-
1
-
-
0028811312
-
Testing the leading crime theories: An alternative strategy focusing on motivational process
-
R. Agnew Testing the leading crime theories: an alternative strategy focusing on motivational process Journal of Research in Crime and Delinquency 32 4 1995 363 398
-
(1995)
Journal of Research in Crime and Delinquency
, vol.32
, Issue.4
, pp. 363-398
-
-
Agnew, R.1
-
3
-
-
0035999319
-
Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behaviour
-
I. Ajzen Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behaviour Journal of Applied Social Psychology 32 2002 665 683
-
(2002)
Journal of Applied Social Psychology
, vol.32
, pp. 665-683
-
-
Ajzen, I.1
-
7
-
-
0001323143
-
Situational crime prevention: Theory and practice
-
R.V. Clarke Situational crime prevention: theory and practice British Journal of Criminology 20 1980 136 137
-
(1980)
British Journal of Criminology
, vol.20
, pp. 136-137
-
-
Clarke, R.V.1
-
8
-
-
24644501524
-
-
U.S. Department of Defense
-
Department of Defense, Insider Threat Integrated Process Team (DoD-ITIPT) DoD insider threat mitigation 2000 U.S. Department of Defense Available online at http://www.defenselink.mil/c3i/org/sio/iptreport4_26dbl.doc [accessed 01-Apr-05]
-
(2000)
DoD Insider Threat Mitigation
-
-
-
9
-
-
24644494525
-
-
Department of Trade and Industry Information security breaches 2004 Available online at http://www.dti.gov.uk/industry_files/pdf/isbs_2004v3.pdf 2004 [accessed 01-Apr-05]
-
(2004)
Information Security Breaches 2004
-
-
-
10
-
-
0035658603
-
Computer crimes: Theorizing about the enemy within
-
G. Dhillon, and S. Moores Computer crimes: theorizing about the enemy within Computers and Security 20 8 2001 715 723
-
(2001)
Computers and Security
, vol.20
, Issue.8
, pp. 715-723
-
-
Dhillon, G.1
Moores, S.2
-
11
-
-
0004326526
-
-
4th ed. Polity Press Cambridge, UK
-
A. Giddens Sociology 4th ed. 2001 Polity Press Cambridge, UK
-
(2001)
Sociology
-
-
Giddens, A.1
-
12
-
-
0037228072
-
The law, cybercrime, risk assessment and cyber protection
-
S. Hinde The law, cybercrime, risk assessment and cyber protection Computers and Security 22 2 2003 90 95
-
(2003)
Computers and Security
, vol.22
, Issue.2
, pp. 90-95
-
-
Hinde, S.1
-
13
-
-
0003991890
-
-
University of California Press Berkeley, CA
-
T. Hirschi Causes of delinquency 1969 University of California Press Berkeley, CA
-
(1969)
Causes of Delinquency
-
-
Hirschi, T.1
-
14
-
-
84928445565
-
Acts against the workplace: Social bonding and employee deviance
-
R.C. Hollinger Acts against the workplace: social bonding and employee deviance Deviant Behaviour 7 1986 53 75
-
(1986)
Deviant Behaviour
, vol.7
, pp. 53-75
-
-
Hollinger, R.C.1
-
15
-
-
0343001536
-
Crime by computer: Correlates of software piracy and unauthorized account access
-
R.C. Hollinger Crime by computer: correlates of software piracy and unauthorized account access Security Journal 4 1 1993 2 12
-
(1993)
Security Journal
, vol.4
, Issue.1
, pp. 2-12
-
-
Hollinger, R.C.1
-
16
-
-
0036330173
-
Information security policy - What do international information security standards say?
