-
1
-
-
84984313122
-
Foundation for a general strain theory of crime and delinquency
-
Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30 (1), 47-87.
-
(1992)
Criminology
, vol.30
, Issue.1
, pp. 47-87
-
-
Agnew, R.1
-
4
-
-
85005305538
-
The market for "lemons": Quality uncertainty and the market mechanism
-
Akerlof, G. A. (1970). The market for "Lemons": Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84 (3), 488-500.
-
(1970)
The Quarterly Journal of Economics
, vol.84
, Issue.3
, pp. 488-500
-
-
Akerlof, G.A.1
-
7
-
-
84925838576
-
Why information security is hard - An economic perspective
-
New Orleans, Louisiana, USA, Washington, DC: IEEE
-
Anderson, R. (2001). Why information security is hard - An economic perspective. In Proceedings of the 17th annual computer security applications conference, New Orleans, Louisiana, USA (pp. 358-365). Washington, DC: IEEE.
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 358-365
-
-
Anderson, R.1
-
8
-
-
80051982002
-
-
Edinburgh, SA: Defence Science and Technology Organisation, Commonwealth of Australia
-
Anderson, M. S., North, C. J. G., & Yiu, K. K. (2008). Towards countering the rise of the silicon trojan . Edinburgh, SA: Defence Science and Technology Organisation, Commonwealth of Australia.
-
(2008)
Towards Countering the Rise of the Silicon Trojan
-
-
Anderson, M.S.1
North, C.J.G.2
Yiu, K.K.3
-
9
-
-
80053512050
-
Cyber militias and political hackers: Use of irregular forces in cyberwarfare
-
Applegae, S. D. (2011). Cyber militias and political hackers: Use of irregular forces in cyberwarfare. IEEE Security and Privacy, 9 (5), 16-22.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.5
, pp. 16-22
-
-
Applegae, S.D.1
-
10
-
-
84898662923
-
-
Australian Government, Department of the Prime Minister and Cabinet. Commonwealth of Australia, ACT, Australia
-
Australian Government, Department of the Prime Minister and Cabinet (2013) Strong and secure: a strategy for Australia's national security. Commonwealth of Australia, ACT, Australia.
-
(2013)
Strong and Secure: A Strategy for Australia's National Security
-
-
-
11
-
-
84902262572
-
A study of ten popular Android mobile VoIP applications: Are the communications encrypted?
-
January 6-9, 2014, IEEE Computer Society Press
-
Azfar, A., Choo, K.-K. R., & Liu, L. (2014). A study of ten popular Android mobile VoIP applications: Are the communications encrypted? In: 47th Annual Hawaii international conference on system sciences (HICSS 2014), pp. 4858-4867, January 6-9, 2014, IEEE Computer Society Press.
-
(2014)
47th Annual Hawaii International Conference on System Sciences (HICSS 2014)
, pp. 4858-4867
-
-
Azfar, A.1
Choo, K.-K.R.2
Liu, L.3
-
12
-
-
0000787258
-
Crime and punishment: An economic approach
-
Becker, G. S. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76 , 169-217.
-
(1968)
Journal of Political Economy
, vol.76
, pp. 169-217
-
-
Becker, G.S.1
-
14
-
-
84863759731
-
Social networking sites: Their users and social implications-A longitudinal study
-
Brandtzæg, P. B. (2012). Social networking sites: Their users and social implications-A longitudinal study. Journal of Computer-Mediated Communication, 17 (4), 467-488.
-
(2012)
Journal of Computer-Mediated Communication
, vol.17
, Issue.4
, pp. 467-488
-
-
Brandtzæg, P.B.1
-
15
-
-
85192416265
-
A new global convention on cybercrime
-
Broadhurst, R. (2010). A new global convention on cybercrime. Pakistan Journal of Criminology, 2 (4), 1-10.
-
(2010)
Pakistan Journal of Criminology
, vol.2
, Issue.4
, pp. 1-10
-
-
Broadhurst, R.1
-
16
-
-
80955155209
-
Cybercrime and on-line safety in cyberspace
-
C. Smith, S. Zhang, & R. Barberet (Eds.). New York, NY: Routledge
-
Broadhurst, R., & Choo, K. K. R. (2011). Cybercrime and on-line safety in cyberspace. In C. Smith, S. Zhang, & R. Barberet (Eds.), Routledge international handbook of criminology (pp. 153-165). New York, NY: Routledge.
-
(2011)
Routledge International Handbook of Criminology
, pp. 153-165
-
-
Broadhurst, R.1
Choo, K.K.R.2
-
17
-
-
0004302572
-
-
New Providence, NJ: Matthew Bender & Company
-
Brown, S. E., Esbensen, F. A., & Geis, G. L. (2010). Criminology: Explaining crime and its context (7th ed.). New Providence, NJ: Matthew Bender & Company.
-
(2010)
Criminology: Explaining Crime and Its Context (7th Ed.)
-
-
Brown, S.E.1
Esbensen, F.A.2
Geis, G.L.3
-
18
-
-
85050789996
-
Economic deprivation and neighborhood crime rates, 1960- 1980
-
Bursik, R., Jr., & Grasmick, H. (1993). Economic deprivation and neighborhood crime rates, 1960- 1980. Law and Society Review, 27 (2), 263-283.
-
(1993)
Law and Society Review
, vol.27
, Issue.2
, pp. 263-283
-
-
Bursik, R.1
Grasmick, H.2
-
19
-
-
79958694151
-
-
Center for Strategic and International Studies (CSIS). , Washington. DC: CSIS
-
Center for Strategic and International Studies (CSIS). (2011). Cybersecurity two years later . Washington. DC: CSIS.
-
(2011)
Cybersecurity Two Years Later
-
-
-
20
-
-
77957695303
-
Organised crime groups in cyberspace: A typology
-
Choo, K. K. R. (2008). Organised crime groups in cyberspace: A typology. Trends in Organized Crime, 11 (3), 270-295.
-
(2008)
Trends in Organized Crime
, vol.11
, Issue.3
, pp. 270-295
-
-
Choo, K.K.R.1
-
21
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers and Security, 30 (8), 719-731.
-
(2011)
Computers and Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.K.R.1
-
23
-
-
46449097423
-
Criminal exploitation of online systems by organised crime groups
-
Choo, K.-K. R., & Smith, R. G. (2008). Criminal exploitation of online systems by organised crime groups. Asian Journal of Criminology, 3 (1), 37-59.
-
(2008)
Asian Journal of Criminology
, vol.3
, Issue.1
, pp. 37-59
-
-
Choo, K.-K.R.1
Smith, R.G.2
-
25
-
-
66649125667
-
Seven misconceptions of situational crime prevention
-
N. Tilley (Ed.). Cullompton: Willan Publishing
-
Clarke, R. V. (2005). Seven misconceptions of situational crime prevention. In N. Tilley (Ed.), Handbook of crime prevention and community safety (pp. 39-70). Cullompton: Willan Publishing.
-
(2005)
Handbook of Crime Prevention and Community Safety
, pp. 39-70
-
-
Clarke, R.V.1
-
27
-
-
0000204509
-
Social change and crime rate trends: A routine activity approach
-
Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44 (4), 588-608.
-
(1979)
American Sociological Review
, vol.44
, Issue.4
, pp. 588-608
-
-
Cohen, L.E.1
Felson, M.2
-
28
-
-
84902240279
-
IOS anti-forensics: How can we securely conceal, delete and insert data?
-
January 6-9, 2014, IEEE Computer Society Press
-
D'Orazio, C., Ariffin, A., & Choo, K.-K. R. (2014). IOS anti-forensics: How can we securely conceal, delete and insert data? In: 47th Annual Hawaii international conference on system sciences (HICSS 2014), pp. 4838-4847, January 6-9, 2014, IEEE Computer Society Press.
-
(2014)
47th Annual Hawaii International Conference on System Sciences (HICSS 2014)
, pp. 4838-4847
-
-
D'Orazio, C.1
Ariffin, A.2
Choo, K.-K.R.3
-
29
-
-
84890494747
-
-
Special Report No 46
-
Davies, A., Lewis, J., Herrera-Flanigan, J., & Mulvenon, J. (2012). ANZUS 2.0: Cybersecurity and Australia-US relations . Special Report No 46
-
(2012)
ANZUS 2.0: Cybersecurity and Australia-US Relations
-
-
Davies, A.1
Lewis, J.2
Herrera-Flanigan, J.3
Mulvenon, J.4
-
30
-
-
0000953669
-
The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields
-
DiMaggio, P. J., & Powell, W. W. (1983). The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American Sociological Review, 48 (2), 147-160.
-
(1983)
American Sociological Review
, vol.48
, Issue.2
, pp. 147-160
-
-
Dimaggio, P.J.1
Powell, W.W.2
-
32
-
-
34249696973
-
-
Thousand Oaks, CA: SAGE Publications
-
Felson, M. (2006). Crime and nature . Thousand Oaks, CA: SAGE Publications.
-
(2006)
Crime and Nature
-
-
Felson, M.1
-
33
-
-
84868663823
-
Taking crime out of crime business
-
Findlay, M., & Hanif, N. (2012). Taking crime out of crime business. International Journal of Law, Crime and Justice, 40 (4), 338-368.
-
(2012)
International Journal of Law, Crime and Justice
, vol.40
, Issue.4
, pp. 338-368
-
-
Findlay, M.1
Hanif, N.2
-
37
-
-
67349144062
-
Encouraging information security behavior in organizations: Role of penalties, pressures and perceived effectiveness
-
Herath, T., & Rao, H. R. (2009a). Encouraging information security behavior in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47( 2), 154-165.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
38
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath, T., & Rao, H. R. (2009b). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18 (2), 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
39
-
-
0011432676
-
Deficiencies of the traditional approach to information security and the requirements for a new methodology
-
Hitchings, J. (1995). Deficiencies of the traditional approach to information security and the requirements for a new methodology. Computers and Security, 14 (5), 377-383.
-
(1995)
Computers and Security
, vol.14
, Issue.5
, pp. 377-383
-
-
Hitchings, J.1
-
41
-
-
84874510393
-
Examining the forces shaping cybercrime markets online
-
Holt, T. J. (2013). Examining the forces shaping cybercrime markets online. Social Science Computer Review, 31 (2), 165-177.
-
(2013)
Social Science Computer Review
, vol.31
, Issue.2
, pp. 165-177
-
-
Holt, T.J.1
-
42
-
-
84875587046
-
Cloud computing and its implications for cybercrime investigations in Australia
-
Hooper, C., Martini, B., & Choo, K. K. R. (2013). Cloud computing and its implications for cybercrime investigations in Australia. Computer Law and Security Review, 29 (2), 152-163.
-
(2013)
Computer Law and Security Review
, vol.29
, Issue.2
, pp. 152-163
-
-
Hooper, C.1
Martini, B.2
Choo, K.K.R.3
-
43
-
-
85192407067
-
Response speech by Mr. S. Iswaran, Minister in Prime Minister's Office and Second Minister for Home Affairs and Trade & Industry on the second reading of the computer misuse (Amendment) bill
-
14 January
-
Iswaran, S. (2013). Response speech by Mr. S. Iswaran, Minister in Prime Minister's Office and Second Minister for Home Affairs and Trade & Industry on the second reading of the computer misuse (Amendment) bill. Media Release 14 January.
-
(2013)
Media Release
-
-
Iswaran, S.1
-
46
-
-
0000242433
-
Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
-
Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19 (5), 469-479.
