Why College Students Commit Computer Hacks: Insights from a Cross Culture Analysis
暂无分享,去创建一个
[1] Tom Cross. Academic freedom and the hacker ethic , 2006, Commun. ACM.
[2] Nir Kshetri,et al. The simple economics of cybercrimes , 2006, IEEE Security & Privacy Magazine.
[3] Qing Hu,et al. Moral Beliefs, Self-Control, and Sports: Effective Antidotes to the Youth Computer Hacking Epidemic , 2012, 2012 45th Hawaii International Conference on System Sciences.
[4] R. Paternoster,et al. Sanction threats and appeals to morality : Testing a rational choice model of corporate crime , 1996 .
[5] Majid Yar,et al. Computer Hacking: Just Another Case of Juvenile Delinquency? , 2005 .
[6] G. Hofstede. Culture′s Consequences: Comparing Values, Behaviors, Institutions and Organizations Across Nations , 2001 .
[7] Alex R. Piquero,et al. Specifying the direct and indirect effects of low self-control and situational factors in offenders' decision making: Toward a more complete model of rational offending , 1996 .
[8] Harold G. Grasmick,et al. Testing the Core Empirical Implications of Gottfredson and Hirschi's General Theory of Crime , 1993 .
[9] Mun Y. Yi,et al. Predicting the use of web-based information systems: self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model , 2003, Int. J. Hum. Comput. Stud..
[10] Robert Svensson,et al. When does self-control matter? The interaction between morality and self-control in crime causation , 2010 .
[11] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[12] Debora Halbert. Discourses of Danger and the Computer Hacker , 1997, Inf. Soc..
[13] Christopher J. Coyne,et al. THE ECONOMICS OF COMPUTER HACKING , 2005 .
[14] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[15] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[16] Marc Rogers,et al. Self-reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis , 2006 .
[17] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[18] Robert Reiner,et al. The Oxford Handbook of Criminology , 2012 .
[19] Paul A. Taylor,et al. Hackers: Crime in the Digital Sublime , 1999 .
[20] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[21] Ahl Sanders,et al. Oxford Handbook of Criminology , 1997 .
[22] Qing Hu,et al. The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..
[23] Adam M. Bossler,et al. The General Theory of Crime and Computer Hacking: Low Self-control Hackers? , 2011 .
[24] R. W. Rogers,et al. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change , 1983 .
[25] Magid Igbaria,et al. The effects of self-efficacy on computer usage , 1995 .
[26] A. Bandura. Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychology Review.
[27] T. Holt,et al. Low Self-Control, Deviant Peer Associations, and Juvenile Cyberdeviance , 2012 .
[28] Tyler Moore,et al. Security Economics and European Policy , 2008, WEIS.
[29] I. Ajzen. The theory of planned behavior , 1991 .
[30] R. Bachman,et al. The Rationality of Sexual Offending: Testing a Deterrence/Rational Choice Conception of Sexual Assault , 1992 .
[31] Susan J. Harrington,et al. The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..
[32] Bernadette H. Schell,et al. The Hacking of America: Who's Doing It, Why, and How , 2002 .
[33] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[34] Marilyn E. Gist,et al. Self-Efficacy: A Theoretical Analysis of Its Determinants and Malleability , 1992 .
[35] T. Holt,et al. Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications , 2010 .
[36] Deborah Compeau,et al. Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..
[37] Timothy Paul Cronan,et al. Piracy, computer crime, and IS misuse at the university , 2006, Commun. ACM.
[38] Yufei Yuan,et al. Online game addiction among adolescents: motivation and prevention factors , 2012, Eur. J. Inf. Syst..
[39] P. Wikström,et al. The Explanation of Crime: Individuals, settings, and acts of crime: situational mechanisms and the explanation of crime , 2006 .
[40] Qing Hu,et al. Why computer talents become computer hackers , 2013, CACM.
[41] Marcus K. Rogers,et al. Self-reported computer criminal behavior: A psychological analysis , 2006, Digit. Investig..