-
1
-
-
61349088843
-
-
ACL Data Analysis Software Animated Presentation (Pentana Audit Software, Vancouver, BC, Canada, 2006).
-
ACL Data Analysis Software Animated Presentation (Pentana Audit Software, Vancouver, BC, Canada, 2006).
-
-
-
-
4
-
-
11544316378
-
Name, rank, and serial number? The dilemma of reference checks
-
Arnesen D.W., Fleenor C.P., and Blizinsky M. Name, rank, and serial number? The dilemma of reference checks. Business Horizons 41 4 (1998)
-
(1998)
Business Horizons
, vol.41
, Issue.4
-
-
Arnesen, D.W.1
Fleenor, C.P.2
Blizinsky, M.3
-
6
-
-
33845442788
-
A wavelet-based approach to preserve privacy for classification mining
-
Bapna S., and Gangopadhyay A. A wavelet-based approach to preserve privacy for classification mining. Decision Sciences 37 4 (2006)
-
(2006)
Decision Sciences
, vol.37
, Issue.4
-
-
Bapna, S.1
Gangopadhyay, A.2
-
7
-
-
61349104947
-
Employee handbooks: contracts or empty promises?
-
Brady T. Employee handbooks: contracts or empty promises?. Management Review 82 6 (1993)
-
(1993)
Management Review
, vol.82
, Issue.6
-
-
Brady, T.1
-
10
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu H., Mishra B., and Raghunathan S. The value of intrusion detection systems in information technology security architecture. Information Systems Research 16 1 (2005)
-
(2005)
Information Systems Research
, vol.16
, Issue.1
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
12
-
-
0034824884
-
Concept decompositions for large sparse text data using clustering
-
Dhillon I.S., and Modha D.S. Concept decompositions for large sparse text data using clustering. Machine Learning 42 1 (2001)
-
(2001)
Machine Learning
, vol.42
, Issue.1
-
-
Dhillon, I.S.1
Modha, D.S.2
-
15
-
-
61349194049
-
-
Fraud Survey KPMG Forensic
-
Fraud Survey (KPMG Forensic, 2003).
-
(2003)
-
-
-
16
-
-
0005766289
-
Morality and computers: attitudes and differences in judgments
-
Gattiker U.E., and Kelley H. Morality and computers: attitudes and differences in judgments. Information Systems Research 10 3 (1999)
-
(1999)
Information Systems Research
, vol.10
, Issue.3
-
-
Gattiker, U.E.1
Kelley, H.2
-
17
-
-
61349126777
-
-
Global Economic Crime Survey PricewaterhouseCoopers, New York
-
Global Economic Crime Survey (PricewaterhouseCoopers, New York, 2005).
-
(2005)
-
-
-
18
-
-
32544451794
-
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
-
Gupta M., Rees J., Chaturvedi A., and Chi J. Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decision Support Systems 41 3 (2006)
-
(2006)
Decision Support Systems
, vol.41
, Issue.3
-
-
Gupta, M.1
Rees, J.2
Chaturvedi, A.3
Chi, J.4
-
22
-
-
84965629708
-
Employee deviance: a response to the perceived quality of the work experience
-
Hollinger R., and Clark J. Employee deviance: a response to the perceived quality of the work experience. Work And Occupations 9 1 (1982)
-
(1982)
Work And Occupations
, vol.9
, Issue.1
-
-
Hollinger, R.1
Clark, J.2
-
23
-
-
0020985537
-
Deterrence in the workplace: perceived certainty, perceived severity, and employee theft
-
Hollinger R.C., and Clark J.P. Deterrence in the workplace: perceived certainty, perceived severity, and employee theft. Social Forces 62 2 (1983)
-
(1983)
Social Forces
, vol.62
, Issue.2
-
-
Hollinger, R.C.1
Clark, J.P.2
-
24
-
-
61349113619
-
Are you guilty of electronic trespassing?