-
(1983)
Journal of Experimental Social Psychology
, vol.19
, Issue.5
, pp. 469-479
-
-
Maddux, J.E.1
Rogers, R.W.2
-
48
-
-
84889083567
-
Cloud storage forensics: OwnCloud as a case study
-
Martini, B., & Choo, K.-K. R. (2013). Cloud storage forensics: OwnCloud as a case study. Digital Investigation, 10 (4), 287-299. http://dx.doi.org/10.1016/j.diin.2013.08.005 .
-
(2013)
Digital Investigation
, vol.10
, Issue.4
, pp. 287-299
-
-
Martini, B.1
Choo, K.-K.R.2
-
49
-
-
0000414040
-
Social structure and anomie
-
Merton, R. (1938). Social structure and anomie. American Sociological Review, 3 (5), 672-682.
-
(1938)
American Sociological Review
, vol.3
, Issue.5
, pp. 672-682
-
-
Merton, R.1
-
51
-
-
84873443277
-
Cybercrime victimization: An examination of individual and situational level factors
-
Ngo, F. T., & Paternoste, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5 (1), 773-793.
-
(2011)
International Journal of Cyber Criminology
, vol.5
, Issue.1
, pp. 773-793
-
-
Ngo, F.T.1
Paternoste, R.2
-
52
-
-
84862646119
-
Pursuing security in cyberspace: Strategic and organizational challenges
-
Nielsen, S. C. (2012). Pursuing security in cyberspace: Strategic and organizational challenges. Orbis Summer, 2012 , 336-356.
-
(2012)
Orbis Summer
, vol.2012
, pp. 336-356
-
-
Nielsen, S.C.1
-
53
-
-
39749168050
-
Employees' behaviour towards is security policy compliance
-
Washington, DC: IEEE
-
Pahnila, S., Siponen, M., & Mahmood, A. (2007). Employees' behaviour towards IS security policy compliance. In Proceedings of 40th Hawaii international conference on system sciences Hawaii USA . Washington, DC: IEEE.
-
(2007)
Proceedings of 40th Hawaii International Conference on System Sciences Hawaii USA
-
-
Pahnila, S.1
Siponen, M.2
Mahmood, A.3
-
54
-
-
33748777660
-
Assessing macro-level predictors and theories of crime: A meta-analysis
-
Pratt, T. C., & Cullen, F. T. (2005). Assessing macro-level predictors and theories of crime: A meta-analysis. Crime and Justice, 32 , 373-450.
-
(2005)
Crime and Justice
, vol.32
, pp. 373-450
-
-
Pratt, T.C.1
Cullen, F.T.2
-
55
-
-
84875147433
-
Digital droplets: Microsoft SkyDrive forensic data remnants
-
Quick, D., & Choo K-K, R. (2013a). Digital droplets: Microsoft SkyDrive forensic data remnants. Future Generation Computer Systems, 29 (6), 1378-1394.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.6
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.R.2
-
56
-
-
84877809583
-
Dropbox analysis: Data remnants on user machines
-
Quick, D., & Choo K-K, R. (2013b). Dropbox analysis: Data remnants on user machines. Digital Investigation, 10 (1), 3-18.
-
(2013)
Digital Investigation
, vol.10
, Issue.1
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
58
-
-
0042084325
-
-
Belmont, CA: Wadsworth
-
Rosenbaum, D. P., Lurigio, A. J., & Davis, R. C. (1998). The prevention of crime: Social and situational strategies . Belmont, CA: Wadsworth.
-
(1998)
The Prevention of Crime: Social and Situational Strategies
-
-
Rosenbaum, D.P.1
Lurigio, A.J.2
Davis, R.C.3
-
64
-
-
0030668250
-
A social learning theory analysis of computer crime among college students
-
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34 (4), 495-518.
