-
1
-
-
32044448164
-
How does market enforcement deter gray market incidence?
-
ANTIA KD, BERGEN ME, DUTTA S and FISHER RJ (2006) How does market enforcement deter gray market incidence? Journal of Marketing 70(1), 92-106.
-
(2006)
Journal of Marketing
, vol.70
, Issue.1
, pp. 92-106
-
-
Antia, K.D.1
Bergen, M.E.2
Dutta, S.3
Fisher, R.J.4
-
2
-
-
84933494181
-
The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault
-
BACHMAN R, PATERNOSTER R and WARD S (1992) The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault. Law & Society Review 26(2), 343-372.
-
(1992)
Law & Society Review
, vol.26
, Issue.2
, pp. 343-372
-
-
Bachman, R.1
Paternoster, R.2
Ward, S.3
-
5
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
BULGURCU B, CAVUSOGLU H and BENBASAT I (2010) Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly 34(3), 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
7
-
-
30344482234
-
Is out of sight, out of mind? an empirical study of social loafing in technology-supported groups
-
CHIDAMBARAM L and TUNG LL (2005) Is out of sight, out of mind? an empirical study of social loafing in technology-supported groups. Information Systems Research 16(2), 149-168.
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 149-168
-
-
Chidambaram, L.1
Tung, L.L.2
-
8
-
-
46349084961
-
Are persons low in self-control rational and deterrable?
-
COCHRAN JK, ALEKSA V and SANDERS BA (2008) Are persons low in self-control rational and deterrable? Deviant Behavior 29(5), 461-483.
-
(2008)
Deviant Behavior
, vol.29
, Issue.5
, pp. 461-483
-
-
Cochran, J.K.1
Aleksa, V.2
Sanders, B.A.3
-
9
-
-
80455169162
-
-
CSO/CERT/DELOITTE, [WWW document], (accessed 1 May 2011)
-
CSO/CERT/DELOITTE (2010) Cybersecurity watch survey. [WWW document] http://www.cert.org/insider-threat (accessed 1 May 2011).
-
(2010)
Cybersecurity Watch Survey
-
-
-
10
-
-
67349280492
-
Does one size fit all? examining the differential effects of IS security countermeasures
-
D'ARCY J and HOVAV A (2009) Does one size fit all? examining the differential effects of IS security countermeasures. Journal of Business Ethics 89(1), 59-71.
-
(2009)
Journal of Business Ethics
, vol.89
, Issue.1
, pp. 59-71
-
-
D'Arcy, J.1
Hovav, A.2
-
11
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence perspective
-
D'ARCY J, HOVAV A and GALLETTA DF (2009) User awareness of security countermeasures and its impact on information systems misuse: A deterrence perspective. Information Systems Research 20(1), 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.F.3
-
12
-
-
0028847197
-
Informal sanction threats and corporate crime: Additive versus multiplicative models
-
ELIS LA and SIMPSON S (1995) Informal sanction threats and corporate crime: Additive versus multiplicative models. Journal of Research in Crime and Delinquency 32(4), 399-424.
-
(1995)
Journal of Research in Crime and Delinquency
, vol.32
, Issue.4
, pp. 399-424
-
-
Elis, L.A.1
Simpson, S.2
-
13
-
-
80455157035
-
-
ERNST AND YOUNG, [WWW document], (accessed 1 May 2011)
-
ERNST AND YOUNG (2009) 12th annual global information security survey. [WWW document] http://www.ey.com (accessed 1 May 2011).
-
(2009)
12th annual global information security survey
-
-
-
16
-
-
84857046974
-
The deterrent effect of perceived severity of punishment
-
GRASMICK HG and BRYJAK GJ (1980) The deterrent effect of perceived severity of punishment. Social Forces 59(2), 471-491.
-
(1980)
Social Forces
, vol.59
, Issue.2
, pp. 471-491
-
-
Grasmick, H.G.1
Bryjak, G.J.2
-
17
-
-
84935667238
-
Conscience, significant others, and rational choice: Extending the deterrence model
-
GRASMICK HG and BURSIK R (1990) Conscience, significant others, and rational choice: Extending the deterrence model. Law and Society Review 24(3), 837-861.
-
(1990)
Law and Society Review
, vol.24
, Issue.3
, pp. 837-861
-
-
Grasmick, H.G.1
Bursik, R.2
-
18
-
-
0027476181
-
Testing the core implications of Gettfredson and Hirschi's general theory of crime
-
GRASMICK HG, TITTLE R, BURSIK J and ARNEKLEV B (1993) Testing the core implications of Gettfredson and Hirschi's general theory of crime. Journal of Research in Crime and Delinquency 30(1), 5-29.
