-
1
-
-
84875515215
-
Computer crimes-a study of different types of offences and offenders
-
Singapore, 27-29 May 1992 Elsevier Science Publishers B.V. (North Holland)
-
Angerfelt, B. (1992). Computer crimes-a study of different types of offences and offenders. Eighth IFIP International Symposium on Computer Security, IFIP Sec '92, Singapore, 27-29 May 1992, Elsevier Science Publishers B.V. (North Holland).
-
(1992)
Eighth IFIP International Symposium on Computer Security, IFIP Sec '92
-
-
Angerfelt, B.1
-
4
-
-
33749323733
-
-
Audit Commission, London, Audit Commission Publications, HMSO
-
Audit Commission (2001). Your business@ risk: an update of IT abuse 2001, London, Audit Commission Publications, HMSO.
-
(2001)
Your business@ risk: An update of IT abuse 2001
-
-
-
5
-
-
84875513843
-
-
Audit Commission Report, London, HMSO
-
Audit Commission Report, (2005). ICT Fraud and Abuse 2005. London, HMSO.
-
(2005)
ICT Fraud and Abuse 2005
-
-
-
6
-
-
84875486676
-
Report of the Board of Banking Supervision: Inquiry into the Circumstances of the Collapse of Barings
-
HMSO. Extract from the conclusion of the Bank of England Report on the collapse of Barings
-
Bank of England Report, 1995, "Report of the Board of Banking Supervision: Inquiry into the Circumstances of the Collapse of Barings", HMSO. Extract from the conclusion of the Bank of England Report on the collapse of Barings. http://www.forex.com/members/regulation/boebar/boe.htm
-
(1995)
Bank of England Report
-
-
-
7
-
-
13444285413
-
-
Los Angeles, National Center for Computer Crime Data
-
BloomBecker, J. (1986). Computer crime law reporter. Los Angeles, National Center for Computer Crime Data.
-
(1986)
Computer crime law reporter
-
-
BloomBecker, J.1
-
10
-
-
84965878455
-
On theory and action for corporate crime control
-
(April)
-
Braithwaite, J. and Geis, G. (1982). "On theory and action for corporate crime control", Crime and Delinquency (April): 292-314.
-
(1982)
Crime and Delinquency
, pp. 292-314
-
-
Braithwaite, J.1
Geis, G.2
-
12
-
-
2342497078
-
-
CSI/F.B.I. San Francisco, CSI
-
CSI/FBI (2003). Computer Crime Security Survey. San Francisco, CSI: http://www.gocsi.com/
-
(2003)
Computer Crime Security Survey
-
-
-
15
-
-
84875497244
-
The role of individual characteristics on the effectiveness of IS security countermeasures
-
D'Arcy and Hovav, New York
-
D'Arcy and Hovav (2004). The role of individual characteristics on the effectiveness of IS security countermeasures. Tenth Americas Conference on Information Systems (AMCIS) 2004, New York: 1-8.
-
(2004)
Tenth Americas Conference on Information Systems (AMCIS) 2004
, pp. 1-8
-
-
-
18
-
-
0004040956
-
-
Milton Keynes, Open University Press
-
Croall, H. (1992). White collar crime. Milton Keynes, Open University Press.
-
(1992)
White collar crime
-
-
Croall, H.1
-
21
-
-
0003982595
-
Managing information system security
-
Macmillan Press
-
Dhillon, G. (1997). Managing information system security, Macmillan Press.
-
(1997)
-
-
Dhillon, G.1
-
23
-
-
0035063716
-
Violation of safeguard by trusted personnel and understanding related information security concerns
-
Dhillon, G. (2001). "Violation of safeguard by trusted personnel and understanding related information security concerns. " Computers & Security 20 (2): 165-172.
-
(2001)
Computers & Security
, vol.20
, Issue.2
, pp. 165-172
-
-
Dhillon, G.1
-
28
-
-
85024291756
-
News track: Latest computer security numbers
-
Fox, R. (1998). "News track: Latest computer security numbers. " Communications of the ACM 41(11): 9-16.
-
(1998)
Communications of the ACM
, vol.41
, Issue.11
, pp. 9-16
-
-
Fox, R.1
-
30
-
-
84875491096
-
Just 37 get security cert
-
London
-
Goodwin, B. (2000). "Just 37 get security cert. " Computer Weekly. London: 2.
