REFERENCES
- Bandura , A. , Barbaranelli , C. , Gian , V. and Pastorelli , C. 1996 . Mechanism of disengagement in exercise of moral agency. . Journal of Personality and Social Psychology , 71 ( 2 ) : 364 – 374 .
- Bargh , J. A. , Chen , M. and Burrows , L. 1996 . Automatocity of social behavior: Direct effects of trait construct and stereotype activation on action. . Journal of Personality and Social Psychology , 71 : 230 – 244 .
- Cavusoglu , H. , Mishra , B. and Raghunathan , S. 2004 . A model for evaluating IT security investments. . Communications of the ACM , 47 ( 7 ) : 87 – 92 .
- Conti , G. 2005 . Why computer scientists should attend hacker conferences . Communications of the ACM. , 48 ( 3 ) : 23 – 24 .
- Ellis, P. & Walsh, P. (2004). DefCon harbors sex, geeks and rock 'n' roll in one sleepless package. Retrieved August 29, 2007 from: https://www.defcon.org/html/links/dc_press_archives/12/citylife_hackingtheplanet.htm
- Epley , N. and Gilovich , T. 1999 . Just going along: Nonconscious priming and conformity to social pressure. . Journal of Personality and Social Psychology , 35 : 578 – 589 .
- Halbert , D. 1997 . Discourses of danger and the computer hacker. . Information Society , 13 ( 4 ) : 361 – 374 .
- Kaplan , H. B. and Johnson , R. J. 1991 . Negative social sanctions and juvenile delinquency: Effects of labeling in a model of deviant behavior. . Social Science Quarterly , 72 ( 1 ) : 98 – 122 .
- Kshetri , N. 2006 . The simple economics of cybercrimes. . IEEE Security & Privacy , 4 ( 1 ) : 33 – 39 .
- Leatherwood , M. L. and Spector , L. C. 1991 . Enforcements, inducements, expected utility and employee misconduct. . Journal of Management , 17 ( 3 ) : 553 – 569 .
- Levy , B. 1996 . Improving Memory in Old Age through Implicit Self Stereotyping. . Journal of Personality and Social Psychology , 71 : 1092 – 1107 .
- Macrae , C. N. and Johnston , L. 1998 . Help, I need somebody: Automatic action and inaction. . Social Cognition , 16 : 400 – 417 .
- McDevitt , J. , Balboni , J. , Garcia , L. and Gu , J. 2001 . Consequences for victims: A comparison of bias- and non-bias-motivated assaults. . American Behavioral Scientist , 45 ( 4 ) : 697 – 713 .
- Mollick , E. 2005 . Tapping into the underground. . Sloan Management Review , 46 ( 4 ) : 21 – 24 .
- Rogers , M. K. 2001 . Modern-day robin hood or moral disengagement: Understanding the justification for criminal computer activity. , Winnipeg , CA : Unpublished dissertation, University of Manitoba .
- Sidel , R. 2007, January 18 . Giant retailer reveals customer data breach. . Wall Street Journal , : D1
- Sinrod , E. J. and Reilly , W. P. 2000 . Hacking your way to hard time: Application of computer crime laws to specific types of hacking attacks. . Journal of Internet Laws , 4 ( 3 ) : 1 – 14 .
- Skibell , R. 2003 . Cybercrimes & misdemeanors: Reevaluation of the computer fraud and abuse act. . Berkeley Technology Law Journal , 18 : 909 – 944 .
- Skorodumova , O. 2004 . Hackers as information space phenomenon. . Social Sciences , 35 ( 4 ) : 105 – 113 .
- Smith , D. J. and McVie , S. 2003 . Theory and method in the Edinburgh study of youth transitions and crime. . The British Journal of Criminology , 43 ( 1 ) : 169 – 195 .
- Stone, T. M. Computer hacking. (1999). Retrieved August 27, 2007 from: http://www.uni.uiuc.edu/∼dstone/hacking.html
- Von Hirsch , A. , Bottoms , A. E. , Burney , E. and Wickstrom , P. O. 1999 . Criminal deterrence and sentence severity. , Oxford : Hart .