Self-reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis
暂无分享,去创建一个
[1] Marcus K. Rogers,et al. A social learning theory and moral disengagement analysis of criminal computer behavior: an exploratory study , 2001 .
[2] Winn Schwartau,et al. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption , 2000 .
[3] Andy K. Bissett,et al. Some human dimensions of computer virus creation and infection , 2000, Int. J. Hum. Comput. Stud..
[4] Sarah Gordon. Virus Writers: The End of The Innocence? , 2000 .
[5] Helen Kelley,et al. Morality and Computers: Attitudes and Differences in Moral Judgments , 1999, Inf. Syst. Res..
[6] Gallagher,et al. Cybercrime Cyberterrorism Cyberwarfare: Averting an Electronic Waterloo , 1998 .
[7] W. F. Skinner,et al. A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .
[8] L. R. Goldberg. THE DEVELOPMENT OF MARKERS FOR THE BIG-FIVE FACTOR STRUCTURE , 1992 .
[9] M. Klein. New directions in psycho-analysis: The significance of infant conflict in the pattern of adult behaviour; , 1971 .
[10] Keven G. Ruby,et al. The Insider Threat to Information Systems , 2022 .