-
1
-
-
85034486487
-
Inside jobs: Is there a hacker in the next cubicle?
-
August 13
-
Littman, J. (1998, August 13). Inside jobs: Is there a hacker in the next cubicle? PCWorld Online, http://cnn.com/TECH/computing/9808/13/hacker. idg/index/html
-
(1998)
PCWorld Online
-
-
Littman, J.1
-
3
-
-
84897972882
-
-
Lethbridge, Canada: Centre for Technology Studies, University of Lethbridge. Online document
-
Gattiker, U.E., and Kelley, H. (1998). Techno-crime and terror against tomorrow's organization: What about cyberpunks? Lethbridge, Canada: Centre for Technology Studies, University of Lethbridge. Online document, http://www.ncsa.com/knowledge/research/tecnoc.htm
-
(1998)
Techno-crime and Terror Against Tomorrow's Organization: What about Cyberpunks?
-
-
Gattiker, U.E.1
Kelley, H.2
-
4
-
-
85034462563
-
Online maliciousness results in online protections
-
September 23
-
Lorek, L.A. (1997, September 23). Online maliciousness results in online protections. Sun-Sentinel, 5.
-
(1997)
Sun-Sentinel
, pp. 5
-
-
Lorek, L.A.1
-
5
-
-
85034470441
-
-
Deloitte Press Release. December 16. Online document
-
Deloitte Press Release. (1997, December 16). Two in five Australian companies suffer computer crime. Online document, http:/www.deloitte.com.au/library/456.asp
-
(1997)
Two in Five Australian Companies Suffer Computer Crime
-
-
-
6
-
-
85034463437
-
-
Insiders. Online document
-
BA&H Analysis of Open Source Literature. Insiders. Online document, http://www.ncs.gov/n5_hp/ n5_ia_hp/html/eitr/thrat2_2.htm
-
BA&H Analysis of Open Source Literature
-
-
-
7
-
-
1842809409
-
Physical security: The danger within
-
Radcliff, D. (1998). Physical security: The danger within. InfoWorld, 20, 95.
-
(1998)
InfoWorld
, vol.20
, pp. 95
-
-
Radcliff, D.1
-
8
-
-
85034471886
-
Greatest threat to computer networks comes from within
-
March 15. (of Minneapolis-St. Paul)
-
Lewis, P.H. (1998, March 15). Greatest threat to computer networks comes from within. Star-Tribune (of Minneapolis-St. Paul), pp. 12-14.
-
(1998)
Star-Tribune
, pp. 12-14
-
-
Lewis, P.H.1
-
10
-
-
85034467244
-
Battling the cyber-terrorist: Internal breaches pose the greatest threat
-
November 10, Online document
-
Cohen, A. (1997, November 10, Vol. 1). Battling the cyber-terrorist: Internal breaches pose the greatest threat. New York Law Journal. Online document, http://www.nylj.com/tech/111097t1.html
-
(1997)
New York Law Journal
, vol.1
-
-
Cohen, A.1
-
11
-
-
85034487842
-
Security is encryption prescription
-
October 18
-
Security is encryption prescription. (1996, October 18). Computer World, 1, 36(3) 1-10.
-
(1996)
Computer World
, vol.1-36
, Issue.3
, pp. 1-10
-
-
-
12
-
-
3042922187
-
1997 CSI/FBI computer crime and security survey
-
Computer Security Institute and Federal Bureau of Investigation. (1997). 1997 CSI/FBI computer crime and security survey. Computer Security Issues and Trends, 3, 1-10.
-
(1997)
Computer Security Issues and Trends
, vol.3
, pp. 1-10
-
-
-
13
-
-
3042909052
-
-
Washington, D.C.
-
American Society for Industrial Security (ASIS). (1997-1998). Intellectual property special report. Washington, D.C.
-
(1997)
Intellectual Property Special Report
-
-
-
15
-
-
85034469560
-
FBI survey reveals growth of cybercrime
-
May 6. online document
-
O'Connor, R.J. (1998, May 6). FBI survey reveals growth of cybercrime. San Jose Mercury News, online document, http://www.datasync.com/∼sotmesc/ news/trend
-
(1998)
San Jose Mercury News
-
-
O'Connor, R.J.1
-
16
-
-
0004915776
-
1998 CSI/FBI computer crime and security survey
-
Computer Security Institute and Federal Bureau of Investigation. (1998). 1998 CSI/FBI computer crime and security survey. Computer Security Issues and Trends, 4, 1-12.
-
(1998)
Computer Security Issues and Trends
, vol.4
, pp. 1-12
-
-
-
17
-
-
85034485455
-
Hackers cost businesses worldwide
-
June 6
-
C/Net News. (1996, June 6). Hackers cost businesses worldwide. On-line: www.isecure.com/newslet.htm
-
(1996)
C/Net News
-
-
-
19
-
-
85034468633
-
-
April 15. Online document
-
Network security. (1998, April 15). Online document, www.its.state.ms.us/et/SECURITY/seopaper.htm
-
(1998)
Network Security
-
-
-
22
-
-
0030290396
-
Hacked! Are your company files safe?
-
Rothfeder, J. (1996). Hacked! Are your company files safe? PC World, 14, 170.
-
(1996)
PC World
, vol.14
, pp. 170
-
-
Rothfeder, J.1
-
23
-
-
3042877318
-
Attacks up 22% since 1996
-
Zuckerman, M.J. (1997). Attacks up 22% since 1996. USA Today, 16, no 20.
-
(1997)
USA Today
, vol.16
, Issue.20
-
-
Zuckerman, M.J.1
-
27
-
-
85034467910
-
Hacker accused of using US West
-
September 15. Online document
-
CNN Interactive. (1998, September 15). Hacker accused of using US West. Online document, http:// am.com/tech/computing/9809/15/uswest.hacker.ap/ index.html
-
(1998)
CNN Interactive
-
-
-
29
-
-
85034484094
-
U.S. Coast Guard beefs up security after hack
-
July 22. Online document, IDG.Net Site
-
DiDio, L. (1998, July 22). U.S. Coast Guard beefs up security after hack. Computerworld. Online document, IDG.Net Site, http://cnn.com/TECH/computing/9807/22/coastguard.idg
-
(1998)
Computerworld
-
-
DiDio, L.1
-
30
-
-
85034482976
-
Do you know you've been hacked?
-
July 7. Online document, IDG. Net Site
-
DiDio, L. (1998, July 7). Do you know you've been hacked? Computerworld. Online document, IDG. Net Site, http://cnn.com/TECH/computing/9807/07/ hacked.idg
-
(1998)
Computerworld
-
-
DiDio, L.1
-
38
-
-
85034464277
-
Pre-employment disability - Related questions and medical examinations under the ADA
-
October 10. Washington, DC: U.S. government printing office
-
United States Equal Employment Opportunity Commission. (1995, October 10). Pre-employment disability - Related questions and medical examinations under the ADA. In U.S. Equal Opportunity Commission News. Washington, DC: U.S. government printing office.
-
(1995)
U.S. Equal Opportunity Commission News
-
-
-
39
-
-
85034459732
-
Groat case thrusts CIA's employee woes into spotlight
-
May 3. Capital Region Section
-
Groat case thrusts CIA's employee woes into spotlight. (1998, May 3). Times Union, Capital Region Section, p. 12.
-
(1998)
Times Union
, pp. 12
-
-
-
40
-
-
85034459521
-
-
Online document
-
Anonymous. (1997). The profile of a hacker. Online document, http://www.cs.uregina.ca/∼obst/hack-profile.html
-
(1997)
The Profile of a Hacker
-
-
-
41
-
-
0010886652
-
The insider threat to information systems
-
Shaw, E.D., Ruby, K.G., and Post, J.M. (1998). The insider threat to information systems. Security Awareness Bulletin, 2-98, 27-46.
-
(1998)
Security Awareness Bulletin
, vol.2-98
, pp. 27-46
-
-
Shaw, E.D.1
Ruby, K.G.2
Post, J.M.3
-
43
-
-
24144446780
-
Psychological types
-
J. Campbell (ed.), New York: Viking Penguin Inc.
-
Jung, C.G. (1971). Psychological types. In J. Campbell (ed.), The portable Jung. New York: Viking Penguin Inc.
-
(1971)
The Portable Jung
-
-
Jung, C.G.1
-
46
-
-
0001918148
-
Fear of flying: A case report using virtual reality therapy with physiological monitoring
-
Wiederhold, B.K., Gevirtz, R., and Wiederhold, M.D. (1998). Fear of flying: A case report using virtual reality therapy with physiological monitoring. CyberPsychology and Behavior, 1, 97-103.
-
(1998)
CyberPsychology and Behavior
, vol.1
, pp. 97-103
-
-
Wiederhold, B.K.1
Gevirtz, R.2
Wiederhold, M.D.3
-
47
-
-
85034470357
-
-
Goelzman, G. (Producer), and Denne, J. (Director). 1990. The Silence of the Lambs [film]. (Available from Orion Pictures)
-
Goelzman, G. (Producer), and Denne, J. (Director). 1990. The Silence of the Lambs [film]. (Available from Orion Pictures)
-
-
-
-
48
-
-
85034470177
-
-
Stephen Kronish. (Executive Producer). (1998). Profiler. New York: WNBC
-
Stephen Kronish. (Executive Producer). (1998). Profiler. New York: WNBC.
-
-
-
-
53
-
-
3042882557
-
-
Lexington, MA: Lexington Books
-
Douglas, J.E. (1988). Sexual homicide. Lexington, MA: Lexington Books.
-
(1988)
Sexual Homicide
-
-
Douglas, J.E.1
-
56
-
-
0023846187
-
The process of criminalization: The case of computer crime laws
-
Hollinger, R.C., and Lanza-Kaduce, L. (1988). The process of criminalization: The case of computer crime laws. Criminology, 26, 101-126.
-
(1988)
Criminology
, vol.26
, pp. 101-126
-
-
Hollinger, R.C.1
Lanza-Kaduce, L.2
-
57
-
-
0031523675
-
The ethical issues rating scale: An instrument for measuring ethical orientation of college students toward various business practices
-
Daniel, L.G., Elliott-Howard, F.E., and DuFrene, D. (1997). The ethical issues rating scale: An instrument for measuring ethical orientation of college students toward various business practices. Educational and Psychological Measurement, 57, 515-526.
-
(1997)
Educational and Psychological Measurement
, vol.57
, pp. 515-526
-
-
Daniel, L.G.1
Elliott-Howard, F.E.2
Dufrene, D.3
-
58
-
-
0000535664
-
Professional ethics: Business students' perceptions
-
Davis, J.R., and Welton, R.E. (1991). Professional ethics: Business students' perceptions. Journal of Business Ethics, 10, 451-463.
-
(1991)
Journal of Business Ethics
, vol.10
, pp. 451-463
-
-
Davis, J.R.1
Welton, R.E.2
-
60
-
-
0031574684
-
The relationship between personal values and the perception of the corporation's code of ethics
-
Finegan, J., and Theriault, C. (1997). The relationship between personal values and the perception of the corporation's code of ethics. Journal of Applied Social Psychology, 27, 708-724.
-
(1997)
Journal of Applied Social Psychology
, vol.27
, pp. 708-724
-
-
Finegan, J.1
Theriault, C.2
-
63
-
-
0001481899
-
Workplace aggression as a consequence of negative performance feedback
-
Geddes, D., and Baron, R.A. (1997). Workplace aggression as a consequence of negative performance feedback. Management Communication Quarterly, 10, 433-454.
-
(1997)
Management Communication Quarterly
, vol.10
, pp. 433-454
-
-
Geddes, D.1
Baron, R.A.2
-
64
-
-
85034461144
-
Web helps job-seekers fake their resumes
-
September 7. Online document, IDG.Net Site
-
Cole-Gomolski, B. (1998, September 7). Web helps job-seekers fake their resumes. Computerworld. Online document, IDG.Net Site, htp://cnn.com/TECH/ computing/9807/07
-
(1998)
Computerworld
-
-
Cole-Gomolski, B.1
-
67
-
-
84984306815
-
Not just "for the thrill of it": An instrumentalist elaboration of Katz's explanation of sneaky thrill property crimes
-
McCarthy, B. (1995). Not just "for the thrill of it": An instrumentalist elaboration of Katz's explanation of sneaky thrill property crimes. Criminology, 33, 519-538.
-
(1995)
Criminology
, vol.33
, pp. 519-538
-
-
McCarthy, B.1
-
68
-
-
0038867317
-
Ignoring commitment is costly: New approaches establish the missing link between commitment and performance
-
Benkhoff, B. (1997). Ignoring commitment is costly: New approaches establish the missing link between commitment and performance. Human Relations, 50, 701-726.
-
(1997)
Human Relations
, vol.50
, pp. 701-726
-
-
Benkhoff, B.1
-
71
-
-
85034465170
-
Miami-Dade bank employees steal $2 Million, 12 embezzlers use various methods, the FBI says
-
May 24
-
Yanez, L. (1998, May 24). Miami-Dade bank employees steal $2 Million, 12 embezzlers use various methods, the FBI says. Sun-Sentinel Ft. Lauderdale p. 21, 38.
-
(1998)
Sun-Sentinel Ft. Lauderdale
, pp. 21
-
-
Yanez, L.1
-
72
-
-
0003527849
-
-
Springfield, MA: Merriam-Webster, Inc., Publishers
-
Webster's Ninth New Collegiate Dictionary. (1983). Springfield, MA: Merriam-Webster, Inc., Publishers.
-
(1983)
Webster's Ninth New Collegiate Dictionary
-
-
-
73
-
-
85034474501
-
-
January 14. Paper presented at University of New Haven
-
Theil, S.A. (1995, January 14). Lecture, crime profiling. Paper presented at University of New Haven.
-
(1995)
Lecture, Crime Profiling
-
-
Theil, S.A.1
|