-
1
-
-
0003878594
-
-
The Dorsey Press Chicago, IL
-
Ajzen, I. (1988), Attitudes, Personality, and Behavior, The Dorsey Press, Chicago, IL.
-
(1988)
Attitudes, Personality, and Behavior
-
-
Ajzen, I.1
-
3
-
-
0347892655
-
Hack attack: cyberthieves siphon millions from US firms
-
Anthes, G.H. (1996), “Hack attack: cyberthieves siphon millions from US firms”, Computerworld, Vol. 30 No. 16, p. 81.
-
(1996)
Computerworld
, vol.30
, Issue.16
, pp. 81
-
-
Anthes, G.H.1
-
4
-
-
18844372566
-
Public knowledge of criminal penalties
-
Assembly Committee on Criminal Procedure (State of California) Columbia University Press New York, NY
-
Assembly Committee on Criminal Procedure (State of California) (1975), “Public knowledge of criminal penalties”, in Ed. Henshel, R.L. and Ed. Silverman, R.A. (Eds), Perception in Criminology, Columbia University Press, New York, NY, pp. 74-90.
-
(1975)
Perception in Criminology
, pp. 74-90
-
-
Henshel, R.L.1
Silverman, R.A.2
-
5
-
-
0001156375
-
Managing computer crime: a research outlook
-
Backhouse, J. and Dhillon, G. (1995), “Managing computer crime: a research outlook”, Computers and Security, Vol. 14 No. 7, pp. 645-651.
-
(1995)
Computers and Security
, vol.14
, Issue.7
, pp. 645-651
-
-
Backhouse, J.1
Dhillon, G.2
-
6
-
-
28844460781
-
Predicting dishonest actions using the theory of planned behavior
-
Beck, L. and Ajzen, I. (1991), “Predicting dishonest actions using the theory of planned behavior”, Journal of Research in Personality, Vol. 25 No. 3, pp. 285-301.
-
(1991)
Journal of Research in Personality
, vol.25
, Issue.3
, pp. 285-301
-
-
Beck, L.1
Ajzen, I.2
-
7
-
-
0003435516
-
-
National Academy of Sciences Washington, DC
-
Blumstein, A., Cohen, J. and Nagin, D. (Eds) (1978), Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates, National Academy of Sciences, Washington, DC.
-
(1978)
Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates
-
-
Blumstein, A.1
Cohen, J.2
Nagin, D.3
-
8
-
-
46749109854
-
Delaware board sets computer-use policy
-
October 11 www.thedailystar.com/archivesearch/local_story_ 284040041.html available at (accessed April 4, 2008).
-
Breakey, P. (2007), “Delaware board sets computer-use policy”, Knight Ridder Tribune Business News, October 11, available at: www.thedailystar.com/archivesearch/local_story_ 284040041.html (accessed April 4, 2008).
-
(2007)
Knight Ridder Tribune Business News
-
-
Breakey, P.1
-
9
-
-
84992928616
-
Firefighters put on suspension: technician finds sexual images on Timberlake district's computers
-
April 11
-
Brodwater, T. (2007), “Firefighters put on suspension: technician finds sexual images on Timberlake district's computers”, Knight Ridder Tribune Business News, April 11, p. 1.
-
(2007)
Knight Ridder Tribune Business News
, pp. 1
-
-
Brodwater, T.1
-
10
-
-
0010154421
-
General deterrence: research and theory
-
Buikhuisen, W. (1974), “General deterrence: research and theory”, Abstracts on Criminology and Penology, Vol. 14 No. 3, pp. 285-8.
-
(1974)
Abstracts on Criminology and Penology
, vol.14
, Issue.3
, pp. 285-288
-
-
Buikhuisen, W.1
-
11
-
-
0003552195
-
-
Russell Sage Foundation New York, NY
-
Cook, K.S. (Ed.) (2001), Trust in Society, Russell Sage Foundation, New York, NY.
-
(2001)
Trust in Society
-
-
Cook, K.S.1
-
12
-
-
21144478161
-
Accessibility and stability of predictors in the theory of planned behavior
-
Doll, J. and Ajzen, I. (1992), “Accessibility and stability of predictors in the theory of planned behavior”, Journal of Personality and Social Psychology, Vol. 63 No. 5, pp. 754-764.
-
(1992)
Journal of Personality and Social Psychology
, vol.63
, Issue.5
, pp. 754-764
-
-
Doll, J.1
Ajzen, I.2
-
14
-
-
46749158934
-
Behind the numbers: the FBI cyber-crime survey results
-
http://govtsecurity.com/mag/behind_numbers_fbi/ Government Security web site (accessed August 1, 2004).
-
Flickes, M. (2004), “Behind the numbers: the FBI cyber-crime survey results”, Government Security web site, http://govtsecurity.com/mag/behind_numbers_fbi/ (accessed August 1, 2004).
