메뉴 건너뛰기




Volumn 37, Issue 1, 2013, Pages 1-20

Beyond deterrence: An expanded view of employee computer abuse

Author keywords

Computer abuse; Deterrence; Disgruntlement; Employee computer crime; Expressive crimes; Information systems security; Insider; Instrumental crimes; Motivation; Neutralization; Organizational justice

Indexed keywords

COMPUTER SUPPORTED COOPERATIVE WORK; CRIME; MOTIVATION; PERSONNEL TRAINING; PUBLIC POLICY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84873974226     PISSN: 02767783     EISSN: 21629730     Source Type: Journal    
DOI: 10.25300/MISQ/2013/37.1.01     Document Type: Review
Times cited : (401)

References (159)
  • 1
    • 77956839363 scopus 로고
    • Inequity in social exchange
    • L. Berkowitz (ed.), New York: Academic Press
    • Adams, J. 1965. "Inequity in Social Exchange," in Advances in Experimental Social Psychology, Volume 2, L. Berkowitz (ed.), New York: Academic Press, pp. 267-299.
    • (1965) Advances in Experimental Social Psychology , vol.2 , pp. 267-299
    • Adams, J.1
  • 2
    • 84984287155 scopus 로고
    • The techniques of neutralization and violence
    • Agnew, R. 1994. "The Techniques of Neutralization and Violence," Criminology (32:4), pp. 555-580.
    • (1994) Criminology , vol.32 , Issue.4 , pp. 555-580
    • Agnew, R.1
  • 3
    • 0009021911 scopus 로고
    • The techniques of neutralization: An analysis of predisposing and situational factors
    • Agnew, R., and Peters, A. 1986. "The Techniques of Neutralization: An Analysis of Predisposing and Situational Factors," Criminal Justice and Behavior (13:1), pp. 81-97.
    • (1986) Criminal Justice and Behavior , vol.13 , Issue.1 , pp. 81-97
    • Agnew, R.1    Peters, A.2
  • 4
    • 84873969129 scopus 로고    scopus 로고
    • The combat operator
    • March 23 (January 24, 2010)
    • Allen, J. 2009. "The Combat Operator," DefenseTech, March 23 (available at http://defensetech.org/2009/03/23/guest-blog-thecombat-operator/; accessed January 24, 2010).
    • (2009) DefenseTech
    • Allen, J.1
  • 6
    • 0042284549 scopus 로고
    • Political terrorism and 'common criminality
    • R. Ward and H. Smith (eds.), Chicago: The University of Illinois at Chicago
    • Amir, M. 1988. "Political Terrorism and 'Common Criminality,'" in International Terrorism: Operational Issues, R. Ward and H. Smith (eds.), Chicago: The University of Illinois at Chicago, pp. 95-109.
    • (1988) International Terrorism: Operational Issues , pp. 95-109
    • Amir, M.1
  • 7
    • 33745308201 scopus 로고    scopus 로고
    • The heat of the moment: The effect of sexual arousal on sexual decision making
    • Ariely, D., and Lowenstein, G. 2006. "The Heat of the Moment: the Effect of Sexual Arousal on Sexual Decision Making," Journal of Behavioral Decision Making (19:2), pp. 87-98.
    • (2006) Journal of Behavioral Decision Making , vol.19 , Issue.2 , pp. 87-98
    • Ariely, D.1    Lowenstein, G.2
  • 9
    • 0033247523 scopus 로고    scopus 로고
    • Moral disengagement in the perpetration of inhumanities
    • Bandura, A. 1999. "Moral Disengagement in the Perpetration of Inhumanities," Personality and Social Psychology Review (3:3), pp. 193-209.
    • (1999) Personality and Social Psychology Review , vol.3 , Issue.3 , pp. 193-209
    • Bandura, A.1
  • 10
    • 0036623355 scopus 로고    scopus 로고
    • Selective moral disengagement in the exercise of moral agency
    • Bandura, A. 2002. "Selective Moral Disengagement in the Exercise of Moral Agency," Journal of Moral Education (31:2), pp. 101-119.
    • (2002) Journal of Moral Education , vol.31 , Issue.2 , pp. 101-119
    • Bandura, A.1
  • 12
  • 13
    • 84984280715 scopus 로고
    • Denying the guilty mind: Accounting for involvement in a white-collar crime
    • Benson, M. 1985. "Denying the Guilty Mind: Accounting for Involvement in a White-Collar Crime," Criminology (23:4), pp. 583-607.
    • (1985) Criminology , vol.23 , Issue.4 , pp. 583-607
    • Benson, M.1
  • 14
    • 0003092186 scopus 로고
    • Interactional justice: Communication criteria
    • R. Lewicki., B. Sheppard., and M. Bazerman (eds.), Greenwich, CT: JAI Press
    • Bies, R., and Moag, J. 1986. "Interactional Justice: Communication Criteria," in Research on Negotiations in Organizations (Volume 1), R. Lewicki., B. Sheppard., and M. Bazerman (eds.), Greenwich, CT: JAI Press, pp. 43-55.
    • (1986) Research on Negotiations in Organizations , vol.1 , pp. 43-55
    • Bies, R.1    Moag, J.2
  • 15
    • 0003105729 scopus 로고    scopus 로고
    • Revenge in organizations: The good, the bad and the ugly
    • R. Griffin, A. O'Leary-Kelly, and J. Collins (eds.), Stamford, CT: JAI Press
    • Bies, R., and Tripp, T. 1998. "Revenge in Organizations: The Good, the Bad and the Ugly," in Dysfunctional Behavior in Organizations, Part B: Non-Violent Dysfunctional Behavior, R. Griffin, A. O'Leary-Kelly, and J. Collins (eds.), Stamford, CT: JAI Press, pp. 49-68.
    • (1998) Dysfunctional Behavior in Organizations, Part B: Non-Violent Dysfunctional Behavior , pp. 49-68
    • Bies, R.1    Tripp, T.2
  • 16
    • 0002359187 scopus 로고    scopus 로고
    • At the breaking point: Cognitive and social dynamics of revenge in organizations
    • in R. Giacalone and J. Greenberg (eds.), Thousand Oaks, CA: Sage
    • Bies, R., Tripp, T., and Kramer, R. 1997. "At the Breaking Point: Cognitive and Social Dynamics of Revenge in Organizations," in Antisocial Behavior in Organizations, in R. Giacalone and J. Greenberg (eds.), Thousand Oaks, CA: Sage, pp. 18-36.