-
Jacobs D.L. Are you guilty of electronic trespassing?. Management Review 83 4 (1994)
-
(1994)
Management Review
, vol.83
, Issue.4
-
-
Jacobs, D.L.1
-
25
-
-
61349189897
-
-
Kroll Inc, Economist Intelligence Unit Overview in the Kroll Global Fraud Report
-
Kroll Inc., Economist Intelligence Unit Overview in the Kroll Global Fraud Report (2008).
-
(2008)
-
-
-
27
-
-
53349090403
-
Predicting going concern opinion with data mining
-
Martens D., Bruynseels L., Baesens B., Willekens M., and Vanthienen J. Predicting going concern opinion with data mining. Decision Support Systems 45 4 (2008)
-
(2008)
Decision Support Systems
, vol.45
, Issue.4
-
-
Martens, D.1
Bruynseels, L.2
Baesens, B.3
Willekens, M.4
Vanthienen, J.5
-
30
-
-
84948481845
-
An algorithm for suffix stripping
-
Porter M.F. An algorithm for suffix stripping. Program 14 3 (1980)
-
(1980)
Program
, vol.14
, Issue.3
-
-
Porter, M.F.1
-
31
-
-
61349176784
-
-
Preventing crime and violence in the workplace in workplace health, safety and security AllBusiness.com, Undated
-
Preventing crime and violence in the workplace in workplace health, safety and security (AllBusiness.com, Undated).
-
-
-
-
32
-
-
17744384398
-
Auditors' Responsibility for Fraud Detection
-
Ramos M. Auditors' Responsibility for Fraud Detection. Journal of Accountancy 195 (2003)
-
(2003)
Journal of Accountancy
, vol.195
-
-
Ramos, M.1
-
33
-
-
61349153817
-
-
Report to the nation on occupational fraud and abuse Association of Certified Fraud Examiners
-
Report to the nation on occupational fraud and abuse (Association of Certified Fraud Examiners, Austin, TX, 2006).
-
(2006)
-
-
Austin, T.X.1
-
36
-
-
61349093720
-
-
Sarbanes-Oxley Act, H.R. 3763, PL 107-204, 116 Stat 745, 107th Congress (2002).
-
Sarbanes-Oxley Act, H.R. 3763, PL 107-204, 116 Stat 745, 107th Congress (2002).
-
-
-
-
37
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz E.E. A framework for understanding and predicting insider attacks. Computers and Security 21 (2002)
-
(2002)
Computers and Security
, vol.21
-
-
Schultz, E.E.1
-
38
-
-
61349182736
-
Rethinking message storage: Sarbanes-Oxley demands better archiving and retrieval of electronic communications
-
1p
-
E. Schwartz, Rethinking message storage: Sarbanes-Oxley demands better archiving and retrieval of electronic communications, InfoWorld 26 (24) 14-14 (1p).
-
InfoWorld
, vol.26
, Issue.24
, pp. 14-14
-
-
Schwartz, E.1
-
39
-
-
0000670457
-
Culture and moral development
-
Kagan J., and Lamb S. (Eds), University of Chicago Press, Chicago
-
Schweder R.A., Mahapatra M., and Miller J.G. Culture and moral development. In: Kagan J., and Lamb S. (Eds). The Emergence of Morality in Young Children (1987), University of Chicago Press, Chicago
-
(1987)
The Emergence of Morality in Young Children
-
-
Schweder, R.A.1
Mahapatra, M.2
Miller, J.G.3
-
40
-
-
33644904044
-
The role of behavioral research and profiling in malicious cyber insider investigations
-
Shaw E.D. The role of behavioral research and profiling in malicious cyber insider investigations. Digital Investigation 3 1 (2006)
-
(2006)
Digital Investigation
, vol.3
, Issue.1
-
-
Shaw, E.D.1
-
42
-
-
0001133137
-
Coping with systems risk: security planning modules for management decision making
-
Straub D.W., and Welke R.J. Coping with systems risk: security planning modules for management decision making. MIS Quarterly 22 4 (1998)
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
-
-
Straub, D.W.1
Welke, R.J.2
-
44
-
-
61349094303
-
-
The 2006 Oversight Systems Financial Executive Report on Sarbanes-Oxley (Oversight Systems, Inc., Atlanta, Georgia, 2006).
