-
1
-
-
33750725059
-
-
Audit Commission. (1998). Ghost in the machine: An analysis of IT Fraud and abuse. London: Audit Commission Publications.
-
-
-
-
2
-
-
0001156375
-
Managing computer crime: a research outlook
-
Backhouse J., and Dhillon G. Managing computer crime: a research outlook. Computers and Security 14 7 (1995) 645-651
-
(1995)
Computers and Security
, vol.14
, Issue.7
, pp. 645-651
-
-
Backhouse, J.1
Dhillon, G.2
-
3
-
-
84933494181
-
The rationality of sexual offending: testing a deterrence/rational choice conception of sexual assault
-
Bachman R., Paternoster R., and Ward S. The rationality of sexual offending: testing a deterrence/rational choice conception of sexual assault. Law and Society Review 26 2 (1992) 343-372
-
(1992)
Law and Society Review
, vol.26
, Issue.2
, pp. 343-372
-
-
Bachman, R.1
Paternoster, R.2
Ward, S.3
-
4
-
-
85197144511
-
Social learning analysis of aggression
-
Ribes-Inesta E., and Bandura A. (Eds), Lawrence Erlbaum Associates, Publishers, Hillsdale, NJ
-
Bandura A. Social learning analysis of aggression. In: Ribes-Inesta E., and Bandura A. (Eds). Analysis of delinquency and aggression (1976), Lawrence Erlbaum Associates, Publishers, Hillsdale, NJ 202-232
-
(1976)
Analysis of delinquency and aggression
, pp. 202-232
-
-
Bandura, A.1
-
7
-
-
33745455297
-
Who are the computer criminals?
-
Becker J. Who are the computer criminals?. ACM SIGCAS Computers and Society 12 1 (1981) 18-20
-
(1981)
ACM SIGCAS Computers and Society
, vol.12
, Issue.1
, pp. 18-20
-
-
Becker, J.1
-
8
-
-
33750716821
-
-
CSI/FBI. (2004). Computer crime and security survey. San Francisco: CSI.
-
-
-
-
9
-
-
77956151290
-
-
Campbell, M. (1988). Ethics and computer security: Cause and effect. In: Proceedings of the 1988 ACM sixteenth annual conference on computer science. Atlanta, Georgia. United States.
-
-
-
-
10
-
-
0001323143
-
Situational crime prevention: Theory and practice
-
Clarke R. Situational crime prevention: Theory and practice. British Journal of Criminology 20 2 (1980) 136-147
-
(1980)
British Journal of Criminology
, vol.20
, Issue.2
, pp. 136-147
-
-
Clarke, R.1
-
11
-
-
0347405262
-
Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime
-
Cardinali R. Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime. Work Study 44 8 (1995) 11-17
-
(1995)
Work Study
, vol.44
, Issue.8
, pp. 11-17
-
-
Cardinali, R.1
-
14
-
-
0001244215
-
Modelling offender's decisions : a framework for policy and research
-
Tonry M., and Morris N. (Eds), The University of Chicago, Chicago, IL
-
Clarke R., and Cornish D. Modelling offender's decisions : a framework for policy and research. In: Tonry M., and Morris N. (Eds). Crime and justice: An annual review of research Vol. 6 (1985), The University of Chicago, Chicago, IL 147-185
-
(1985)
Crime and justice: An annual review of research
, vol.6
, pp. 147-185
-
-
Clarke, R.1
Cornish, D.2
-
15
-
-
0347278667
-
Rational Choice
-
Paternoster R., and Bachman R. (Eds), Roxbury Publishing Company, Los Angeles, CA
-
Clarke R., and Cornish D. Rational Choice. In: Paternoster R., and Bachman R. (Eds). Explaining criminals and crime: Essays in contemporary criminological theory (2000), Roxbury Publishing Company, Los Angeles, CA 27-41
-
(2000)
Explaining criminals and crime: Essays in contemporary criminological theory
