-
1
-
-
77956839363
-
Inequity in social exchange
-
L. Berkowitz (ed.), New York: Academic Press
-
Adams, J. 1965. "Inequity in Social Exchange," in Advances in Experimental Social Psychology, Volume 2, L. Berkowitz (ed.), New York: Academic Press, pp. 267-299.
-
(1965)
Advances in Experimental Social Psychology
, vol.2
, pp. 267-299
-
-
Adams, J.1
-
2
-
-
84984287155
-
The techniques of neutralization and violence
-
Agnew, R. 1994. "The Techniques of Neutralization and Violence," Criminology (32:4), pp. 555-580.
-
(1994)
Criminology
, vol.32
, Issue.4
, pp. 555-580
-
-
Agnew, R.1
-
3
-
-
0009021911
-
The techniques of neutralization: An analysis of predisposing and situational factors
-
Agnew, R., and Peters, A. 1986. "The Techniques of Neutralization: An Analysis of Predisposing and Situational Factors," Criminal Justice and Behavior (13:1), pp. 81-97.
-
(1986)
Criminal Justice and Behavior
, vol.13
, Issue.1
, pp. 81-97
-
-
Agnew, R.1
Peters, A.2
-
4
-
-
84873969129
-
The combat operator
-
March 23 (January 24, 2010)
-
Allen, J. 2009. "The Combat Operator," DefenseTech, March 23 (available at http://defensetech.org/2009/03/23/guest-blog-thecombat-operator/; accessed January 24, 2010).
-
(2009)
DefenseTech
-
-
Allen, J.1
-
5
-
-
0036741938
-
Sabotage in the workplace: The role of organizational justice
-
Ambrose, M., Seabright, M., and Schminke, M. 2002. "Sabotage in the Workplace: The Role of Organizational Justice," Organizational Behavior and Human Decision Processes (89:1), pp. 947-965.
-
(2002)
Organizational Behavior and Human Decision Processes
, vol.89
, Issue.1
, pp. 947-965
-
-
Ambrose, M.1
Seabright, M.2
Schminke, M.3
-
6
-
-
0042284549
-
Political terrorism and 'common criminality
-
R. Ward and H. Smith (eds.), Chicago: The University of Illinois at Chicago
-
Amir, M. 1988. "Political Terrorism and 'Common Criminality,'" in International Terrorism: Operational Issues, R. Ward and H. Smith (eds.), Chicago: The University of Illinois at Chicago, pp. 95-109.
-
(1988)
International Terrorism: Operational Issues
, pp. 95-109
-
-
Amir, M.1
-
7
-
-
33745308201
-
The heat of the moment: The effect of sexual arousal on sexual decision making
-
Ariely, D., and Lowenstein, G. 2006. "The Heat of the Moment: the Effect of Sexual Arousal on Sexual Decision Making," Journal of Behavioral Decision Making (19:2), pp. 87-98.
-
(2006)
Journal of Behavioral Decision Making
, vol.19
, Issue.2
, pp. 87-98
-
-
Ariely, D.1
Lowenstein, G.2
-
9
-
-
0033247523
-
Moral disengagement in the perpetration of inhumanities
-
Bandura, A. 1999. "Moral Disengagement in the Perpetration of Inhumanities," Personality and Social Psychology Review (3:3), pp. 193-209.
-
(1999)
Personality and Social Psychology Review
, vol.3
, Issue.3
, pp. 193-209
-
-
Bandura, A.1
-
10
-
-
0036623355
-
Selective moral disengagement in the exercise of moral agency
-
Bandura, A. 2002. "Selective Moral Disengagement in the Exercise of Moral Agency," Journal of Moral Education (31:2), pp. 101-119.
-
(2002)
Journal of Moral Education
, vol.31
, Issue.2
, pp. 101-119
-
-
Bandura, A.1
-
11
-
-
0030489733
-
Mechanisms of moral disengagement in the exercise of moral agency
-
Bandura, A., Barbaranelli, C., Caprara, G., and Pastorelli, C. 1996. "Mechanisms of Moral Disengagement in the Exercise of Moral Agency," Journal of Personality and Social Psychology (71:2), pp. 364-374.
-
(1996)
Journal of Personality and Social Psychology
, vol.71
, Issue.2
, pp. 364-374
-
-
Bandura, A.1
Barbaranelli, C.2
Caprara, G.3
Pastorelli, C.4
-
12
-
-
79960783594
-
Violent street crime: Making sense of seemingly senseless acts
-
Bennett, T., and Brookman, F. 2008. "Violent Street Crime: Making Sense of Seemingly Senseless Acts," International Review of Law Computers & Technology (22:1-2), pp. 171-180.
-
(2008)
International Review of Law Computers & Technology
, vol.22
, Issue.1-2
, pp. 171-180
-
-
Bennett, T.1
Brookman, F.2
-
13
-
-
84984280715
-
Denying the guilty mind: Accounting for involvement in a white-collar crime
-
Benson, M. 1985. "Denying the Guilty Mind: Accounting for Involvement in a White-Collar Crime," Criminology (23:4), pp. 583-607.
-
(1985)
Criminology
, vol.23
, Issue.4
, pp. 583-607
-
-
Benson, M.1
-
14
-
-
0003092186
-
Interactional justice: Communication criteria
-
R. Lewicki., B. Sheppard., and M. Bazerman (eds.), Greenwich, CT: JAI Press
-
Bies, R., and Moag, J. 1986. "Interactional Justice: Communication Criteria," in Research on Negotiations in Organizations (Volume 1), R. Lewicki., B. Sheppard., and M. Bazerman (eds.), Greenwich, CT: JAI Press, pp. 43-55.
-
(1986)
Research on Negotiations in Organizations
, vol.1
, pp. 43-55
-
-
Bies, R.1
Moag, J.2
-
15
-
-
0003105729
-
Revenge in organizations: The good, the bad and the ugly
-
R. Griffin, A. O'Leary-Kelly, and J. Collins (eds.), Stamford, CT: JAI Press
-
Bies, R., and Tripp, T. 1998. "Revenge in Organizations: The Good, the Bad and the Ugly," in Dysfunctional Behavior in Organizations, Part B: Non-Violent Dysfunctional Behavior, R. Griffin, A. O'Leary-Kelly, and J. Collins (eds.), Stamford, CT: JAI Press, pp. 49-68.
-
(1998)
Dysfunctional Behavior in Organizations, Part B: Non-Violent Dysfunctional Behavior
, pp. 49-68
-
-
Bies, R.1
Tripp, T.2
-
16
-
-
0002359187
-
At the breaking point: Cognitive and social dynamics of revenge in organizations
-
in R. Giacalone and J. Greenberg (eds.), Thousand Oaks, CA: Sage
-
Bies, R., Tripp, T., and Kramer, R. 1997. "At the Breaking Point: Cognitive and Social Dynamics of Revenge in Organizations," in Antisocial Behavior in Organizations, in R. Giacalone and J. Greenberg (eds.), Thousand Oaks, CA: Sage, pp. 18-36.
-
(1997)
Antisocial Behavior in Organizations
, pp. 18-36
-
-
Bies, R.1
Tripp, T.2
Kramer, R.3
-
18
-
-
67650100804
-
If someone is watching, i'll do what i'm asked: Manditoriness, control, and information security
-
Boss, S., Kirsch, L., Angermermeier, I., Shingler, R., and Boss, W. 2009. "If Someone is Watching, I'll Do What I'm Asked: Manditoriness, Control, and Information Security," European Journal of Information Systems (18:2), pp. 151-164.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 151-164
-
-
Boss, S.1
Kirsch, L.2
Angermermeier, I.3
Shingler, R.4
Boss, W.5
-
19
-
-
0036191138
-
The influence of emotion on rational decision making in sexual aggression
-
Bouffard, J. 2002. "The Influence of Emotion on Rational Decision Making in Sexual Aggression," Journal of Criminal Justice (30:2), pp. 121-134.
-
(2002)
Journal of Criminal Justice
, vol.30
, Issue.2
, pp. 121-134
-
-
Bouffard, J.1
-
20
-
-
0038481773
-
Whither the beast? The role of emotions in criminal conduct
-
S. Simpson (ed.), Thousand Oaks, CA: Pine Forge
-
Bouffard, J., Exum, M., and Paternoster, R. 2000. "Whither the Beast? The Role of Emotions in Criminal Conduct," in Of Crime and Criminality, S. Simpson (ed.), Thousand Oaks, CA: Pine Forge, pp. 159-178.
-
(2000)
Of Crime and Criminality
, pp. 159-178
-
-
Bouffard, J.1
Exum, M.2
Paternoster, R.3
-
23
-
-
77957061746
-
Information security compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. "Information Security Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly (34:3), pp. 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
24
-
-
85044802584
-
AFDC to TANF: The effect of welfare reform on instrumental and expressive crimes
-
Burek, M. 2006. "AFDC to TANF: The Effect of Welfare Reform on Instrumental and Expressive Crimes," Criminal Justice Studies (19:3), pp. 241-256.
-
(2006)
Criminal Justice Studies
, vol.19
, Issue.3
, pp. 241-256
-
-
Burek, M.1
-
25
-
-
10344245100
-
Sanctions, perceived anger, and criminal offending
-
Carmichael, S., and Piquero, A. 2004. "Sanctions, Perceived Anger, and Criminal Offending," Journal of Quantitative Criminology (20:4), pp. 371-393.
-
(2004)
Journal of Quantitative Criminology
, vol.20
, Issue.4
, pp. 371-393
-
-
Carmichael, S.1
Piquero, A.2
-
26
-
-
84873946931
-
Computer economics study: Insiders top IT pros' worries
-
May 10 (May 29, 2007)
-
Carr, J. 2007. "Computer Economics Study: Insiders Top IT Pros' Worries," SC Magazine, May 10 (available at http://www.scmagazine.com/ computer-economics-study-insiders-top-it-prosworries/article/34942/; accessed May 29, 2007).
-
(2007)
SC Magazine
-
-
Carr, J.1
-
27
-
-
84883916218
-
Types of deviance and the effectiveness of legal sanctions
-
Chambliss, W. 1967. "Types of Deviance and the Effectiveness of Legal Sanctions," Wisconsin Law Review (3), pp. 703-719.
-
(1967)
Wisconsin Law Review
, vol.3
, pp. 703-719
-
-
Chambliss, W.1
-
28
-
-
0035210619
-
The role of justice in organizations: A meta-analysis
-
Cohen-Charash, Y., and Spector, P. 2001. "The Role of Justice in Organizations: A Meta-Analysis," Organizational Behavior and Human Decision Processes (86:2), pp. 278-321.
-
(2001)
Organizational Behavior and Human Decision Processes
, vol.86
, Issue.2
, pp. 278-321
-
-
Cohen-Charash, Y.1
Spector, P.2
-
30
-
-
85043737515
-
Justice at the millenium: A meta-analytic review of 25 years of organizational justice research
-
Colquitt, J., Conlon, D., Wesson., Porter., C., and Ng, K. 2001. "Justice at the Millenium: A Meta-Analytic Review of 25 Years of Organizational Justice Research," Journal of Applied Psychology (86:3), pp. 425-445.
-
(2001)
Journal of Applied Psychology
, vol.86
, Issue.3
, pp. 425-445
-
-
Colquitt, J.1
Conlon, D.2
Wesson3
Porter, C.4
Ng, K.5
-
31
-
-
0037370805
-
Societal attachments, offending frequency, and techniques of neutralization
-
Copes, H. 2003. "Societal Attachments, Offending Frequency, and Techniques of Neutralization," Deviant Behavior (24:2), pp. 101-127.
-
(2003)
Deviant Behavior
, vol.24
, Issue.2
, pp. 101-127
-
-
Copes, H.1
-
32
-
-
33947356707
-
Techniques of affirmation: Deviant behavior, moral commitment and subcultural identity
-
Copes, H., and Patrick Williams, J. 2007. "Techniques of Affirmation: Deviant Behavior, Moral Commitment and Subcultural Identity," Deviant Behavior (28:3), pp. 247-272.
-
(2007)
Deviant Behavior
, vol.28
, Issue.3
, pp. 247-272
-
-
Copes, H.1
Patrick Williams, J.2
-
33
-
-
0348006597
-
Crime specialisation, crime displacement and rational choice theory
-
H. Wegener., F. Losel, and J. Haisch (eds.), New York: Springer-Verlag
-
Cornish, D., and Clarke, R. 1989. "Crime Specialisation, Crime Displacement and Rational Choice Theory," in Criminal Behavior and the Justice System: Psychological Perspectives, H. Wegener., F. Losel, and J. Haisch (eds.), New York: Springer-Verlag: pp.103-117.
-
(1989)
Criminal Behavior and the Justice System: Psychological Perspectives
, pp. 103-117
-
-
Cornish, D.1
Clarke, R.2
-
34
-
-
0142040643
-
The devil made me do it: Use of neutralizations by shoplifters
-
Cromwell, P., and Thurman, Q. 2003. "The Devil Made Me Do It: Use of Neutralizations by Shoplifters," Deviant Behavior (24:6), pp. 535-550.
-
(2003)
Deviant Behavior
, vol.24
, Issue.6
, pp. 535-550
-
-
Cromwell, P.1
Thurman, Q.2
-
36
-
-
58049122836
-
E-crime watch survey
-
(November 1, 2009)
-
CSO Magazine. 2007. "E-Crime Watch Survey," (available at http://www.cert.org/archive/pdf/ecrimesummary07.pdf; accessed November 1, 2009).
-
(2007)
CSO Magazine
-
-
-
37
-
-
34848873123
-
Deterring internal information systems misuse
-
D'Arcy, J., and Hovav, A. 2007. "Deterring Internal Information Systems Misuse," Communications of the ACM (50:10), pp. 113-117.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 113-117
-
-
D'Arcy, J.1
Hovav, A.2
-
38
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'Arcy, J., Hovav, A., and Galletta, D. 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research (20:1), pp. 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
39
-
-
33846160600
-
Intimacy and violence: Exploring the role of victim-defendant relationship in criminal law
-
Dawson, M. 2006. "Intimacy and Violence: Exploring the Role of Victim-Defendant Relationship in Criminal Law," The Journal of Criminal Law and Criminology (96:4), pp. 1417-1449.
-
(2006)
The Journal of Criminal Law and Criminology
, vol.96
, Issue.4
, pp. 1417-1449
-
-
Dawson, M.1
-
40
-
-
78650371884
-
-
Deloitte. Deloitte & Touche LLP
-
Deloitte. 2006. "2006 Global Security Survey," Deloitte & Touche LLP (available at https://www.deloitte.com/assets/Dcom-Shared %20Assets/Documents/us-fsi-150606globalsecuritysurvey(1). pdf).
-
(2006)
2006 Global Security Survey
-
-
-
41
-
-
84924768355
-
-
Deloitte. Deloitte Center for Security & Privacy Solutions, Deloitte & Touche LLP
-
Deloitte. 2010. "Cyber Crime: A Clear and Present Danger." Deloitte Center for Security & Privacy Solutions, Deloitte & Touche LLP (available at http://www.deloitte.com/assets/Dcom-UnitedStates/Local%20Assets/ Documents/AERS/us-aers- Deloitte%20Cyber%20Crime%20POV%20Jan252010.pdf).
-
(2010)
Cyber Crime: A Clear and Present Danger
-
-
-
42
-
-
33846794868
-
Phishing for user security awareness
-
Dodge, R., Carver, C., and Ferguson, A. 2007. "Phishing for User Security Awareness," Computers & Security (26:1), pp. 73-80.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 73-80
-
-
Dodge, R.1
Carver, C.2
Ferguson, A.3
-
44
-
-
38249010350
-
Affect, risk, and decision criticality: Replication and extension in a business setting
-
Dunegan, K., Duchon, D., and Barton, S. 1992. "Affect, Risk, and Decision Criticality: Replication and Extension in a Business Setting," Organizational Behavior and Human Decision Processes (53:3), pp. 335-351.
-
(1992)
Organizational Behavior and Human Decision Processes
, vol.53
, Issue.3
, pp. 335-351
-
-
Dunegan, K.1
Duchon, D.2
Barton, S.3
-
45
-
-
84935677792
-
Wife assaulter's explanations for assaults
-
Dutton, D. 1986. "Wife Assaulter's Explanations for Assaults," Canadian Journal of Behavioral Science (18:4), pp. 381-390.
-
(1986)
Canadian Journal of Behavioral Science
, vol.18
, Issue.4
, pp. 381-390
-
-
Dutton, D.1
-
46
-
-
0038830415
-
Gearing up against crime: A dynamic framework to help designers keep up with the adaptive changing criminal in a changing world
-
Ekblom, P. 1997. "Gearing Up Against Crime: A Dynamic Framework to Help Designers Keep Up With the Adaptive Changing Criminal in a Changing World," International Journal of Risk Security and Crime Prevention (2:4), pp. 249-265.
-
(1997)
International Journal of Risk Security and Crime Prevention
, vol.2
, Issue.4
, pp. 249-265
-
-
Ekblom, P.1
-
47
-
-
0033164070
-
Techniques of neutralization used by deer poachers in the western United States: A research note
-
Eliason, S., and Dodder, R. 1999. "Techniques of Neutralization Used by Deer Poachers in the Western United States: A Research Note," Deviant Behavior (20:3), pp. 233-252.
-
(1999)
Deviant Behavior
, vol.20
, Issue.3
, pp. 233-252
-
-
Eliason, S.1
Dodder, R.2
-
49
-
-
0036865364
-
The application and robustness of the rational choice perspective in the study of intoxicated and angry intentions to aggress
-
Exum, M. 2002. "The Application and Robustness of the Rational Choice Perspective in the Study of Intoxicated and Angry Intentions to Aggress," Criminology (40:4), pp. 933-966.
-
(2002)
Criminology
, vol.40
, Issue.4
, pp. 933-966
-
-
Exum, M.1
-
50
-
-
0002895619
-
A popcorn metaphor for employee aggression
-
R. W. Griffin, A. O'Leary-Kelly, and J. Collins (eds.), Greenwich, CT: JAI Press
-
Folger, R., and Skarlicki, D. P. 1998. "A Popcorn Metaphor for Employee Aggression," in Monographs in Organizational Behavior and Industrial Relations: Volume 23, Dysfunctional Behavior in Organizations: Part A. Violent and Deviant Behavior, R. W. Griffin, A. O'Leary-Kelly, and J. Collins (eds.), Greenwich, CT: JAI Press, pp. 43-81.
-
(1998)
Monographs in Organizational Behavior and Industrial Relations: Volume 23, Dysfunctional Behavior in Organizations: Part A. Violent and Deviant Behavior
, pp. 43-81
-
-
Folger, R.1
Skarlicki, D.P.2
-
52
-
-
0037666778
-
Exploratory notes on criminality and emotional ambivalence
-
Frasier, C., and Meisenhelder, T. 1985. "Exploratory Notes on Criminality and Emotional Ambivalence," Qualitative Sociology (8:3), pp. 266-284.
-
(1985)
Qualitative Sociology
, vol.8
, Issue.3
, pp. 266-284
-
-
Frasier, C.1
Meisenhelder, T.2
-
53
-
-
0346487370
-
An examination of the relationship between distance travelled and motivational aspects of firesetting behavior
-
Fritzon, K. 2001. "An Examination of the Relationship Between Distance Travelled and Motivational Aspects of Firesetting Behavior," Journal of Environmental Psychology (21:1), pp. 45-60.
-
(2001)
Journal of Environmental Psychology
, vol.21
, Issue.1
, pp. 45-60
-
-
Fritzon, K.1
-
54
-
-
0010911757
-
Issues management and organizational accounts: An analysis of corporate responses to accusations of unethical business practices
-
Garrett, D., Bardford, J., Meyers. R., and Becker, J. 1989. "Issues Management and Organizational Accounts: An Analysis of Corporate Responses to Accusations of Unethical Business Practices," Journal of Business Ethics (8:7), pp. 507-520.
-
(1989)
Journal of Business Ethics
, vol.8
, Issue.7
, pp. 507-520
-
-
Garrett, D.1
Bardford, J.2
Meyers, R.3
Becker, J.4
-
55
-
-
0004223848
-
-
Newbury Park, CA: Sage
-
Gelles, R. 1987. Violent Home, Newbury Park, CA: Sage.
-
(1987)
Violent Home
-
-
Gelles, R.1
-
56
-
-
0000978088
-
Employee sabotage: Toward a practitioner-scholar understanding
-
A. Robert and J. Greenberg (eds.), Thousand Oaks, CA: Sage
-
Giacolone, R., Riordan, C., and Rosenfeld, P. 1997. "Employee Sabotage: Toward a Practitioner-Scholar Understanding," in Antisocial Behavior in Organizations, A. Robert and J. Greenberg (eds.), Thousand Oaks, CA: Sage: pp. 109-129.
-
(1997)
Antisocial Behavior in Organizations
, pp. 109-129
-
-
Giacolone, R.1
Riordan, C.2
Rosenfeld, P.3
-
57
-
-
0042175440
-
Employee theft as a reaction to underpayment inequity: The hidden cost of pay cuts
-
Greenberg, J. 1990. "Employee Theft as a Reaction to Underpayment Inequity: The Hidden Cost of Pay Cuts," Journal of Applied Psychology (54:1), pp. 81-103.
-
(1990)
Journal of Applied Psychology
, vol.54
, Issue.1
, pp. 81-103
-
-
Greenberg, J.1
-
58
-
-
0001862761
-
The social side of fairness: Interpersonal and informational classes of organizational justice
-
R. Cropanzano (ed.), Hilldale, NJ: Earlbaum
-
Greenberg, J. 1993. "The Social Side of Fairness: Interpersonal and Informational Classes of Organizational Justice," in Justice in the Workplace: Approaching Fairness in Human Resource Management, R. Cropanzano (ed.), Hilldale, NJ: Earlbaum, pp. 79-103.
