• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4624131)   Today's Articles (6046)   Subscriber (49410)
For: Willison R. Understanding the offender/environment dynamic for computer crimes. Info Technology & People 2006. [DOI: 10.1108/09593840610673810] [Citation(s) in RCA: 20] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Number Cited by Other Article(s)
1
Kranenbarg MW, Gelder JLV, Barends AJ, de Vries RE. Is there a cybercriminal personality? Comparing cyber offenders and offline offenders on HEXACO personality domains and their underlying facets. COMPUTERS IN HUMAN BEHAVIOR 2022. [DOI: 10.1016/j.chb.2022.107576] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
2
Ho H, Ko R, Mazerolle L. Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102611] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
3
Can individuals’ neutralization techniques be overcome? A field experiment on password policy. Comput Secur 2020. [DOI: 10.1016/j.cose.2019.101617] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
4
Baskerville R, Hee Park E, Kim J. An emote opportunity model of computer abuse. INFORMATION TECHNOLOGY & PEOPLE 2014. [DOI: 10.1108/itp-11-2011-0068] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
5
Williams PA. In a ‘trusting’ environment, everyone is responsible for information security. ACTA ACUST UNITED AC 2008. [DOI: 10.1016/j.istr.2008.10.009] [Citation(s) in RCA: 17] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
6
Willison R. Understanding the perpetration of employee computer crime in the organisational context. INFORMATION AND ORGANIZATION 2006. [DOI: 10.1016/j.infoandorg.2006.08.001] [Citation(s) in RCA: 59] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA