Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference61 articles.
1. Apostolidis, T., Fieulaine, N., Simonin, L., & Rolland, G. (2006). Cannabis use, time perspective and risk perception: Evidence of a moderating effect†. Psychology & Health, 21(5), 571–592. https://doi.org/10.1080/14768320500422683.
2. Aransiola, J. O., & Asindemade, S. O. (2011). Understanding cybercrime perpetrators and the strategies they employ in Nigeria. Cyberpsychology, Behavior and Social Networking, 14(12), 759–763. https://doi.org/10.1089/cyber.2010.0307.
3. Barlow, J. B., Warkentin, M., Ormond, D., & Dennis, A. R. (2013). Don’t make excuses! Discouraging neutralization to reduce IT policy violation. Computers & Security, 39, 145–159. https://doi.org/10.1016/j.cose.2013.05.006.
4. Boateng, R., Olumide, L., Isabalija, R. S., & Budu, J. (2011). Sakawa - cybercrime and criminality in Ghana. Journal of Information Technology Impact, 11(2), 85–100.
5. Brenhoff, A. (2017). How a Billion-Dollar Internet Scam is Breaking Hearts and Bank Accounts, HUFFPOST. https://www.huffpost.com/entry/romance-scams-online-fbi-facebook_n_59414c67e4b0d318548666f9.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献