-
(1993)
Journal of Research in Crime and Delinquency
, vol.30
, Issue.1
, pp. 5-29
-
-
Grasmick, H.G.1
Tittle, R.2
Bursik, J.3
Arneklev, B.4
-
19
-
-
0000917858
-
The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
-
HARRINGTON SJ (1996) The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly 20(3), 257-278.
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.J.1
-
20
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organizations
-
HERATH T and RAO HR (2009a) Protection motivation and deterrence: A framework for security policy compliance in organizations. European Journal of Information Systems 18(2), 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
21
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
HERATH T and RAO HR (2009b) Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems 47(2), 14-165.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 14-165
-
-
Herath, T.1
Rao, H.R.2
-
23
-
-
0343001536
-
Crime by computer: Correlates of software piracy and unauthorized account access
-
HOLLINGER RC (1993) Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal 4(1), 2-12.
-
(1993)
Security Journal
, vol.4
, Issue.1
, pp. 2-12
-
-
Hollinger, R.C.1
-
24
-
-
77954295697
-
Deterrence and deterrability
-
JACOBS BA (2010) Deterrence and deterrability. Criminology 48(2), 417-441.
-
(2010)
Criminology
, vol.48
, Issue.2
, pp. 417-441
-
-
Jacobs, B.A.1
-
25
-
-
0037400028
-
An integrative study of information systems security effectiveness
-
KANKANHALLI A, TEO H-H, TAN BCY and WEI K-K (2003) An integrative study of information systems security effectiveness. International Journal of Information Management 23(2), 139-154.
-
(2003)
International Journal of Information Management
, vol.23
, Issue.2
, pp. 139-154
-
-
Kankanhalli, A.1
Teo, H.-H.2
Tan, B.C.Y.3
Wei, K.-K.4
-
26
-
-
0024447728
-
The deterrent effect of perceived certainty and severity of punishment revisited
-
KLEPPER S andNAGIN DS (1989) The deterrent effect of perceived certainty and severity of punishment revisited. Criminology 27(4), 721-746.
-
(1989)
Criminology
, vol.27
, Issue.4
, pp. 721-746
-
-
Klepper, S.1
Nagin, D.S.2
-
27
-
-
0001851459
-
Stage and sequence: The cognitive developmental approach to socialization
-
(Goslin DA, Ed.), Rand McNally, Chicago
-
KOHLBERG L (1969) Stage and sequence: The cognitive developmental approach to socialization. In Handbook of Socialization Theory (Goslin DA, Ed.), pp 347-380, Rand McNally, Chicago.
-
(1969)
Handbook of Socialization Theory
, pp. 347-380
-
-
Kohlberg, L.1
-
28
-
-
84990586591
-
How believing in ourselves increases risk taking: Perceived self-efficacy and opportunity recognition
-
KRUEGAR NJ and DICKSON PR (1994) How believing in ourselves increases risk taking: Perceived self-efficacy and opportunity recognition. Decision Sciences 25(3), 385-400.
-
(1994)
Decision Sciences
, vol.25
, Issue.3
, pp. 385-400
-
-
Kruegar, N.J.1
Dickson, P.R.2
-
29
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
LEE SM, LEE S-G and YOO S (2004) An integrative model of computer abuse based on social control and general deterrence theories. Information and Management 41(6), 707-718.
-
(2004)
Information and Management
, vol.41
, Issue.6
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.-G.2
Yoo, S.3
-
30
-
-
75349090403
-
Understanding compliance within internet use policy from the perspective of rational choice theory
-
LI H, ZHANG J and SARATHY R (2010) Understanding compliance within internet use policy from the perspective of rational choice theory. Decision Support Systems 48(4), 635-645.
-
(2010)
Decision Support Systems
, vol.48
, Issue.4
, pp. 635-645
-
-
Li, H.1
Zhang, J.2
Sarathy, R.3
-
31
-
-
77949559438
-
Workplace management and employee misuse: Does punishment matter?
-
LIAO Q, GURUNG A, LUO X and LI L (2009) Workplace management and employee misuse: Does punishment matter? Journal of Computer Information Systems 50(2), 49-59.
