-
1
-
-
0018503050
-
Social learning and deviant behavior: A specific test of a general theory
-
Akers, R. L., M. Krohn, L. Lanza-Kaduce, M. Radosevich. 1979. Social learning and deviant behavior: A specific test of a general theory. Amer. Sociol. Rev. 44(4) 636-655.
-
(1979)
Amer. Sociol. Rev.
, vol.44
, Issue.4
, pp. 636-655
-
-
Akers, R.L.1
Krohn, M.2
Lanza-Kaduce, L.3
Radosevich, M.4
-
2
-
-
33646141892
-
Timing disclosure of software vulnerability for optimal social welfare
-
Arora, A., R. Telang, H. Xu. 2004. Timing disclosure of software vulnerability for optimal social welfare. Proc. Third Workshop Econom. Inform. Systems, Minneapolis, 1-47.
-
(2004)
Proc. Third Workshop Econom. Inform. Systems, Minneapolis
, pp. 1-47
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
4
-
-
0002520483
-
Modeling IT ethics: A study in situational ethics
-
Banerjee, D., T. P. Cronan, T. W. Jones. 1998. Modeling IT ethics: A study in situational ethics. MIS Quart. 22(1) 31-60.
-
(1998)
MIS Quart.
, vol.22
, Issue.1
, pp. 31-60
-
-
Banerjee, D.1
Cronan, T.P.2
Jones, T.W.3
-
5
-
-
0023020183
-
The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
-
Baron, R. M., D. A. Kenny. 1986. The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. J. Personality Soc. Psych. 51(6) 1173-1182.
-
(1986)
J. Personality Soc. Psych.
, vol.51
, Issue.6
, pp. 1173-1182
-
-
Baron, R.M.1
Kenny, D.A.2
-
6
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R. 1993. Information systems security design methods: Implications for information systems development. ACM Comput. Surveys 25(4) 375-414.
-
(1993)
ACM Comput. Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
7
-
-
0001449665
-
A new product growth for model consumer durables
-
Bass, F. 1969. A new product growth for model consumer durables. Management Sci. 15(5) 215-227.
-
(1969)
Management Sci.
, vol.15
, Issue.5
, pp. 215-227
-
-
Bass, F.1
-
8
-
-
0000787258
-
Crime and punishment: An economic approach
-
Becker, G. 1968. Crime and punishment: An economic approach. J. Political Econom. 76(2) 169-217.
-
(1968)
J. Political Econom.
, vol.76
, Issue.2
, pp. 169-217
-
-
Becker, G.1
-
9
-
-
0039935773
-
Implementing security and integrity in micro-mainframe networks
-
Boockholdt, J. L. 1989. Implementing security and integrity in micro-mainframe networks. MIS Quart. 13(2) 134-144.
-
(1989)
MIS Quart.
, vol.13
, Issue.2
, pp. 134-144
-
-
Boockholdt, J.L.1
-
10
-
-
85041859483
-
-
National Institute of Standards and Technology Special Publication 800-18, Revision 1, Gaithersburg, MD
-
Bowen, P., J. Hash, M. Swanson. 2005. Guide for Developing Security Plans for Federal Information Systems. National Institute of Standards and Technology Special Publication 800-18, Revision 1, Gaithersburg, MD, 1-45.
-
(2005)
Guide for Developing Security Plans for Federal Information Systems
, pp. 1-45
-
-
Bowen, P.1
Hash, J.2
Swanson, M.3
-
11
-
-
34250050600
-
Racial harrassment and the process of victimization
-
Bowling, B. 1993. Racial harrassment and the process of victimization. British J. Criminology 33(2) 231-250.
-
(1993)
British J. Criminology
, vol.33
, Issue.2
, pp. 231-250
-
-
Bowling, B.1
-
13
-
-
9744281201
-
Key issues in information systems management: 1994-1995 SIM Delphi results
-
Brancheau, J., B. Janz, J. Wetherbe. 1996. Key issues in information systems management: 1994-1995 SIM Delphi results. MIS Quart. 20(2) 225-242.
-
(1996)
MIS Quart.
, vol.20
, Issue.2
, pp. 225-242
-
-
Brancheau, J.1
Janz, B.2
Wetherbe, J.3
-
14
-
-
7444242205
-
The impact of Internet security breach announcements on market value of breached firms and Internet security developers
-
Cavusoglu, H., B. Mishra, S. Raghunathan. 2004. The impact of Internet security breach announcements on market value of breached firms and Internet security developers. Internat. J. Electronic Commerce 9(1) 69-104.
-
(2004)
Internat. J. Electronic Commerce
, vol.9
, Issue.1
, pp. 69-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
15
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu, H., B. Mishra, S. Raghunathan. 2005. The value of intrusion detection systems in information technology security architecture. Inform. Systems Res. 16(1) 28-46.
-
(2005)
Inform. Systems Res.
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
16
-
-
0036871268
-
Internet infrastructure security: A taxonomy
-
Chakrabarti, A., G. Manimaran. 2002. Internet infrastructure security: A taxonomy. IEEE Network 16(6) 13-21.
-
(2002)
IEEE Network
, vol.16
, Issue.6
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
18
-
-
0000204509
-
Social change and crime rate change: A routine activity approach
-
Cohen, L. E., M. Felson. 1979. Social change and crime rate change: A routine activity approach. Amer. Sociol. Rev. 44(4) 588-608.
-
(1979)
Amer. Sociol. Rev.
, vol.44
, Issue.4
, pp. 588-608
-
-
Cohen, L.E.1
Felson, M.2
-
19
-
-
84934563431
-
Toward an integrated theory of white-collar crime
-
Coleman, J. W. 1987. Toward an integrated theory of white-collar crime. Amer. J. Sociol. 93(2) 406-439.
-
(1987)
Amer. J. Sociol.
, vol.93
, Issue.2
, pp. 406-439
-
-
Coleman, J.W.1
-
20
-
-
34247732721
-
Grounded theory research: Procedures, canons and evaluative criteria
-
Corbin, J., A. Strauss. 1990. Grounded theory research: Procedures, canons and evaluative criteria. Qualitative Sociol. 13(1) 3-21.
-
(1990)
Qualitative Sociol.
, vol.13
, Issue.1
, pp. 3-21
-
-
Corbin, J.1
Strauss, A.2
-
21
-
-
0036079912
-
Alert correlation in a cooperative intrusion detection framework
-
Security Privacy, Oakland, CA
-
Cuppens, F., A. Miege. 2002. Alert correlation in a cooperative intrusion detection framework. Proc. 2002 IEEE Sympos. Security Privacy, Oakland, CA, 202-215.
-
(2002)
Proc. 2002 IEEE Sympos
, pp. 202-215
-
-
Cuppens, F.1
Miege, A.2
-
22
-
-
15944369564
-
Classification of computer attacks using a self-organizing map
-
U.S. Military Academy, West Point, NY
-
DeLooze, L. L. 2004. Classification of computer attacks using a self-organizing map. Proc. 2004 IEEE Workshop Inform. Assurance, U.S. Military Academy, West Point, NY, 365-369.
-
(2004)
Proc. 2004 IEEE Workshop Inform. Assurance
, pp. 365-369
-
-
DeLooze, L.L.1
-
23
-
-
23044525969
-
Current directions in IS security research: Towards socio-organizational perspectives
-
Dhillon, G., J. Backhouse. 2001. Current directions in IS security research: Towards socio-organizational perspectives. Inform. Systems J. 11(2) 127-153.
-
(2001)
Inform. Systems J.
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
24
-
-
0035792373
-
Fuzzy intrusion detection
-
2001, Vancouver, Canada
-
Dickersen, J. E., J. Juslin, O. KouKousoula, J. A. Dickersen. 2001. Fuzzy intrusion detection. Proc. Joint 9th IFSA World Congress and 20th NAFIPS Internat. Conf., 2001, Vancouver, Canada, 1506-1510.
-
(2001)
Proc. Joint 9th IFSA World Congress and 20th NAFIPS Internat. Conf.
, pp. 1506-1510
-
-
Dickersen, J.E.1
Juslin, J.2
KouKousoula, O.3
Dickersen, J.A.4
-
25
-
-
4243098281
-
Security and privacy issues of handheld and wearable wireless devices
-
DiPietro, R., L. V. Mancini. 2003. Security and privacy issues of handheld and wearable wireless devices. Comm. ACM 46(9) 74-79.
-
(2003)
Comm. ACM
, vol.46
, Issue.9
, pp. 74-79
-
-
DiPietro, R.1
Mancini, L.V.2
-
26
-
-
0036765493
-
Management's role in information security in a cyber economy
-
Dutta, A., K. McCrohan. 2002. Management's role in information security in a cyber economy. California Management Rev. 45(1) 67-87.
-
(2002)
California Management Rev.
, vol.45
, Issue.1
, pp. 67-87
-
-
Dutta, A.1
McCrohan, K.2
-
27
-
-
0000577656
-
Participation in illegitimate activities: A theoretical and empirical investigation
-
Ehrlich, I. 1973. Participation in illegitimate activities: A theoretical and empirical investigation. J. Political Econom. 81(3) 521-565.
-
(1973)
J. Political Econom.
, vol.81
, Issue.3
, pp. 521-565
-
-
Ehrlich, I.1
-
28
-
-
0001985405
-
Crime, punishment and the market for offences
-
Ehrlich, I. 1996. Crime, punishment and the market for offences. J. Econom. Perspectives 10(1) 43-67.
-
(1996)
J. Econom. Perspectives
, vol.10
, Issue.1
, pp. 43-67
-
-
Ehrlich, I.1
-
29
-
-
0038172257
-
Cyberterrorism: Are we under siege?
-
Embar-Seddon, A. 2002. Cyberterrorism: Are we under siege? Amer. Behavioral Scientist 45(6) 1033-1043.
-
(2002)
Amer. Behavioral Scientist
, vol.45
, Issue.6
, pp. 1033-1043
-
-
Embar-Seddon, A.1
-
30
-
-
0005766289
-
Morality and computers: Attitudes and differences in moral judgments
-
Gattiker, U. E., H. Kelley. 1999. Morality and computers: Attitudes and differences in moral judgments. Inform. Systems Res. 10(3) 233-254.
-
(1999)
Inform. Systems Res.
, vol.10
, Issue.3
, pp. 233-254
-
-
Gattiker, U.E.1
Kelley, H.2
-
32
-
-
84990029315
-
The economics of information security investment
-
Gordon, L. A., M. P. Loeb. 2002. The economics of information security investment. ACM Trans. Inform. System Security 5(4) 438-457.
-
(2002)
ACM Trans. Inform. System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
34
-
-
21944448888
-
Discourses of danger and the computer hacker
-
Halbert, D. 1997. Discourses of danger and the computer hacker. Inform. Soc. 13(4) 361-374.
-
(1997)
Inform. Soc.
, vol.13
, Issue.4
, pp. 361-374
-
-
Halbert, D.1
-
35
-
-
0000917858
-
The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions
-
Harrington, S. J. 1996. The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions. MIS Quart. 20(3) 257-278.
-
(1996)
MIS Quart.
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.J.1
-
37
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Julisch, K. 2003. Clustering intrusion detection alarms to support root cause analysis. ACM Trans. Inform. System Security 6(4) 443-471.
-
(2003)
ACM Trans. Inform. System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
38
-
-
20944441343
-
Market for software vulnerabilities? Think again
-
Kannan, K., R. Telang. 2005. Market for software vulnerabilities? Think again. Management Sci. 51(5) 726-740.
-
(2005)
Management Sci.
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
39
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
Kemmerer, R. A., G. Vigna. 2002. Intrusion detection: A brief history and overview. IEEE Comput. 35(4) 27-30.
-
(2002)
IEEE Comput.
, vol.35
, Issue.4
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
40
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K. D., H. H. Carr, M. E. Warkentin. 1992. Threats to information systems: Today's reality, yesterday's understanding. MIS Quart. 16(2) 173-186.
-
(1992)
MIS Quart.
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
43
-
-
0003543517
-
-
State University of New York Press, New York
-
Miethe, T. D., R. F. Meier. 1994. Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations. State University of New York Press, New York.
-
(1994)
Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations
-
-
Miethe, T.D.1
Meier, R.F.2
-
44
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
Ning, P., Y. Cui, D. S. Reeves, D. Xu. 2004. Techniques and tools for analyzing intrusion alerts. ACM Trans. Inform. System Security 7(2) 274-318.
-
(2004)
ACM Trans. Inform. System Security
, vol.7
, Issue.2
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
45
-
-
0000052619
-
Authentication, access control, and audit
-
Sandhu, R., P. Samarati. 1996. Authentication, access control, and audit. ACM Comput. Surveys 28(1) 241-243.
-
(1996)
ACM Comput. Surveys
, vol.28
, Issue.1
, pp. 241-243
-
-
Sandhu, R.1
Samarati, P.2
-
46
-
-
0036909696
-
The security of confidential numerical data in databases
-
Sarathy, R., K. Muralidhar. 2002. The security of confidential numerical data in databases. Inform. Systems Res. 13(4) 389-403.