, pp. 27-41
-
-
Clarke, R.1
Cornish, D.2
-
16
-
-
0002999357
-
A revised classification of situational crime prevention techniques
-
Lab S. (Ed), Anderson Publishing Co, Cincinnati
-
Clarke R., and Homel R. A revised classification of situational crime prevention techniques. In: Lab S. (Ed). Crime prevention at a crossroads (1997), Anderson Publishing Co, Cincinnati 21-35
-
(1997)
Crime prevention at a crossroads
, pp. 21-35
-
-
Clarke, R.1
Homel, R.2
-
17
-
-
0004895387
-
Crime as scripts
-
Zahm D., and Cromwell P. (Eds), Florida Statistical Analysis Center, Florida Criminal Justice Executive Institute, Florida Department of Law Enforcement, Tallahassee, FL
-
Cornish D. Crime as scripts. In: Zahm D., and Cromwell P. (Eds). Proceedings of the international seminar on environmental criminology and crime analysis (1994), Florida Statistical Analysis Center, Florida Criminal Justice Executive Institute, Florida Department of Law Enforcement, Tallahassee, FL 30-45
-
(1994)
Proceedings of the international seminar on environmental criminology and crime analysis
, pp. 30-45
-
-
Cornish, D.1
-
18
-
-
0038830409
-
The procedural analysis of offending and its relevance for situational prevention
-
Clarke R. (Ed), Criminal Justice Press, Monsey, NY
-
Cornish D. The procedural analysis of offending and its relevance for situational prevention. In: Clarke R. (Ed). Crime prevention studies Vol. 3 (1994), Criminal Justice Press, Monsey, NY 151-196
-
(1994)
Crime prevention studies
, vol.3
, pp. 151-196
-
-
Cornish, D.1
-
19
-
-
0039910857
-
Situational prevention, displacement of crime and rational choice theory
-
Heal K., and Laycock G. (Eds), H.M.S.O, London
-
Cornish D., and Clarke R. Situational prevention, displacement of crime and rational choice theory. In: Heal K., and Laycock G. (Eds). Situational crime prevention: From theory into practice (1986), H.M.S.O, London 1-16
-
(1986)
Situational crime prevention: From theory into practice
, pp. 1-16
-
-
Cornish, D.1
Clarke, R.2
-
20
-
-
0348006597
-
Crime specialisation, crime displacement and rational choice theory
-
Wegener H., Losel F., and Haisch J. (Eds), Springer-Verlag, New York
-
Cornish D., and Clarke R. Crime specialisation, crime displacement and rational choice theory. In: Wegener H., Losel F., and Haisch J. (Eds). Criminal behavior and the justice system: Psychological perspective (1989), Springer-Verlag, New York 103-117
-
(1989)
Criminal behavior and the justice system: Psychological perspective
, pp. 103-117
-
-
Cornish, D.1
Clarke, R.2
-
21
-
-
18844419105
-
Opportunities, precipitators and criminal decisions: a reply to Wortley's critique of situational crime prevention
-
Smith M., and Cornish D. (Eds), Criminal Justice Press, Monsey, NY
-
Cornish D., and Clarke R. Opportunities, precipitators and criminal decisions: a reply to Wortley's critique of situational crime prevention. In: Smith M., and Cornish D. (Eds). Theory for practice in situational crime prevention: Crime prevention studies Vol. 16 (2003), Criminal Justice Press, Monsey, NY 151-196
-
(2003)
Theory for practice in situational crime prevention: Crime prevention studies
, vol.16
, pp. 151-196
-
-
Cornish, D.1
Clarke, R.2
-
22
-
-
33750717810
-
-
DTI/PWC. (2004). Information security breaches survey. London: PWC.