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, Issue.4
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
66
-
-
0000280419
-
Effective is security: An empirical study
-
Straub, D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1 (3), 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
67
-
-
84924148767
-
-
Port Melbourne, VIC: Cambridge University Press
-
Sutton, A., Cherney, A., & White, R. (2008). Crime prevention: Principles, perspectives and practices . Port Melbourne, VIC: Cambridge University Press.
-
(2008)
Crime Prevention: Principles, Perspectives and Practices
-
-
Sutton, A.1
Cherney, A.2
White, R.3
-
68
-
-
84890628545
-
-
Symantec. Mountain View, CA: Symantec Corporation
-
Symantec. (2012). Internet security threat report 2011 trends (Vol. 17). Mountain View, CA: Symantec Corporation.
-
(2012)
Internet Security Threat Report 2011 Trends
, vol.17
-
-
-
71
-
-
15744368808
-
Information security obedience: A definition
-
Thomson, K., & von Solms, R. (2005). Information security obedience: A definition. Computers and Security, 24 (1), 69-75.
-
(2005)
Computers and Security
, vol.24
, Issue.1
, pp. 69-75
-
-
Thomson, K.1
Von Solms, R.2
-
73
-
-
85192406832
-
-
(Presented to Parliament by the Prime Minister by Command of Her Majesty July 2011) UK Intelligence and Security Committee. Retrieved from
-
UK Intelligence and Security Committee. (2011). Annual report 2010-2011 (Presented to Parliament by the Prime Minister by Command of Her Majesty July 2011) . Retrieved from, http://www.official-documents.gov.uk/document/cm81/8114/8114.pdf
-
(2011)
Annual Report 2010-2011
-
-
-
75
-
-
84881111823
-
-
US Government Accountability Office (US GAO). Washington, DC: US GAO.
-
US Government Accountability Office (US GAO). (2012a). Cybersecurity: Threats impacting the nation . Washington, DC: US GAO.
-
(2012)
Cybersecurity: Threats Impacting the Nation
-
-
-
80
-
-
84887499198
-
-
US White House. Retrieved from
-
US White House. (2013). Executive order: Improving critical infrastructure cybersecurity . Retrieved from, http://www.whitehouse.gov/the-press-office/2013/02/12/executive-orderimproving- critical-infrastructure-cybersecurity
-
(2013)
Executive Order: Improving Critical Infrastructure Cybersecurity
-
-
-
81
-
-
0034814690
-
Information security - A multidimensional discipline
-
von Solms, B. (2001). Information security - A multidimensional discipline. Computers and Security, 20 (6), 504-508.
-
(2001)
Computers and Security
, vol.20
, Issue.6
, pp. 504-508
-
-
Von Solms, B.1
-
82
-
-
9744248960
-
Theoretically speaking
-
Weber, R. (2003). Theoretically speaking. MIS Quarterly, 27 (3), iii-xi.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. iii-xi
-
-
Weber, R.1
-
83
-
-
84906761342
-
Theory building in the information systems discipline: Some critical reflections
-
D. N. Hart & S. D. Gregor (Eds.). Canberra, ACT: Australian National University
-
Weber, R. (2012). Theory building in the information systems discipline: Some critical reflections. In D. N. Hart & S. D. Gregor (Eds.), Information systems foundations: Theory building in information systems (pp. 1-20). Canberra, ACT: Australian National University.
-
(2012)
Information Systems Foundations: Theory Building in Information Systems
, pp. 1-20
-
-
Weber, R.1
-
84
-
-
84937202364
-
Perceptions of the eCrime controllers: Modelling the influence of cooperation and data source factors
-
In press
-
Williams, M. & Levi, M. (2013). Perceptions of the eCrime controllers: Modelling the influence of cooperation and data source factors. Security Journal . In press, http://dx.doi.org/10.1057/sj.2012.47.
-
(2013)
Security Journal.
-
-
Williams, M.1
Levi, M.2
|