-
(2002)
Inform. Systems Res.
, vol.13
, Issue.4
, pp. 389-403
-
-
Sarathy, R.1
Muralidhar, K.2
-
47
-
-
30344453851
-
How much security is enough to stop a thief? The economics of outsider theft via computer systems and networks
-
G. Davida, Y. Frankel, O. Rees, eds. January 27-30, 2003, Lecture Notes in Computer Science, 2742, LCNS 2437. Springer-Verlag, New York
-
Schechter, S. E., M. D. Smith. 2003. How much security is enough to stop a thief? The economics of outsider theft via computer systems and networks. G. Davida, Y. Frankel, O. Rees, eds. Proc. Seventh Financial Cryptography Conf., January 27-30, 2003, Lecture Notes in Computer Science, 2742, LCNS 2437. Springer-Verlag, New York, 7-10.
-
(2003)
Proc. Seventh Financial Cryptography Conf.
, pp. 7-10
-
-
Schechter, S.E.1
Smith, M.D.2
-
48
-
-
24944436916
-
Sarbanes-Oxley: A huge boon to information security in the US
-
Schultz, E. 2004. Sarbanes-Oxley: A huge boon to information security in the US. Comput. Security 23(5) 353-354.
-
(2004)
Comput. Security
, vol.23
, Issue.5
, pp. 353-354
-
-
Schultz, E.1
-
49
-
-
24644436394
-
Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
-
Siponen, M. 2005. Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods. Inform. Organ. 15 339-375.
-
(2005)
Inform. Organ.
, vol.15
, pp. 339-375
-
-
Siponen, M.1
-
50
-
-
0002037905
-
Asymptotic confidence intervals for indirect effects in structural equation models
-
Sobel, M. E. 1982. Asymptotic confidence intervals for indirect effects in structural equation models. Sociol. Methodology 13 290-312.
-
(1982)
Sociol. Methodology
, vol.13
, pp. 290-312
-
-
Sobel, M.E.1
-
51
-
-
85041822425
-
The privacy rule, security rule, and transaction standards: Three sides of the same coin
-
Speers, T., S. Wilcox, B. Brown. 2004. The privacy rule, security rule, and transaction standards: Three sides of the same coin. J. Health Care Compliance 6(1) 11-14.
-
(2004)
J. Health Care Compliance
, vol.6
, Issue.1
, pp. 11-14
-
-
Speers, T.1
Wilcox, S.2
Brown, B.3
-
52
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D. W. 1990. Effective IS security: An empirical study. Inform. Systems Res. 1(3) 255-276.
-
(1990)
Inform. Systems Res.
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
53
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
Straub, D. W., W. D. Nance. 1990. Discovering and disciplining computer abuse in organizations: A field study. MIS Quart. 14(1) 45-60.
-
(1990)
MIS Quart.
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, D.W.1
Nance, W.D.2
-
54
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W., R. J. Welke. 1998. Coping with systems risk: Security planning models for management decision making. MIS Quart. 22(4) 441-469.
-
(1998)
MIS Quart.
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
56
-
-
0037967312
-
Flow-based model of computer hacker's motivation
-
Voiskounsky, A. E., O. V. Smyslova. 2003. Flow-based model of computer hacker's motivation. Cyber Psych. Behav. 6(2) 171-180.
-
(2003)
Cyber Psych. Behav.
, vol.6
, Issue.2
, pp. 171-180
-
-
Voiskounsky, A.E.1
Smyslova, O.V.2
-
57
-
-
9744248960
-
Theoretically speaking
-
Weber, R. 2002. Theoretically speaking. MIS Quart. 27(3) iii-xii.
-
(2002)
MIS Quart.
, vol.27
, Issue.3
-
-
Weber, R.1
-
58
-
-
0001268563
-
What constitutes a theoretical contribution?
-
Whetten, D. A. 1989. What constitutes a theoretical contribution? Acad. Management Rev. 14(4) 490-495.
-
(1989)
Acad. Management Rev.
, vol.14
, Issue.4
, pp. 490-495
-
-
Whetten, D.A.1
-
60
-
-
0141798248
-
Editor's comments
-
Zmud, R. 1998. Editor's comments. MIS Quart. 22(2) 7-10.
-
(1998)
MIS Quart.
, vol.22
, Issue.2
, pp. 7-10
-
-
Zmud, R.1
|