Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes
暂无分享,去创建一个
[1] Paul Benjamin Lowry,et al. Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study , 2019, Inf. Syst. J..
[2] Hsinchun Chen,et al. DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics , 2019, MIS Q..
[3] Paul Benjamin Lowry,et al. A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research , 2018, J. Assoc. Inf. Syst..
[4] Paul Benjamin Lowry,et al. Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives , 2018, DATB.
[5] Paul Benjamin Lowry,et al. security and privacy research lies , 2017 .
[6] P. Wikström. Crime as Alternative: Towards a Cross-Level Situational Action Theory of Crime Causation , 2017 .
[7] Michael Cherbonneau,et al. Nerve Management and Crime Accomplishment , 2017 .
[8] Paul Benjamin Lowry,et al. Examining the intended and unintended consequences of organisational privacy safeguards , 2016, Eur. J. Inf. Syst..
[9] R. Ryan,et al. Self-determination theory , 2015 .
[10] Chuang Wang,et al. Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model , 2016, Inf. Syst. Res..
[11] Katherine L. Milkman,et al. How Backup Plans Can Harm Goal Pursuit: The Unexpected Downside of Being Prepared for Failure , 2016 .
[12] Bin Zhang,et al. Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities , 2016, J. Manag. Inf. Syst..
[13] Paul Benjamin Lowry,et al. Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations Under Conditions of Strain and Excess , 2015, J. Assoc. Inf. Syst..
[14] Hsinchun Chen,et al. Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).
[15] T. Holt,et al. An Assessment of the Current State of Cybercrime Scholarship , 2014 .
[16] R. Clarke,et al. The Rational Choice Perspective 1 , 2013 .
[17] Bradford W Reyns,et al. Online Routines and Identity Theft Victimization , 2013 .
[18] Qing Hu,et al. Future directions for behavioral information security research , 2013, Comput. Secur..
[19] Thomas J. Holt,et al. Examining the social networks of malware writers and hackers , 2012 .
[20] William L. Davis,et al. A Human Capital Perspective On Criminal Careers , 2011 .
[21] Robert L. Grinaker,et al. The Relationship Between Earnings Goals And Expenditures For Repairs And Maintenance , 2011 .
[22] Justin W. Patchin,et al. Traditional and Nontraditional Bullying Among Youth: A Test of General Strain Theory , 2011 .
[23] Detmar W. Straub,et al. Moving toward black hat research in information systems security: an editorial introduction to the special issue , 2010 .
[24] Cathy Urquhart,et al. Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems , 2009, Inf. Syst. J..
[25] T. Holt,et al. A Profile of the Demographics, Psychological Predispositions, and Social/Behavioral Patterns of Computer Hacker Insiders and Outsiders , 2009 .
[26] Orly Turgeman-Goldschmidt. Meanings that Hackers Assign to their Being a Hacker , 2008 .
[27] Elizabeth R. Groff,et al. Adding the Temporal and Spatial Aspects of Routine Activities: A Further Test of Routine Activity Theory , 2008 .
[28] Lixuan Zhang,et al. Hacking into the Minds of Hackers , 2007, Inf. Syst. Manag..
[29] P. Wikström,et al. The Explanation of Crime: Individuals, settings, and acts of crime: situational mechanisms and the explanation of crime , 2006 .
[30] Marcus K. Rogers,et al. A two-dimensional circumplex approach to the development of a hacker taxonomy , 2006, Digit. Investig..
[31] Tom Cross. Academic freedom and the hacker ethic , 2006, Commun. ACM.
[32] Michael Cherbonneau,et al. ‘Drive it like you Stole it’ Auto Theft and the Illusion of Normalcy , 2006 .
[33] Richard Bellamy,et al. On crimes and punishments and other writings , 2006 .
[34] Nir Kshetri,et al. The simple economics of cybercrimes , 2006, IEEE Security & Privacy Magazine.
[35] Christopher J. Coyne,et al. THE ECONOMICS OF COMPUTER HACKING , 2005 .
[36] Majid Yar,et al. Computer Hacking: Just Another Case of Juvenile Delinquency? , 2005 .
[37] Orly Turgeman-Goldschmidt. Hackers' Accounts , 2005 .
[38] Orly Turgeman-Goldschmidt. Hackers' Accounts , 2005 .
[39] Stephen W. Baron,et al. GENERAL STRAIN, STREET YOUTH AND CRIME: A TEST OF AGNEW'S REVISED THEORY* , 2004 .
[40] Alan D. Smith,et al. Issues in cybersecurity; understanding the potential risks associated with hackers/crackers , 2002, Inf. Manag. Comput. Secur..
[41] Andy Hochstetler. sprees and runs: opportunity construction and criminal episodes , 2002 .
[42] Bernadette H. Schell,et al. The Hacking of America: Who's Doing It, Why, and How , 2002 .
[43] Andy Hochstetler,et al. OPPORTUNITIES AND DECISIONS: INTERACTIONAL DYNAMICS IN ROBBERY AND BURGLARY GROUPS* , 2001 .
[44] D. Crooks,et al. THE IMPORTANCE OF SYMBOLIC INTERACTION IN GROUNDED THEORY RESEARCH ON WOMEN'S HEALTH , 2001, Health care for women international.
[45] Robert Agnew,et al. A General Strain Theory of Community Differences in Crime Rates , 1999 .
[46] Elijah Anderson. Code of the Street: Decency, Violence, and the Moral Life of the Inner City , 1999 .
[47] D. Rennie. Grounded Theory Methodology , 1998 .
[48] Anselm L. Strauss,et al. Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .
[49] Robert W. Davis,et al. Computer Crime in Canada: An Introduction to Technological Crime and Related Legal Issues , 1997 .
[50] N. Teske. Beyond Altruism: Identity-Construction as Moral Motive in Political Explanation , 1997 .
[51] A. Chandler,et al. The Changing Definition and Image of Hackers in Popular Discourse , 1996 .
[52] E. Kallman,et al. Ethical Decision Making and Information Technology: An Introduction with Cases , 1996 .
[53] Jennifer C. Gibbs,et al. Measuring cognitive distortion in antisocial youth: Development and preliminary validation of the 'How I Think' questionnaire , 1996 .
[54] R. Blackburn. The Psychology of Criminal Conduct: Theory, Research and Practice , 1993 .
[55] R. Agnew. Foundation for a General Strain Theory of Crime and Delinquency , 1992, Crime, Inequality and the State.
[56] K. Charmaz,et al. 'Discovering' chronic illness: using grounded theory. , 1990, Social science & medicine.
[57] Jack Katz,et al. Seductions of crime : moral and sensual attractions in doing evil , 1989 .
[58] K. Ferraro,et al. The Measurement of Fear of Crime , 1987 .
[59] Michael R. Gottfredson,et al. A general theory of crime. , 1992 .
[60] Steven Levy,et al. Hackers: Heroes of the Computer Revolution , 1984 .
[61] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[62] A. Bandura. Social learning theory , 1977 .
[63] J. Gibbs. Crime, punishment, and deterrence , 1975 .
[64] B. F. Skinner,et al. Beyond Freedom and Dignity , 1972 .
[65] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .