References
- American Bar Association. Report on Computer Crime. Pamphlet prepared by the Task force on Computer Crime, American Bar Association, Section on Criminal Justice, 1800 M Street, Washington, DC 20036, 1984.
- Anthes, G. “Hack Attack: Cyberthieves Siphon Millions from U.S. Firms,” Computerworld, 30:16, 1986, p. 81.
- Baskerville, R. “Information Systems Security Design Methods: Implications for Information Systems Development,” ACM Computing Surveys, 25:4, 1993, pp. 749–764.
- CERT Coordination Center. CERT/CC Overview: Trends, on-line. Available: http://www.cert.org/present/cert-overview-trends/.
- Cooper, D.R. and P.S. Schindler. Business Research Methods, 6th ed. Boston: Irwin/McGraw Hill, 1998, pp. 5–7, 20.
- Dawes, R.M. Rational Choice in an Uncertain World. San Diego: Harcourt Brace Jovanovich, 1988.
- Deloitte & Touché. “New E-commerce Study Reveals Key Management Issues,” E-commerce Security: A Global Status Report, ISACA, Rolling Meadows, IL, 2000.
- Drake, D.L. and K.L. Morse. “Applying the Eight-stage Risk Assessment Methodology to Firewalls,” monograph, Science Applications International Corp., San Diego, CA, 1996.
- Drake, D.L. and K.L. Morse. “The Security-specific Eight Stage Risk Assessment Methodology,” monograph, Science Applications International Corp., San Diego, CA, 1994.
- Edwards, W. and D.V. Winterfeldt. Decision Analysis and Behavioral Research. Cambridge, MA: Cambridge University Press, 1986.
- Forcht, K.A. and W.C. Ayers. “Developing a Computer Security Policy for Organizational Use and Implementation,” Journal of Computer Information Systems, 41:2, 2001, pp. 52–57.
- Foroughi, A. and W.C. Perkins. “Ensuring Internet Security,” Journal of Computer Information Systems, 37:1, 1997, pp. 33–38.
- Hoffer, J.A. and D.W. Straub. “The 9 to 5 Underground: Are You Policing Computer Crime?” Sloan Management Review, 30:4, Summer 1989, pp. 35–44.
- Hogarth, R.M. Judgment and Choice, 2nd. Chichester: Wiley, 1987.
- Kahai, P., M. Gibson, and K. Swinehart. “Computer Usage Characteristics and Small Service Firms: An Exploratory Study,” Journal of Computer Information Systems, 33:2, Winter 1992–1993, pp. 70–76.
- Kahane, Y., S. Neumann, and C. Tapiero. “Computer Backup Pools, Disaster Recovery, and Default Risk,” Communications of the ACM, 31:1, 1988.
- Kulczycki, G. “Information Security,” Management Accounting, LXXIX:6, 1997, pp. 18–24.
- Loch, K.D., H.H. Carr, and M.E. Warkentin. “Threats to Information Systems: Today's Reality, Yesterday's Understanding,” MIS Quarterly, 16:2, 1992, pp. 173–186.
- Lundgren, T. “User System Secrity,” Journal of Computer Information Systems, 34:3, 1994, pp. 51–54.
- Panettieri, J.C. “Security,” Information Week, November 27, 1995, pp. 32–40.
- Parker, D.B. Computer Security Management Upper Saddle River, NJ: Prentice Hall, 1981.
- Parker, D.B. Crime by Computer. New York: Chas. Scribners Sons, 1976.
- Parker, D.B. Fighting Computer Crime. New York: Chas. Scribners and Sons, 1983.
- Power, R. 1999 CSI/FBI Computer Crime and Security Survey. San Francisco: Computer Security Institute, 1999.
- Power, R. 2000 CWI/FBI Computer Crime and Security Survey. San Francisco: Computer Security Institute, 2000.
- Power, R. 2001 CSI/FBI Computer Crime and Security Survey. San Francisco: Computer Security Institute, 2001.
- Power, R. 2002 CSI/FBI Computer Crime and Security Survey. San Francisco: Computer Security Institute, 2002.
- Rapalus, P. “Financial Losses Due to Internet Intrusions Trade Secret Theft and Other Cyber Crimes Soar,” On-line. Available: http://www.gocsi.com/prelea_000321.htm.
- Sanford, C. “Computer Viruses: Symptoms, Remedies, and Preventive Measures,” Journal of Computer Information Systems, 22:3, 1993, p. 67.
- Schwartz, E. Webonomics: Nine Essential Principles for Growing Your Business on the World Wide Web. New York: Broadway Books, 1997, pp. 190–218.
- Schwartz, K. “Hackers are Ubiquitous, Malicious and Taken Far Too Lightly, Experts Say,” Government Computer News, 16:23, 1997, pp. 81–82.
- Seymour, T.J. and E. Robinson. “International Viruses and the Computer Network,” Journal of Computer Information Systems, 35:1, 1995, pp. 23–27. /
- Shipley, G. “How Secure is Your Network?” Network Computing,” 2000, p. 58.
- Steinke, G. “A Task-based Approach to Implementing Computer Security,” Journal of Computer Information Systems, 38:1, 1998, pp. 47–54.
- Straub, D. “Controlling Computer Abuse: An Empirical Study of Effective Security Countermeasures,” Proceedings of the International Conference on Information Systems, Pittsburgh, PA, December 6–8, 1987, pp. 277–289.
- Straub, D. Deterring Computer Abuse: The Effectiveness of Deterrent Countermeasures in the Computer Security Environment, Indiana University Graduate School of Business, Dissertation, Bloomington, IN, 1986.
- Straub, D. “Effective IS Security: An Empirical Study,” Information Systems Research, 1:3, 1990, pp. 255–276.
- Straub, D.W. and R.J. Welke. “Coping with Systems Risk: Security Planning Models for Management Decision-making,” MIS Quarterly, 22:4, 1998, pp. 441–469.
- Tippett, P. “Calculating Risk,” Information Security, 3, March 2001, pp. 36–38.
- Vatis, M. Computer Security Threat on Rise. On-line. Available: http://www.desai.com/articles/security_threaton_rise.htm.
- Whitman, M. “Enemy at the Gate: Threats to Information Security,” Communications of the ACM, 46:8, 2003, pp. 91–95.