Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes

[1]  Paul Benjamin Lowry,et al.  Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study , 2019, Inf. Syst. J..

[2]  Hsinchun Chen,et al.  DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics , 2019, MIS Q..

[3]  Paul Benjamin Lowry,et al.  A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research , 2018, J. Assoc. Inf. Syst..

[4]  Paul Benjamin Lowry,et al.  Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives , 2018, DATB.

[5]  Paul Benjamin Lowry,et al.  security and privacy research lies , 2017 .

[6]  P. Wikström Crime as Alternative: Towards a Cross-Level Situational Action Theory of Crime Causation , 2017 .

[7]  Michael Cherbonneau,et al.  Nerve Management and Crime Accomplishment , 2017 .

[8]  Paul Benjamin Lowry,et al.  Examining the intended and unintended consequences of organisational privacy safeguards , 2016, Eur. J. Inf. Syst..

[9]  R. Ryan,et al.  Self-determination theory , 2015 .

[10]  Chuang Wang,et al.  Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model , 2016, Inf. Syst. Res..

[11]  Katherine L. Milkman,et al.  How Backup Plans Can Harm Goal Pursuit: The Unexpected Downside of Being Prepared for Failure , 2016 .

[12]  Bin Zhang,et al.  Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities , 2016, J. Manag. Inf. Syst..

[13]  Paul Benjamin Lowry,et al.  Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations Under Conditions of Strain and Excess , 2015, J. Assoc. Inf. Syst..

[14]  Hsinchun Chen,et al.  Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).

[15]  T. Holt,et al.  An Assessment of the Current State of Cybercrime Scholarship , 2014 .

[16]  R. Clarke,et al.  The Rational Choice Perspective 1 , 2013 .

[17]  Bradford W Reyns,et al.  Online Routines and Identity Theft Victimization , 2013 .

[18]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[19]  Thomas J. Holt,et al.  Examining the social networks of malware writers and hackers , 2012 .

[20]  William L. Davis,et al.  A Human Capital Perspective On Criminal Careers , 2011 .

[21]  Robert L. Grinaker,et al.  The Relationship Between Earnings Goals And Expenditures For Repairs And Maintenance , 2011 .

[22]  Justin W. Patchin,et al.  Traditional and Nontraditional Bullying Among Youth: A Test of General Strain Theory , 2011 .

[23]  Detmar W. Straub,et al.  Moving toward black hat research in information systems security: an editorial introduction to the special issue , 2010 .

[24]  Cathy Urquhart,et al.  Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems , 2009, Inf. Syst. J..

[25]  T. Holt,et al.  A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders , 2009 .

[26]  Orly Turgeman-Goldschmidt Meanings that Hackers Assign to their Being a Hacker , 2008 .

[27]  Elizabeth R. Groff,et al.  Adding the Temporal and Spatial Aspects of Routine Activities: A Further Test of Routine Activity Theory , 2008 .

[28]  Lixuan Zhang,et al.  Hacking into the Minds of Hackers , 2007, Inf. Syst. Manag..

[29]  P. Wikström,et al.  The Explanation of Crime: Individuals, settings, and acts of crime: situational mechanisms and the explanation of crime , 2006 .

[30]  Marcus K. Rogers,et al.  A two-dimensional circumplex approach to the development of a hacker taxonomy , 2006, Digit. Investig..

[31]  Tom Cross Academic freedom and the hacker ethic , 2006, Commun. ACM.

[32]  Michael Cherbonneau,et al.  ‘Drive it like you Stole it’ Auto Theft and the Illusion of Normalcy , 2006 .

[33]  Richard Bellamy,et al.  On crimes and punishments and other writings , 2006 .

[34]  Nir Kshetri,et al.  The simple economics of cybercrimes , 2006, IEEE Security & Privacy Magazine.

[35]  Christopher J. Coyne,et al.  THE ECONOMICS OF COMPUTER HACKING , 2005 .

[36]  Majid Yar,et al.  Computer Hacking: Just Another Case of Juvenile Delinquency? , 2005 .

[37]  Orly Turgeman-Goldschmidt Hackers' Accounts , 2005 .

[38]  Orly Turgeman-Goldschmidt Hackers' Accounts , 2005 .

[39]  Stephen W. Baron,et al.  GENERAL STRAIN, STREET YOUTH AND CRIME: A TEST OF AGNEW'S REVISED THEORY* , 2004 .

[40]  Alan D. Smith,et al.  Issues in cybersecurity; understanding the potential risks associated with hackers/crackers , 2002, Inf. Manag. Comput. Secur..

[41]  Andy Hochstetler sprees and runs: opportunity construction and criminal episodes , 2002 .

[42]  Bernadette H. Schell,et al.  The Hacking of America: Who's Doing It, Why, and How , 2002 .

[43]  Andy Hochstetler,et al.  OPPORTUNITIES AND DECISIONS: INTERACTIONAL DYNAMICS IN ROBBERY AND BURGLARY GROUPS* , 2001 .

[44]  D. Crooks,et al.  THE IMPORTANCE OF SYMBOLIC INTERACTION IN GROUNDED THEORY RESEARCH ON WOMEN'S HEALTH , 2001, Health care for women international.

[45]  Robert Agnew,et al.  A General Strain Theory of Community Differences in Crime Rates , 1999 .

[46]  Elijah Anderson Code of the Street: Decency, Violence, and the Moral Life of the Inner City , 1999 .

[47]  D. Rennie Grounded Theory Methodology , 1998 .

[48]  Anselm L. Strauss,et al.  Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .

[49]  Robert W. Davis,et al.  Computer Crime in Canada: An Introduction to Technological Crime and Related Legal Issues , 1997 .

[50]  N. Teske Beyond Altruism: Identity-Construction as Moral Motive in Political Explanation , 1997 .

[51]  A. Chandler,et al.  The Changing Definition and Image of Hackers in Popular Discourse , 1996 .

[52]  E. Kallman,et al.  Ethical Decision Making and Information Technology: An Introduction with Cases , 1996 .

[53]  Jennifer C. Gibbs,et al.  Measuring cognitive distortion in antisocial youth: Development and preliminary validation of the 'How I Think' questionnaire , 1996 .

[54]  R. Blackburn The Psychology of Criminal Conduct: Theory, Research and Practice , 1993 .

[55]  R. Agnew Foundation for a General Strain Theory of Crime and Delinquency , 1992, Crime, Inequality and the State.

[56]  K. Charmaz,et al.  'Discovering' chronic illness: using grounded theory. , 1990, Social science & medicine.

[57]  Jack Katz,et al.  Seductions of crime : moral and sensual attractions in doing evil , 1989 .

[58]  K. Ferraro,et al.  The Measurement of Fear of Crime , 1987 .

[59]  Michael R. Gottfredson,et al.  A general theory of crime. , 1992 .

[60]  Steven Levy,et al.  Hackers: Heroes of the Computer Revolution , 1984 .

[61]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[62]  A. Bandura Social learning theory , 1977 .

[63]  J. Gibbs Crime, punishment, and deterrence , 1975 .

[64]  B. F. Skinner,et al.  Beyond Freedom and Dignity , 1972 .

[65]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .