The Empirical Study on Human Flesh Search Based on neutralization Theory
暂无分享,去创建一个
Wenli Li | Na Wu | Xin Lv | Yulong Ke | Yulin An | Wenli Li | Xin Lv | Na Wu | Y. Ke | Y. An | Yulin An
[1] Catherine D. Marcum,et al. Deterrence and Digital Piracy , 2008 .
[2] R. A. Dodder,et al. techniques of neutralization used by deer poachers in the western united states: a research note , 1999 .
[3] Sameer Hinduja,et al. Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.
[4] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .
[5] Donald L. Mccabe. The Influence of Situational Ethics on Cheating Among College Students , 1992 .
[6] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[7] Bing Wang,et al. Human Flesh Search Model Incorporating Network Expansion and GOSSIP with Feedback , 2009, 2009 13th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications.
[8] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[9] Catherine D. Marcum,et al. A Preliminary Examination of the Role of Viruses , 2010 .
[10] Jana L. Pershing. To Snitch or Not to Snitch? Applying the Concept of Neutralization Techniques to the Enforcement of Occupational Misconduct , 2003 .
[11] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[12] Mariana Hentea. A Perspective on Achieving Information Security Awareness , 2005 .
[13] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[14] Yu-Hui Tao,et al. Human Flesh Search: A Supplemental Review , 2012, Cyberpsychology Behav. Soc. Netw..
[15] Mikko T. Siponen,et al. Six Design Theories for IS Security Policies and Guidelines , 2006, J. Assoc. Inf. Syst..
[16] Joseph W. Rogers,et al. Neutralization Techniques , 1974 .
[17] Xiaoyan Pan. Hunt by the Crowd: An Exploratory Qualitative Analysis on Cyber Surveillance in China , 2010 .
[18] Lei Zhang,et al. A study of human flesh search with epidemic models , 2012, WebSci '12.
[19] Yuen J. Huo,et al. Trust in the Law , 2002 .
[20] Carl B. Klockars. The Professional Fence , 1975 .
[21] Stefanie Pötzsch,et al. Privacy Awareness: A Means to Solve the Privacy Paradox? , 2008, FIDIS.
[22] Petri Puhakainen,et al. A design theory for information security awareness , 2006 .
[23] Donald E. Green. Measures of Illegal Behavior in Individual-Level Deterrence Research , 1989 .
[24] Lee Sproull,et al. Computers, Networks and Work. , 1991 .
[25] D. Dabney,et al. Neutralization and deviance in the workplace: Theft of supplies and medicines by hospital nurses , 1995 .
[26] B. Guerin. Social Behaviors as Determined by Different Arrangements of Social Consequences: Diffusion of Responsibility Effects With Competition , 2003, The Journal of social psychology.
[27] Mikko T. Siponen,et al. New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[28] Dennis E. Garrett,et al. Issues management and organizational accounts: An analysis of corporate responses to accusations of unethical business practices , 1989 .
[29] Quint C. Thurman,et al. Neutralization and Tax Evasion: How Effective Would a Moral Appeal Be in Improving Compliance to Tax Laws? , 1984 .
[30] S. Hinduja,et al. Neutralizing Music Piracy: An Empirical Examination , 2008 .
[31] Izak Benbasat,et al. Roles of Information Security Awareness and Perceived Fairness in Information Security Policy Compliance , 2009, AMCIS.
[32] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[33] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[34] Anat Hovav,et al. Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea , 2012, Inf. Manag..
[35] Mikko T. Siponen,et al. A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..
[36] Mikko T. Siponen,et al. Five dimensions of information security awareness , 2001, CSOC.
[37] T. Priest,et al. TECHNIQUES OF NEUTRALIZATION: YOUNG ADULT MARIJUANA SMOKERS , 1970 .
[38] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[39] Detmar W. Straub,et al. Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..
[40] D'ArcyJohn,et al. Applying an extended model of deterrence across cultures , 2012 .
[41] Namjoo Choi,et al. Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action , 2008, Inf. Manag. Comput. Secur..
[42] Weng Guo. The Conflict of the Right to Privacy and the Right to Know , 2002 .
[43] Ronald L. Akers,et al. Criminological Theories: Introduction and Evaluation , 1994 .
[44] Michael B. Blankenship,et al. examining the role of differential association and techniques of neutralization in explaining corporate crime , 2005 .
[45] R. Briggs,et al. Association for Information Systems , 2009 .
[46] James A. Hendler,et al. A Study of the Human Flesh Search Engine: Crowd-Powered Expansion of Online Knowledge , 2010, Computer.
[47] Susan J. Harrington,et al. The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..