-
1
-
-
0003878594
-
-
The Dorsey Press, Chicago, IL
-
Ajzen, I. (1988), Attitudes, Personality, and Behavior, The Dorsey Press, Chicago, IL.
-
(1988)
Attitudes, Personality, and Behavior
-
-
Ajzen, I.1
-
2
-
-
0347892655
-
Hack attack: Cyberthieves siphon millions from US Firms
-
Anthes, G.H. (1996), "Hack attack: cyberthieves siphon millions from US Firms", Computerworld, Vol. 30 No. 16, p. 81.
-
(1996)
Computerworld
, vol.30
, Issue.16
, pp. 81
-
-
Anthes, G.H.1
-
3
-
-
0001156375
-
Managing computer crime: A research outlook
-
Backhouse, J. and Dhillon, G. (1995), "Managing computer crime: a research outlook", Computers & Security, Vol. 14 No. 7, pp. 645-51.
-
(1995)
Computers and Security
, vol.14
, Issue.7
, pp. 645-651
-
-
Backhouse, J.1
Dhillon, G.2
-
4
-
-
3943078360
-
Time for a new security model
-
Bort, J. (2002), "Time for a new security model", Network World, Vol. 19 No. 30, pp. s6-s8.
-
(2002)
Network World
, vol.19
, Issue.30
-
-
Bort, J.1
-
5
-
-
0038081630
-
CSIS on alert for cyber saboteurs: Spy agency monitors threat to computer networks
-
9 January
-
Bronskill, J. (2001), "CSIS on alert for cyber saboteurs: spy agency monitors threat to computer networks", Ottawa Citizen, 9 January, p. A3.
-
(2001)
Ottawa Citizen
-
-
Bronskill, J.1
-
6
-
-
3943053355
-
-
Statement of Dorothy E. Denning
-
Denning, D.E. (2000), Statement of Dorothy E. Denning, available at: www.house.gov/hasc/testimony/106thcongress/00-05-23denning.htm
-
(2000)
-
-
Denning, D.E.1
-
7
-
-
1842851683
-
Thwarting cyberterrorism
-
Desmond, P. (2002), "Thwarting cyberterrorism", Network World, Vol. 19 No. 7, pp. 72-4.
-
(2002)
Network World
, vol.19
, Issue.7
, pp. 72-74
-
-
Desmond, P.1
-
8
-
-
0037401061
-
Semiotic emergent framework to address the reality of cyberterrorism
-
Desouza, K.C. and Hensgen, T. (2003), "Semiotic emergent framework to address the reality of cyberterrorism", Technological Forecasting and Social Change., Vol. 70 No. 4, pp. 385-96.
-
(2003)
Technological Forecasting and Social Change
, vol.70
, Issue.4
, pp. 385-396
-
-
Desouza, K.C.1
Hensgen, T.2
-
9
-
-
0038172257
-
Cyberterrorism: Are we under siege?
-
Embar-Seddon, A. (2002), "Cyberterrorism: are we under siege?", American Behavioral Scientist, Vol. 45 No. 6, pp. 1033-44.
-
(2002)
American Behavioral Scientist
, vol.45
, Issue.6
, pp. 1033-1044
-
-
Embar-Seddon, A.1
-
10
-
-
1642564389
-
Human behavior as a factor in the control of information systems misuse and computer crime
-
DSI, Atlanta, GA
-
Foltz, C., Cronan, P.T. and Jones, T. (2002), "Human behavior as a factor in the control of information systems misuse and computer crime", Proceedings of the Decision Sciences Institute, DSI, Atlanta, GA, pp. 1246-51.
-
(2002)
Proceedings of the Decision Sciences Institute
, pp. 1246-1251
-
-
Foltz, C.1
Cronan, P.T.2
Jones, T.3
-
11
-
-
3943054719
-
Politicians speak out on cyberterrorism
-
Gengler, B. (1999), "Politicians speak out on cyberterrorism", Network Security, Vol. 1999 No. 10, p. 6.
-
(1999)
Network Security
, vol.1999
, Issue.10
, pp. 6
-
-
Gengler, B.1
-
12
-
-
0036429285
-
Cyberterrorism?
-
Gordon, S. and Ford, R. (2002), "Cyberterrorism?", Computers & Security, Vol. 21 No. 7, pp. 636-47.
-
(2002)
Computers and Security
, vol.21
, Issue.7
, pp. 636-647
-
-
Gordon, S.1
Ford, R.2
-
13
-
-
0012133705
-
Sound security policies combat cyberterrorism
-
Hulme, G.V. (2002), "Sound security policies combat cyberterrorism", Information Week, No. 905, p. 22.
-
(2002)
Information Week
, Issue.905
, pp. 22
-
-
Hulme, G.V.1
-
14
-
-
3943096420
-
Some minimum requirements for legal sanctioning systems with special emphasis on detection
-
National Swedish Council for Crime Prevention, Stockholm
-
Klette, H. (1975), "Some minimum requirements for legal sanctioning systems with special emphasis on detection", Proceedings of General Deterrence: A Conference on Current Research and Standpoints, National Swedish Council for Crime Prevention, Stockholm, pp. 12-59.
-
(1975)
Proceedings of General Deterrence: A Conference on Current Research and Standpoints
, pp. 12-59
-
-
Klette, H.1
-
15
-
-
0042394600
-
-
(Eds) CRC Press LLC, Boca Raton, FL
-
Krause, M. and Tipton, H.F. (Eds) (1998), Handbook of Information Security Management, CRC Press LLC, Boca Raton, FL.
