Equation Modeling with the SIMPLIS Command Language, Scientific Software, Chicago, IL, 1993.
-
(1993)
LISREL 8: Structural Equation Modeling with the SIMPLIS Command Language
-
-
Jöreskog, K.G.1
Sörbom, D.2
-
40
-
-
84984053688
-
Social control and delinquency: An examination of the elements of the social bond
-
Krohn M.D., Massey J.L. Social control and delinquency: an examination of the elements of the social bond. Sociological Quarterly. 21:1980;529-543.
-
(1980)
Sociological Quarterly
, vol.21
, pp. 529-543
-
-
Krohn, M.D.1
Massey, J.L.2
-
42
-
-
0033148488
-
Value strategy rather than quality strategy: A case of business to business professional service
-
Lapierre J., Filiatrault P., Chebet J. Value strategy rather than quality strategy: a case of business to business professional service. Journal of Business Research. 45:1999;235-246.
-
(1999)
Journal of Business Research
, vol.45
, pp. 235-246
-
-
Lapierre, J.1
Filiatrault, P.2
Chebet, J.3
-
43
-
-
2342645818
-
An integrated model on computer abuse: A pilot study
-
Boston, MA
-
S. Lee, F. Nah, S. Yoo, An integrated model on computer abuse: a pilot study, in: Proceedings of the 7th Americas Conference on Information Systems, Boston, MA, 2001, pp. 2195-2197.
-
(2001)
Proceedings of the 7th Americas Conference on Information Systems
, pp. 2195-2197
-
-
Lee, S.1
Nah, F.2
Yoo, S.3
-
44
-
-
2342576559
-
The integrated computer security model based on the general trust theory
-
Lee S., Yoo S. The integrated computer security model based on the general trust theory. Journal of Management Information System Review. 12(1):2002;123-138.
-
(2002)
Journal of Management Information System Review
, vol.12
, Issue.1
, pp. 123-138
-
-
Lee, S.1
Yoo, S.2
-
46
-
-
73549114871
-
Predicting User Intentions: Comparing the technology acceptance model with the theory of planned behavior
-
Mathieson K. Predicting User Intentions: Comparing the technology acceptance model with the theory of planned behavior. Information System Research. 2(3):1991;173-191.
-
(1991)
Information System Research
, vol.2
, Issue.3
, pp. 173-191
-
-
Mathieson, K.1
-
47
-
-
84913949833
-
Testing control theory and differential association: A casual modeling approach
-
Matsueda R.L. Testing control theory and differential association: a casual modeling approach. American Sociological Review. 47:1982;489-504.
-
(1982)
American Sociological Review
, vol.47
, pp. 489-504
-
-
Matsueda, R.L.1
-
48
-
-
0005766298
-
Computer crime
-
November
-
T. McCollum, Computer crime, Nation's Business, November 1997, pp. 18-26.
-
(1997)
Nation's Business
, pp. 18-26
-
-
McCollum, T.1
-
49
-
-
43949152336
-
A review of current practices for evaluating causal models in organizational behavior and human resources management research
-
Medsker G.J., Williams L.J., Holahan P.J. A review of current practices for evaluating causal models in organizational behavior and human resources management research. Journal of Management. 20:1994;439-464.
-
(1994)
Journal of Management
, vol.20
, pp. 439-464
-
-
Medsker, G.J.1
Williams, L.J.2
Holahan, P.J.3
-
50
-
-
85101726600
-
An investigation into the use and usefulness of security software in detecting computer abuse
-
Minneapolis, MN
-
W.D. Nance, D.W. Straub, An investigation into the use and usefulness of security software in detecting computer abuse, in: Proceedings of the 9th International Conference on Information Systems (ICIS), Minneapolis, MN, 1988, pp. 283-294.
-
(1988)
Proceedings of the 9th International Conference on Information Systems (ICIS)
, pp. 283-294
-
-
Nance, W.D.1
Straub, D.W.2
-
53
-
-
0000802230
-
The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues
-
Paternoster R. The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues. Justice Quarterly. 4:1987;173-217.
-
(1987)
Justice Quarterly
, vol.4
, pp. 173-217
-
-
Paternoster, R.1
-
57
-
-
0040304844
-
Organizational offending and neoclassical criminology: Challenging the reach of a general theory of crime
-
Reed G.E., Yeager P.C. Organizational offending and neoclassical criminology: challenging the reach of a general theory of crime. Criminology. 34:1996;357-382.
-
(1996)
Criminology
, vol.34
, pp. 357-382
-
-
Reed, G.E.1
Yeager, P.C.2
-
58
-
-
0003938079
-
-
Cambridge University Press, New York
-
R. Rosenthal, R.L. Rosnow, D.B. Rubin, Contrasts and Effect Sizes in Behavioral Research: A Correlational Approach, Cambridge University Press, New York, 2000.
-
(2000)
Contrasts and Effect Sizes in Behavioral Research: A Correlational Approach
-
-
Rosenthal, R.1
Rosnow, R.L.2
Rubin, D.B.3
-
59
-
-
0004214403
-
-
Harvard University Press, Cambridge, MA
-
R.J. Sampson, J.H. Laub, Crime in the Making: Pathways and Turning Points through Life, Harvard University Press, Cambridge, MA, 1992.
-
(1992)
Crime in the Making: Pathways and Turning Points through Life
-
-
Sampson, R.J.1
Laub, J.H.2
-
60
-
-
2342452212
-
-
Butterworth Heinemann, Newton, MA
-
J.L. Schaub, K.D. Biery, The Ultimate Computer Security Survey, Butterworth Heinemann, Newton, MA, 1995.
-
(1995)
The Ultimate Computer Security Survey
-
-
Schaub, J.L.1
Biery, K.D.2
-
62
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen M. A conceptual foundation for organizational information security awareness. Information Management & Computer Security. 8(1):2000;31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
64
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub D.W. Effective IS security: an empirical study. Information Systems Research. 1(3):1990;255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
65
-
-
0001823869
-
Security concerns of system users: A study of perceptions of the adequacy of security
-
Straub D.W., Goodhue D.L. Security concerns of system users: a study of perceptions of the adequacy of security. Information and Management. 20(1):1991;13-27.
-
(1991)
Information and Management
, vol.20
, Issue.1
, pp. 13-27
-
-
Straub, D.W.1
Goodhue, D.L.2
-
66
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
Straub D.W., Nance W.D. Discovering and disciplining computer abuse in organizations: a field study. MIS Quarterly. 14(1):1990;45-62.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-62
-
-
Straub, D.W.1
Nance, W.D.2
-
67
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision-making
-
Straub D.W., Welke R. Coping with systems risk: security planning models for management decision-making. MIS Quarterly. 22(4):1998;441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.2
-
70
-
-
0001897127
-
Information Security Management: Why standards are important
-
von Solms R. Information Security Management: why standards are important. Information Management & Computer Security. 7(1):1999;50-57.
-
(1999)
Information Management & Computer Security
, vol.7
, Issue.1
, pp. 50-57
-
-
Von Solms, R.1
-
72
-
-
2342485336
-
-
http://www.emarketer.com/ereports/eprivacy_security/welcome.html, 2001.
-
(2001)
-
-
|