메뉴 건너뛰기




Volumn 49, Issue 6, 2006, Pages 85-90

Piracy, computer crime, and is misuse at the University

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER USAGE POLICY; INFORMATION SYSTEMS; UNIVERSITIES;

EID: 33745903904     PISSN: 00010782     EISSN: 00010782     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (37)

References (12)
  • 2
    • 0347892655 scopus 로고    scopus 로고
    • Hack attack: Cyberthieves siphon millions from U.S. firms
    • Anthes, G.H. Hack attack: Cyberthieves siphon millions from U.S. firms. Computerworld 30, 16 (1996), 81.
    • (1996) Computerworld , vol.30 , Issue.16 , pp. 81
    • Anthes, G.H.1
  • 3
    • 33745890769 scopus 로고    scopus 로고
    • Software piracy seems rampant among students in a survey at 2 universities
    • March 4
    • Carnevale, D. Software piracy seems rampant among students in a survey at 2 universities. The Chronicle of Higher Education: Daily News (March 4, 2002).
    • (2002) The Chronicle of Higher Education: Daily News
    • Carnevale, D.1
  • 5
    • 0343001536 scopus 로고
    • Crime by computer: Correlates of software piracy and unauthorized account access
    • Hollinger, R.C. Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal 2, 1 (1992), 2-12.
    • (1992) Security Journal , vol.2 , Issue.1 , pp. 2-12
    • Hollinger, R.C.1
  • 6
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch, K.D., Carr, H.H., and Warkentin, M.E. Threats to information systems: Today's reality, yesterday's understanding. MIS Quarterly 16, 2 (1992), 173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 7
    • 15744399299 scopus 로고    scopus 로고
    • Security and risk management: A fundamental business issue
    • McAdams, A.C. Security and risk management: A fundamental business issue. The Infonnation Management Journal 38, 4 (2004), 36-44.
    • (2004) The Infonnation Management Journal , vol.38 , Issue.4 , pp. 36-44
    • McAdams, A.C.1
  • 8
    • 33745874239 scopus 로고    scopus 로고
    • The growing vulnerability of campus networks
    • March 15
    • Olsen, F. The growing vulnerability of campus networks. The Chronicle of Higher Education 48, 27 (March 15, 2002), A35-A36.
    • (2002) The Chronicle of Higher Education , vol.48 , Issue.27
    • Olsen, F.1
  • 9
    • 1642568985 scopus 로고    scopus 로고
    • Hackers are ubiquitous, malicious, and taken far too lightly, experts say
    • Schwartz, K.D. Hackers are ubiquitous, malicious, and taken far too lightly, experts say. Government Computer News 16, 23 (1997), 81-82.
    • (1997) Government Computer News , vol.16 , Issue.23 , pp. 81-82
    • Schwartz, K.D.1
  • 10
    • 0030668250 scopus 로고    scopus 로고
    • A social learning theory analysis of computer crime among college students
    • Skinner, W.F. and Fream, A.M. A social learning theory analysis of computer crime among college students. The Journal of Research in Crime and Delinquency 34, 4 (1997), 495-518.
    • (1997) The Journal of Research in Crime and Delinquency , vol.34 , Issue.4 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.