A Social Learning Theory Analysis of Computer Crime among College Students
暂无分享,去创建一个
[1] Ronald L. Akers,et al. Criminological Theories: Introduction and Evaluation , 1994 .
[2] Richard C. Hollinger,et al. Hackers: computer heroes or electronic highwaymen? , 1991, CSOC.
[3] M. Cools,et al. Crime by employees in large corporations: the concept of employee crime. , 1991 .
[4] William R. Swinyard,et al. The morality of software piracy: A cross-cultural analysis , 1990 .
[5] L. Lanza-Kaduce,et al. THE PROCESS OF CRIMINALIZATION: THE CASE OF COMPUTER CRIME LAWS* , 1988 .
[6] T. T. Gottleber. Teaching Ethics in the Community College Data Processing Curriculum. , 1988 .
[7] DonnB. Parker. Information crime and security , 1987 .
[8] Erdwin H. Pfuhl. Computer abuse: Problems of instrumental control , 1987 .
[9] Ken Wong,et al. Computer fraud in the UK — The 1986 picture , 1986 .
[10] A. Bandura. Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .
[11] Ronald L. Akers,et al. Social Learning Theory and Adolescent Cigarette Smoking: A Longitudinal Study , 1985 .
[12] John T. Soma,et al. LEGAL ANALYSIS OF ELECTRONIC BULLETIN BOARD ACTIVITIES , 1985 .
[13] L. Lanza-Kaduce,et al. Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.
[14] D. Kandel,et al. Adolescent Involvement in Legal and Illegal Drug Use: A Multiple Classification Analysis , 1976 .
[15] D. Parker. Crime by computer , 1976 .
[16] Eric L. Jensen,et al. Conventional Ties, Peer Influence, and the Fear of Apprehension: a Study of Adolescent Marijuana Use , 1975 .
[17] Ronald L. Akers,et al. Deviant behavior;: A social learning approach , 1973 .
[18] B. Skinner,et al. Science and human behavior , 1953 .