-
(2004)
-
-
Flickes, M.1
-
15
-
-
46749158526
-
Factors influencing awareness of computer usage policies
-
Foltz, C.B., Anderson, J.E. and Schwager, P.H. (2007), “Factors influencing awareness of computer usage policies”, Proceedings of the Southwest Decision Sciences Institute, San Diego, CA, pp. 243-252.
-
(2007)
Proceedings of the Southwest Decision Sciences Institute, San Diego, CA
, pp. 243-252
-
-
Foltz, C.B.1
Anderson, J.E.2
Schwager, P.H.3
-
16
-
-
46749156543
-
Student awareness of university computer usage policies: is a single exposure enough?
-
Foltz, C.B., Cronan, T.P. and Jones, T.W. (2004), “Student awareness of university computer usage policies: is a single exposure enough?”, Proceedings of the Southwest Decision Sciences Institute, Orlando, FL, pp. 293-9.
-
(2004)
Proceedings of the Southwest Decision Sciences Institute, Orlando, FL
, pp. 293-299
-
-
Foltz, C.B.1
Cronan, T.P.2
Jones, T.W.3
-
17
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
Fornell, C. and Larcker, D. (1981), “Evaluating structural equation models with unobservable variables and measurement error”, Journal of Marketing Research, Vol. 18, pp. 89-98.
-
(1981)
Journal of Marketing Research
, vol.18
, pp. 89-98
-
-
Fornell, C.1
Larcker, D.2
-
18
-
-
33749646491
-
2006 CSI/FBI computer crime and security survey
-
Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Richardson, R. (2006), “2006 CSI/FBI computer crime and security survey”, Computer Security Journal, Vol. 22 No. 3, pp. 1-21.
-
(2006)
Computer Security Journal
, vol.22
, Issue.3
, pp. 1-21
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
20
-
-
46749127595
-
Formulating an effective computer use policy
-
Holmes, J. (2003), “Formulating an effective computer use policy”, Information Strategy: The Executive's Journal, Vol. 20 No. 1, pp. 26-33.
-
(2003)
Information Strategy: The Executive's Journal
, vol.20
, Issue.1
, pp. 26-33
-
-
Holmes, J.1
-
21
-
-
3943096420
-
Some minimum requirements for legal sanctioning systems with special emphasis on detection
-
Klette, H. (1975), “Some minimum requirements for legal sanctioning systems with special emphasis on detection”, General Deterrence: A Conference on Current Research and Standpoints, National Swedish Council for Crime Prevention, Stockholm, pp. 12-59.
-
(1975)
General Deterrence: A Conference on Current Research and Standpoints, National Swedish Council for Crime Prevention, Stockholm
, pp. 12-59
-
-
Klette, H.1
-
23
-
-
0036064934
-
A holistic model of computer abuse within organizations
-
Lee, J. and Lee, Y. (2002), “A holistic model of computer abuse within organizations”, Information Management & Computer Security, Vol. 10 No. 2, pp. 57-63.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2
, pp. 57-63
-
-
Lee, J.1
Lee, Y.2
-
24
-
-
28644441165
-
Attitude toward ethical behavior in computer use: a shifting model
-
Leonard, L.N.K. and Cronan, T.P. (2005), “Attitude toward ethical behavior in computer use: a shifting model”, Industrial Management & Data Systems, Vol. 105 No. 9, pp. 1150-71.
-
(2005)
Industrial Management & Data Systems
, vol.105
, Issue.9
, pp. 1150-1171
-
-
Leonard, L.N.K.1
Cronan, T.P.2
-
25
-
-
46749122477
-
Commentary: use of employer's e-mail in attorney-client communication raises privilege concerns
-
January 3
-
Lindquist, C.D. (2008), “Commentary: use of employer's e-mail in attorney-client communication raises privilege concerns”, Daily Record, January 3, p. 1.
-
(2008)
Daily Record
, pp. 1
-
-
Lindquist, C.D.1
-
26
-
-
0002172779
-
A comparison of the theory of planned behavior and the theory of reasoned action
-
Madden, T.J., Ellen, P.S. and Ajzen, I. (1992), “A comparison of the theory of planned behavior and the theory of reasoned action”, Personality and Social Psychology Bulletin, Vol. 18 No. 1, pp. 3-9.
-
(1992)
Personality and Social Psychology Bulletin
, vol.18
, Issue.1
, pp. 3-9
-
-
Madden, T.J.1
Ellen, P.S.2
Ajzen, I.3
-
27
-
-
0009056377
-
General deterrence: a review of the empirical evidence
-
National Academy of Sciences Washington, DC
-
Nagin, D. (1978), “General deterrence: a review of the empirical evidence”, Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates, National Academy of Sciences, Washington, DC, pp. 93-139.
-
(1978)
Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates
, pp. 93-139
-
-
Nagin, D.1
-
28
-
-
0003528130
-
-
2nd ed. McGraw-Hill New York, NY
-
Nunnally, J. (1978), Psychometric Theory, 2nd ed., McGraw-Hill, New York, NY.