    • (1997) Antisocial Behavior in Organizations , pp. 18-36
    • Bies, R.1    Tripp, T.2    Kramer, R.3
  • 18
    • 67650100804 scopus 로고    scopus 로고
    • If someone is watching, i'll do what i'm asked: Manditoriness, control, and information security
    • Boss, S., Kirsch, L., Angermermeier, I., Shingler, R., and Boss, W. 2009. "If Someone is Watching, I'll Do What I'm Asked: Manditoriness, Control, and Information Security," European Journal of Information Systems (18:2), pp. 151-164.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 151-164
    • Boss, S.1    Kirsch, L.2    Angermermeier, I.3    Shingler, R.4    Boss, W.5
  • 19
    • 0036191138 scopus 로고    scopus 로고
    • The influence of emotion on rational decision making in sexual aggression
    • Bouffard, J. 2002. "The Influence of Emotion on Rational Decision Making in Sexual Aggression," Journal of Criminal Justice (30:2), pp. 121-134.
    • (2002) Journal of Criminal Justice , vol.30 , Issue.2 , pp. 121-134
    • Bouffard, J.1
  • 20
    • 0038481773 scopus 로고    scopus 로고
    • Whither the beast? The role of emotions in criminal conduct
    • S. Simpson (ed.), Thousand Oaks, CA: Pine Forge
    • Bouffard, J., Exum, M., and Paternoster, R. 2000. "Whither the Beast? The Role of Emotions in Criminal Conduct," in Of Crime and Criminality, S. Simpson (ed.), Thousand Oaks, CA: Pine Forge, pp. 159-178.
    • (2000) Of Crime and Criminality , pp. 159-178
    • Bouffard, J.1    Exum, M.2    Paternoster, R.3
  • 23
    • 77957061746 scopus 로고    scopus 로고
    • Information security compliance: An empirical study of rationality-based beliefs and information security awareness
    • Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. "Information Security Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly (34:3), pp. 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 24
    • 85044802584 scopus 로고    scopus 로고
    • AFDC to TANF: The effect of welfare reform on instrumental and expressive crimes
    • Burek, M. 2006. "AFDC to TANF: The Effect of Welfare Reform on Instrumental and Expressive Crimes," Criminal Justice Studies (19:3), pp. 241-256.
    • (2006) Criminal Justice Studies , vol.19 , Issue.3 , pp. 241-256
    • Burek, M.1
  • 25
    • 10344245100 scopus 로고    scopus 로고
    • Sanctions, perceived anger, and criminal offending
    • Carmichael, S., and Piquero, A. 2004. "Sanctions, Perceived Anger, and Criminal Offending," Journal of Quantitative Criminology (20:4), pp. 371-393.
    • (2004) Journal of Quantitative Criminology , vol.20 , Issue.4 , pp. 371-393
    • Carmichael, S.1    Piquero, A.2
  • 26
    • 84873946931 scopus 로고    scopus 로고
    • Computer economics study: Insiders top IT pros' worries
    • May 10 (May 29, 2007)
    • Carr, J. 2007. "Computer Economics Study: Insiders Top IT Pros' Worries," SC Magazine, May 10 (available at http://www.scmagazine.com/ computer-economics-study-insiders-top-it-prosworries/article/34942/; accessed May 29, 2007).
    • (2007) SC Magazine
    • Carr, J.1
  • 27
    • 84883916218 scopus 로고
    • Types of deviance and the effectiveness of legal sanctions
    • Chambliss, W. 1967. "Types of Deviance and the Effectiveness of Legal Sanctions," Wisconsin Law Review (3), pp. 703-719.
    • (1967) Wisconsin Law Review , vol.3 , pp. 703-719
    • Chambliss, W.1
  • 30
    • 85043737515 scopus 로고    scopus 로고
    • Justice at the millenium: A meta-analytic review of 25 years of organizational justice research
    • Colquitt, J., Conlon, D., Wesson., Porter., C., and Ng, K. 2001. "Justice at the Millenium: A Meta-Analytic Review of 25 Years of Organizational Justice Research," Journal of Applied Psychology (86:3), pp. 425-445.
    • (2001) Journal of Applied Psychology , vol.86 , Issue.3 , pp. 425-445
    • Colquitt, J.1    Conlon, D.2    Wesson3    Porter, C.4    Ng, K.5
  • 31
    • 0037370805 scopus 로고    scopus 로고
    • Societal attachments, offending frequency, and techniques of neutralization
    • Copes, H. 2003. "Societal Attachments, Offending Frequency, and Techniques of Neutralization," Deviant Behavior (24:2), pp. 101-127.
    • (2003) Deviant Behavior , vol.24 , Issue.2 , pp. 101-127
    • Copes, H.1
  • 32
    • 33947356707 scopus 로고    scopus 로고
    • Techniques of affirmation: Deviant behavior, moral commitment and subcultural identity
    • Copes, H., and Patrick Williams, J. 2007. "Techniques of Affirmation: Deviant Behavior, Moral Commitment and Subcultural Identity," Deviant Behavior (28:3), pp. 247-272.
    • (2007) Deviant Behavior , vol.28 , Issue.3 , pp. 247-272
    • Copes, H.1    Patrick Williams, J.2
  • 33
    • 0348006597 scopus 로고
    • Crime specialisation, crime displacement and rational choice theory
    • H. Wegener., F. Losel, and J. Haisch (eds.), New York: Springer-Verlag
    • Cornish, D., and Clarke, R. 1989. "Crime Specialisation, Crime Displacement and Rational Choice Theory," in Criminal Behavior and the Justice System: Psychological Perspectives, H. Wegener., F. Losel, and J. Haisch (eds.), New York: Springer-Verlag: pp.103-117.
    • (1989) Criminal Behavior and the Justice System: Psychological Perspectives , pp. 103-117
    • Cornish, D.1    Clarke, R.2
  • 34
    • 0142040643 scopus 로고    scopus 로고
    • The devil made me do it: Use of neutralizations by shoplifters
    • Cromwell, P., and Thurman, Q. 2003. "The Devil Made Me Do It: Use of Neutralizations by Shoplifters," Deviant Behavior (24:6), pp. 535-550.
    • (2003) Deviant Behavior , vol.24 , Issue.6 , pp. 535-550
    • Cromwell, P.1    Thurman, Q.2
  • 36
    • 58049122836 scopus 로고    scopus 로고
    • E-crime watch survey
    • (November 1, 2009)
    • CSO Magazine. 2007. "E-Crime Watch Survey," (available at http://www.cert.org/archive/pdf/ecrimesummary07.pdf; accessed November 1, 2009).
    • (2007) CSO Magazine
  • 37
    • 34848873123 scopus 로고    scopus 로고
    • Deterring internal information systems misuse
    • D'Arcy, J., and Hovav, A. 2007. "Deterring Internal Information Systems Misuse," Communications of the ACM (50:10), pp. 113-117.
    • (2007) Communications of the ACM , vol.50 , Issue.10 , pp. 113-117
    • D'Arcy, J.1    Hovav, A.2
  • 38
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • D'Arcy, J., Hovav, A., and Galletta, D. 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research (20:1), pp. 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 39
    • 33846160600 scopus 로고    scopus 로고
    • Intimacy and violence: Exploring the role of victim-defendant relationship in criminal law
    • Dawson, M. 2006. "Intimacy and Violence: Exploring the Role of Victim-Defendant Relationship in Criminal Law," The Journal of Criminal Law and Criminology (96:4), pp. 1417-1449.
    • (2006) The Journal of Criminal Law and Criminology , vol.96 , Issue.4 , pp. 1417-1449
    • Dawson, M.1
  • 40
    • 78650371884 scopus 로고    scopus 로고
    • Deloitte. Deloitte & Touche LLP
    • Deloitte. 2006. "2006 Global Security Survey," Deloitte & Touche LLP (available at https://www.deloitte.com/assets/Dcom-Shared %20Assets/Documents/us-fsi-150606globalsecuritysurvey(1). pdf).
    • (2006) 2006 Global Security Survey
  • 41
    • 84924768355 scopus 로고    scopus 로고
    • Deloitte. Deloitte Center for Security & Privacy Solutions, Deloitte & Touche LLP
    • Deloitte. 2010. "Cyber Crime: A Clear and Present Danger." Deloitte Center for Security & Privacy Solutions, Deloitte & Touche LLP (available at http://www.deloitte.com/assets/Dcom-UnitedStates/Local%20Assets/ Documents/AERS/us-aers- Deloitte%20Cyber%20Crime%20POV%20Jan252010.pdf).
    • (2010) Cyber Crime: A Clear and Present Danger
  • 42
    • 33846794868 scopus 로고    scopus 로고
    • Phishing for user security awareness
    • Dodge, R., Carver, C., and Ferguson, A. 2007. "Phishing for User Security Awareness," Computers & Security (26:1), pp. 73-80.
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 73-80
    • Dodge, R.1    Carver, C.2    Ferguson, A.3
  • 44
    • 38249010350 scopus 로고
    • Affect, risk, and decision criticality: Replication and extension in a business setting
    • Dunegan, K., Duchon, D., and Barton, S. 1992. "Affect, Risk, and Decision Criticality: Replication and Extension in a Business Setting," Organizational Behavior and Human Decision Processes (53:3), pp. 335-351.
    • (1992) Organizational Behavior and Human Decision Processes , vol.53 , Issue.3 , pp. 335-351
    • Dunegan, K.1    Duchon, D.2    Barton, S.3
  • 45
    • 84935677792 scopus 로고
    • Wife assaulter's explanations for assaults
    • Dutton, D. 1986. "Wife Assaulter's Explanations for Assaults," Canadian Journal of Behavioral Science (18:4), pp. 381-390.
    • (1986) Canadian Journal of Behavioral Science , vol.18 , Issue.4 , pp. 381-390
    • Dutton, D.1
  • 46
    • 0038830415 scopus 로고    scopus 로고
    • Gearing up against crime: A dynamic framework to help designers keep up with the adaptive changing criminal in a changing world
    • Ekblom, P. 1997. "Gearing Up Against Crime: A Dynamic Framework to Help Designers Keep Up With the Adaptive Changing Criminal in a Changing World," International Journal of Risk Security and Crime Prevention (2:4), pp. 249-265.
    • (1997) International Journal of Risk Security and Crime Prevention , vol.2 , Issue.4 , pp. 249-265
    • Ekblom, P.1
  • 47
    • 0033164070 scopus 로고    scopus 로고
    • Techniques of neutralization used by deer poachers in the western United States: A research note
    • Eliason, S., and Dodder, R. 1999. "Techniques of Neutralization Used by Deer Poachers in the Western United States: A Research Note," Deviant Behavior (20:3), pp. 233-252.
    • (1999) Deviant Behavior , vol.20 , Issue.3 , pp. 233-252
    • Eliason, S.1    Dodder, R.2
  • 49
    • 0036865364 scopus 로고    scopus 로고
    • The application and robustness of the rational choice perspective in the study of intoxicated and angry intentions to aggress
    • Exum, M. 2002. "The Application and Robustness of the Rational Choice Perspective in the Study of Intoxicated and Angry Intentions to Aggress," Criminology (40:4), pp. 933-966.
    • (2002) Criminology , vol.40 , Issue.4 , pp. 933-966
    • Exum, M.1
  • 52
    • 0037666778 scopus 로고
    • Exploratory notes on criminality and emotional ambivalence
    • Frasier, C., and Meisenhelder, T. 1985. "Exploratory Notes on Criminality and Emotional Ambivalence," Qualitative Sociology (8:3), pp. 266-284.
    • (1985) Qualitative Sociology , vol.8 , Issue.3 , pp. 266-284
    • Frasier, C.1    Meisenhelder, T.2
  • 53
    • 0346487370 scopus 로고    scopus 로고
    • An examination of the relationship between distance travelled and motivational aspects of firesetting behavior
    • Fritzon, K. 2001. "An Examination of the Relationship Between Distance Travelled and Motivational Aspects of Firesetting Behavior," Journal of Environmental Psychology (21:1), pp. 45-60.
    • (2001) Journal of Environmental Psychology , vol.21 , Issue.1 , pp. 45-60
    • Fritzon, K.1
  • 54
    • 0010911757 scopus 로고
    • Issues management and organizational accounts: An analysis of corporate responses to accusations of unethical business practices
    • Garrett, D., Bardford, J., Meyers. R., and Becker, J. 1989. "Issues Management and Organizational Accounts: An Analysis of Corporate Responses to Accusations of Unethical Business Practices," Journal of Business Ethics (8:7), pp. 507-520.
    • (1989) Journal of Business Ethics , vol.8 , Issue.7 , pp. 507-520
    • Garrett, D.1    Bardford, J.2    Meyers, R.3    Becker, J.4
  • 55
    • 0004223848 scopus 로고
    • Newbury Park, CA: Sage
    • Gelles, R. 1987. Violent Home, Newbury Park, CA: Sage.
    • (1987) Violent Home
    • Gelles, R.1
  • 56
    • 0000978088 scopus 로고    scopus 로고
    • Employee sabotage: Toward a practitioner-scholar understanding
    • A. Robert and J. Greenberg (eds.), Thousand Oaks, CA: Sage
    • Giacolone, R., Riordan, C., and Rosenfeld, P. 1997. "Employee Sabotage: Toward a Practitioner-Scholar Understanding," in Antisocial Behavior in Organizations, A. Robert and J. Greenberg (eds.), Thousand Oaks, CA: Sage: pp. 109-129.
    • (1997) Antisocial Behavior in Organizations , pp. 109-129
    • Giacolone, R.1    Riordan, C.2    Rosenfeld, P.3
  • 57
    • 0042175440 scopus 로고
    • Employee theft as a reaction to underpayment inequity: The hidden cost of pay cuts
    • Greenberg, J. 1990. "Employee Theft as a Reaction to Underpayment Inequity: The Hidden Cost of Pay Cuts," Journal of Applied Psychology (54:1), pp. 81-103.