-
(2000)
Computer Weekly
, pp. 2
-
-
Goodwin, B.1
-
33
-
-
0000917858
-
The effects of codes of ethics and personal denial of responsibility on computer abuse and judgments and intentions
-
Harrington, S. J. (1996). "The effects of codes of ethics and personal denial of responsibility on computer abuse and judgments and intentions. " MIS Quarterly (20) 3: 257-278.
-
(1996)
MIS Quarterly
, vol.3
, Issue.20
, pp. 257-278
-
-
Harrington, S.J.1
-
35
-
-
84875546527
-
The process of criminalization: The case of computer crime laws
-
R. C. Hollinger (ed). Dartmouth, Dartmouth Publishing Company Limited
-
Hollinger, R. C. and L. Lanza-Kaduce (1997). The process of criminalization: the case of computer crime laws. Crime, deviance and the computer. R. C. Hollinger (ed). Dartmouth, Dartmouth Publishing Company Limited: 59-84.
-
(1997)
Crime, deviance and the computer
, pp. 59-84
-
-
Hollinger, R.C.1
Lanza-Kaduce, L.2
-
36
-
-
0004265173
-
-
Sebastopol, O'Riley & Associates
-
Icove, D., Seger, K., and VonStorch, W. (1995). Computer crime: a crime fighter's handbook. Sebastopol, O'Riley & Associates.
-
(1995)
Computer crime: A crime fighter's handbook
-
-
Icove, D.1
Seger, K.2
VonStorch, W.3
-
38
-
-
0004197846
-
-
Englewood Cliffs, Prentice-Hall
-
Johnson, D. G. (1994). Computer ethics. Englewood Cliffs, Prentice-Hall.
-
(1994)
Computer ethics
-
-
Johnson, D.G.1
-
39
-
-
84976680568
-
Accountability and computer decision systems
-
Johnson, D. G., and Mulvey, J.M. (1995). "Accountability and computer decision systems. " Communications of the ACM 38 (12): 58-64.
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 58-64
-
-
Johnson, D.G.1
Mulvey, J.M.2
-
41
-
-
84875547856
-
Dealing with computer misuse-the need for an international approach
-
Singapore, 27-29 May 1992 Elsevier Science Publishers B.V. (North Holland)
-
Jones, M. R. (1992). Dealing with computer misuse-the need for an international approach. Eighth IFIP International Symposium on Computer Security, IFIP Sec '92, Singapore, 27-29 May 1992, Elsevier Science Publishers B.V. (North Holland).
-
(1992)
Eighth IFIP International Symposium on Computer Security, IFIP Sec '92
-
-
Jones, M.R.1
-
42
-
-
0037400028
-
An integrated study of information systems security effectiveness
-
Kankanhalli, A., Teo, H.H., Tang, B.C., and Wei, K.K. (2003). "An integrated study of information systems security effectiveness. " International Journal of Information Management 23 (2): 139-154.
-
(2003)
International Journal of Information Management
, vol.23
, Issue.2
, pp. 139-154
-
-
Kankanhalli, A.1
Teo, H.H.2
Tang, B.C.3
Wei, K.K.4
-
44
-
-
26044473699
-
Managing Computer Misuse
-
Special Issue: ISTAS '97: Computers and Society at a Time of Sweeping Change, a Sage Referred Journal
-
Kesar, S., and Rogerson, S. (1998). "Managing Computer Misuse" Social Science Computer Review (SCCORE), Special Issue: ISTAS '97: Computers and Society at a Time of Sweeping Change, a Sage Referred Journal 16 (3): 240-251.
-
(1998)
Social Science Computer Review (SCCORE)
, vol.16
, Issue.3
, pp. 240-251
-
-
Kesar, S.1
Rogerson, S.2
-
45
-
-
24344435754
-
The computer virus threat: A survey of current criminal statues
-
Kluth, D. J. (1990). "The computer virus threat: a survey of current criminal statues. " Hameline Law Review 13(Spring): 297-312.
-
(1990)
Hameline Law Review
, vol.13
, Issue.SPRING
, pp. 297-312
-
-
Kluth, D.J.1
-
46
-
-
84976745037
-
Ethical concepts and information technology
-
Laudon, K. C. (1995). "Ethical concepts and information technology. " Communications of the ACM 38 (12): 33-39.
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 33-39
-
-
Laudon, K.C.1
-
48
-
-
84875503185
-
White-collar crime in the news
-
Liverpool, July
-
Levi, M. (1999). White-collar crime in the news. British Criminology Conference, Liverpool, July.
-
(1999)
British Criminology Conference
-
-
Levi, M.1
-
49
-
-
84875530915
-
Computer crime
-
Lloyd. C. Reed (ed), London, Blackstone
-
Lloyd (1990). Computer crime. Computer law. C. Reed (ed), London, Blackstone.
-
(1990)
Computer law
-
-
-
50
-
-
0036173202
-
Insider threat prediction tool: Evaluating the probability of IT misuse
-
Magklaras, G. B., and Furnell, S.M. (2003). "Insider threat prediction tool: evaluating the probability of IT misuse. " Computers & Security 21 (1): 62-73.
-
(2003)
Computers & Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
51
-
-
24344460927
-
A preliminary model of end user sophistication for insider threat prediction in IT systems
-
16th December 2004
-
Magklaras, G. B., and Furnell, S.M. (2005). "A preliminary model of end user sophistication for insider threat prediction in IT systems. " Computers & Security. 16th December 2004, http://www.sciencedirect.com/science.
-
(2005)
Computers & Security
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
52
-
-
0000997408
-
Unique ethical problems in information technology
-
Maner, W. (1996). "Unique ethical problems in information technology. " Science and Engineering Ethics 2 (2): 137-154.
-
(1996)
Science and Engineering Ethics
, vol.2
, Issue.2
, pp. 137-154
-
-
Maner, W.1
-
55
-
-
27844572798
-
White-collar crime
-
M. Maguire, R. Morgan and R. Reiner. Oxford, Clarendon Press
-
Nelken, D. (1997). White-collar crime. The Oxford Handbook of criminology. M. Maguire, R. Morgan and R. Reiner. Oxford, Clarendon Press.
-
(1997)
The Oxford Handbook of criminology
-
-
Nelken, D.1
-
56
-
-
0027961711
-
Computing and accountability
-
Nissenbaum, H. (1994). "Computing and accountability. " Communications of the ACM: 37 (1): 74-80.
-
(1994)
Communications of the ACM
, vol.37
, Issue.1
, pp. 74-80
-
-
Nissenbaum, H.1
-
57
-
-
33748811786
-
Ethical standards for information systems: A case for unified code
-
Oz, E. (1992). "Ethical standards for information systems: a case for unified code. " MIS Quarterly 16(4): 423-433.
-
(1992)
MIS Quarterly
, vol.16
, Issue.4
, pp. 423-433
-
-
Oz, E.1
-
58
-
-
34249866520
-
-
New York, Charles Scribner's Sons
-
Parker, D. B. (1976). Crime by computer. New York, Charles Scribner's Sons.
-
(1976)
Crime by computer
-
-
Parker, D.B.1
-
62
-
-
0006733347
-
Modeling the relative importance of ethical behaviour criteria: A simulation of information systems professional ethical decisions
-
Pearson, J. M., L. Crosby, J.P. Shim (1996). "Modeling the relative importance of ethical behaviour criteria: a simulation of information systems professional ethical decisions. " Journal of Strategic Information Systems (5) 4: 275-291.
-
(1996)
Journal of Strategic Information Systems
, vol.4
, Issue.5
, pp. 275-291
-
-
Pearson, J.M.1
Crosby, L.2
Shim, J.P.3
-
65
-
-
0042484572
-
Computer crime and security survey
-
San Francisco, USA
-
Power, R. (2001). "Computer crime and security survey". Computer Security Institute (VII) 1, San Francisco, USA.
-
(2001)
Computer Security Institute
, vol.1
, Issue.7
-
-
Power, R.1
-
68
-
-
0038422202
-
-
Eds. London, Blackstine Press Limited
-
Reed, C. and J. Angel. Eds. Computer law. London, Blackstine Press Limited
-
Computer law
-
-
Reed, C.1
Angel, J.2
-
69
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz, E. E. (2002). "A framework for understanding and predicting insider attacks. " Computers & Security 21 (6): 526-531.