-
(1978)
Psychometric Theory
-
-
Nunnally, J.1
-
29
-
-
0036904309
-
The apathy inventory: assessment of apathy and awareness in Alzheimer's disease, Parkinson's disease and mild cognitive impairment
-
Robert, P.H., Clairet, S., Benoit, M., Koutaich, J., Bertogliati, C., Tible, O., Caci, H., Borg, M., Brocker, P. and Bedoucha, P. (2002), “The apathy inventory: assessment of apathy and awareness in Alzheimer's disease, Parkinson's disease and mild cognitive impairment”, International Journal of Geriatric Psychiatry, Vol. 17 No. 12, pp. 1099-105.
-
(2002)
International Journal of Geriatric Psychiatry
, vol.17
, Issue.12
, pp. 1099-1105
-
-
Robert, P.H.1
Clairet, S.2
Benoit, M.3
Koutaich, J.4
Bertogliati, C.5
Tible, O.6
Caci, H.7
Borg, M.8
Brocker, P.9
Bedoucha, P.10
-
30
-
-
1642568988
-
Computer fraud – what can be done about it?
-
Romney, M. (1995), “Computer fraud – what can be done about it?”, The CPA Journal, Vol. 65 No. 5, pp. 30-33.
-
(1995)
The CPA Journal
, vol.65
, Issue.5
, pp. 30-33
-
-
Romney, M.1
-
31
-
-
84992929692
-
Ethics and the 7 ‘P's’ of computer use policies
-
Gatlinburg, TN
-
Scott, T. and Voss, R. (1994), “Ethics and the 7 ‘P's’ of computer use policies”, Proceedings of the Conference on Ethics in the Computer Age, Gatlinburg, TN, pp. 61-67.
-
(1994)
Proceedings of the Conference on Ethics in the Computer Age
, pp. 61-67
-
-
Scott, T.1
Voss, R.2
-
32
-
-
0034086124
-
The influence of trust and perceptions of risks and benefits on the acceptance of gene technology
-
Siegrist, M. (2000), “The influence of trust and perceptions of risks and benefits on the acceptance of gene technology”, Risk Analysis, Vol. 20 No. 2, pp. 195-203.
-
(2000)
Risk Analysis
, vol.20
, Issue.2
, pp. 195-203
-
-
Siegrist, M.1
-
33
-
-
0033653855
-
Perception of hazards: the role of social trust and knowledge
-
Siegrist, M. and Cvetkovich, G. (2000), “Perception of hazards: the role of social trust and knowledge”, Risk Analysis, Vol. 20 No. 5, pp. 713-9.
-
(2000)
Risk Analysis
, vol.20
, Issue.5
, pp. 713-719
-
-
Siegrist, M.1
Cvetkovich, G.2
-
34
-
-
0033884025
-
Salient value similarity, social trust, and risk/benefit perception
-
Siegrist, M., Cvetkovich, G. and Roth, C. (2000), “Salient value similarity, social trust, and risk/benefit perception”, Risk Analysis, Vol. 20 No. 3, pp. 353-362.
-
(2000)
Risk Analysis
, vol.20
, Issue.3
, pp. 353-362
-
-
Siegrist, M.1
Cvetkovich, G.2
Roth, C.3
-
35
-
-
1542626402
-
Deterring computer abuse: the effectiveness of deterrent countermeasures in the computer security environment
-
dissertation Graduate School of Business Indiana University, Bloomington, IN.
-
Straub, D.W. (1986), “Deterring computer abuse: the effectiveness of deterrent countermeasures in the computer security environment”, dissertation, Graduate School of Business, Indiana University, Bloomington, IN.
-
(1986)
-
-
Straub, D.W.1
-
37
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: a field study
-
Straub, D.W. and Nance, W.D. (1990), “Discovering and disciplining computer abuse in organizations: a field study”, MIS Quarterly, Vol. 14 No. 1, pp. 45-60.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, D.W.1
Nance, W.D.2
-
38
-
-
73549120882
-
Understanding information technology usage: a test of competing models
-
Taylor, S. and Todd, P.A. (1995), “Understanding information technology usage: a test of competing models”, Information Systems Research, Vol. 6 No. 2, pp. 144-176.
-
(1995)
Information Systems Research
, vol.6
, Issue.2
, pp. 144-176
-
-
Taylor, S.1
Todd, P.A.2
-
39
-
-
1542382496
-
User acceptance of information technology: toward a unified view
-
Vankatesh, V., Morris, M., Davis, G. and Davis, F. (2003), “User acceptance of information technology: toward a unified view”, MIS Quarterly, Vol. 27 No. 3, pp. 425-478.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Vankatesh, V.1
Morris, M.2
Davis, G.3
Davis, F.4
-
40
-
-
33845763496
-
Individual characteristics and ethical decision-making in an IT context
-
Haines, R. and Leonard, L.N.K. (2007), “Individual characteristics and ethical decision-making in an IT context”, Industrial Management & Data Systems, Vol. 107 No. 1, pp. 5-20.
-
(2007)
Industrial Management & Data Systems
, vol.107
, Issue.1
, pp. 5-20
-
-
Haines, R.1
Leonard, L.N.K.2
|