-
(1993)
Justice in the Workplace: Approaching Fairness in Human Resource Management
, pp. 79-103
-
-
Greenberg, J.1
-
59
-
-
0033216652
-
Predicting employee aggression against coworkers, subordinates and supervisors: The roles of person behaviors and perceived workplace factors
-
Greenberg, L., and Barling, J. 1999. "Predicting Employee Aggression Against Coworkers, Subordinates and Supervisors: The Roles of Person Behaviors and Perceived Workplace Factors," Journal of Organizational Behavior (20:6), pp. 897-913.
-
(1999)
Journal of Organizational Behavior
, vol.20
, Issue.6
, pp. 897-913
-
-
Greenberg, L.1
Barling, J.2
-
60
-
-
81255163048
-
Understanding non-malicious security violations in the workplace: A composite behavior model
-
Guo, K., Yufei, Y., Archer, N., and Connelly, C. 2011. "Understanding Non-Malicious Security Violations in the Workplace: A Composite Behavior Model," Journal of Management Information Systems (28:2), pp. 203-236.
-
(2011)
Journal of Management Information Systems
, vol.28
, Issue.2
, pp. 203-236
-
-
Guo, K.1
Yufei, Y.2
Archer, N.3
Connelly, C.4
-
61
-
-
4444328737
-
Crime scene actions and offender characteristics in arsons
-
Hakkanen, H., Puolakka, P., and Santtila, P. 2004. "Crime Scene Actions and Offender Characteristics in Arsons," Legal and Criminal Psychology (9:2), pp. 197-214.
-
(2004)
Legal and Criminal Psychology
, vol.9
, Issue.2
, pp. 197-214
-
-
Hakkanen, H.1
Puolakka, P.2
Santtila, P.3
-
62
-
-
0000917858
-
The effects of ethics and personal denial of responsibility on computer abuse judgements and intentions
-
Harrington, S. 1996. "The Effects of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions," MIS Quarterly (20:3), pp. 257-277.
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-277
-
-
Harrington, S.1
-
64
-
-
67650152666
-
Protection motivation and deterrence: A framework for security compliance in organizations
-
Herath, T., and Rao, R. 2009. "Protection Motivation and Deterrence: A Framework for Security Compliance in Organizations," European Journal of Information Systems (18:2), pp. 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, R.2
-
65
-
-
72449140612
-
Toward a multi-foci approach to workplace aggression: A meta-analytic review of outcomes from different perpetrators
-
Hershcovis., M., and Barling, J. 2010. "Toward a Multi-Foci Approach to Workplace Aggression: A Meta-Analytic Review of Outcomes from Different Perpetrators," Journal of Organizational Behavior (31:1), pp. 24-44.
-
(2010)
Journal of Organizational Behavior
, vol.31
, Issue.1
, pp. 24-44
-
-
Hershcovis, M.1
Barling, J.2
-
66
-
-
33846296977
-
Predicting workplace aggression: A meta-analysis
-
Hershcovis, M., Turner, N., Barling, J., Arnold, K., Dupre, K., and Inness, M. 2007. "Predicting Workplace Aggression: A Meta- Analysis," Journal of Applied Psychology (92:1), pp. 228-238.
-
(2007)
Journal of Applied Psychology
, vol.92
, Issue.1
, pp. 228-238
-
-
Hershcovis, M.1
Turner, N.2
Barling, J.3
Arnold, K.4
Dupre, K.5
Inness, M.6
-
67
-
-
36949037524
-
Neutralization theory and online software piracy: An empirical analysis
-
Hinduja, S. 2007. "Neutralization Theory and Online Software Piracy: An Empirical Analysis," Ethics and Information Technology (9:3), pp. 187-204.
-
(2007)
Ethics and Information Technology
, vol.9
, Issue.3
, pp. 187-204
-
-
Hinduja, S.1
-
68
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crimes?
-
Hoffer, J., and Straub, D. 1989. "The 9 to 5 Underground: Are You Policing Computer Crimes?" Sloan Management Review (30:4), pp. 35-43.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-43
-
-
Hoffer, J.1
Straub, D.2
-
69
-
-
84928836007
-
Neutralizing in the workplace: An empirical analysis of property theft and production deviance
-
Hollinger, R. 1991. "Neutralizing in the Workplace: An Empirical Analysis of Property Theft and Production Deviance," Deviant Behavior (12:2), pp. 169-202.
-
(1991)
Deviant Behavior
, vol.12
, Issue.2
, pp. 169-202
-
-
Hollinger, R.1
-
70
-
-
69949141264
-
Fair today, fair tomorrow? A longitudinal investigation of overall justice perceptions
-
Holtz, B., and Harold, C. 2009. "Fair Today, Fair Tomorrow? A Longitudinal Investigation of Overall Justice Perceptions," Journal of Applied Psychology (94:5), pp. 1185-1199.
-
(2009)
Journal of Applied Psychology
, vol.94
, Issue.5
, pp. 1185-1199
-
-
Holtz, B.1
Harold, C.2
-
71
-
-
79959944364
-
Does deterrence really work in reducing information security policy violations by employees?
-
Hu Q, Xu Z, Dinev T, and Ling H. 2011. "Does Deterrence Really Work in Reducing Information Security Policy Violations by Employees?," Communications of the ACM (54:6), pp. 54-60.
-
(2011)
Communications of the ACM
, vol.54
, Issue.6
, pp. 54-60
-
-
Hu, Q.1
Xu, Z.2
Dinev, T.3
Ling, H.4
-
72
-
-
45949086382
-
Neutralizing music piracy: An empirical examination
-
Ingram, J., and Hinduja, S. 2008. "Neutralizing Music Piracy: An Empirical Examination," Deviant Behavior (24:4), pp. 334-366.
-
(2008)
Deviant Behavior
, vol.24
, Issue.4
, pp. 334-366
-
-
Ingram, J.1
Hinduja, S.2
-
73
-
-
24944579247
-
Understanding supervisor-targeted aggression: A within-person, between-jobs design
-
Inness, M., Barling, J., and Turner, M. 2005. "Understanding Supervisor-Targeted Aggression: A Within-Person, Between- Jobs Design," Journal of Applied Psychology (90:4), pp. 731-739.
-
(2005)
Journal of Applied Psychology
, vol.90
, Issue.4
, pp. 731-739
-
-
Inness, M.1
Barling, J.2
Turner, M.3
-
74
-
-
77957057727
-
Fear appeals and information security behavior: An empirical study
-
Johnston, A, and Warkentin, M. 2010. "Fear Appeals and Information Security Behavior: An Empirical Study," MIS Quarterly (34:3), pp. 549-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.1
Warkentin, M.2
-
75
-
-
34548827619
-
Predicting retaliation in the workplace: The theory of planned behavior and organizational justice
-
D. Nagao (ed.), Briarcliff Manor, NY: Academy of Management
-
rd Annual Meeting of the Academy of Management, D. Nagao (ed.), Briarcliff Manor, NY: Academy of Management.