    • (1990) Journal of Applied Psychology , vol.54 , Issue.1 , pp. 81-103
    • Greenberg, J.1
  • 58
    • 0001862761 scopus 로고
    • The social side of fairness: Interpersonal and informational classes of organizational justice
    • R. Cropanzano (ed.), Hilldale, NJ: Earlbaum
    • Greenberg, J. 1993. "The Social Side of Fairness: Interpersonal and Informational Classes of Organizational Justice," in Justice in the Workplace: Approaching Fairness in Human Resource Management, R. Cropanzano (ed.), Hilldale, NJ: Earlbaum, pp. 79-103.
    • (1993) Justice in the Workplace: Approaching Fairness in Human Resource Management , pp. 79-103
    • Greenberg, J.1
  • 59
    • 0033216652 scopus 로고    scopus 로고
    • Predicting employee aggression against coworkers, subordinates and supervisors: The roles of person behaviors and perceived workplace factors
    • Greenberg, L., and Barling, J. 1999. "Predicting Employee Aggression Against Coworkers, Subordinates and Supervisors: The Roles of Person Behaviors and Perceived Workplace Factors," Journal of Organizational Behavior (20:6), pp. 897-913.
    • (1999) Journal of Organizational Behavior , vol.20 , Issue.6 , pp. 897-913
    • Greenberg, L.1    Barling, J.2
  • 60
    • 81255163048 scopus 로고    scopus 로고
    • Understanding non-malicious security violations in the workplace: A composite behavior model
    • Guo, K., Yufei, Y., Archer, N., and Connelly, C. 2011. "Understanding Non-Malicious Security Violations in the Workplace: A Composite Behavior Model," Journal of Management Information Systems (28:2), pp. 203-236.
    • (2011) Journal of Management Information Systems , vol.28 , Issue.2 , pp. 203-236
    • Guo, K.1    Yufei, Y.2    Archer, N.3    Connelly, C.4
  • 61
    • 4444328737 scopus 로고    scopus 로고
    • Crime scene actions and offender characteristics in arsons
    • Hakkanen, H., Puolakka, P., and Santtila, P. 2004. "Crime Scene Actions and Offender Characteristics in Arsons," Legal and Criminal Psychology (9:2), pp. 197-214.
    • (2004) Legal and Criminal Psychology , vol.9 , Issue.2 , pp. 197-214
    • Hakkanen, H.1    Puolakka, P.2    Santtila, P.3
  • 62
    • 0000917858 scopus 로고    scopus 로고
    • The effects of ethics and personal denial of responsibility on computer abuse judgements and intentions
    • Harrington, S. 1996. "The Effects of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions," MIS Quarterly (20:3), pp. 257-277.
    • (1996) MIS Quarterly , vol.20 , Issue.3 , pp. 257-277
    • Harrington, S.1
  • 64
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security compliance in organizations
    • Herath, T., and Rao, R. 2009. "Protection Motivation and Deterrence: A Framework for Security Compliance in Organizations," European Journal of Information Systems (18:2), pp. 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, R.2
  • 65
    • 72449140612 scopus 로고    scopus 로고
    • Toward a multi-foci approach to workplace aggression: A meta-analytic review of outcomes from different perpetrators
    • Hershcovis., M., and Barling, J. 2010. "Toward a Multi-Foci Approach to Workplace Aggression: A Meta-Analytic Review of Outcomes from Different Perpetrators," Journal of Organizational Behavior (31:1), pp. 24-44.
    • (2010) Journal of Organizational Behavior , vol.31 , Issue.1 , pp. 24-44
    • Hershcovis, M.1    Barling, J.2
  • 67
    • 36949037524 scopus 로고    scopus 로고
    • Neutralization theory and online software piracy: An empirical analysis
    • Hinduja, S. 2007. "Neutralization Theory and Online Software Piracy: An Empirical Analysis," Ethics and Information Technology (9:3), pp. 187-204.
    • (2007) Ethics and Information Technology , vol.9 , Issue.3 , pp. 187-204
    • Hinduja, S.1
  • 68
    • 0002042413 scopus 로고
    • The 9 to 5 underground: Are you policing computer crimes?
    • Hoffer, J., and Straub, D. 1989. "The 9 to 5 Underground: Are You Policing Computer Crimes?" Sloan Management Review (30:4), pp. 35-43.
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35-43
    • Hoffer, J.1    Straub, D.2
  • 69
    • 84928836007 scopus 로고
    • Neutralizing in the workplace: An empirical analysis of property theft and production deviance
    • Hollinger, R. 1991. "Neutralizing in the Workplace: An Empirical Analysis of Property Theft and Production Deviance," Deviant Behavior (12:2), pp. 169-202.
    • (1991) Deviant Behavior , vol.12 , Issue.2 , pp. 169-202
    • Hollinger, R.1
  • 70
    • 69949141264 scopus 로고    scopus 로고
    • Fair today, fair tomorrow? A longitudinal investigation of overall justice perceptions
    • Holtz, B., and Harold, C. 2009. "Fair Today, Fair Tomorrow? A Longitudinal Investigation of Overall Justice Perceptions," Journal of Applied Psychology (94:5), pp. 1185-1199.
    • (2009) Journal of Applied Psychology , vol.94 , Issue.5 , pp. 1185-1199
    • Holtz, B.1    Harold, C.2
  • 71
    • 79959944364 scopus 로고    scopus 로고
    • Does deterrence really work in reducing information security policy violations by employees?
    • Hu Q, Xu Z, Dinev T, and Ling H. 2011. "Does Deterrence Really Work in Reducing Information Security Policy Violations by Employees?," Communications of the ACM (54:6), pp. 54-60.
    • (2011) Communications of the ACM , vol.54 , Issue.6 , pp. 54-60
    • Hu, Q.1    Xu, Z.2    Dinev, T.3    Ling, H.4
  • 72
    • 45949086382 scopus 로고    scopus 로고
    • Neutralizing music piracy: An empirical examination
    • Ingram, J., and Hinduja, S. 2008. "Neutralizing Music Piracy: An Empirical Examination," Deviant Behavior (24:4), pp. 334-366.
    • (2008) Deviant Behavior , vol.24 , Issue.4 , pp. 334-366
    • Ingram, J.1    Hinduja, S.2
  • 73
    • 24944579247 scopus 로고    scopus 로고
    • Understanding supervisor-targeted aggression: A within-person, between-jobs design
    • Inness, M., Barling, J., and Turner, M. 2005. "Understanding Supervisor-Targeted Aggression: A Within-Person, Between- Jobs Design," Journal of Applied Psychology (90:4), pp. 731-739.
