-
1
-
-
0003878594
-
-
The Dorsey Press, Chicago, IL
-
Ajzen, I. Attitudes, Personality, and Behavior. The Dorsey Press, Chicago, IL, 1988.
-
(1988)
Attitudes, Personality, and Behavior
-
-
Ajzen, I.1
-
2
-
-
0347892655
-
Hack attack: Cyberthieves siphon millions from U.S. firms
-
Anthes, G.H. Hack attack: Cyberthieves siphon millions from U.S. firms. Computerworld 30, 16 (1996), 81.
-
(1996)
Computerworld
, vol.30
, Issue.16
, pp. 81
-
-
Anthes, G.H.1
-
3
-
-
33745890769
-
Software piracy seems rampant among students in a survey at 2 universities
-
March 4
-
Carnevale, D. Software piracy seems rampant among students in a survey at 2 universities. The Chronicle of Higher Education: Daily News (March 4, 2002).
-
(2002)
The Chronicle of Higher Education: Daily News
-
-
Carnevale, D.1
-
4
-
-
33745914388
-
-
Computer Security Institute
-
Gordon, L., Loeb, M., Lucyshyn, W., and Richardson, R. 2004 Ninth Annual CSI/FBI Computer Crime and Security Survey, Computer Security Institute, 2004.
-
(2004)
2004 Ninth Annual CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.1
Loeb, M.2
Lucyshyn, W.3
Richardson, R.4
-
5
-
-
0343001536
-
Crime by computer: Correlates of software piracy and unauthorized account access
-
Hollinger, R.C. Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal 2, 1 (1992), 2-12.
-
(1992)
Security Journal
, vol.2
, Issue.1
, pp. 2-12
-
-
Hollinger, R.C.1
-
6
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K.D., Carr, H.H., and Warkentin, M.E. Threats to information systems: Today's reality, yesterday's understanding. MIS Quarterly 16, 2 (1992), 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
7
-
-
15744399299
-
Security and risk management: A fundamental business issue
-
McAdams, A.C. Security and risk management: A fundamental business issue. The Infonnation Management Journal 38, 4 (2004), 36-44.
-
(2004)
The Infonnation Management Journal
, vol.38
, Issue.4
, pp. 36-44
-
-
McAdams, A.C.1
-
8
-
-
33745874239
-
The growing vulnerability of campus networks
-
March 15
-
Olsen, F. The growing vulnerability of campus networks. The Chronicle of Higher Education 48, 27 (March 15, 2002), A35-A36.
-
(2002)
The Chronicle of Higher Education
, vol.48
, Issue.27
-
-
Olsen, F.1
-
9
-
-
1642568985
-
Hackers are ubiquitous, malicious, and taken far too lightly, experts say
-
Schwartz, K.D. Hackers are ubiquitous, malicious, and taken far too lightly, experts say. Government Computer News 16, 23 (1997), 81-82.
-
(1997)
Government Computer News
, vol.16
, Issue.23
, pp. 81-82
-
-
Schwartz, K.D.1
-
10
-
-
0030668250
-
A social learning theory analysis of computer crime among college students
-
Skinner, W.F. and Fream, A.M. A social learning theory analysis of computer crime among college students. The Journal of Research in Crime and Delinquency 34, 4 (1997), 495-518.
-
(1997)
The Journal of Research in Crime and Delinquency
, vol.34
, Issue.4
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
11
-
-
0004279306
-
-
Course Technologies, Cambridge, MA
-
Stair, R.M. and Reynolds, G.W. Principles of Information Systems: A Managerial Approach, 3E. Course Technologies, Cambridge, MA, 1998.
-
(1998)
Principles of Information Systems: A Managerial Approach, 3E
-
-
Stair, R.M.1
Reynolds, G.W.2
|