1. Andenaes, J. (1975), “General prevention revisited: research and policy implications”, General Deterrence: A Conference on Current Research and Standpoints, National Swedish Council for Crime Prevention, Stockholm, pp. 12‐59.
2. Anderson, L.S. (1979), “The deterrent effect of criminal sanctions: reviewing the evidence”, in Brentingham, P.J. and Kress, J.M. (Eds), Structure, Law, and Power, Sage Publications, Beverly Hills, CA.
3. Anthes, G.H. (1996), “Hack attack: cyberthieves siphon millions from US firms”, Computerworld, Vol. 30 No. 16, p. 81.
4. Backhouse, J. and Dhillon, G. (1995), “Managing computer crime: a research outlook”, Computers & Security, Vol. 14 No. 7, pp. 645‐51.
5. Baskerville, R. (1993), “Information systems security design methods: implications for information systems development”, ACM Computing Surveys, Vol. 25 No. 4, pp. 375‐414.