-
K. Höne, and J.H. Eloff Information security policy - what do international information security standards say? Computers and Security 21 5 2002 402 409
-
(2002)
Computers and Security
, vol.21
, Issue.5
, pp. 402-409
-
-
Höne, K.1
Eloff, J.H.2
-
18
-
-
0345764837
-
Improving user security behaviour
-
J. Leach Improving user security behaviour Computers and Security 22 8 2003 685 692
-
(2003)
Computers and Security
, vol.22
, Issue.8
, pp. 685-692
-
-
Leach, J.1
-
19
-
-
0036064934
-
A holistic model of computer abuse within organisations
-
J. Lee, and Y. Lee A holistic model of computer abuse within organisations Information Management and Computer Security 10 2 2002 57 63
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.2
, pp. 57-63
-
-
Lee, J.1
Lee, Y.2
-
20
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
S.M. Lee, S. Lee, and Y. Sangjin An integrative model of computer abuse based on social control and general deterrence theories Information and Management 41 6 2003 707 718
-
(2003)
Information and Management
, vol.41
, Issue.6
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.2
Sangjin, Y.3
-
21
-
-
24344460927
-
A preliminary model of end user sophistication for insider threat prediction in IT systems
-
in press. doi:10.1016/j.cose.2004.10.003
-
Magklaras GB, Furnell SM. A preliminary model of end user sophistication for insider threat prediction in IT systems, Computers and Security, in press. doi:10.1016/j.cose.2004.10.003.
-
Computers and Security
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
26
-
-
0037390453
-
Insider fraud: Spotting the wolf in sheep's clothing
-
D. Porter Insider fraud: spotting the wolf in sheep's clothing Computer Fraud and Security 2003 4 2003 12 15
-
(2003)
Computer Fraud and Security
, vol.2003
, Issue.4
, pp. 12-15
-
-
Porter, D.1
-
27
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
E.E. Schultz A framework for understanding and predicting insider attacks Computers and Security 21 6 2002 526 531
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
28
-
-
0030668250
-
A social learning theory analysis of computer abuse among college students
-
W.F. Skinner, and A.M. Fream A social learning theory analysis of computer abuse among college students Journal of Research in Crime and Delinquency 34 4 1997 495 518
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, Issue.4
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
29
-
-
17844366573
-
Analysis of end user security behaviours
-
J.M. Stanton, K.R. Stam, P. Mastrangelo, and J. Jolton Analysis of end user security behaviours Computers and Security 24 2 2005 124 133
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
30
-
-
0000280419
-
Effective IS security: An empirical study
-
D.W. Straub Effective IS security: an empirical study Information System Research 1 3 1990 255 276
-
(1990)
Information System Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
31
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
D.W. Straub, and R.J. Welke Coping with systems risk: security planning models for management decision making MIS Quarterly 22 4 1998 441 465
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-465
-
-
Straub, D.W.1
Welke, R.J.2
-
32
-
-
0003805614
-
-
J.B. Lippincott Philadelphia
-
E. Sutherland Criminology 1924 J.B. Lippincott Philadelphia
-
(1924)
Criminology
-
-
Sutherland, E.1
-
33
-
-
0008390093
-
A preliminary structural approach to insider computer misuse incidents
-
Brussels, Belgium; March
-
Tuglular T. A preliminary structural approach to insider computer misuse incidents. In: Proceedings of EICAR 2000 international conference, Brussels, Belgium; March 2000.
-
(2000)
Proceedings of EICAR 2000 International Conference
-
-
Tuglular, T.1
-
34
-
-
0030554013
-
Misbehavior in organisations: A motivational framework
-
Y. Vardi, and Y. Wiener Misbehavior in organisations: a motivational framework Organization Science 7 2 1996 151 165
-
(1996)
Organization Science
, vol.7
, Issue.2
, pp. 151-165
-
-
Vardi, Y.1
Wiener, Y.2
-
36
-
-
12344260478
-
Understanding the offender/environment dynamic for computer crimes: Assessing the feasibility of applying criminological theory to the IS security context
-
Willison R. Understanding the offender/environment dynamic for computer crimes: assessing the feasibility of applying criminological theory to the IS security context. In: Proceedings of the 37th Hawaii international conference on system sciences; 2004.
-
(2004)
Proceedings of the 37th Hawaii International Conference on System Sciences
-
-
Willison, R.1
-
37
-
-
24644478392
-
An insider threat model for adversary simulation
-
R. Anderson T. Bozek T. Longstaff W. Meitzler M. Skroch K. van Wyk RAND Publ. Santa Monica, CA
-
B.J. Wood An insider threat model for adversary simulation R. Anderson T. Bozek T. Longstaff W. Meitzler M. Skroch K. van Wyk Research on mitigating the insider threat to information systems - #2 2000 RAND Publ. Santa Monica, CA
-
(2000)
Research on Mitigating the Insider Threat to Information Systems - #2
-
-
Wood, B.J.1
|