參考文獻 |
〔1〕 莊耿宗,「台中市汽車竊盜偵防策略之研究」,私立東海大學,碩士論文,民國91年。
〔2〕 陳景圓,「家庭、學校及同儕因素與國中聽覺障礙學生偏差行為之關聯性研究」,國立成功大學,碩士論文,民國94年六月。
〔3〕 蔡群儀,「政策知覺對廠商接受輔導政策的意圖、行為與績效之影響---以中小企業為例」,國立成功大學,碩士論文,民國93年一月。
〔4〕 Ajzen, I. & Fishbein, M., “Attitude-Behavior Relations: A Theoretical Analysis and Review of Empirical Research”, Psychological Bulletin, 84, pp.888-918, 1977.
〔5〕 Ajzen, I. & Fishbein, M., Understanding Attitudes and Predicting Social Behavior., NJ: Prentice-Hall., Englewood Cliffs, 1980.
〔6〕 Ajzen, I., A. R. Pratkanis, S. J. Breckler & A. G. Greenwald (Eds.), Attitude Structure and Behavior, Attitude Structure and Function, Lawrence Erlbaum Associates, pp. 241-274, Hillsdale, NJ, 1989.
〔7〕 Ajzen, I., J. Kuhl & J. Beckman(Eds.), From Intentions to Actions: A Theory of Planned Behavior., Action Control: From Cognition to Behavior., Springer, Heidelberg, 1985.
〔8〕 Akers, RL., Deviant behavior: a social learning perspective., Belmont, CA, 1977.
〔9〕 Beccaria, C., On crime and punishments., IN: Bobbs Merril, Indianapolis, 1963.
〔10〕 Blumstein, A., Cohen, J. & Nagin, D.(Eds.), Deterrence and incapacitation: estimating the effects of criminal sanctions on crime rates., National Academy of Sciences, Washington, DC, 1978.
〔11〕 Briney, A., 2001 Information security industry survey, accessed on December 20, 2006.[cited from http://www.infosecuritymag.com]
〔12〕 Burgess, Robert & Ronald L. Akers., “A Differential Association-Reinforcement Theory of Criminal Behavior.”, Social Problems, 14, pp. 363-383, 1966.
〔13〕 Porter, D., “Insider Fraud: Spotting The Wolf In Sheep's Clothing.”, Computer Fraud & Security, Vol. 2003, Issue 4, p12, 4p, Apr. 2003.
〔14〕 Davis, F. D., Bagozzi, R. P. & Warshaw, P. R., “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models”, Management Science, 35(8), pp. 982-1003, 1989.
〔15〕 Einwechter, N., Preventing and detecting insider attacks using IDS., accessed on December 20, 2006. [cited from http://online.securityfocus.com/infocus/1558].
〔16〕 Greenwald, Judy, “Cost/benefit analysis, access crucial to data security.”, Business Insurance, , Vol. 39, Issue 21, p18-18, 1/2p, May 2005.
〔17〕 Hirschi, T., “Causes of delinquency.”, University of California Press, Berkeley, CA, 1969.
〔18〕 Hoffer, J. A. & D. W. Straub Jr., “The 9 To 5 Underground: Are You Policing Computer Crimes?”, Sloan Management Review, 30(4), pp. 35-43, 1989.
〔19〕 Lee, Jintae & Lee, Younghwa “A holistic model of computer abuse within organization”, Information Management & Computer Security, 10﹙2﹚, pp. 57-63, 2002.
〔20〕 Stanton, J. M., Stam, K. R., Mastrangelo, P. & Jolton, J., “Analysis of end user security behaviors.”, Computers & Security, 24, pp. 124-133, 2005.
〔21〕 King,R., “Computer Abuse and Computer Crime as Organizational Activities.” Computer Law Journal, 2(2), pp. 186-196, 1980.
〔22〕 Gordon, L. A., Loeb, M. P., Lucyshyn, W. & Richardson, R., 2006 CSI/FBI Computer Crime and Security Survey, accessed on December 20, 2006. [cited from http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2006.pdf].
〔23〕 Loch, K. D., Carr, H. H., & Warkentin M. E., “Threats to Information Systems: Today's Reality, Yesterday's Understanding”, MIS Quarterly, pp. 173-186, June 1992.
〔24〕 Theoharidou, M., Kokolakis, S., Karyda, M. & Kiountouzis, E., “The insider threat to information systems and the effectiveness of ISO17799”, Computers & Security, 24, pp. 472-484, 2005.
〔25〕 Mathieson, K., “Predicting User Intentions: Comparing the Technology Acceptance Model with The Theory of Planned Behavior”, Information System Research, 2(3), pp. 173-191, 1991.
〔26〕 PriceWaterhouseCoopers Internet portal, Information Security Breaches Survey 2004-technical report, accessed on December 20, 2006. [cited from http://www.pwc.com/images/gx/eng/about/svcs/grms/2004Technical_Report.pdf].
〔27〕 Lee, S. M., Lee, S. G. & Yoo, S., “An integrative model of computer abuse based on social control and general deterrence theories.”, Information & Management, 41, pp. 707–718, 2004.
〔28〕 Schultz, EE., “A framework for understanding and predicting insider attacks.”, Computers and Security, 21(6), pp. 526-31, 2002.
〔29〕 Schultz, E.E. & Shumway, R., Incident response: A strategic guide for system and network security breaches., New Riders, p.189, Indianapolis, 2001.
〔30〕 Straub, DW & Welke, RJ., “Coping with systems risk: security planning models for management decision making.”, MIS Quarterly, 22(4), pp. 441-65, 1998.
〔31〕 Straub, DW., “Effective IS security: an empirical study.”, Information System Research, 1(3), pp. 255-76, 1990.
〔32〕 Sutherland, E., “Criminology.”, J.B. Lippincott, Philadelphia, 1924.
〔33〕 VOGON, Computer Forensic Services and Systems, Computer Fraud and Computer Abuse, accessed on December 20, 2006. [cited from http://www.vogon-computer-evidence.com/investigation_services-02.htm#abuse] |