메뉴 건너뛰기




Volumn 27, Issue 3, 2006, Pages 245-268

Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33745740196     PISSN: 01639625     EISSN: 15210456     Source Type: Journal    
DOI: 10.1080/01639620600605333     Document Type: Article
Times cited : (86)

References (17)
  • 3
    • 0005766289 scopus 로고    scopus 로고
    • Morality and computers: Attitudes and differences in moral judgments
    • Gattiker, Urs E. and Helen Kelley. 1999. "Morality and Computers: Attitudes and Differences in Moral Judgments." Information Systems Research 10:233-54.
    • (1999) Information Systems Research , vol.10 , pp. 233-254
    • Gattiker, U.E.1    Kelley, H.2
  • 4
    • 58149208119 scopus 로고
    • The development of markers for the big-five factor structure
    • Goldberg, Lewis R. 1992. "The Development of Markers for the Big-Five Factor Structure." Psychological Assessment 4:26-42.
    • (1992) Psychological Assessment , vol.4 , pp. 26-42
    • Goldberg, L.R.1
  • 5
    • 33745758036 scopus 로고    scopus 로고
    • Cambridge, MA: IBM Thomas J. Watson Research Center
    • Gordon, Sarah. 2000. "Virus Writers: The End of the Innocence?" Cambridge, MA: IBM Thomas J. Watson Research Center. Available at http://www.research.ibm.com/antivirus/SciPapers/VB2000SG.pdf
    • (2000) Virus Writers: The End of the Innocence?
    • Gordon, S.1
  • 10
    • 84861618785 scopus 로고    scopus 로고
    • Psychology of computer criminals
    • Paper presented St. Louis, MO
    • Rogers, Marcus. 1999. "Psychology of Computer Criminals." Paper presented at the annual Computer Security Institute Conference, St. Louis, MO.
    • (1999) Annual Computer Security Institute Conference
    • Rogers, M.1
  • 12
    • 33745993321 scopus 로고    scopus 로고
    • A comparative analysis of canadian computer and general criminals
    • Spring 2004
    • Rogers, Marcus and J. Ogloff. 2004. "A Comparative Analysis of Canadian Computer and General Criminals." Canadian Journal of Police & Security Services. Spring 2004, 366-76.
    • (2004) Canadian Journal of Police & Security Services , pp. 366-376
    • Rogers, M.1    Ogloff, J.2
  • 14
    • 0010886652 scopus 로고    scopus 로고
    • The insider threat to information systems: The psychology of the dangerous insider
    • Shaw, Eric, Keven G. Ruby, and Jerrold M. Post. 1998. "The Insider Threat to Information Systems: The Psychology of the Dangerous Insider." Security Awareness Bulletin 2-98.
    • (1998) Security Awareness Bulletin , pp. 2-98
    • Shaw, E.1    Ruby, K.G.2    Post, J.M.3
  • 15
    • 0030668250 scopus 로고    scopus 로고
    • A social learning theory analysis of computer crime among college students
    • Skinner, William F., and Anne M. Fream. 1997. "A Social Learning Theory Analysis of Computer Crime Among College Students." Journal of Research in Crime and Delinquency 34:495-518.
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 17
    • 33745745306 scopus 로고    scopus 로고
    • United States Census Bureau. 2003. "2001 E-Commerce Multi-Sector Report." Available at http://www.census.gov/eos/www/ebusiness614. html
    • (2003) 2001 E-commerce Multi-sector Report , vol.614


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.