    • (2005) Journal of Applied Psychology , vol.90 , Issue.4 , pp. 731-739
    • Inness, M.1    Barling, J.2    Turner, M.3
  • 74
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behavior: An empirical study
    • Johnston, A, and Warkentin, M. 2010. "Fear Appeals and Information Security Behavior: An Empirical Study," MIS Quarterly (34:3), pp. 549-566.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.1    Warkentin, M.2
  • 75
    • 34548827619 scopus 로고    scopus 로고
    • Predicting retaliation in the workplace: The theory of planned behavior and organizational justice
    • D. Nagao (ed.), Briarcliff Manor, NY: Academy of Management
    • rd Annual Meeting of the Academy of Management, D. Nagao (ed.), Briarcliff Manor, NY: Academy of Management.
    • (2003) rd Annual Meeting of the Academy of Management
    • Jones, D.1
  • 76
    • 67449165031 scopus 로고    scopus 로고
    • Getting even with one's supervisor and one's organization: Relationships among types of injustice, desires for revenge, and counterproductive work behaviors
    • Jones, D. 2009. "Getting Even with One's Supervisor and One's Organization: Relationships Among Types of Injustice, Desires for Revenge, and Counterproductive Work Behaviors," Journal of Organizational Behavior (30:4), pp. 525-542
    • (2009) Journal of Organizational Behavior , vol.30 , Issue.4 , pp. 525-542
    • Jones, D.1
  • 79
    • 0036064934 scopus 로고    scopus 로고
    • A holistic model of computer abuse within organizations
    • Lee, J., and Lee, Y. 2002. "A Holistic Model of Computer Abuse Within Organizations," Information Management and Computer Security (10:2), pp. 57-63.
    • (2002) Information Management and Computer Security , vol.10 , Issue.2 , pp. 57-63
    • Lee, J.1    Lee, Y.2
  • 80
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • Lee, S., Lee, S-G., and Yoo, S. 2004. "An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories," Information and Management (41:6), pp. 707-718.
    • (2004) Information and Management , vol.41 , Issue.6 , pp. 707-718
    • Lee, S.1    Lee, S.-G.2    Yoo, S.3
  • 81
    • 67650166189 scopus 로고    scopus 로고
    • Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
    • Lee, Y., and Larsen, K. 2009. "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," European Journal of Information Systems (18:2), pp. 177-187.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 177-187
    • Lee, Y.1    Larsen, K.2
  • 82
    • 0033935642 scopus 로고    scopus 로고
    • Beyond valence: Toward a model of emotion-specific influences on judgement and choice
    • Lerner, J., and Keltner, D. 2000. "Beyond Valence: Toward a Model of Emotion-Specific Influences on Judgement and Choice," Cognition & Emotion (14:4), pp. 473-493.
    • (2000) Cognition & Emotion , vol.14 , Issue.4 , pp. 473-493
    • Lerner, J.1    Keltner, D.2
  • 83
    • 0001787903 scopus 로고
    • What should be done with equity theory?
    • K. Gergen, M. Greenberg, and R. Willis (eds.), New York: Plenum
    • Leventhal, G. 1980. "What Should be Done With Equity Theory?," in Social Exchange: Advances in Theory and Research, K. Gergen, M. Greenberg, and R. Willis (eds.), New York: Plenum, pp. 27-55.
    • (1980) Social Exchange: Advances in Theory and Research , pp. 27-55
    • Leventhal, G.1
  • 84
    • 0002014647 scopus 로고
    • Beyond fairness: A theory of allocation preferences
    • G. Mikula (ed.), New York: Springer-Verlag
    • Leventhal, G., Karuza, J., and Fry, W. 1980. "Beyond Fairness: A Theory of Allocation Preferences," in Justice and Social Interaction, G. Mikula (ed.), New York: Springer-Verlag, pp. 167-218.
    • (1980) Justice and Social Interaction , pp. 167-218
    • Leventhal, G.1    Karuza, J.2    Fry, W.3
  • 85
    • 0142123338 scopus 로고    scopus 로고
    • The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice
    • Lim, V. 2002. "The IT Way of Loafing on the Job: Cyberloafing, Neutralizing and Organizational Justice," Journal of Organizational Behavior (23:5), pp. 675-694.
    • (2002) Journal of Organizational Behavior , vol.23 , Issue.5 , pp. 675-694
    • Lim, V.1
  • 86
    • 28044468029 scopus 로고    scopus 로고
    • Prevalence, perceived seriousness, justification and regulation of cyberloafing in singapore: An exploratory study
    • Lim, V., and Teo, T. 2005. "Prevalence, Perceived Seriousness, Justification and Regulation of Cyberloafing in Singapore: An Exploratory Study," Information & Management (42:8), pp. 1081-1093.
    • (2005) Information & Management , vol.42 , Issue.8 , pp. 1081-1093
    • Lim, V.1    Teo, T.2
  • 88
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch, K., Carr, H., and Warkentin, M. 1992. "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly (16:2), pp. 173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.1    Carr, H.2    Warkentin, M.3
  • 91
    • 84873980918 scopus 로고    scopus 로고
    • Information systems security in a digital economy: Call for papers
    • (December 31, 2011)
    • Mahmood, M., Siponen, M., Straub, D., and Rao, R. 2008. "Information Systems Security in a Digital Economy: Call for Papers," MIS Quarterly (available at http://eventseer.net/e/6368/; accessed December 31, 2011).
    • (2008) MIS Quarterly
    • Mahmood, M.1    Siponen, M.2    Straub, D.3    Rao, R.4
  • 92
    • 77957096376 scopus 로고    scopus 로고
    • Moving toward black hat research in information systems security: An editorial introduction to the special issue
    • Mahmood, M. A., Siponen, M., Straub, D., Rao, R., and Raghu, T. S. 2010. "Moving Toward Black Hat Research in Information Systems Security: An Editorial Introduction to the Special Issue," MIS Quarterly (34:3), pp. 431-433.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 431-433
    • Mahmood, M.A.1    Siponen, M.2    Straub, D.3    Rao, R.4    Raghu, T.S.5
  • 93
    • 33645465637 scopus 로고    scopus 로고
    • What have we learned from five decades of neutralization research?
    • M. Tonry (ed.), Chicago: The University of Chicago Press
    • Maruna, S., and Copes, H. 2005. "What Have We Learned from Five Decades of Neutralization Research?," in Crime and Justice: A Review of Research (Volume 32), M. Tonry (ed.), Chicago: The University of Chicago Press, pp. 221-320.
    • (2005) Crime and Justice: A Review of Research (Volume 32) , pp. 221-320
    • Maruna, S.1    Copes, H.2
  • 94
    • 23044521671 scopus 로고    scopus 로고
    • Integrating justice and social exchange: The differing effects of fair procedures and treatment on work relationships
    • Masterson, S. S., Lewis, K., Goldman, B. M., and Taylor, M. S. 2000. "Integrating Justice and Social Exchange: The Differing Effects of Fair Procedures and Treatment on Work Relationships," Academy of Management Journal (43:4), pp. 738-748.
