Understanding the perpetration of employee computer crime in the organisational context
Tài liệu tham khảo
Audit Commission. (1998). Ghost in the machine: An analysis of IT Fraud and abuse. London: Audit Commission Publications.
Backhouse, 1995, Managing computer crime: a research outlook, Computers and Security, 14, 645, 10.1016/0167-4048(95)00024-0
Bachman, 1992, The rationality of sexual offending: testing a deterrence/rational choice conception of sexual assault, Law and Society Review, 26, 343, 10.2307/3053901
Bandura, 1976, Social learning analysis of aggression, 202
Bandura, 1977
Baskerville, 1998, Diversity in information systems action research methods, European Journal of Information Systems, 7, 235, 10.1057/palgrave.ejis.3000298
Becker, 1981, Who are the computer criminals?, ACM SIGCAS Computers and Society, 12, 18, 10.1145/957893.957898
CSI/FBI. (2004). Computer crime and security survey. San Francisco: CSI.
Campbell, M. (1988). Ethics and computer security: Cause and effect. In: Proceedings of the 1988 ACM sixteenth annual conference on computer science. Atlanta, Georgia. United States.
Clarke, 1980, Situational crime prevention: Theory and practice, British Journal of Criminology, 20, 136, 10.1093/oxfordjournals.bjc.a047153
Cardinali, 1995, Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime, Work Study, 44, 11, 10.1108/00438029510147745
1992
1997
Clarke, 1985, Modelling offender’s decisions : a framework for policy and research, Vol. 6, 147
Clarke, 2000, Rational Choice, 27
Clarke, 1997, A revised classification of situational crime prevention techniques, 21
Cornish, 1994, Crime as scripts, 30
Cornish, 1994, The procedural analysis of offending and its relevance for situational prevention, Vol. 3, 151
Cornish, 1986, Situational prevention, displacement of crime and rational choice theory, 1
Cornish, 1989, Crime specialisation, crime displacement and rational choice theory, 103
Cornish, 2003, Opportunities, precipitators and criminal decisions: a reply to Wortley’s critique of situational crime prevention, Vol. 16, 151
DTI/PWC. (2004). Information security breaches survey. London: PWC.
Dhillon, 2001, Computer crimes: theorizing about the enemy within, Computers and Security, 20, 715, 10.1016/S0167-4048(01)00813-6
Dhillon, 2004, Computer crime at CEFORMA: a case study, International Journal of Information Management, 24, 551, 10.1016/j.ijinfomgt.2004.08.009
Ekblom, 1994, Proximal circumstances: a mechanism-based classification of crime prevention, Vol. 2, 185
Ernst & Young. (2004). Global information security survey.
Felson, 2002
Gardner, 1985
Graesser, 1979, Recognition memory for typical and atypical actions in scripted activities: tests of a script pointer+tag hypothesis, Journal of Verbal Learning and Verbal Behavior, 18, 319, 10.1016/S0022-5371(79)90182-8
Goodhue, 1991, Security concerns of systems users: a study of perceptions of the adequacy of security measures, Information and Management, 20, 13, 10.1016/0378-7206(91)90024-V
Gottfredson, 1990
Harrington, 1996, The effects of ethics and personal denial of responsibility on computer abuse judgements and intentions, MIS Quarterly, 20, 257, 10.2307/249656
Hewstone, 1989
Hoffer, 1989, The 9 to 5 underground: are you policing computer crimes?, Sloan Management Review, 30, 35
ISO BS17799. (2005). Information technology – security techniques – codes of practice for information security management. Switzerland: International Organization for Standardization.
Kesar, 1998, Developing ethical practices to minimize computer misuse, Social Science Computer Review, 16, 240, 10.1177/089443939801600302
Klepper, 1989, Tax compliance and perceptions of the risks of detection and criminal prosecution, Law and Society Review, 23, 209, 10.2307/3053715
Lacoste, 2003, Crime and innovation: a script analysis of patterns in check forgery, Vol. 16, 169
Loch, 1992, Threats to information systems: today’s reality, yesterday’s understanding, MIS Quarterly, 17, 173, 10.2307/249574
Mathiassen, 2002, Collaborative research practice, Information, Technology and People, 14, 321, 10.1108/09593840210453115
Nagin, 1993, Enduring individual differences and rational choice theories of crime, Law and Society Review, 27, 467, 10.2307/3054102
Nakamura, 1985, Script processing in a natural situation, Memory and Cognition, 13, 140, 10.3758/BF03197006
Newman, 1997, Introduction: towards a theory of situational crime prevention, 1
Newman, 2003
Parker, 1976
Parker, 1981
Parker, 1998
Paternoster, 1989, Decisions to participate in and desist from four types of common delinquency, Law and Society Review, 23, 7, 10.2307/3053879
Paternoster, 1996, Sanction threats and appeals to morality: testing a rational choice model of corporate crime, Law and Society Review, 30, 549, 10.2307/3054128
Peltier, 2004, Risk analysis and risk management, Information Systems Security, 13, 44, 10.1201/1086/44640.13.4.20040901/83732.7
Poyner, 1991
Sherizen, 1995, Can computer crime be deterred?, Security Journal, 6, 177, 10.1016/0955-1662(94)00121-9
Smith, 2000, Crime and public transport, Vol. 27, 169
Straub, 1986, Computer abuse and computer security: update on an empirical study, Security, Audit, and Control Review, 4, 21
Straub, D. (1986b). Deterring computer abuse: the effectiveness of deterrent countermeasures in the computer security environment. Unpublished doctoral dissertation, Indiana University Graduate School of Business.
Straub, 1990, Effective IS security: an empirical study, Information Systems Research, 1, 255, 10.1287/isre.1.3.255
Straub, 1992, Deterring highly motivated computer abusers: a field experiment in computer security, 309
Straub, 1990, Discovering and disciplining computer abuse in organisations: a field study, MIS Quarterly, 14, 45, 10.2307/249307
Straub, 1998, Coping with systems risks: security planning models for management decision making, MIS Quarterly, 22, 441, 10.2307/249551
Sykes, 1957, Techniques of neutralisation: a theory of delinquency, American Sociological Review, 22, 664, 10.2307/2089195
Taylor, 1981, Schematic bases of social information processing, Vol. 1, 89
Tremblay, 2001, Bodyswitching and related adaptations in the resale of stolen vehicles, British Journal of Criminology, 41, 561, 10.1093/bjc/41.4.561
Willison, R. (2002). Opportunities for computer abuse: assessing a crime specific approach in the case of Barings Bank. Unpublished PhD Thesis. University of London.
Willison, 2006, Understanding the offender/context dynamic for computer crimes, Information, Technology and People, 19, 170, 10.1108/09593840610673810
Willison, 2006, Opportunities for computer crime: considering systems risk from a criminological perspective, European Journal of Information Systems, 15, 403, 10.1057/palgrave.ejis.3000592
Wilson, 1975
Wood, 2002
Wortley, R. (1996). Guilt, shame and situational crime prevention. In R. Homel (Ed.), The politics and practice of situational crime prevention (pp.115–132, Vol. 5). Crime Prevention Studies.