-
(2009)
Journal of Computer Information Systems
, vol.50
, Issue.2
, pp. 49-59
-
-
Liao, Q.1
Gurung, A.2
Luo, X.3
Li, L.4
-
32
-
-
0030194196
-
Evaluating ethical decision making and computer use
-
LOCH KD and CONGER S (1996) Evaluating ethical decision making and computer use. Communications of the ACM 39(7), 74-83.
-
(1996)
Communications of the AC.M.
, vol.39
, Issue.7
, pp. 74-83
-
-
Loch, K.D.1
Conger, S.2
-
33
-
-
0242509167
-
The effects of drinking-driving laws: A test of the differential deterrence hypothesis
-
MANN RE, SMART RG, STODUTO G, ADLAF EM, VINGILIS E, BEIRNESS D, LAMBLE R and ASHBRIDGE M (2003) The effects of drinking-driving laws: A test of the differential deterrence hypothesis. Addiction 98(11), 1531-1536.
-
(2003)
Addiction
, vol.98
, Issue.11
, pp. 1531-1536
-
-
Mann, R.E.1
Smart, R.G.2
Stoduto, G.3
Adlaf, E.M.4
Vingilis, E.5
Beirness, D.6
Lamble, R.7
Ashbridge, M.8
-
34
-
-
55349132521
-
The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability and stability over time
-
MARAKAS GM, JOHNSON RD and CLAY PF (2007) The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability and stability over time. Journal of the Association for Information Systems 8(1), 16-46.
-
(2007)
Journal of the Association for Information Systems
, vol.8
, Issue.1
, pp. 16-46
-
-
Marakas, G.M.1
Johnson, R.D.2
Clay, P.F.3
-
35
-
-
0041880143
-
Does out of sight' mean 'out of mind'? an empirical investigation of career advancement prospects of telecommuters
-
MCCLOSKEY DW and IGBARIA M (2003) Does 'out of sight' mean 'out of mind'? an empirical investigation of career advancement prospects of telecommuters. Information Resources Management Journal 16(2), 19-34.
-
(2003)
Information Resources Management Journal
, vol.16
, Issue.2
, pp. 19-34
-
-
Mccloskey, D.W.1
Igbaria, M.2
-
36
-
-
0035737668
-
Putting severity of punishment back in the deterrence package
-
MENDES SM and MCDONALD MD (2001) Putting severity of punishment back in the deterrence package. Policy Studies Journal 29(4), 588-610.
-
(2001)
Policy Studies Journal
, vol.29
, Issue.4
, pp. 588-610
-
-
Mendes, S.M.1
Mcdonald, M.D.2
-
38
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules? an empirical study
-
MYYRY L, SIPONEN M, PAHNILA S, VARTIAINEN T and VANCE A (2009) What levels of moral reasoning and values explain adherence to information security rules? an empirical study. European Journal of Information Systems 18(2), 1-14.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 1-14
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
39
-
-
0012801298
-
Integrating celerity, impulsivity, and extralegal sanction threats into a model of general deterrence: Theory and evidence
-
NAGIN DS and POGARSKY G (2001) Integrating celerity, impulsivity, and extralegal sanction threats into a model of general deterrence: Theory and evidence. Criminology 39(4), 865-891.
-
(2001)
Criminology
, vol.39
, Issue.4
, pp. 865-891
-
-
Nagin, D.S.1
Pogarsky, G.2
-
41
-
-
0000802230
-
The deterrence effect of perceived certainty and severity of punishment: A review of the evidence and issues
-
PATERNOSTER R (1987) The deterrence effect of perceived certainty and severity of punishment: A review of the evidence and issues. Justice Quarterly 4(2), 173-217.
-
(1987)
Justice Quarterly
, vol.4
, Issue.2
, pp. 173-217
-
-
Paternoster, R.1
-
42
-
-
79251640122
-
How much do we really know about criminal deterrence?
-
PATERNOSTER R (2010) How much do we really know about criminal deterrence? The Journal of Criminal Law and Criminology 100(3), 765-823.
-
(2010)
The Journal of Criminal Law and Criminology
, vol.100
, Issue.3
, pp. 765-823
-
-
Paternoster, R.1
-
43
-
-
85133181649
-
The deterrent effect of perceived severity: A reexamination
-
PATERNOSTER R and IOVANNI L (1986) The deterrent effect of perceived severity: A reexamination. Social Forces 64, 751-777.
-
(1986)
Social Forces
, vol.64
, pp. 751-777
-
-
Paternoster, R.1
Iovanni, L.2
-
44
-
-
0039933440
-
A rational choice theory of corporate crime
-
(CLARKE RV and FELSON M, Eds), Transaction Publishers, New Brunswick, NJ.
