-
2
-
-
3242808612
-
-
Computer Security Institute, San Francisco, CA;
-
Gordon, L., Loeb, M., Lucyshyn, W., and Richardson, R. 2006 CSI/FBI Computer Crime and Security Survey. Computer Security Institute, San Francisco, CA; www.gocsi.com/forms/fbi/csi_fbi_survey.jhtml.
-
2006 CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.1
Loeb, M.2
Lucyshyn, W.3
Richardson, R.4
-
3
-
-
84973806845
-
A five-item measure of socially desirable response set
-
Hays, R., Hayashi, T., and Stewart, A. A five-item measure of socially desirable response set. Educational and Psychology Measurement 49, 3 (1989), 629-637.
-
(1989)
Educational and Psychology Measurement
, vol.49
, Issue.3
, pp. 629-637
-
-
Hays, R.1
Hayashi, T.2
Stewart, A.3
-
4
-
-
34848859114
-
-
InformationWeek. U.S. Information Security Research Report. InformationWeek (Aug. 29, 2005); www.informationweek.com/reports/ showReport.jhtml?articleID=170100861.
-
InformationWeek. U.S. Information Security Research Report. InformationWeek (Aug. 29, 2005); www.informationweek.com/reports/ showReport.jhtml?articleID=170100861.
-
-
-
-
5
-
-
0036064934
-
A holistic model of computer abuse within organizations
-
Lee, J. and Lee, Y. A holistic model of computer abuse within organizations. Information Management & Computer Security 10, 2 (2002), 57-63.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2
, pp. 57-63
-
-
Lee, J.1
Lee, Y.2
-
6
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
Lee, S.M., Lee, S.-G., and Yoo, S. An integrative model of computer abuse based on social control and general deterrence theories. Information and Management 41, 6 (2004), 707-718.
-
(2004)
Information and Management
, vol.41
, Issue.6
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.-G.2
Yoo, S.3
-
8
-
-
34848882942
-
The weakest link
-
Oct. 26
-
Standage, T. The weakest link. The Economist (Oct. 26, 2002), 11-14.
-
(2002)
The Economist
, pp. 11-14
-
-
Standage, T.1
-
9
-
-
17844366573
-
An analysis of end-user security behaviors
-
Stanton, J., Stain, K., Mastrangelo, P., and Jolton, J. An analysis of end-user security behaviors. Computers & Security 24, 2 (2005), 124-133.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.1
Stain, K.2
Mastrangelo, P.3
Jolton, J.4
-
10
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Dec
-
Straub, D. and Welke, R. Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22, 4 (Dec. 1998), 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.1
Welke, R.2
-
11
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D. Effective IS security: An empirical study. Information Systems Research 1, 3 (1990), 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.1
|