-
(2003)
rd Annual Meeting of the Academy of Management
-
-
Jones, D.1
-
76
-
-
67449165031
-
Getting even with one's supervisor and one's organization: Relationships among types of injustice, desires for revenge, and counterproductive work behaviors
-
Jones, D. 2009. "Getting Even with One's Supervisor and One's Organization: Relationships Among Types of Injustice, Desires for Revenge, and Counterproductive Work Behaviors," Journal of Organizational Behavior (30:4), pp. 525-542
-
(2009)
Journal of Organizational Behavior
, vol.30
, Issue.4
, pp. 525-542
-
-
Jones, D.1
-
77
-
-
27844543023
-
-
CERT, Software Engineering Institute, Carnegie Mellon University
-
Keeney, M., Kowalski, E., Cappelli, D., Moore, A., Shimeall, T., and Rogers, S. 2005. "Insider Threat Study: Computer Systems Sabotage in Critical Infrastructure Sectors," CERT, Software Engineering Institute, Carnegie Mellon University (available at http://www.cert.org/insider-threat/ insidercross.html ).
-
(2005)
Insider Threat Study: Computer Systems Sabotage in Critical Infrastructure Sectors
-
-
Keeney, M.1
Kowalski, E.2
Cappelli, D.3
Moore, A.4
Shimeall, T.5
Rogers, S.6
-
79
-
-
0036064934
-
A holistic model of computer abuse within organizations
-
Lee, J., and Lee, Y. 2002. "A Holistic Model of Computer Abuse Within Organizations," Information Management and Computer Security (10:2), pp. 57-63.
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.2
, pp. 57-63
-
-
Lee, J.1
Lee, Y.2
-
80
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
Lee, S., Lee, S-G., and Yoo, S. 2004. "An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories," Information and Management (41:6), pp. 707-718.
-
(2004)
Information and Management
, vol.41
, Issue.6
, pp. 707-718
-
-
Lee, S.1
Lee, S.-G.2
Yoo, S.3
-
81
-
-
67650166189
-
Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
-
Lee, Y., and Larsen, K. 2009. "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," European Journal of Information Systems (18:2), pp. 177-187.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 177-187
-
-
Lee, Y.1
Larsen, K.2
-
82
-
-
0033935642
-
Beyond valence: Toward a model of emotion-specific influences on judgement and choice
-
Lerner, J., and Keltner, D. 2000. "Beyond Valence: Toward a Model of Emotion-Specific Influences on Judgement and Choice," Cognition & Emotion (14:4), pp. 473-493.
-
(2000)
Cognition & Emotion
, vol.14
, Issue.4
, pp. 473-493
-
-
Lerner, J.1
Keltner, D.2
-
83
-
-
0001787903
-
What should be done with equity theory?
-
K. Gergen, M. Greenberg, and R. Willis (eds.), New York: Plenum
-
Leventhal, G. 1980. "What Should be Done With Equity Theory?," in Social Exchange: Advances in Theory and Research, K. Gergen, M. Greenberg, and R. Willis (eds.), New York: Plenum, pp. 27-55.
-
(1980)
Social Exchange: Advances in Theory and Research
, pp. 27-55
-
-
Leventhal, G.1
-
84
-
-
0002014647
-
Beyond fairness: A theory of allocation preferences
-
G. Mikula (ed.), New York: Springer-Verlag
-
Leventhal, G., Karuza, J., and Fry, W. 1980. "Beyond Fairness: A Theory of Allocation Preferences," in Justice and Social Interaction, G. Mikula (ed.), New York: Springer-Verlag, pp. 167-218.
-
(1980)
Justice and Social Interaction
, pp. 167-218
-
-
Leventhal, G.1
Karuza, J.2
Fry, W.3
-
85
-
-
0142123338
-
The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice
-
Lim, V. 2002. "The IT Way of Loafing on the Job: Cyberloafing, Neutralizing and Organizational Justice," Journal of Organizational Behavior (23:5), pp. 675-694.
-
(2002)
Journal of Organizational Behavior
, vol.23
, Issue.5
, pp. 675-694
-
-
Lim, V.1
-
86
-
-
28044468029
-
Prevalence, perceived seriousness, justification and regulation of cyberloafing in singapore: An exploratory study
-
Lim, V., and Teo, T. 2005. "Prevalence, Perceived Seriousness, Justification and Regulation of Cyberloafing in Singapore: An Exploratory Study," Information & Management (42:8), pp. 1081-1093.
-
(2005)
Information & Management
, vol.42
, Issue.8
, pp. 1081-1093
-
-
Lim, V.1
Teo, T.2
-
88
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K., Carr, H., and Warkentin, M. 1992. "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly (16:2), pp. 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.1
Carr, H.2
Warkentin, M.3
-
90
-
-
0030696195
-
The effect of sexual arousal on expectations of sexual forcefulness
-
Lowenstein, G., Nagin, D., and Paternoster, R. 1997. "The Effect of Sexual Arousal on Expectations of Sexual Forcefulness," Journal of Research in Crime and Delinquency (34:4), pp. 443-473.
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, Issue.4
, pp. 443-473
-
-
Lowenstein, G.1
Nagin, D.2
Paternoster, R.3
-
91
-
-
84873980918
-
Information systems security in a digital economy: Call for papers
-
(December 31, 2011)
-
Mahmood, M., Siponen, M., Straub, D., and Rao, R. 2008. "Information Systems Security in a Digital Economy: Call for Papers," MIS Quarterly (available at http://eventseer.net/e/6368/; accessed December 31, 2011).
-
(2008)
MIS Quarterly
-
-
Mahmood, M.1
Siponen, M.2
Straub, D.3
Rao, R.4
-
92
-
-
77957096376
-
Moving toward black hat research in information systems security: An editorial introduction to the special issue
-
Mahmood, M. A., Siponen, M., Straub, D., Rao, R., and Raghu, T. S. 2010. "Moving Toward Black Hat Research in Information Systems Security: An Editorial Introduction to the Special Issue," MIS Quarterly (34:3), pp. 431-433.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 431-433
-
-
Mahmood, M.A.1
Siponen, M.2
Straub, D.3
Rao, R.4
Raghu, T.S.5
-
93
-
-
33645465637
-
What have we learned from five decades of neutralization research?
-
M. Tonry (ed.), Chicago: The University of Chicago Press
-
Maruna, S., and Copes, H. 2005. "What Have We Learned from Five Decades of Neutralization Research?," in Crime and Justice: A Review of Research (Volume 32), M. Tonry (ed.), Chicago: The University of Chicago Press, pp. 221-320.
-
(2005)
Crime and Justice: A Review of Research (Volume 32)
, pp. 221-320
-
-
Maruna, S.1
Copes, H.2
-
94
-
-
23044521671
-
Integrating justice and social exchange: The differing effects of fair procedures and treatment on work relationships
-
Masterson, S. S., Lewis, K., Goldman, B. M., and Taylor, M. S. 2000. "Integrating Justice and Social Exchange: The Differing Effects of Fair Procedures and Treatment on Work Relationships," Academy of Management Journal (43:4), pp. 738-748.
-
(2000)
Academy of Management Journal
, vol.43
, Issue.4
, pp. 738-748
-
-
Masterson, S.S.1
Lewis, K.2
Goldman, B.M.3
Taylor, M.S.4
-
95
-
-
0019495519
-
Techniques of neutralization: A reconceptualization and empirical examination
-
Minor, W. 1981. "Techniques of Neutralization: A Reconceptualization and Empirical Examination," Journal of Research in Crime and Delinquency (18:2), pp. 295-318.
