Review of IS security policy compliance: Toward the building blocks of an IS security theory

P Balozian, D Leidner - ACM SIGMIS Database: The DATABASE for …, 2017 - dl.acm.org
An understanding of insider threats in information systems (IS) is important to help address
one of the dangers lurking within organizations. This article provides a review of the …

Utilizing webcam-based proctoring to deter misconduct in online exams

K Hylton, Y Levy, LP Dringus - Computers & Education, 2016 - Elsevier
Deception and dishonesty in online exams are believed to link to their unmonitored nature
where users appear to have the opportunity to collaborate or utilize unauthorized resources …

Can we continue to effectively police digital crime?

G Horsman - Science & justice, 2017 - Elsevier
Now approximately 30 years old, the field of digital forensics is arguably facing some of its
greatest challenges to date. Whilst currently supporting law enforcement in numerous …

Factors that influence the intention to pirate software and media

TP Cronan, S Al-Rafee - Journal of business ethics, 2008 - Springer
This study focuses on one of the newer forms of software piracy, known as digital piracy, and
uses the Theory of Planned Behavior (TPB) as a framework to attempt to determine factors …

The behavioral roots of information systems security: Exploring key factors related to unethical IT use

S Chatterjee, S Sarker, JS Valacich - Journal of Management …, 2015 - Taylor & Francis
Unethical information technology (IT) use, related to activities such as hacking, software
piracy, phishing, and spoofing, has become a major security concern for individuals …

Information security awareness in higher education: An exploratory study

Y Rezgui, A Marks - Computers & security, 2008 - Elsevier
The research explores factors that affect information security awareness of staff, including
information systems decision makers, in higher education within the context of a developing …

A system dynamics model for information security management

DL Nazareth, J Choi - Information & management, 2015 - Elsevier
Managing security for information assets is a critically important and challenging task. As
organizations provide clients with ubiquitous access to information systems and the …

Information security management and the human aspect in organizations

H Stewart, J Jürjens - Information & Computer Security, 2017 - emerald.com
Purpose The aim of this study is to encourage management boards to recognize that
employees play a major role in the management of information security. Thus, these issues …

Social learning and cyber-deviance: Examining the importance of a full social learning model in the virtual world

TJ Holt, GW Burruss, AM Bossler - Journal of Crime and Justice, 2010 - Taylor & Francis
Akers' social learning theory is one of the most recognized criminological theories because
of its comprehensiveness and strong empirical support. Recent research that has applied …

The general theory of crime and computer hacking: Low self-control hackers?

AM Bossler, GW Burruss - Corporate hacking and technology-driven …, 2011 - igi-global.com
Though in recent years, a number of studies have been completed on hackers' personality
and communication traits by experts in the fields of psychology and criminology, a number of …