-
The 2006 Oversight Systems Financial Executive Report on Sarbanes-Oxley (Oversight Systems, Inc., Atlanta, Georgia, 2006).
-
-
-
-
46
-
-
84869800995
-
Utilizing text mining techniques to identify fall related injuries
-
Tremblay M., Berndt D., Foulis P., and Luther S. Utilizing text mining techniques to identify fall related injuries. Presented at Eleventh Americas Conference on Information Systems, Omaha, NE (2005)
-
(2005)
Presented at Eleventh Americas Conference on Information Systems, Omaha, NE
-
-
Tremblay, M.1
Berndt, D.2
Foulis, P.3
Luther, S.4
-
47
-
-
33749669785
-
Mandate from SEC regulators: save your electronic documents
-
Varon E. Mandate from SEC regulators: save your electronic documents. CIO Magazine 16 (2003)
-
(2003)
CIO Magazine
, vol.16
-
-
Varon, E.1
-
48
-
-
0012320306
-
Why employees commit fraud
-
Wells J.T. Why employees commit fraud. Journal of Accountancy 191 2 (2001)
-
(2001)
Journal of Accountancy
, vol.191
, Issue.2
-
-
Wells, J.T.1
-
49
-
-
61349163859
-
Reading your every keystroke: protecting employee e-mail privacy
-
Wesche T.M. Reading your every keystroke: protecting employee e-mail privacy. Journal of High Technology Law 1 1 (2002)
-
(2002)
Journal of High Technology Law
, vol.1
, Issue.1
-
-
Wesche, T.M.1
-
50
-
-
0036639314
-
Corporate computer fraud - straight from the secret investigators
-
Wilding E., and Parker J. Corporate computer fraud - straight from the secret investigators. Computer Fraud & Security 2002 7 (2002)
-
(2002)
Computer Fraud & Security
, vol.2002
, Issue.7
-
-
Wilding, E.1
Parker, J.2
-
51
-
-
4644253314
-
Decomposition of fraud risk assessments and auditors' sensitivity to fraud cues
-
Wilks J., and Zimbelman M. Decomposition of fraud risk assessments and auditors' sensitivity to fraud cues. Contemporary Accounting Research 21 3 (2004)
-
(2004)
Contemporary Accounting Research
, vol.21
, Issue.3
-
-
Wilks, J.1
Zimbelman, M.2
-
52
-
-
12344260478
-
Understanding the offender/environment dynamic for computer crimes: assessing the feasibility of applying criminological theory to the IS security context
-
Willison R. Understanding the offender/environment dynamic for computer crimes: assessing the feasibility of applying criminological theory to the IS security context. presented at Proceedings of the 37th Hawaii International Conference on System Sciences (2004)
-
(2004)
presented at Proceedings of the 37th Hawaii International Conference on System Sciences
-
-
Willison, R.1
-
53
-
-
61349179750
-
Message therapy: federal regulations require an entirely new approach to storing and searching e-mails. Noncompliance is not an option
-
Worthen B. Message therapy: federal regulations require an entirely new approach to storing and searching e-mails. Noncompliance is not an option. CIO Magazine 18 7 (2005)
-
(2005)
CIO Magazine
, vol.18
, Issue.7
-
-
Worthen, B.1
-
54
-
-
34548477450
-
Network externalities, layered protection and IT security risk management
-
Yue W.T., ÇakanyIldIrIm M., Ryu Y.U., and Liu D. Network externalities, layered protection and IT security risk management. Decision Support Systems 44 1 (2007)
-
(2007)
Decision Support Systems
, vol.44
, Issue.1
-
-
Yue, W.T.1
ÇakanyIldIrIm, M.2
Ryu, Y.U.3
Liu, D.4
|