-
PATERNOSTER R and SIMPSON S (1993) A rational choice theory of corporate crime. In Routine Activities and Rational Choice: Advances in Criminological Theory, Volume 5 (CLARKE RV and FELSON M, Eds), pp 37-58, Transaction Publishers, New Brunswick, NJ.
-
(1993)
Routine Activities and Rational Choice: Advances in Criminological Theory Volume 5
, pp. 37-58
-
-
Paternoster, R.1
Simpson, S.2
-
45
-
-
0030521693
-
Sanction threats and appeals to morality: Testing a rational choice model of corporate crime
-
PATERNOSTER R and SIMPSON S (1996) Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law & Society Review 30(3), 549-584.
-
(1996)
Law & Society Review
, vol.30
, Issue.3
, pp. 549-584
-
-
Paternoster, R.1
Simpson, S.2
-
46
-
-
0031288378
-
Anonymity in group support systems research: A new conceptualization, measure, and contingency framework
-
PINSONNEAULT A and HEPPEL N (1998) Anonymity in group support systems research: A new conceptualization, measure, and contingency framework. Journal of Management Information Systems 14(3), 89-108.
-
(1998)
Journal of Management Information Systems
, vol.14
, Issue.3
, pp. 89-108
-
-
Pinsonneault, A.1
Heppel, N.2
-
47
-
-
0000392842
-
Specifying the direct and indirect effects of low self-control and situational factors in offenders decision making: Toward a more comparative model of rational offending
-
PIQUERO A and TIBBETTS S (1996) Specifying the direct and indirect effects of low self-control and situational factors in offenders decision making: Toward a more comparative model of rational offending. Justice Quarterly 13(3), 481-510.
-
(1996)
Justice Quarterly
, vol.13
, Issue.3
, pp. 481-510
-
-
Piquero, A.1
Tibbetts, S.2
-
48
-
-
3242783413
-
Studying the reach of deterrence: Can deterrence theory help explain police misconduct?
-
POGARSKY G and PIQUERO AR (2004) Studying the reach of deterrence: Can deterrence theory help explain police misconduct? Journal of Criminal Justice 32(4), 371-386.
-
(2004)
Journal of Criminal Justice
, vol.32
, Issue.4
, pp. 371-386
-
-
Pogarsky, G.1
Piquero, A.R.2
-
49
-
-
5644238106
-
Modeling change in perceptions about sanction threats: The neglected linkage in deterrence theory
-
POGARSKY G, PIQUERO AR and PATERNOSTER R (2004) Modeling change in perceptions about sanction threats: The neglected linkage in deterrence theory. Journal of Quantitative Criminology 20(4), 343-369.
-
(2004)
Journal of Quantitative Criminology
, vol.20
, Issue.4
, pp. 343-369
-
-
Pogarsky, G.1
Piquero, A.R.2
Paternoster, R.3
-
50
-
-
0032367768
-
Deindividuation and antinormative behavior: A meta-analysis
-
POSTMES T and SPEARS R (1998) Deindividuation and antinormative behavior: A meta-analysis. Psychological Bulletin 123(3), 238-259.
-
(1998)
Psychological Bulletin
, vol.123
, Issue.3
, pp. 238-259
-
-
Postmes, T.1
Spears, R.2
-
51
-
-
0039842473
-
The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis
-
PRATT TC and CULLEN FT (2000) The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis. Criminology 38, 931-964.
-
(2000)
Criminology
, vol.38
, pp. 931-964
-
-
Pratt, T.C.1
Cullen, F.T.2
-
52
-
-
33751089858
-
The empirical status of deterrence theory: A meta-analysis
-
(CULLEN FT, WRIGHT JP and BLEVINS KR, Eds), Transaction Publishers, New Brunswick, N.J.
-
PRATT TC, CULLEN FT, BLEVIS KR, DAIGLE LE and MADENSEN TD (2006) The empirical status of deterrence theory: A meta-analysis. In Taking Stock: The Status of Criminological Theory (CULLEN FT, WRIGHT JP and BLEVINS KR, Eds), pp 37-76, Transaction Publishers, New Brunswick, NJ.
