-
2
-
-
9744260316
-
Validation in information systems research: A state-of-the-art assessment
-
doi:10.2307/3250956
-
Boudreau, M. C., Gefen, D., & Straub, D. W. (2001). Validation in information systems research: A state-of-the-art assessment. Management Information Systems Quarterly, 11(1), 1-16. doi:10.2307/3250956
-
(2001)
Management Information Systems Quarterly
, vol.11
, Issue.1
, pp. 1-16
-
-
Boudreau, M.C.1
Gefen, D.2
Straub, D.W.3
-
6
-
-
15544368870
-
Monitoring hacker activity with a honeynet
-
doi:10.1002/nem.549
-
Curran, K., Morrissey, C., Fagan, C., Murphy, C., O'Donnell, B., & Firzpatrick, G. (2005). Monitoring hacker activity with a honeynet. International Journal of Network Management, 15(2), 123-134. doi:10.1002/nem.549
-
(2005)
International Journal of Network Management
, vol.15
, Issue.2
, pp. 123-134
-
-
Curran, K.1
Morrissey, C.2
Fagan, C.3
Murphy, C.4
O'Donnell, B.5
Firzpatrick, G.6
-
9
-
-
3242808612
-
-
Retrieved December 22, 2009, from
-
Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Richardson, R. (2005). Computer crime and security survey: Retrieved December 22, 2009, from http://www.cpppe.umd.edu/Bookstore/Documents/2005CSISurvey.pdf
-
(2005)
Computer Crime and Security Survey:
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
10
-
-
84899321203
-
-
Grecs, Retrieved April 25, 2008, from
-
Grecs. (2008). ShmooCon 2008 infosec conference event. Retrieved April 25, 2008, from http://www.novainfosecportal.com/2008/02/18/shmoocon2008-infosec-conference-event-saturday/
-
(2008)
ShmooCon 2008 Infosec Conference Event
-
-
-
11
-
-
4444273034
-
-
Hoboken, NJ, Wiley
-
Groves, R. M., Fowler, F. J., Couper, M. P., & Lepkowski, J. M., Singer, E., & Tourangeau, R. (2004). Survey methodology. Hoboken, NJ: Wiley.
-
(2004)
Survey Methodology
-
-
Groves, R.M.1
Fowler, F.J.2
Couper, M.P.3
Lepkowski, J.M.4
Singer, E.5
Tourangeau, R.6
-
12
-
-
33847270657
-
Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures
-
doi:10.1080/01639620601131065
-
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171-198. doi:10.1080/01639620601131065
-
(2007)
Deviant Behavior
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
14
-
-
84899329508
-
Real-world problems of virtual crime
-
In Balkin, J. M., Grimmelmann, J., Katz, E., Kozlovski, N., Wagman, S., & Zarsky, T. (Eds.), New York: New York University Press
-
Howell, B. A. (2007). Real-world problems of virtual crime. In Balkin, J. M., Grimmelmann, J., Katz, E., Kozlovski, N., Wagman, S., & Zarsky, T. (Eds.), Cybercrime: Digital cops in a networked environment. New York: New York University Press.
-
(2007)
Cybercrime: Digital Cops in a Networked Environment
-
-
Howell, B.A.1
-
15
-
-
74949091035
-
Cyber criminology: Evolving a novel discipline with a new journal
-
Jaishankar, K. (2007). Cyber criminology: Evolving a novel discipline with a new journal. International Journal of Cyber Criminology, 1(1), 1-6.
-
(2007)
International Journal of Cyber Criminology
, vol.1
, Issue.1
, pp. 1-6
-
-
Jaishankar, K.1
-
18
-
-
0042855099
-
A sociology of hackers
-
doi:10.1111/1467-954X.00139
-
Jordan, T., & Taylor, P. A. (1998). A sociology of hackers. The Sociological Review, 46(4), 757-780. doi:10.1111/1467-954X.00139
-
(1998)
The Sociological Review
, vol.46
, Issue.4
, pp. 757-780
-
-
Jordan, T.1
Taylor, P.A.2
-
20
-
-
80053525878
-
-
May 29, Retrieved August 25, 2007, from
-
Landler, M., & Markoff, J. (2007, May 29). Digital fears emerge after data siege in Estonia. Retrieved August 25, 2007, from http://www.nytimes.com/2007/05/29/technology/29estonia.html?pagewanted=1&ei=5070&en=15ee9940d96714da&ex=1188187200
-
(2007)
Digital Fears Emerge After Data Siege in Estonia
-
-
Landler, M.1
Markoff, J.2
-
21
-
-
0032376197
-
NetCrime. More change in the organisation of thieving
-
Mann, D., & Sutton, M. (1998). NetCrime. More change in the organisation of thieving. The British Journal of Criminology, 38(2), 210-229.