    • (2000) Academy of Management Journal , vol.43 , Issue.4 , pp. 738-748
    • Masterson, S.S.1    Lewis, K.2    Goldman, B.M.3    Taylor, M.S.4
  • 95
    • 0019495519 scopus 로고
    • Techniques of neutralization: A reconceptualization and empirical examination
    • Minor, W. 1981. "Techniques of Neutralization: A Reconceptualization and Empirical Examination," Journal of Research in Crime and Delinquency (18:2), pp. 295-318.
    • (1981) Journal of Research in Crime and Delinquency , vol.18 , Issue.2 , pp. 295-318
    • Minor, W.1
  • 96
    • 34548831353 scopus 로고    scopus 로고
    • Abusive supervision and workplace deviance and the moderating effects of negative reciprocity beliefs
    • Mitchell, M., and Ambrose, M. 2007. "Abusive Supervision and Workplace Deviance and the Moderating Effects of Negative Reciprocity Beliefs," Journal of Applied Psychology (92:4), pp. 1159-1168.
    • (2007) Journal of Applied Psychology , vol.92 , Issue.4 , pp. 1159-1168
    • Mitchell, M.1    Ambrose, M.2
  • 97
    • 65649098362 scopus 로고    scopus 로고
    • Neutralizing potential and self-reported digital piracy: A multi-theoretical exploration among college undergraduates
    • Morris, R., and Higgins, G. 2009. "Neutralizing Potential and Self- Reported Digital Piracy: A Multi-Theoretical Exploration Among College Undergraduates," Criminal Justice Review (34:2), pp. 173-195.
    • (2009) Criminal Justice Review , vol.34 , Issue.2 , pp. 173-195
    • Morris, R.1    Higgins, G.2
  • 98
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules? An empirical study
    • Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., and Vance, A. 2009. "What Levels of Moral Reasoning and Values Explain Adherence to Information Security Rules? An Empirical Study," European Journal of Information Systems (18:2), pp. 126-139.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 99
    • 0002294309 scopus 로고    scopus 로고
    • Criminal deterrence research at the outset of the twenty-first century
    • M. Tonry (ed.), Chicago: The University of Chicago Press
    • Nagin, D. 1998. "Criminal Deterrence Research at the Outset of the Twenty-First Century," in Crime and Justice: A Review of Research (Volume 23), M. Tonry (ed.), Chicago: The University of Chicago Press, pp. 1-42.
    • (1998) Crime and Justice: A Review of Research , vol.23 , pp. 1-42
    • Nagin, D.1
  • 100
    • 85050412654 scopus 로고
    • Enduring individual differences and rational choice theories of crime
    • Nagin, D., and Paternoster, R. 1993. "Enduring Individual Differences and Rational Choice Theories of Crime," Law & Society Review (27:3), pp.467-496.
    • (1993) Law & Society Review , vol.27 , Issue.3 , pp. 467-496
    • Nagin, D.1    Paternoster, R.2
  • 101
    • 85101726600 scopus 로고
    • An investigation into the use and usefulness of security software in detecting computer abuse
    • J. I. DeGross and M. H. Olson (eds.), Minneapolis, MN
    • th International Conference on Information Systems, J. I. DeGross and M. H. Olson (eds.), Minneapolis, MN, pp. 283-294.
    • (1988) th International Conference on Information Systems , pp. 283-294
    • Nance, W.D.1    Straub, D.W.2
  • 102
  • 104
    • 0035611374 scopus 로고    scopus 로고
    • Desperately seeking the 'it' in it research: A call to theorizing the it artifact
    • Orlikowski, W., and Iacono, S. 2001. "Desperately Seeking the 'IT' in IT Research: A Call to Theorizing the IT Artifact," Information Systems Research (12:2), pp. 121-134.
    • (2001) Information Systems Research , vol.12 , Issue.2 , pp. 121-134
    • Orlikowski, W.1    Iacono, S.2
  • 107
    • 84869094909 scopus 로고
    • Deterrence, poverty, and type of homicide
    • Parker, R. N., and Smith, M. D. 1979. "Deterrence, Poverty, and Type of Homicide," The American Journal of Sociology (85:3), pp. 614-624.
    • (1979) The American Journal of Sociology , vol.85 , Issue.3 , pp. 614-624
    • Parker, R.N.1    Smith, M.D.2
  • 108
    • 0030521693 scopus 로고    scopus 로고
    • Sanction threats and appeals to morality: Testing a rational choice theory of corporate crime
    • Paternoster, R., and Simpson, S. 1996. "Sanction Threats and Appeals to Morality: Testing a Rational Choice Theory of Corporate Crime," Law and Society Review (30:3), pp. 549-584.
    • (1996) Law and Society Review , vol.30 , Issue.3 , pp. 549-584
    • Paternoster, R.1    Simpson, S.2
  • 109
    • 0000392842 scopus 로고    scopus 로고
    • Specifying the direct and indirect effects of low self-control and situational factors in offenders decision making: Toward a more comparative model of rational offending
    • Piquero, N., and Tibbetts, S. 1996. "Specifying the Direct and Indirect Effects of Low Self-Control and Situational Factors in Offenders Decision Making: Toward a More Comparative Model of Rational Offending," Justice Quarterly (13:3), pp. 481-510.
    • (1996) Justice Quarterly , vol.13 , Issue.3 , pp. 481-510
    • Piquero, N.1    Tibbetts, S.2
  • 110
    • 14544279756 scopus 로고    scopus 로고
    • Examining the role of differential association and techniques of neutralization in explaining corporate crime
    • Piquero, N., Tibbetts, S., and Blankenship, M. 2005. "Examining the Role of Differential Association and Techniques of Neutralization in Explaining Corporate Crime," Deviant Behavior (26:2), pp. 159-188.
    • (2005) Deviant Behavior , vol.26 , Issue.2 , pp. 159-188
    • Piquero, N.1    Tibbetts, S.2    Blankenship, M.3
  • 112
    • 84873951007 scopus 로고    scopus 로고
    • Ponemon Institute. ArcSight, Inc
    • Ponemon Institute. 2010. First Annual Cost of Cyber Crime Study. ArcSight, Inc. (http://www.riskandinsurancechalkboard.com/uploads/file/Ponemon% 20Study(1).pdf).
    • (2010) First Annual Cost of Cyber Crime Study
  • 113
    • 0009240018 scopus 로고
    • Techniques of neutralization: Young adult marijuana smokers
    • Priest, T., and McGrath, J. 1970. "Techniques of Neutralization: Young Adult Marijuana Smokers," Criminology (8:2), pp. 185-194.
    • (1970) Criminology , vol.8 , Issue.2 , pp. 185-194
    • Priest, T.1    McGrath, J.2
  • 114
    • 82955172800 scopus 로고    scopus 로고
    • PwC. Pricewaterhouse Coopers
    • PwC. 2008. "The Global State of Information Security" Pricewaterhouse Coopers (http://www.pwcglobal.com/extweb/home.nsf/docid/ C1CD6CC69C2676D4852574 DA00785949).
    • (2008) The Global State of Information Security
  • 116
    • 84865537483 scopus 로고    scopus 로고
    • PwC. Pricewaterhouse Coopers Security Survey
    • PwC. 2010b. "Trial by Fire," Pricewaterhouse Coopers Security Survey.
    • (2010) Trial by Fire
  • 117
    • 78049400376 scopus 로고    scopus 로고
    • PwC/UK DoBE Pricewaterhouse Coopers
    • PwC/UK DoBE 2008. "Information Security Breaches Survey," Pricewaterhouse Coopers(available at http://www.pwc.co.uk/eng/publications/berr- information-security-breaches-survey-2008. html ).
    • (2008) Information Security Breaches Survey
  • 119
    • 21844526560 scopus 로고
    • A typology of deviant workplace behaviors: A multidimensional scaling study
    • Robinson, S., and Bennett, R. 1995. "A Typology of Deviant Workplace Behaviors: A Multidimensional Scaling Study," Academy of Management Journal (38:2), pp. 555-572.
    • (1995) Academy of Management Journal , vol.38 , Issue.2 , pp. 555-572
    • Robinson, S.1    Bennett, R.2
  • 120
    • 0001782487 scopus 로고    scopus 로고
    • Workplace deviance: Its definition, its nature and its causes
    • R. Lewicki., B. Sheppard., and R. Bies (eds.), Greenwich, CT: JAI Press
    • Robinson, S., and Bennett, R. 1997. "Workplace Deviance: Its Definition, Its Nature and Its Causes," in Research on Negotiation in Organizations (Volume 6), R. Lewicki., B. Sheppard., and R. Bies (eds.), Greenwich, CT: JAI Press, pp. 3-28.
    • (1997) Research on Negotiation in Organizations , vol.6 , pp. 3-28
    • Robinson, S.1    Bennett, R.2
  • 122
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link'-A human/computer interaction approach to usable and effective security
    • Sasse, M., Brostoff, S., and Weirich, D. 2001. "Transforming the 'Weakest Link'-A Human/Computer Interaction Approach to Usable and Effective Security," BT Technology Journal (19:3), pp. 122-131.
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.1    Brostoff, S.2    Weirich, D.3
  • 126
    • 76649136483 scopus 로고    scopus 로고
    • A canonical analysis of intentional information security breaches by insiders
    • Shropshire, J. 2009. "A Canonical Analysis of Intentional Information Security Breaches by Insiders," Information Management and Computer Security (17:4), pp. 221-234.
    • (2009) Information Management and Computer Security , vol.17 , Issue.4 , pp. 221-234
    • Shropshire, J.1
  • 127
    • 0001597886 scopus 로고
    • Garment workers: Perceptions of inequity and employee theft
    • Sieh, E. 1987. "Garment Workers: Perceptions of Inequity and Employee Theft," British Journal of Criminology (27:2), pp. 174-191.
    • (1987) British Journal of Criminology , vol.27 , Issue.2 , pp. 174-191
    • Sieh, E.1
  • 128
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • Siponen, M., and Vance, A. 2010. "Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations," MIS Quarterly (34:3), pp. 487-502.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 130
    • 0031515495 scopus 로고    scopus 로고
    • Retaliation in the workplace: The role of distributive, procedural and interactional justice
    • Skarlicki, D., and Folger, R. 1997. "Retaliation in the Workplace: The Role of Distributive, Procedural and Interactional Justice," Journal of Applied Psychology (82:3), pp. 434-443.
    • (1997) Journal of Applied Psychology , vol.82 , Issue.3 , pp. 434-443
    • Skarlicki, D.1    Folger, R.2
  • 131
    • 0033248835 scopus 로고    scopus 로고
    • Personality as a moderator in the relationship between fairness and retaliation
    • Skarlicki, D., Folger, R., and Tesluk, P. 1999. "Personality as a Moderator in the Relationship Between Fairness and Retaliation," Academy of Management Journal (42:1), pp. 100-108.
    • (1999) Academy of Management Journal , vol.42 , Issue.1 , pp. 100-108
    • Skarlicki, D.1    Folger, R.2    Tesluk, P.3
  • 134
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • Straub, D. 1990. "Effective IS Security: An Empirical Study," Information Systems Research (1:3), pp. 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.1
  • 135
    • 8744241162 scopus 로고
    • Deterring highly motivated computer abusers: A field experiment in computer security
    • G. Gable and W. Caelli (eds.), Amsterdam: Elsevier Science Publishers
    • Straub, D., Carlson, P., and Jones, E. 1992. "Deterring Highly Motivated Computer Abusers: A Field Experiment in Computer Security," in IT Security: The Needs for International Cooperation, G. Gable and W. Caelli (eds.), Amsterdam: Elsevier Science Publishers, pp. 309-324.
    • (1992) IT Security: The Needs for International Cooperation , pp. 309-324
    • Straub, D.1    Carlson, P.2    Jones, E.3
  • 136
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risks: Security planning models for management decision making
    • Straub, D., and Welke, R. 1998. "Coping With Systems Risks: Security Planning Models for Management Decision Making," MIS Quarterly (22:4), pp. 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.1    Welke, R.2
  • 138
    • 0001155759 scopus 로고
    • Techniques of neutralization: A theory of delinquency
    • Sykes, G., and Matza, D. 1957. "Techniques of Neutralization: A Theory of Delinquency," American Sociological Review (22:6), pp. 664-670.
    • (1957) American Sociological Review , vol.22 , Issue.6 , pp. 664-670
    • Sykes, G.1    Matza, D.2
  • 139
    • 0041783565 scopus 로고
    • Actors, actions and deterrence: A reformulation of chambliss's typology of deterrence
    • M. Riedel and P. Vales (eds.), New York: Praeger
    • Thomas, C., and Williams, J. 1977. "Actors, Actions and Deterrence: A Reformulation of Chambliss's Typology of Deterrence," in Treating the Offender: Problems and Issues, M. Riedel and P. Vales (eds.), New York: Praeger.
    • (1977) Treating the Offender: Problems and Issues
    • Thomas, C.1    Williams, J.2
  • 140
    • 84926279405 scopus 로고
    • Deviance and the neutralization of moral commitment: An empirical analysis
    • Thurman, Q. 1984. "Deviance and the Neutralization of Moral Commitment: An Empirical Analysis," Deviant Behavior (5:1-4), pp. 291-304.