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
70
-
-
84925911469
-
Towards sociology of organisational crime
-
Schrager, L. S., and Short, J. F. (1977). "Towards sociology of organisational crime. " Social problems 25 (4): 407-419.
-
(1977)
Social problems
, vol.25
, Issue.4
, pp. 407-419
-
-
Schrager, L.S.1
Short, J.F.2
-
71
-
-
30244512684
-
Computer-related crime: An international problem in need of an international solution
-
Shackelford, S. (1992). "Computer-related crime: an international problem in need of an international solution. " Texas International Law Journal 27: 479-505.
-
(1992)
Texas International Law Journal
, vol.27
, pp. 479-505
-
-
Shackelford, S.1
-
73
-
-
84875519714
-
The case study: A vital yet misunderstood research method for management
-
Cardiff
-
Smith, N. C. (1988). The case study: a vital yet misunderstood research method for management. British Academy of Management Conference, Cardiff.
-
(1988)
British Academy of Management Conference
-
-
Smith, N.C.1
-
74
-
-
0001133137
-
Coping with systems risks: Security planning models for management decision making
-
Straub, D. W., and Welke, R. J. (1998). "Coping with systems risks: security planning models for management decision making. " MIS Quarterly 22 (4): 441-464.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-464
-
-
Straub, D.W.1
Welke, R.J.2
-
75
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D. W. (1990). "Effective IS security: an empirical study. " Information System Research 1 (2): 255-277.
-
(1990)
Information System Research
, vol.1
, Issue.2
, pp. 255-277
-
-
Straub, D.W.1
-
77
-
-
84875540086
-
-
R. Hollinger (ed). Dartmouth, Dartmouth Publishing Company Limited
-
Raymond, J. and Erdwin (1997). Technology, property and law. Crime, deviance, and the computer. R. Hollinger (ed). Dartmouth, Dartmouth Publishing Company Limited: 85-105.
-
(1997)
Technology, property and law. Crime, deviance, and the computer
, pp. 85-105
-
-
Raymond, J.1
Erdwin2
-
78
-
-
84875543828
-
Computer crime: Computer hacking and misuse is now a criminal offence
-
Rigby, A. (1994). "Computer crime: computer hacking and misuse is now a criminal offence. " Solicitors Journal 138: 624-5.
-
(1994)
Solicitors Journal
, vol.138
, pp. 624-625
-
-
Rigby, A.1
-
80
-
-
84981982436
-
Causes of disaster: Sloppy management
-
Turner, B. A. (1994). "Causes of disaster: sloppy management. " British Journal of Management 5(5): 215-219.
-
(1994)
British Journal of Management
, vol.5
, Issue.5
, pp. 215-219
-
-
Turner, B.A.1
-
81
-
-
0002861365
-
Ethical beliefs of MIS professional: The frequency and opportunity for unethical behaviour
-
Vitell, S. J. and D. L. Davies (1990). "Ethical beliefs of MIS professional: the frequency and opportunity for unethical behaviour. " Journal of Business Ethics 9(1):63-70.
-
(1990)
Journal of Business Ethics
, vol.9
, Issue.1
, pp. 63-70
-
-
Vitell, S.J.1
Davies, D.L.2
-
82
-
-
84875499145
-
Computer crime
-
C. Reed and J. Angel (eds). London, Blackstone Press Limited
-
Walden, I. (2000). Computer crime. Computer law. C. Reed and J. Angel (eds). London, Blackstone Press Limited: 277-298.
-
(2000)
Computer law
, pp. 277-298
-
-
Walden, I.1
-
83
-
-
0033745066
-
Partner in crime
-
Walsh, A. (2000). "Partner in crime. " The Computer Bulletin 2(5):6-7
-
(2000)
The Computer Bulletin
, vol.2
, Issue.5
, pp. 6-7
-
-
Walsh, A.1
-
84
-
-
84875511925
-
Retrospect and prospect: Fashions in criminal justice theory and practice
-
D. Gottfredson and R. Clarke. Eds. Aldershot, Avebury
-
Wilkins, L. (1990). Retrospect and prospect: fashions in criminal justice theory and practice. Policy and theory in criminal justice. D. Gottfredson and R. Clarke. Eds. Aldershot, Avebury: 14-26. 84.
-
(1990)
Policy and theory in criminal justice
, pp. 14-26
-
-
Wilkins, L.1
|