-
-
-
-
23
-
-
0035658603
-
Computer crimes: theorizing about the enemy within
-
Dhillon G., and Moores S. Computer crimes: theorizing about the enemy within. Computers and Security 20 8 (2001) 715-723
-
(2001)
Computers and Security
, vol.20
, Issue.8
, pp. 715-723
-
-
Dhillon, G.1
Moores, S.2
-
25
-
-
0040608410
-
Proximal circumstances: a mechanism-based classification of crime prevention
-
Clarke R. (Ed), Criminal Justice Press, Monsey, NY
-
Ekblom P. Proximal circumstances: a mechanism-based classification of crime prevention. In: Clarke R. (Ed). Crime prevention studies Vol. 2 (1994), Criminal Justice Press, Monsey, NY 185-232
-
(1994)
Crime prevention studies
, vol.2
, pp. 185-232
-
-
Ekblom, P.1
-
26
-
-
33750733554
-
-
Ernst & Young. (2004). Global information security survey.
-
-
-
-
29
-
-
0000849930
-
Recognition memory for typical and atypical actions in scripted activities: tests of a script pointer + tag hypothesis
-
Graesser A., Gordon S., and Sawyer J. Recognition memory for typical and atypical actions in scripted activities: tests of a script pointer + tag hypothesis. Journal of Verbal Learning and Verbal Behavior 18 3 (1979) 319-332
-
(1979)
Journal of Verbal Learning and Verbal Behavior
, vol.18
, Issue.3
, pp. 319-332
-
-
Graesser, A.1
Gordon, S.2
Sawyer, J.3
-
30
-
-
0001823869
-
Security concerns of systems users: a study of perceptions of the adequacy of security measures
-
Goodhue D., and Straub D. Security concerns of systems users: a study of perceptions of the adequacy of security measures. Information and Management 20 1 (1991) 13-27
-
(1991)
Information and Management
, vol.20
, Issue.1
, pp. 13-27
-
-
Goodhue, D.1
Straub, D.2
-
32
-
-
0000917858
-
The effects of ethics and personal denial of responsibility on computer abuse judgements and intentions
-
Harrington S. The effects of ethics and personal denial of responsibility on computer abuse judgements and intentions. MIS Quarterly 20 3 (1996) 257-277
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-277
-
-
Harrington, S.1
-
34
-
-
0002042413
-
The 9 to 5 underground: are you policing computer crimes?
-
Hoffer J., and Straub D. The 9 to 5 underground: are you policing computer crimes?. Sloan Management Review 30 4 (1989) 35-43
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-43
-
-
Hoffer, J.1
Straub, D.2
-
35
-
-
33750743370
-
-
ISO BS17799. (2005). Information technology - security techniques - codes of practice for information security management. Switzerland: International Organization for Standardization.
-
-
-
-
36
-
-
26044473699
-
Developing ethical practices to minimize computer misuse
-
Kesar S., and Rogerson S. Developing ethical practices to minimize computer misuse. Social Science Computer Review 16 3 (1998) 240-251
-
(1998)
Social Science Computer Review
, vol.16
, Issue.3
, pp. 240-251
-
-
Kesar, S.1
Rogerson, S.2
-
37
-
-
84935413493
-
Tax compliance and perceptions of the risks of detection and criminal prosecution
-
Klepper S., and Nagin D. Tax compliance and perceptions of the risks of detection and criminal prosecution. Law and Society Review 23 2 (1989) 209-240
-
(1989)
Law and Society Review
, vol.23
, Issue.2
, pp. 209-240
-
-
Klepper, S.1
Nagin, D.2
-
38
-
-
33750684609
-
Crime and innovation: a script analysis of patterns in check forgery
-
Smith M., and Cornish D. (Eds), Criminal Justice Press, Monsey, NY
-
Lacoste J., and Tremblay P. Crime and innovation: a script analysis of patterns in check forgery. In: Smith M., and Cornish D. (Eds). Theory for practice in situational crime prevention Vol. 16 (2003), Criminal Justice Press, Monsey, NY 169-196
-
(2003)