-
(1981)
Journal of Research in Crime and Delinquency
, vol.18
, Issue.2
, pp. 295-318
-
-
Minor, W.1
-
96
-
-
34548831353
-
Abusive supervision and workplace deviance and the moderating effects of negative reciprocity beliefs
-
Mitchell, M., and Ambrose, M. 2007. "Abusive Supervision and Workplace Deviance and the Moderating Effects of Negative Reciprocity Beliefs," Journal of Applied Psychology (92:4), pp. 1159-1168.
-
(2007)
Journal of Applied Psychology
, vol.92
, Issue.4
, pp. 1159-1168
-
-
Mitchell, M.1
Ambrose, M.2
-
97
-
-
65649098362
-
Neutralizing potential and self-reported digital piracy: A multi-theoretical exploration among college undergraduates
-
Morris, R., and Higgins, G. 2009. "Neutralizing Potential and Self- Reported Digital Piracy: A Multi-Theoretical Exploration Among College Undergraduates," Criminal Justice Review (34:2), pp. 173-195.
-
(2009)
Criminal Justice Review
, vol.34
, Issue.2
, pp. 173-195
-
-
Morris, R.1
Higgins, G.2
-
98
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
-
Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., and Vance, A. 2009. "What Levels of Moral Reasoning and Values Explain Adherence to Information Security Rules? An Empirical Study," European Journal of Information Systems (18:2), pp. 126-139.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
99
-
-
0002294309
-
Criminal deterrence research at the outset of the twenty-first century
-
M. Tonry (ed.), Chicago: The University of Chicago Press
-
Nagin, D. 1998. "Criminal Deterrence Research at the Outset of the Twenty-First Century," in Crime and Justice: A Review of Research (Volume 23), M. Tonry (ed.), Chicago: The University of Chicago Press, pp. 1-42.
-
(1998)
Crime and Justice: A Review of Research
, vol.23
, pp. 1-42
-
-
Nagin, D.1
-
100
-
-
85050412654
-
Enduring individual differences and rational choice theories of crime
-
Nagin, D., and Paternoster, R. 1993. "Enduring Individual Differences and Rational Choice Theories of Crime," Law & Society Review (27:3), pp.467-496.
-
(1993)
Law & Society Review
, vol.27
, Issue.3
, pp. 467-496
-
-
Nagin, D.1
Paternoster, R.2
-
101
-
-
85101726600
-
An investigation into the use and usefulness of security software in detecting computer abuse
-
J. I. DeGross and M. H. Olson (eds.), Minneapolis, MN
-
th International Conference on Information Systems, J. I. DeGross and M. H. Olson (eds.), Minneapolis, MN, pp. 283-294.
-
(1988)
th International Conference on Information Systems
, pp. 283-294
-
-
Nance, W.D.1
Straub, D.W.2
-
103
-
-
34250736802
-
Organizational justice: Looking back, looking forward
-
Nowakowski, J., and Conlon, D. 2005. "Organizational Justice: Looking Back, Looking Forward," The International Journal of Conflict Management (16:1), pp. 4-29.
-
(2005)
The International Journal of Conflict Management
, vol.16
, Issue.1
, pp. 4-29
-
-
Nowakowski, J.1
Conlon, D.2
-
104
-
-
0035611374
-
Desperately seeking the 'it' in it research: A call to theorizing the it artifact
-
Orlikowski, W., and Iacono, S. 2001. "Desperately Seeking the 'IT' in IT Research: A Call to Theorizing the IT Artifact," Information Systems Research (12:2), pp. 121-134.
-
(2001)
Information Systems Research
, vol.12
, Issue.2
, pp. 121-134
-
-
Orlikowski, W.1
Iacono, S.2
-
105
-
-
80053473856
-
Which factors explain employees' adherence to information security policies?
-
Auckland, New Zealand
-
Pahnila, S., Siponen, M., and Mahmood, A. 2007. "Which Factors Explain Employees' Adherence to Information Security Policies?," in Proceedings of the Pacific Asia Conference on Information Systems, Auckland, New Zealand.
-
(2007)
Proceedings of the Pacific Asia Conference on Information Systems
-
-
Pahnila, S.1
Siponen, M.2
Mahmood, A.3
-
107
-
-
84869094909
-
Deterrence, poverty, and type of homicide
-
Parker, R. N., and Smith, M. D. 1979. "Deterrence, Poverty, and Type of Homicide," The American Journal of Sociology (85:3), pp. 614-624.
-
(1979)
The American Journal of Sociology
, vol.85
, Issue.3
, pp. 614-624
-
-
Parker, R.N.1
Smith, M.D.2
-
108
-
-
0030521693
-
Sanction threats and appeals to morality: Testing a rational choice theory of corporate crime
-
Paternoster, R., and Simpson, S. 1996. "Sanction Threats and Appeals to Morality: Testing a Rational Choice Theory of Corporate Crime," Law and Society Review (30:3), pp. 549-584.
-
(1996)
Law and Society Review
, vol.30
, Issue.3
, pp. 549-584
-
-
Paternoster, R.1
Simpson, S.2
-
109
-
-
0000392842
-
Specifying the direct and indirect effects of low self-control and situational factors in offenders decision making: Toward a more comparative model of rational offending
-
Piquero, N., and Tibbetts, S. 1996. "Specifying the Direct and Indirect Effects of Low Self-Control and Situational Factors in Offenders Decision Making: Toward a More Comparative Model of Rational Offending," Justice Quarterly (13:3), pp. 481-510.
-
(1996)
Justice Quarterly
, vol.13
, Issue.3
, pp. 481-510
-
-
Piquero, N.1
Tibbetts, S.2
-
110
-
-
14544279756
-
Examining the role of differential association and techniques of neutralization in explaining corporate crime
-
Piquero, N., Tibbetts, S., and Blankenship, M. 2005. "Examining the Role of Differential Association and Techniques of Neutralization in Explaining Corporate Crime," Deviant Behavior (26:2), pp. 159-188.
-
(2005)
Deviant Behavior
, vol.26
, Issue.2
, pp. 159-188
-
-
Piquero, N.1
Tibbetts, S.2
Blankenship, M.3
-
112
-
-
84873951007
-
-
Ponemon Institute. ArcSight, Inc
-
Ponemon Institute. 2010. First Annual Cost of Cyber Crime Study. ArcSight, Inc. (http://www.riskandinsurancechalkboard.com/uploads/file/Ponemon% 20Study(1).pdf).
-
(2010)
First Annual Cost of Cyber Crime Study
-
-
-
113
-
-
0009240018
-
Techniques of neutralization: Young adult marijuana smokers
-
Priest, T., and McGrath, J. 1970. "Techniques of Neutralization: Young Adult Marijuana Smokers," Criminology (8:2), pp. 185-194.
-
(1970)
Criminology
, vol.8
, Issue.2
, pp. 185-194
-
-
Priest, T.1
McGrath, J.2
-
114
-
-
82955172800
-
-
PwC. Pricewaterhouse Coopers
-
PwC. 2008. "The Global State of Information Security" Pricewaterhouse Coopers (http://www.pwcglobal.com/extweb/home.nsf/docid/ C1CD6CC69C2676D4852574 DA00785949).
-
(2008)
The Global State of Information Security
-
-
-
116
-
-
84865537483
-
-
PwC. Pricewaterhouse Coopers Security Survey
-
PwC. 2010b. "Trial by Fire," Pricewaterhouse Coopers Security Survey.
-
(2010)
Trial by Fire
-
-
-
117
-
-
78049400376
-
-
PwC/UK DoBE Pricewaterhouse Coopers
-
PwC/UK DoBE 2008. "Information Security Breaches Survey," Pricewaterhouse Coopers(available at http://www.pwc.co.uk/eng/publications/berr- information-security-breaches-survey-2008. html ).
-
(2008)
Information Security Breaches Survey
-
-
-
119
-
-
21844526560
-
A typology of deviant workplace behaviors: A multidimensional scaling study
-
Robinson, S., and Bennett, R. 1995. "A Typology of Deviant Workplace Behaviors: A Multidimensional Scaling Study," Academy of Management Journal (38:2), pp. 555-572.
-
(1995)
Academy of Management Journal
, vol.38
, Issue.2
, pp. 555-572
-
-
Robinson, S.1
Bennett, R.2
-
120
-
-
0001782487
-
Workplace deviance: Its definition, its nature and its causes
-
R. Lewicki., B. Sheppard., and R. Bies (eds.), Greenwich, CT: JAI Press
-
Robinson, S., and Bennett, R. 1997. "Workplace Deviance: Its Definition, Its Nature and Its Causes," in Research on Negotiation in Organizations (Volume 6), R. Lewicki., B. Sheppard., and R. Bies (eds.), Greenwich, CT: JAI Press, pp. 3-28.
-
(1997)
Research on Negotiation in Organizations
, vol.6
, pp. 3-28
-
-
Robinson, S.1
Bennett, R.2
-
121
-
-
0023772601
-
Validating the components of a taxonomic system for rapists: A path analytic approach
-
Rosenberg, R., Knight, R., Prentky, R., and Lee, A. 1988. "Validating the Components of a Taxonomic System for Rapists: A Path Analytic Approach," Bulletin of the American Academy of Psychiatry and the Law (16:2), pp. 169-185.
-
(1988)
Bulletin of the American Academy of Psychiatry and the Law
, vol.16
, Issue.2
, pp. 169-185
-
-
Rosenberg, R.1
Knight, R.2
Prentky, R.3
Lee, A.4
-
122
-
-
0035387175
-
Transforming the 'weakest link'-A human/computer interaction approach to usable and effective security
-
Sasse, M., Brostoff, S., and Weirich, D. 2001. "Transforming the 'Weakest Link'-A Human/Computer Interaction Approach to Usable and Effective Security," BT Technology Journal (19:3), pp. 122-131.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.1
Brostoff, S.2
Weirich, D.3
-
123
-
-
43949161471
-
Explanations: What factors enhance their perceived adequacy?
-
Shapiro, D., Buttner, E., and Barry, B. 1994. "Explanations: What Factors Enhance Their Perceived Adequacy?," Organizational Behavior and Human Decision Processes (58:3), pp. 346-368.
-
(1994)
Organizational Behavior and Human Decision Processes
, vol.58
, Issue.3
, pp. 346-368
-
-
Shapiro, D.1
Buttner, E.2
Barry, B.3
-
124
-
-
84873958675
-
-
White Paper, Symantec, Mountain View, CA
-
Shaw, E. D., and Stock, H. V. 2011. "Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall," White Paper, Symantec, Mountain View, CA.
-
(2011)
Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall
-
-
Shaw, E.D.1
Stock, H.V.2
-
126
-
-
76649136483
-
A canonical analysis of intentional information security breaches by insiders
-
Shropshire, J. 2009. "A Canonical Analysis of Intentional Information Security Breaches by Insiders," Information Management and Computer Security (17:4), pp. 221-234.
-
(2009)
Information Management and Computer Security
, vol.17
, Issue.4
, pp. 221-234
-
-
Shropshire, J.1
-
127
-
-
0001597886
-
Garment workers: Perceptions of inequity and employee theft
-
Sieh, E. 1987. "Garment Workers: Perceptions of Inequity and Employee Theft," British Journal of Criminology (27:2), pp. 174-191.
-
(1987)
British Journal of Criminology
, vol.27
, Issue.2
, pp. 174-191
-
-
Sieh, E.1
-
128
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
Siponen, M., and Vance, A. 2010. "Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations," MIS Quarterly (34:3), pp. 487-502.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
130
-
-
0031515495
-
Retaliation in the workplace: The role of distributive, procedural and interactional justice
-
Skarlicki, D., and Folger, R. 1997. "Retaliation in the Workplace: The Role of Distributive, Procedural and Interactional Justice," Journal of Applied Psychology (82:3), pp. 434-443.
-
(1997)
Journal of Applied Psychology
, vol.82
, Issue.3
, pp. 434-443
-
-
Skarlicki, D.1
Folger, R.2
-
131
-
-
0033248835
-
Personality as a moderator in the relationship between fairness and retaliation
-
Skarlicki, D., Folger, R., and Tesluk, P. 1999. "Personality as a Moderator in the Relationship Between Fairness and Retaliation," Academy of Management Journal (42:1), pp. 100-108.
-
(1999)
Academy of Management Journal
, vol.42
, Issue.1
, pp. 100-108
-
-
Skarlicki, D.1
Folger, R.2
Tesluk, P.3
-
133
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton, J. M., Stam, K. R., Mastrangelo, P., and Jolton, J. 2005. "Analysis of End User Security Behaviors," Computers & Security (24:2), pp. 124-133.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
134
-
-
0000280419
-
Effective is security: An empirical study
-
Straub, D. 1990. "Effective IS Security: An Empirical Study," Information Systems Research (1:3), pp. 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.1
-
135
-
-
8744241162
-
Deterring highly motivated computer abusers: A field experiment in computer security
-
G. Gable and W. Caelli (eds.), Amsterdam: Elsevier Science Publishers
-
Straub, D., Carlson, P., and Jones, E. 1992. "Deterring Highly Motivated Computer Abusers: A Field Experiment in Computer Security," in IT Security: The Needs for International Cooperation, G. Gable and W. Caelli (eds.), Amsterdam: Elsevier Science Publishers, pp. 309-324.
-
(1992)
IT Security: The Needs for International Cooperation
, pp. 309-324
-
-
Straub, D.1
Carlson, P.2
Jones, E.3
-
136
-
-
0001133137
-
Coping with systems risks: Security planning models for management decision making
-
Straub, D., and Welke, R. 1998. "Coping With Systems Risks: Security Planning Models for Management Decision Making," MIS Quarterly (22:4), pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.1
Welke, R.2
-
138
-
-
0001155759
-
Techniques of neutralization: A theory of delinquency
-
Sykes, G., and Matza, D. 1957. "Techniques of Neutralization: A Theory of Delinquency," American Sociological Review (22:6), pp. 664-670.
-
(1957)
American Sociological Review
, vol.22
, Issue.6
, pp. 664-670
-
-
Sykes, G.1
Matza, D.2
-
139
-
-
0041783565
-
Actors, actions and deterrence: A reformulation of chambliss's typology of deterrence
-
M. Riedel and P. Vales (eds.), New York: Praeger
-
Thomas, C., and Williams, J. 1977. "Actors, Actions and Deterrence: A Reformulation of Chambliss's Typology of Deterrence," in Treating the Offender: Problems and Issues, M. Riedel and P. Vales (eds.), New York: Praeger.
-
(1977)
Treating the Offender: Problems and Issues
-
-
Thomas, C.1
Williams, J.2
-
140
-
-
84926279405
-
Deviance and the neutralization of moral commitment: An empirical analysis
-
Thurman, Q. 1984. "Deviance and the Neutralization of Moral Commitment: An Empirical Analysis," Deviant Behavior (5:1-4), pp. 291-304.
-
(1984)
Deviant Behavior
, vol.5
, Issue.1-4
, pp. 291-304
-
-
Thurman, Q.1
-
141
-
-
21144462980
-
The social effects of punishment in organizations: A justice perspective
-
Trevino. L. 1992. "The Social Effects of Punishment in Organizations: A Justice Perspective," Academy of Management Review (17:4), pp. 647-676.
-
(1992)
Academy of Management Review
, vol.17
, Issue.4
, pp. 647-676
-
-
Trevino, L.1
-
144
-
-
84905713906
-
Information systems security and privacy
-
J. Hanson (series editor), Norwood, NJ: Ablex Publishing
-
Warkentin, M. 1995. "Information Systems Security and Privacy," in Advances in Telematics, Volume 3: Emerging Information Technologies, J. Hanson (series editor), Norwood, NJ: Ablex Publishing, pp. 57-77.
-
(1995)
Advances in Telematics, Volume 3: Emerging Information Technologies
, pp. 57-77
-
-
Warkentin, M.1
-
145
-
-
85106113141
-
IT governance and organizational development for security management
-
D. Straub, S. Goodman and R. L. Baskerville (eds.), Armonk, NY: M. E. Sharpe
-
Warkentin, M., and Johnston, A. C. 2008. "IT Governance and Organizational Development for Security Management," in Information Security Policies and Practices, D. Straub, S. Goodman and R. L. Baskerville (eds.), Armonk, NY: M. E. Sharpe, pp. 46-68.
-
(2008)
Information Security Policies and Practices
, pp. 46-68
-
-
Warkentin, M.1
Johnston, A.C.2
-
146
-
-
79955622246
-
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
-
Warkentin, M., Johnston, A. J., and Shropshire. J. 2011. "The Influence of the Informal Social Learning Environment on Information Privacy Policy Compliance Efficacy and Intention," European Journal of Information Systems (20:3), pp. 267-284.
-
(2011)
European Journal of Information Systems
, vol.20
, Issue.3
, pp. 267-284
-
-
Warkentin, M.1
Johnston, A.J.2
Shropshire, J.3
-
147
-
-
67650170305
-
Behavioral and policy issues in information systems security: The insider threat
-
Warkentin, M., and Willison, R. 2009. "Behavioral and Policy Issues in Information Systems Security: The Insider Threat," European Journal of Information Systems (18:2), pp. 101-105.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 101-105
-
-
Warkentin, M.1
Willison, R.2
-
148
-
-
33748670060
-
A letter from the tax office: Compliance effects of informational and interpersonal justice
-
Wenzel, M. 2006. "A Letter from the Tax Office: Compliance Effects of Informational and Interpersonal Justice," Social Justice Research (19:3), pp 345-364.
-
(2006)
Social Justice Research
, vol.19
, Issue.3
, pp. 345-364
-
-
Wenzel, M.1
-
149
-
-
0042284545
-
Vandalism-The urge to destroy and damage
-
Whittingham, M. 1981. "Vandalism-The Urge to Destroy and Damage," Canadian Journal of Criminology (23:1), pp. 69-73.
-
(1981)
Canadian Journal of Criminology
, vol.23
, Issue.1
, pp. 69-73
-
-
Whittingham, M.1
-
151
-
-
33750683067
-
Understanding the perpetration of employee computer crime in the organisational context
-
Willison, R. 2006. "Understanding the Perpetration of Employee Computer Crime in the Organisational Context," Information and Organization (16:4), pp. 304-324.
-
(2006)
Information and Organization
, vol.16
, Issue.4
, pp. 304-324
-
-
Willison, R.1
-
152
-
-
33749351964
-
Opportunities for computer crime: Considering systems risk from a criminological perspective
-
Willison, R., and Backhouse, J. 2006. "Opportunities for Computer Crime: Considering Systems Risk from a Criminological Perspective," European Journal of Information Systems (15:4), pp. 403-414.
-
(2006)
European Journal of Information Systems
, vol.15
, Issue.4
, pp. 403-414
-
-
Willison, R.1
Backhouse, J.2
-
153
-
-
70149119150
-
Overcoming the insider: Reducing employee computer crime through situational crime prevention
-
Willison, R., and Siponen, M. 2009. "Overcoming the Insider: Reducing Employee Computer Crime through Situational Crime Prevention," Communications of the ACM (52:9), pp. 133-137.
-
(2009)
Communications of the ACM
, vol.52
, Issue.9
, pp. 133-137
-
-
Willison, R.1
Siponen, M.2
-
154
-
-
84873981377
-
Motivations for employee computer crime: Understanding and addressing workplace disgruntlement through the application of organisational justice
-
A. Vance (ed.), International Federation for Information Processing
-
Willison, R., and Warkentin, M. 2009. "Motivations for Employee Computer Crime: Understanding and Addressing Workplace Disgruntlement through the Application of Organisational Justice," in Proceedings of the IFIP TC8 International Workshop on Information Systems Security Research, A. Vance (ed.), International Federation for Information Processing, pp. 127-144.
-
(2009)
Proceedings of the IFIP TC8 International Workshop on Information Systems Security Research
, pp. 127-144
-
-
Willison, R.1
Warkentin, M.2
-
155
-
-
84873980813
-
The expanded security action cycle: A temporal analysis 'left of bang,'
-
A. Vance (ed.), International Federation for Information Processing
-
Willison, R., and Warkentin, M. 2010. "The Expanded Security Action Cycle: A Temporal Analysis 'Left of Bang,'" in Proceedings of the Dewald Roode Information Security Workshop, A. Vance (ed.), International Federation for Information Processing, pp. 392-438.
-
(2010)
Proceedings of the Dewald Roode Information Security Workshop
, pp. 392-438
-
-
Willison, R.1
Warkentin, M.2
-
156
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Workman, M., Bommer, W., and Straub, D. 2008. "Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test," Computers in Human Behavior (24:6), pp. 2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.2
Straub, D.3
-
157
-
-
33846344673
-
Punishment and ethics deterrents: A study of insider security contravention
-
Workman, M., and Gathegi, J. 2007. "Punishment and Ethics Deterrents: A Study of Insider Security Contravention," Journal of the American Society for Information Science and Technology (58:2), pp. 212-222.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.2
, pp. 212-222
-
-
Workman, M.1
Gathegi, J.2
-
158
-
-
4043110723
-
Does the risk of punishment deter criminally-prone individuals? Rational choice, self-control, and crime
-
Wright, B., Caspi, A., Moffitt, T., and Paternoster, R. 2004. "Does the Risk of Punishment Deter Criminally-Prone Individuals? Rational Choice, Self-Control, and Crime," Journal of Research in Crime and Delinquency (41:2), pp. 180-213.
-
(2004)
Journal of Research in Crime and Delinquency
, vol.41
, Issue.2
, pp. 180-213
-
-
Wright, B.1
Caspi, A.2
Moffitt, T.3
Paternoster, R.4
|