-
(1998)
Handbook of Information Security Management
-
-
Krause, M.1
Tipton, H.F.2
-
16
-
-
3943059962
-
Computer fraud - Points of high exposure you should focus on when controlling and reviewing for fraud
-
Kuong, J.F. (1992), "Computer fraud - points of high exposure you should focus on when controlling and reviewing for fraud", Computer Security, Auditing, and Controls, Vol. 19 No. 1, pp. 1-8.
-
(1992)
Computer Security, Auditing, and Controls
, vol.19
, Issue.1
, pp. 1-8
-
-
Kuong, J.F.1
-
17
-
-
3943056788
-
Who's spying now?
-
Lang, C. (1995), "Who's spying now?", Netguide, Vol. 2 No. 7, pp. 44-50.
-
(1995)
Netguide
, vol.2
, Issue.7
, pp. 44-50
-
-
Lang, C.1
-
19
-
-
0036064934
-
A holistic model of computer abuse within organizations
-
Lee, J. and Lee, Y. (2002), "A holistic model of computer abuse within organizations", Information Management & Computer Security, Vol. 10 No. 2, pp. 57-63.
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.2
, pp. 57-63
-
-
Lee, J.1
Lee, Y.2
-
21
-
-
0037744199
-
Cyber-enemy: America's newest threat is lurking behind computer screens
-
McFeatters, A. (2001), "Cyber-enemy: America's newest threat is lurking behind computer screens", Pitsburgh Post-Gazette, p. E3.
-
(2001)
Pitsburgh Post-Gazette
-
-
McFeatters, A.1
-
22
-
-
3943060104
-
Cyberterrorism: Ready to explode
-
April
-
Montgomery, G. (2003), "Cyberterrorism: ready to explode", Australian Personal Computer, Vol. 292, April, pp. 26-9.
-
(2003)
Australian Personal Computer
, vol.292
, pp. 26-29
-
-
Montgomery, G.1
-
23
-
-
0009056377
-
General deterrence: A review of the empirical evidence
-
National Academy of Sciences, Washington, DC
-
Nagin, D. (1978), "General deterrence: a review of the empirical evidence", Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates, National Academy of Sciences, Washington, DC, pp. 93-139.
-
(1978)
Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates
, pp. 93-139
-
-
Nagin, D.1
-
24
-
-
67650600746
-
-
National Research Council Computers at National Academy Press, Washington, DC
-
National Research Council (1991), Computers at Risk: Safe Computing in the Information Age, National Academy Press, Washington, DC.
-
(1991)
Risk: Safe Computing in the Information Age
-
-
-
25
-
-
0041426663
-
Software piracy in the workplace: A model and empirical test
-
Peace, A.G., Galletta, D.F. and Thong, J.Y.L. (2003), "Software piracy in the workplace: a model and empirical test", Journal of Management Information Systems, Vol. 20 No. 1, pp. 153-77.
-
(2003)
Journal of Management Information Systems
, vol.20
, Issue.1
, pp. 153-177
-
-
Peace, A.G.1
Galletta, D.F.2
Thong, J.Y.L.3
-
27
-
-
0036508551
-
2002 CSI/FBI computer crime and security survey
-
Power, R. (2002), "2002 CSI/FBI computer crime and security survey", Computer Security Issues and Trends, Vol. 8 No. 1.
-
(2002)
Computer Security Issues and Trends
, vol.8
, Issue.1
-
-
Power, R.1
-
28
-
-
0030668250
-
A social learning theory analysis of computer crime among college students
-
Skinner, W.F. and Fream, A.M. (1997), "A social learning theory analysis of computer crime among college students", The Journal of Research in Crime and Delinquency, Vol. 34 No. 4, pp. 495-518.
-
(1997)
The Journal of Research in Crime and Delinquency
, vol.34
, Issue.4
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
29
-
-
0037497016
-
Terror in cyberspace
-
Stanton, J.J. (2002), "Terror in cyberspace", American Behavioral Scientist, Vol. 45 No. 6, pp. 1017-32.
-
(2002)
American Behavioral Scientist
, vol.45
, Issue.6
, pp. 1017-1032
-
-
Stanton, J.J.1
-
30
-
-
1542626402
-
-
dissertation, Indiana University Graduate School of Business, Bloomington, IN
-
Straub, D.W. (1986), "Deterring computer abuse: the effectiveness of deterrent countermeasures in the computer security environment", dissertation, Indiana University Graduate School of Business, Bloomington, IN.
-
(1986)
Deterring Computer Abuse: The Effectiveness of Deterrent Countermeasures in the Computer Security Environment
-
-
Straub, D.W.1
-
31
-
-
85139144524
-
Controlling computer abuse: An empirical study of effective security countermeasures
-
DeGross, L.L. and Kriebel, C.H. (Eds), Pittsburgh, PA, ACM, Baltimore, MD
-
Straub, D.W. (1987), "Controlling computer abuse: an empirical study of effective security countermeasures", in DeGross, L.L. and Kriebel, C.H. (Eds), Proceedings of the International Conference on Information Systems, Pittsburgh, PA, ACM, Baltimore, MD, pp. 277-89.
-
(1987)
Proceedings of the International Conference on Information Systems
, pp. 277-289
-
-
Straub, D.W.1
-
33
-
-
3943071545
-
US vulnerable to cyberterrorism
-
Wehde, E. (1998), "US vulnerable to cyberterrorism", Computer Fraud & Security, Vol. 1998 No. 1, pp. 6-7.
-
(1998)
Computer Fraud and Security
, vol.1998
, Issue.1
, pp. 6-7
-
-
Wehde, E.1
-
34
-
-
0037686230
-
Heavyweights rally against net hackers
-
29 January
-
Yasin, R. (1999), "Heavyweights rally against Net hackers", InternetWeek, Vol. 750, 29 January, p. 7.
-
(1999)
InternetWeek
, vol.750
, pp. 7
-
-
Yasin, R.1
|