Theory for practice in situational crime prevention
, vol.16
, pp. 169-196
-
-
Lacoste, J.1
Tremblay, P.2
-
39
-
-
0000133760
-
Threats to information systems: today's reality, yesterday's understanding
-
Loch K., Carr H., and Warkentin M. Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly 17 2 (1992) 173-186
-
(1992)
MIS Quarterly
, vol.17
, Issue.2
, pp. 173-186
-
-
Loch, K.1
Carr, H.2
Warkentin, M.3
-
41
-
-
85050412654
-
Enduring individual differences and rational choice theories of crime
-
Nagin D., and Paternoster R. Enduring individual differences and rational choice theories of crime. Law and Society Review 27 3 (1993) 467-496
-
(1993)
Law and Society Review
, vol.27
, Issue.3
, pp. 467-496
-
-
Nagin, D.1
Paternoster, R.2
-
43
-
-
33750695932
-
Introduction: towards a theory of situational crime prevention
-
Newman G., Clarke R., and Shoham S.G. (Eds), Ashgate Dartmouth, Hants
-
Newman G. Introduction: towards a theory of situational crime prevention. In: Newman G., Clarke R., and Shoham S.G. (Eds). Rational choice and situational crime prevention (1997), Ashgate Dartmouth, Hants 1-23
-
(1997)
Rational choice and situational crime prevention
, pp. 1-23
-
-
Newman, G.1
-
45
-
-
34249866520
-
-
Charles Scribner's Sons, New York
-
Parker D. Crime by computer (1976), Charles Scribner's Sons, New York
-
(1976)
Crime by computer
-
-
Parker, D.1
-
46
-
-
0004289281
-
-
Reston Publishing Company Inc, Reston, Virginia
-
Parker D. Computer security management (1981), Reston Publishing Company Inc, Reston, Virginia
-
(1981)
Computer security management
-
-
Parker, D.1
-
48
-
-
84935413137
-
Decisions to participate in and desist from four types of common delinquency
-
Paternoster R. Decisions to participate in and desist from four types of common delinquency. Law and Society Review 23 1 (1989) 7-40
-
(1989)
Law and Society Review
, vol.23
, Issue.1
, pp. 7-40
-
-
Paternoster, R.1
-
49
-
-
0030521693
-
Sanction threats and appeals to morality: testing a rational choice model of corporate crime
-
Paternoster R., and Simpson S. Sanction threats and appeals to morality: testing a rational choice model of corporate crime. Law and Society Review 30 3 (1996) 549-583
-
(1996)
Law and Society Review
, vol.30
, Issue.3
, pp. 549-583
-
-
Paternoster, R.1
Simpson, S.2
-
50
-
-
84994734251
-
Risk analysis and risk management
-
Peltier T. Risk analysis and risk management. Information Systems Security 13 4 (2004) 44-56
-
(2004)
Information Systems Security
, vol.13
, Issue.4
, pp. 44-56
-
-
Peltier, T.1
-
52
-
-
29444436912
-
Can computer crime be deterred?
-
Sherizen S. Can computer crime be deterred?. Security Journal 6 (1995) 177-181
-
(1995)
Security Journal
, vol.6
, pp. 177-181
-
-
Sherizen, S.1
-
53
-
-
0345047114
-
Crime and public transport
-
Tonry M. (Ed), The University of Chicago, Chicago, IL
-
Smith M., and Clarke R. Crime and public transport. In: Tonry M. (Ed). Crime and justice: An annual review of research Vol. 27 (2000), The University of Chicago, Chicago, IL 169-233
-
(2000)
Crime and justice: An annual review of research
, vol.27
, pp. 169-233
-
-
Smith, M.1
Clarke, R.2
-
54
-
-
0013417738
-
Computer abuse and computer security: update on an empirical study
-
Straub D. Computer abuse and computer security: update on an empirical study. Security, Audit, and Control Review 4 2 (1986) 21-31
-
(1986)
Security, Audit, and Control Review
, vol.4
, Issue.2
, pp. 21-31
-
-
Straub, D.1
-
55
-
-
33750722762
-
-
Straub, D. (1986b). Deterring computer abuse: the effectiveness of deterrent countermeasures in the computer security environment. Unpublished doctoral dissertation, Indiana University Graduate School of Business.
