메뉴 건너뛰기




Volumn 24, Issue 6, 2004, Pages 551-561

Computer crime at CEFORMA: A case study

Author keywords

[No Author keywords available]

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS; INDUSTRIAL MANAGEMENT; PHYSIOLOGY; PROBLEM SOLVING; RESEARCH; SOCIETIES AND INSTITUTIONS;

EID: 7744227587     PISSN: 02684012     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijinfomgt.2004.08.009     Document Type: Conference Paper
Times cited : (15)

References (29)
  • 1
    • 7744225125 scopus 로고
    • Computer crime
    • T. Forester (Ed.). Oxford: Basil Blackwell
    • Ball, L. (1990). Computer crime. In T. Forester (Ed.), The information technology revolution. Oxford: Basil Blackwell.
    • (1990) The Information Technology Revolution
    • Ball, L.1
  • 4
    • 7744239071 scopus 로고
    • National Computer Security Educators, Information Resource Management College, National Defence University
    • Brown, R K. (1991). Security overview and threat. National Computer Security Educators, Information Resource Management College, National Defence University.
    • (1991) Security Overview and Threat
    • Brown, R.K.1
  • 5
    • 0002524429 scopus 로고
    • Committing a crime: The offenders decision
    • V. Konecni, & E. Ebbesen (Eds.). San Francisco: Freeman and Company
    • Carroll, J. (1982). Committing a crime: the offenders decision. In V. Konecni, & E. Ebbesen (Eds.), The criminal justice system: a social psychological analysis. San Francisco: Freeman and Company.
    • (1982) The Criminal Justice System: A Social Psychological Analysis
    • Carroll, J.1
  • 11
    • 0004040956 scopus 로고
    • Milton Keynes, UK: Open University Press
    • Croall, H. (1992). White collar crime. Milton Keynes, UK: Open University Press.
    • (1992) White Collar Crime
    • Croall, H.1
  • 13
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon, G., & Backhouse, J. (2000). Information system security management in the new millennium. Communications of the ACM, 43(7), 125-128.
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 14
    • 0035658603 scopus 로고    scopus 로고
    • Computer Crimes: Theorizing about the enemy within
    • Dhillon, G., & Moores, S. (2001). Computer Crimes: theorizing about the enemy within. Computers & Security, 20(8), 715-723.
    • (2001) Computers & Security , vol.20 , Issue.8 , pp. 715-723
    • Dhillon, G.1    Moores, S.2
  • 18
    • 7744232178 scopus 로고    scopus 로고
    • A practical solution to the complex human issues of information security design
    • S. K. Katsikas, & D. Gritzalis (Eds.). London: Chapman & Hall
    • Hitchings, J. (1996). A practical solution to the complex human issues of information security design. In S. K. Katsikas, & D. Gritzalis (Eds.), Information systems security: facing the information society of the 21st century (pp. 3-12). London: Chapman & Hall.
    • (1996) Information Systems Security: Facing the Information Society of the 21st Century , pp. 3-12
    • Hitchings, J.1
  • 19
    • 0020985537 scopus 로고
    • Deterrence n the workplace: Perceived certainty, perceived severity and employee theft
    • Hollinger, R., & Clark, J. (1983). Deterrence n the workplace: perceived certainty, perceived severity and employee theft. Social Forces, 62(2), 398-418.
    • (1983) Social Forces , vol.62 , Issue.2 , pp. 398-418
    • Hollinger, R.1    Clark, J.2
  • 21
    • 0017275322 scopus 로고
    • A proposal for a behavioural approach to decrease shoplifting
    • McClaughlin, T. (1976). A proposal for a behavioural approach to decrease shoplifting. Corrective and Social Psychiatry, 22, 12-14.
    • (1976) Corrective and Social Psychiatry , vol.22 , pp. 12-14
    • McClaughlin, T.1
  • 22
    • 84980300455 scopus 로고
    • Shoplifting prevention, providing information through signs
    • McNees, M., et al. (1976). Shoplifting prevention, providing information through signs. Journal of Applied Behavioural Analysis, 9, 339-405.
    • (1976) Journal of Applied Behavioural Analysis , vol.9 , pp. 339-405
    • McNees, M.1
  • 25
    • 34247919432 scopus 로고
    • The ideological construction of the hidden economy
    • Scraton, P., & South, N. (1984). The ideological construction of the hidden economy. Contemporary Crises (8).
    • (1984) Contemporary Crises , Issue.8
    • Scraton, P.1    South, N.2
  • 27
    • 84904255922 scopus 로고    scopus 로고
    • A new paradigm for adding security into IS development methods
    • J. H. P. Eloff, L. Labuschagne, R. von Solms, & G. Dhillon (Eds.). Boston: Kluwer Academic Publishers
    • Siponen, M., & Baskerville, R. (2001). A new paradigm for adding security into IS development methods. In J. H. P. Eloff, L. Labuschagne, R. von Solms, & G. Dhillon (Eds.), Advances in information security management & small systems security (pp. 99-111). Boston: Kluwer Academic Publishers.
    • (2001) Advances in Information Security Management & Small Systems Security , pp. 99-111
    • Siponen, M.1    Baskerville, R.2
  • 29
    • 84993077822 scopus 로고    scopus 로고
    • Understanding and addressing criminal opportunity: The application of situational crime prevention to IS security
    • Willison, R. (2000). Understanding and addressing criminal opportunity: The application of situational crime prevention to IS security. Journal of Financial Crime, 7, 3.
    • (2000) Journal of Financial Crime , vol.7 , pp. 3
    • Willison, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.