From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Behavioral and policy issues in information systems security: the insider threat., и . Eur. J. Inf. Syst., 18 (2): 101-105 (2009)Reducing Computer Fraud Through Situational Crime Prevention.. SEC, том 175 из IFIP Conference Proceedings, стр. 99-109. Kluwer, (2000)Overcoming the insider: reducing employee computer crime through Situational Crime Prevention., и . Commun. ACM, 52 (9): 133-137 (2009)The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions., , и . AMCIS, Association for Information Systems, (2011)Understanding the perpetration of employee computer crime in the organisational context.. Inf. Organ., 16 (4): 304-324 (2006)Understanding the Offender/Environment Dynamic for Computer Crimes: Assessing the Feasibility of Applying Criminological Theory to the IS Security Context.. HICSS, IEEE Computer Society, (2004)A Critical Assessment of IS Security Research between 1990-2004., и . ECIS, стр. 1551-1559. University of St. Gallen, (2007)Power and Practice in Information Systems Security Research., , и . ICIS, стр. 26. Association for Information Systems, (2008)New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs., , и . Inf. Manag., 49 (7-8): 334-341 (2012)New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory., , и . HICSS, стр. 1-10. IEEE Computer Society, (2010)