-
-
-
-
56
-
-
0000280419
-
Effective IS security: an empirical study
-
Straub D. Effective IS security: an empirical study. Information Systems Research 1 3 (1990) 255-276
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.1
-
57
-
-
8744241162
-
Deterring highly motivated computer abusers: a field experiment in computer security
-
Gable G., and Caelli W. (Eds), Elsevier Science, Amsterdam
-
Straub D., Carlson P., and Jones E. Deterring highly motivated computer abusers: a field experiment in computer security. In: Gable G., and Caelli W. (Eds). IT security: The needs for international cooperation (1992), Elsevier Science, Amsterdam 309-324
-
(1992)
IT security: The needs for international cooperation
, pp. 309-324
-
-
Straub, D.1
Carlson, P.2
Jones, E.3
-
58
-
-
0002699431
-
Discovering and disciplining computer abuse in organisations: a field study
-
Straub D., and Nance W. Discovering and disciplining computer abuse in organisations: a field study. MIS Quarterly 14 1 (1990) 45-60
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, D.1
Nance, W.2
-
59
-
-
0001133137
-
Coping with systems risks: security planning models for management decision making
-
Straub D., and Welke R. Coping with systems risks: security planning models for management decision making. MIS Quarterly 22 4 (1998) 441-469
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.1
Welke, R.2
-
60
-
-
0001155759
-
Techniques of neutralisation: a theory of delinquency
-
Sykes G., and Matza D. Techniques of neutralisation: a theory of delinquency. American Sociological Review 22 6 (1957) 664-670
-
(1957)
American Sociological Review
, vol.22
, Issue.6
, pp. 664-670
-
-
Sykes, G.1
Matza, D.2
-
61
-
-
0002133262
-
Schematic bases of social information processing
-
Higgins E., Herman C., and Zanna M. (Eds), Earlbaum, Hillsdale, NJ
-
Taylor S., and Crocker J. Schematic bases of social information processing. In: Higgins E., Herman C., and Zanna M. (Eds). Social cognition Vol. 1 (1981), Earlbaum, Hillsdale, NJ 89-134
-
(1981)
Social cognition
, vol.1
, pp. 89-134
-
-
Taylor, S.1
Crocker, J.2
-
62
-
-
0035631462
-
Bodyswitching and related adaptations in the resale of stolen vehicles
-
Tremblay P., Talon B., and Hurley D. Bodyswitching and related adaptations in the resale of stolen vehicles. British Journal of Criminology 41 4 (2001) 561-579
-
(2001)
British Journal of Criminology
, vol.41
, Issue.4
, pp. 561-579
-
-
Tremblay, P.1
Talon, B.2
Hurley, D.3
-
63
-
-
33750733238
-
-
Willison, R. (2002). Opportunities for computer abuse: assessing a crime specific approach in the case of Barings Bank. Unpublished PhD Thesis. University of London.
-
-
-
-
64
-
-
33745439944
-
Understanding the offender/context dynamic for computer crimes
-
Willison R. Understanding the offender/context dynamic for computer crimes. Information, Technology and People 19 2 (2006) 170-186
-
(2006)
Information, Technology and People
, vol.19
, Issue.2
, pp. 170-186
-
-
Willison, R.1
-
65
-
-
33749351964
-
Opportunities for computer crime: considering systems risk from a criminological perspective
-
Willison R., and Backhouse J. Opportunities for computer crime: considering systems risk from a criminological perspective. European Journal of Information Systems 15 4 (2006) 403-414
-
(2006)
European Journal of Information Systems
, vol.15
, Issue.4
, pp. 403-414
-
-
Willison, R.1
Backhouse, J.2
-
68
-
-
33750687838
-
-
Wortley, R. (1996). Guilt, shame and situational crime prevention. In R. Homel (Ed.), The politics and practice of situational crime prevention (pp.115-132, Vol. 5). Crime Prevention Studies.
-
-
-
|