-
(2006)
Taking Stock: The Status of Criminological Theory
, pp. 37-76
-
-
Pratt, T.C.1
Cullen, F.T.2
Blevis, K.R.3
Daigle, L.E.4
Madensen, T.D.5
-
53
-
-
49249119924
-
Insiders behaving badly
-
PREDD J, PFLEEGER SL, HUNKER J and BULFORD C (2008) Insiders behaving badly. IEEE Security & Privacy 6(4), 66-70.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.4
, pp. 66-70
-
-
Predd, J.1
Pfleeger, S.L.2
Hunker, J.3
Bulford, C.4
-
54
-
-
84881817158
-
-
PWC/CSO/CI.O.[WWW document], (accessed 1 May 2011)
-
PWC/CSO/CIO (2010) The global state of information security. [WWW document] http://www.pwc.com/en-GX/gx/information-security-survey/ pdf/pwcsurvey2010-cio-reprint.pdf (accessed 1 May 2011).
-
(2010)
The Global State of Information Security
-
-
-
55
-
-
77957017257
-
Anticipated shaming and criminal offending
-
REBELLON CJ, PIQUERO NL, PIQUERO AR and TIBBETTS SG (2010) Anticipated shaming and criminal offending. Journal of Criminal Justice 38(5), 988-997.
-
(2010)
Journal of Criminal Justice
, vol.38
, Issue.5
, pp. 988-997
-
-
Rebellon, C.J.1
Piquero, N.L.2
Piquero, A.R.3
Tibbetts, S.G.4
-
56
-
-
0033422813
-
Accounting for the contradictory organizational consequences of information technology: Theoretical directions and methodological implications
-
ROBEY D and BOUDREAU MC (1996) Accounting for the contradictory organizational consequences of information technology: Theoretical directions and methodological implications. Information Systems Research 10(2), 167-185.
-
(1996)
Information Systems Research
, vol.10
, Issue.2
, pp. 167-185
-
-
Robey, D.1
Boudreau, M.C.2
-
57
-
-
29144434015
-
Self-control, moral beliefs, and criminal activity
-
SCHOEPFER A and PIQUERO AR (2006) Self-control, moral beliefs, and criminal activity. Deviant Behavior 27(1), 51-71.
-
(2006)
Deviant Behavior
, vol.27
, Issue.1
, pp. 51-71
-
-
Schoepfer, A.1
Piquero, A.R.2
-
58
-
-
84925902298
-
Toward a theory of criminal deterrence
-
SILBERMAN M (1976) Toward a theory of criminal deterrence. American Sociological Review 41(3), 442-461.
-
(1976)
American Sociological Review
, vol.41
, Issue.3
, pp. 442-461
-
-
Silberman, M.1
-
59
-
-
80455157037
-
Rationality and corporate offending decisions
-
Routledge, New York
-
SIMPSON S, PIQUERO N and PATERNOSTER R (2002) Rationality and corporate offending decisions. In Rational Choice and Criminal Behavior: Recent Research and Future Challenges (Piquero AR and Tibbetts SG, Eds), pp 25-39, Routledge, New York.
-
(2002)
Rational Choice and Criminal Behavior: Recent Research and Future Challenges (Piquero AR and Tibbetts SG, Eds
, pp. 25-39
-
-
Simpson, S.1
Piquero, N.2
Paternoster, R.3
-
60
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
SIPONEN M and VANCE A (2010) Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly 34(3), 487-502.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
61
-
-
36248967046
-
Employees' adherence to information security policies: An empirical study
-
New Approaches for Security, Privacy and Trust in Complex Environments (VENTER H, ELOFF M, LABUSCHAGNE L, ELOFF J and VON SOLMS R Eds), Springer, Boston, M.A.
-
SIPONEN M, PAHNILA S and MAHMOOD A (2007) Employees' adherence to information security policies: An empirical study. In International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments (VENTER H, ELOFF M, LABUSCHAGNE L, ELOFF J and VON SOLMS R Eds), pp 133-144, Springer, Boston, MA.
-
(2007)
International Federation for Information Processing, Volume 232
, pp. 133-144
-
-
Siponen, M.1
Pahnila, S.2
Mahmood, A.3
-
63
-
-
0030668250
-
A social learning theory analysis of computer crime among college students
-
SKINNER WF and FREAM AM (1997) A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency 34(4), 495-518.
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, Issue.4
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
64
-
-
35649002629
-
Why managers fail to do the right thing: An empirical study of unethical and illegal conduct
-
SMITH NC, SIMPSON SS and HUANG C-Y (2007) Why managers fail to do the right thing: An empirical study of unethical and illegal conduct. Business Ethics Quarterly 17(4), 633-667.
