541
Views
12
CrossRef citations to date
0
Altmetric
Original Articles

Using Tittle's control balance theory to understand computer crime and deviance

Pages 145-155 | Published online: 23 Apr 2008

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Paul Benjamin Lowry, Gregory D. Moody & Sutirtha Chatterjee. (2017) Using IT Design to Prevent Cyberbullying. Journal of Management Information Systems 34:3, pages 863-901.
Read now
Anthony Vance, PaulBenjamin Lowry & Dennis Eggett. (2013) Using Accountability to Reduce Access Policy Violations in Information Systems. Journal of Management Information Systems 29:4, pages 263-290.
Read now

Articles from other publishers (10)

Arthur G. Vasquez, Alejandro Rodriguez, Jiwon Suh & Maria Martinez-Cosio. (2020) Appointment Robbery: Do Crime Prevention Through Environmental Design Strategies Work? Voices from the Street. American Journal of Qualitative Research 4:1, pages 16-37.
Crossref
Erin D. Castro, Matt R. Nobles & Egbert Zavala. (2017) Assessing Intimate Partner Violence in a Control Balance Theory Framework. Journal of Interpersonal Violence 35:3-4, pages 600-622.
Crossref
Charles R. Tittle & Cindy Brooks Dollar. 2019. Handbook on Crime and Deviance. Handbook on Crime and Deviance 243 257 .
Jillian Peterson & James Densley. (2017) Cyber violence: What do we know and where do we go from here?. Aggression and Violent Behavior 34, pages 193-200.
Crossref
Ameer Al-Nemrat & Chafika Benzaid. (2015) Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation.
Igor Bernik. 2014. Cybercrime and Cyberwarfare. Cybercrime and Cyberwarfare 145 161 .
Justin T. Davis. (2012) Examining perceptions of local law enforcement in the fight against crimes with a cyber component. Policing: An International Journal of Police Strategies & Management 35:2, pages 272-284.
Crossref
Hamid Jahankhani & Ameer Al-Nemrat. 2011. Intelligence Management. Intelligence Management 181 197 .
Ameer Al-Nemrat, Hamid Jahankhani & David S Preston. 2010. Global Security, Safety, and Sustainability. Global Security, Safety, and Sustainability 55 62 .
Hagen Rafeld, Sebastian G Fritz-Morgenthal & Peter N. Posch. (2017) Behavioural Patterns in Rogue Trading: Analysing the Cases of Nick Leeson, JJrrme Kerviel, and Kweku Adoboli in Light of the Control Balance Theory. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.