    • (1984) Deviant Behavior , vol.5 , Issue.1-4 , pp. 291-304
    • Thurman, Q.1
  • 141
    • 21144462980 scopus 로고
    • The social effects of punishment in organizations: A justice perspective
    • Trevino. L. 1992. "The Social Effects of Punishment in Organizations: A Justice Perspective," Academy of Management Review (17:4), pp. 647-676.
    • (1992) Academy of Management Review , vol.17 , Issue.4 , pp. 647-676
    • Trevino, L.1
  • 144
    • 84905713906 scopus 로고
    • Information systems security and privacy
    • J. Hanson (series editor), Norwood, NJ: Ablex Publishing
    • Warkentin, M. 1995. "Information Systems Security and Privacy," in Advances in Telematics, Volume 3: Emerging Information Technologies, J. Hanson (series editor), Norwood, NJ: Ablex Publishing, pp. 57-77.
    • (1995) Advances in Telematics, Volume 3: Emerging Information Technologies , pp. 57-77
    • Warkentin, M.1
  • 145
    • 85106113141 scopus 로고    scopus 로고
    • IT governance and organizational development for security management
    • D. Straub, S. Goodman and R. L. Baskerville (eds.), Armonk, NY: M. E. Sharpe
    • Warkentin, M., and Johnston, A. C. 2008. "IT Governance and Organizational Development for Security Management," in Information Security Policies and Practices, D. Straub, S. Goodman and R. L. Baskerville (eds.), Armonk, NY: M. E. Sharpe, pp. 46-68.
    • (2008) Information Security Policies and Practices , pp. 46-68
    • Warkentin, M.1    Johnston, A.C.2
  • 146
    • 79955622246 scopus 로고    scopus 로고
    • The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
    • Warkentin, M., Johnston, A. J., and Shropshire. J. 2011. "The Influence of the Informal Social Learning Environment on Information Privacy Policy Compliance Efficacy and Intention," European Journal of Information Systems (20:3), pp. 267-284.
    • (2011) European Journal of Information Systems , vol.20 , Issue.3 , pp. 267-284
    • Warkentin, M.1    Johnston, A.J.2    Shropshire, J.3
  • 147
    • 67650170305 scopus 로고    scopus 로고
    • Behavioral and policy issues in information systems security: The insider threat
    • Warkentin, M., and Willison, R. 2009. "Behavioral and Policy Issues in Information Systems Security: The Insider Threat," European Journal of Information Systems (18:2), pp. 101-105.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 101-105
    • Warkentin, M.1    Willison, R.2
  • 148
    • 33748670060 scopus 로고    scopus 로고
    • A letter from the tax office: Compliance effects of informational and interpersonal justice
    • Wenzel, M. 2006. "A Letter from the Tax Office: Compliance Effects of Informational and Interpersonal Justice," Social Justice Research (19:3), pp 345-364.
    • (2006) Social Justice Research , vol.19 , Issue.3 , pp. 345-364
    • Wenzel, M.1
  • 149
    • 0042284545 scopus 로고
    • Vandalism-The urge to destroy and damage
    • Whittingham, M. 1981. "Vandalism-The Urge to Destroy and Damage," Canadian Journal of Criminology (23:1), pp. 69-73.
    • (1981) Canadian Journal of Criminology , vol.23 , Issue.1 , pp. 69-73
    • Whittingham, M.1
  • 151
    • 33750683067 scopus 로고    scopus 로고
    • Understanding the perpetration of employee computer crime in the organisational context
    • Willison, R. 2006. "Understanding the Perpetration of Employee Computer Crime in the Organisational Context," Information and Organization (16:4), pp. 304-324.
    • (2006) Information and Organization , vol.16 , Issue.4 , pp. 304-324
    • Willison, R.1
  • 152
    • 33749351964 scopus 로고    scopus 로고
    • Opportunities for computer crime: Considering systems risk from a criminological perspective
    • Willison, R., and Backhouse, J. 2006. "Opportunities for Computer Crime: Considering Systems Risk from a Criminological Perspective," European Journal of Information Systems (15:4), pp. 403-414.
    • (2006) European Journal of Information Systems , vol.15 , Issue.4 , pp. 403-414
    • Willison, R.1    Backhouse, J.2
  • 153
    • 70149119150 scopus 로고    scopus 로고
    • Overcoming the insider: Reducing employee computer crime through situational crime prevention
    • Willison, R., and Siponen, M. 2009. "Overcoming the Insider: Reducing Employee Computer Crime through Situational Crime Prevention," Communications of the ACM (52:9), pp. 133-137.
    • (2009) Communications of the ACM , vol.52 , Issue.9 , pp. 133-137
    • Willison, R.1    Siponen, M.2
  • 154
    • 84873981377 scopus 로고    scopus 로고
    • Motivations for employee computer crime: Understanding and addressing workplace disgruntlement through the application of organisational justice
    • A. Vance (ed.), International Federation for Information Processing
    • Willison, R., and Warkentin, M. 2009. "Motivations for Employee Computer Crime: Understanding and Addressing Workplace Disgruntlement through the Application of Organisational Justice," in Proceedings of the IFIP TC8 International Workshop on Information Systems Security Research, A. Vance (ed.), International Federation for Information Processing, pp. 127-144.
    • (2009) Proceedings of the IFIP TC8 International Workshop on Information Systems Security Research , pp. 127-144
    • Willison, R.1    Warkentin, M.2
  • 155
    • 84873980813 scopus 로고    scopus 로고
    • The expanded security action cycle: A temporal analysis 'left of bang,'
    • A. Vance (ed.), International Federation for Information Processing
    • Willison, R., and Warkentin, M. 2010. "The Expanded Security Action Cycle: A Temporal Analysis 'Left of Bang,'" in Proceedings of the Dewald Roode Information Security Workshop, A. Vance (ed.), International Federation for Information Processing, pp. 392-438.
    • (2010) Proceedings of the Dewald Roode Information Security Workshop , pp. 392-438
    • Willison, R.1    Warkentin, M.2
  • 156
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • Workman, M., Bommer, W., and Straub, D. 2008. "Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test," Computers in Human Behavior (24:6), pp. 2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.2    Straub, D.3
  • 158
    • 4043110723 scopus 로고    scopus 로고
    • Does the risk of punishment deter criminally-prone individuals? Rational choice, self-control, and crime
    • Wright, B., Caspi, A., Moffitt, T., and Paternoster, R. 2004. "Does the Risk of Punishment Deter Criminally-Prone Individuals? Rational Choice, Self-Control, and Crime," Journal of Research in Crime and Delinquency (41:2), pp. 180-213.
    • (2004) Journal of Research in Crime and Delinquency , vol.41 , Issue.2 , pp. 180-213
    • Wright, B.1    Caspi, A.2    Moffitt, T.3    Paternoster, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.