-
(2007)
Business Ethics Quarterly
, vol.17
, Issue.4
, pp. 633-667
-
-
Smith, N.C.1
Simpson, S.S.2
Huang, C.-Y.3
-
65
-
-
0000280419
-
Effective IS security: An empirical study
-
STRAUB DW (1990) Effective IS security: An empirical study. Information Systems Research 1(3), 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
66
-
-
24644470542
-
The insider threat to information systems and the effectiveness of ISO17799
-
THEOHARIDOU M, KOKOLAKIS S, KARYDA M and KIOUNTOUZIS E (2005) The insider threat to information systems and the effectiveness of ISO17799. Computers & Security 24(6), 472-484.
-
(2005)
Computers & Security
, vol.24
, Issue.6
, pp. 472-484
-
-
Theoharidou, M.1
Kokolakis, S.2
Karyda, M.3
Kiountouzis, E.4
-
67
-
-
0002536560
-
Reflections on the advantages and disadvantages of theoretical integration
-
State University of New York Press, Albany, N.Y.
-
THORNBERRY TP (1989) Reflections on the advantages and disadvantages of theoretical integration. In Theoretical Integration in the Study of Deviance and Crime (MESSNER SF, KROHN MD, and LISKA AE, eds.), pp 51-60, State University of New York Press, Albany, NY.
-
(1989)
Theoretical Integration in the Study of Deviance and Crime (MESSNER SF, KROHN MD, and LISKA AE, eds.
, pp. 51-60
-
-
Thornberry, T.P.1
-
70
-
-
80455169161
-
-
UNITED NATIONS, Information economy report 2005. [WWW document], accessed 1 May 2011
-
UNITED NATIONS (2005) Information economy report 2005. [WWW document] http://www.unctad.org/en/docs/sdteecb20051overview-en pdf (accessed 1 May 2011).
-
(2005)
-
-
-
71
-
-
67650170305
-
Behavioral and policy issues in information systems security: The insider threat
-
WARKENTIN M and WILLISON R (2009) Behavioral and policy issues in information systems security: The insider threat. European Journal of Information Systems 18(2), 101-105.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 101-105
-
-
Warkentin, M.1
Willison, R.2
-
72
-
-
0033266882
-
Communication patterns as determinants of organizational identification in a virtual organization
-
WIESENFELD B, RAGHURAM S and GARUD R (1999) Communication patterns as determinants of organizational identification in a virtual organization. Organization Science 10(6), 777-790.
-
(1999)
Organization Science
, vol.10
, Issue.6
, pp. 777-790
-
-
Wiesenfeld, B.1
Raghuram, S.2
Garud, R.3
-
73
-
-
84935665607
-
Perceptual research on general deterrence: A critical review
-
WILLIAMS KR and HAWKINS R (1986) Perceptual research on general deterrence: A critical review. Law & Society Review 20(4), 545-572.
-
(1986)
Law & Society Review
, vol.20
, Issue.4
, pp. 545-572
-
-
Williams, K.R.1
Hawkins, R.2
-
75
-
-
4043110723
-
Does the perceived risk of punishment deter criminally prone individuals? rational choice, self-control, and crime
-
WRIGHT BRE, CASPI A, MOFFITT TE and PATERNOSTER R (2004) Does the perceived risk of punishment deter criminally prone individuals? rational choice, self-control, and crime. Journal of Research in Crime and Delinquency 41(2), 180-213.
-
(2004)
Journal of Research in Crime and Delinquency
, vol.41
, Issue.2
, pp. 180-213
-
-
Wright, B.R.E.1
Caspi, A.2
Moffitt, T.E.3
Paternoster, R.4
-
76
-
-
70249120779
-
Examining digital piracy: Self-control, punishment, and self-efficacy
-
ZHANG L, SMITH WW and MCDOWELL WC (2006) Examining digital piracy: Self-control, punishment, and self-efficacy. Information Resources Management Journal 22(1), 24-44.
-
(2006)
Information Resources Management Journal
, vol.22
, Issue.1
, pp. 24-44
-
-
Zhang, L.1
Smith, W.W.2
Mcdowell, W.C.3
-
77
-
-
0001584574
-
The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos
-
(ARNOLD WJ and LEVINE D, Eds), University of Nebraska Press, Lincoln, Nebraska
-
ZIMBARDO PG (1969) The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos. In Nebraska Symposium on Motivation (ARNOLD WJ and LEVINE D, Eds), pp 237-307, University of Nebraska Press, Lincoln, Nebraska.
-
(1969)
Nebraska Symposium on Motivation
, pp. 237-307
-
-
Zimbardo, P.G.1
|