References
- CulnanMMapping the intellectual structure of MIS, 1980–1985: a co-citation analysisMIS Quarterly198711334135310.2307/248680
- Ernst and Young (2008) Moving beyond compliance: Ernst & Young's 2008 global information security survey. [WWW document] http://www.ey.com/Global/assets.nsf/International/TSRS_Global_Information_Security_Survey_2008/$file/TSRS_Global_Information_Security_Survey_2008.pdf (accessed 1 April 2009).
- FarhoomandAFScientific progress of management information systemsThe DATA BASE for Advances in Information Systems1987184485610.1145/1017816.1017821
- FarhoomandAFDruryDHA historiographical examination of information systemsCommunications of the AIS19991127
- ForchtKComputer Security Management1994
- ImGBaskervilleRA longitudinal study of information systems threat categories: the enduring problem of human errorThe DATA BASE for Advances in Information Systems2005364687910.1145/1104004.1104010
- LochKDCarrHHWarkentinMEThreats to information systems: today's reality, yesterday's understandingMIS Quarterly199216217318610.2307/249574
- ParkerDFighting Computer Crime: A New Framework for Protecting Information1998
- Siponen M., Willison R. and Baskerville R. (2008) Power and practice in information systems security research. In Proceedings of the International Conference on Information Systems Paris, France, 14–17 December 2008.
- StantonJMStamKRMastrangeloPJoltonJAnalysis of end user security behaviorsComputers & Security200524212413310.1016/j.cose.2004.07.001
- StraubDWelkeRCoping with systems risk: Security planning models for management decision makingMIS Quarterly199822444146910.2307/249551
- VesseyIRameshVGlassRLResearch in information systems: an empirical study of diversity in the discipline and its journalsJournal of Management Information Systems2002192129174
- WarkentinMEInformation system security and privacyEmerging Information Technologies, Advances in Telematics19955777
- WarkentinMJohnstonACIT governance and organizational development for security managementInformation Security Policies and Practices20084668
- WarkentinMDavisKBekkeringEIntroducing the check-off password system (cops): an advancement in user authentication methods and information securityJournal of Organizational and End User Computing2004163415810.4018/joeuc.2004070103
- WillisonRUnderstanding the perpetration of employee computer crime in the organisational contextInformation and Organization200616430432410.1016/j.infoandorg.2006.08.001
- Willison R. (2009) Motivations for employee computer crime: understanding and addressing workplace disgruntlement through the application of organisational justice. Working Paper No.1, Copenhagen Business School, Department of Informatics.
- WillisonRBackhouseJOpportunities for computer abuse: considering systems risk from the offender's perspectiveEuropean Journal of Information Systems200615440341410.1057/palgrave.ejis.3000592