-
(1998)
The British Journal of Criminology
, vol.38
, Issue.2
, pp. 210-229
-
-
Mann, D.1
Sutton, M.2
-
24
-
-
84899374575
-
-
NCIRC, Retrieved May 03, 2008, from
-
NCIRC. (2008). NATO opens new centre of excellence on cyber defense. Retrieved May 03, 2008, from http://www.nato.int/docu/update/2008/05may/e0514a.html
-
(2008)
NATO Opens New Centre of Excellence on Cyber Defense
-
-
-
25
-
-
84899197624
-
-
December 16-18, Paper presented at the Seventeenth International Conference on Information Systems, Cleveland, OH
-
Newsted, P. R., Chin, W., Ngwenyama, O., & Lee, A. (1996, December 16-18). Resolved: surveys have outlived their usefulness in IS research. Paper presented at the Seventeenth International Conference on Information Systems, Cleveland, OH.
-
(1996)
Resolved: Surveys Have Outlived their Usefulness in is Research
-
-
Newsted, P.R.1
Chin, W.2
Ngwenyama, O.3
Lee, A.4
-
26
-
-
84899244781
-
The challenges of cybercriminological research
-
In Maguire, M., & Okada, D. (Eds.), Washington D.C., London: Sage
-
Nhan, J., & Bachmann, M. (2009). The challenges of cybercriminological research. In Maguire, M., & Okada, D. (Eds.), Critical Issues of Crime and Criminal Justice. Washington D.C., London: Sage.
-
(2009)
Critical Issues of Crime and Criminal Justice
-
-
Nhan, J.1
Bachmann, M.2
-
28
-
-
21244489423
-
-
with, Westport, CT: Quorum
-
Schell, B. H., & Dodge, J. L. with Moutsatsos, S., (2002). The hacking of America: Who's doing it, why, and how. Westport, CT: Quorum.
-
(2002)
The Hacking of America: Who's Doing It, Why, and How
-
-
Schell, B.H.1
Dodge, J.L.2
Moutsatsos, S.3
-
29
-
-
34247095107
-
Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games?
-
doi:10.1007/s10611-007-9061-9
-
Stohl, M. (2006). Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime, Law, and Social Change, 46, 223-238. doi:10.1007/s10611-007-9061-9
-
(2006)
Crime, Law, and Social Change
, vol.46
, pp. 223-238
-
-
Stohl, M.1
-
30
-
-
85069610394
-
-
London, UK and New York, NY: Routledge, doi:10.4324/9780203201503
-
Taylor, P. A. (1999). Hackers: Crime in the digital sublime. London, UK and New York, NY: Routledge. doi:10.4324/9780203201503
-
(1999)
Hackers: Crime in the Digital Sublime
-
-
Taylor, P.A.1
-
31
-
-
84909075835
-
Hackers - cyberpunks or microserfs
-
In Thomas, D., & Loader, B. (Eds.), London, UK: Routledge
-
Taylor, P. A. (2000). Hackers - cyberpunks or microserfs. In Thomas, D., & Loader, B. (Eds.), Cybercrime: law enforcement, security and surveillance in the information age. London, UK: Routledge.
-
(2000)
Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
-
-
Taylor, P.A.1
-
32
-
-
34247657469
-
The novelty of 'cybercrime': An assessment in light of routine activity theory
-
doi:10.1177/147737080556056
-
Yar, M. (2005). The novelty of 'cybercrime': An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407-427. doi:10.1177/147737080556056
-
(2005)
European Journal of Criminology
, vol.2
, Issue.4
, pp. 407-427
-
-
Yar, M.1
|