{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T15:06:59Z","timestamp":1760800019825},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,3,30]],"date-time":"2017-03-30T00:00:00Z","timestamp":1490832000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10796-017-9752-4","type":"journal-article","created":{"date-parts":[[2017,3,30]],"date-time":"2017-03-30T05:41:00Z","timestamp":1490852460000},"page":"443-455","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests"],"prefix":"10.1007","volume":"19","author":[{"given":"Ruochen","family":"Liao","sequence":"first","affiliation":[]},{"given":"Shenaz","family":"Balasinorwala","sequence":"additional","affiliation":[]},{"given":"H.","family":"Raghav Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,30]]},"reference":[{"key":"9752_CR1","volume-title":"Juvenile delinquency: Causes and control","author":"R Agnew","year":"2001","unstructured":"Agnew, R., & Brezina, T. (2001). Juvenile delinquency: Causes and control. Los Angeles: Roxbury Publishing Company."},{"key":"9752_CR2","unstructured":"Albrecht, W.S., Wernz, G.W., Williams, T.L. (1995). Fraud: Bringing light to the dark side of business. Irwin Professional Pub."},{"issue":"4","key":"9752_CR3","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.cose.2006.11.004","volume":"26","author":"E Albrechtsen","year":"2007","unstructured":"Albrechtsen, E. (2007). A qualitative study of users' view on information security. Computers & Security, 26(4), 276\u2013289.","journal-title":"Computers & Security"},{"key":"9752_CR4","unstructured":"Allison, P.D. (2012). Logistic regression using SAS: Theory and application. SAS Institute."},{"issue":"3","key":"9752_CR5","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"CL Anderson","year":"2010","unstructured":"Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613\u2013643.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9752_CR6","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1108\/IMCS-02-2013-0014","volume":"22","author":"I Atoum","year":"2014","unstructured":"Atoum, I., Otoom, A., & Abu Ali, A. (2014). A holistic cyber security implementation framework. Information Management & Computer Security, 22(3), 251\u2013264.","journal-title":"Information Management & Computer Security"},{"issue":"5","key":"9752_CR7","first-page":"348","volume":"9","author":"CR Baker","year":"1999","unstructured":"Baker, C. R. (1999). An analysis of fraud on the internet. International Rescuer, 9(5), 348\u2013360.","journal-title":"International Rescuer"},{"issue":"4","key":"9752_CR8","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1108\/13590790810907236","volume":"15","author":"KJ Barker","year":"2008","unstructured":"Barker, K. J., D'Amato, J., & Sheridon, P. (2008). Credit card fraud: Awareness and prevention. Journal of financial crime, 15(4), 398\u2013410.","journal-title":"Journal of financial crime"},{"key":"9752_CR9","volume-title":"Computer crime","author":"A Bequai","year":"1978","unstructured":"Bequai, A. (1978). Computer crime. Citeseer."},{"key":"9752_CR10","unstructured":"Bequai, A. (1983). How to prevent computer crime: A guide for managers. Wiley."},{"issue":"8","key":"9752_CR11","doi-asserted-by":"crossref","first-page":"688","DOI":"10.1016\/S0167-4048(00)08017-2","volume":"19","author":"A Bequai","year":"2000","unstructured":"Bequai, A. (2000). America\u2019s internet commerce and the threat of fraud. Computers & Security, 19(8), 688\u2013691.","journal-title":"Computers & Security"},{"issue":"1","key":"9752_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/07418820100094801","volume":"18","author":"TJ Bernard","year":"2001","unstructured":"Bernard, T. J., & Engel, R. S. (2001). Conceptualizing criminal justice theory. Justice Quarterly, 18(1), 1\u201330.","journal-title":"Justice Quarterly"},{"issue":"2","key":"9752_CR13","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1023\/B:ISFI.0000025780.94350.79","volume":"6","author":"SW Brenner","year":"2004","unstructured":"Brenner, S. W. (2004). US cybercrime law: Defining offenses. Information Systems Frontiers, 6(2), 115\u2013132.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"9752_CR14","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1023\/B:ISFI.0000025779.42497.30","volume":"6","author":"SW Brenner","year":"2004","unstructured":"Brenner, S. W., & Schwerha, J. J. (2004). Introduction\u2014Cybercrime: A note on international issues. Information Systems Frontiers, 6(2), 111\u2013114.","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"9752_CR15","first-page":"55","volume":"9","author":"CS Brown","year":"2015","unstructured":"Brown, C. S. (2015). Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology, 9(1), 55.","journal-title":"International Journal of Cyber Criminology"},{"issue":"5","key":"9752_CR16","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1016\/j.jcrimjus.2004.06.008","volume":"32","author":"RG Burns","year":"2004","unstructured":"Burns, R. G., Whitworth, K. H., & Thompson, C. Y. (2004). Assessing law enforcement preparedness to address internet fraud. Journal of Criminal Justice, 32(5), 477\u2013493.","journal-title":"Journal of Criminal Justice"},{"issue":"12","key":"9752_CR17","first-page":"1","volume":"65","author":"DL Carter","year":"1996","unstructured":"Carter, D. L., & Katz, A. J. (1996). Computer crime: An emerging challenge for law enforcement. FBI Law Enforcement Bulletin, 65(12), 1\u20138.","journal-title":"FBI Law Enforcement Bulletin"},{"key":"9752_CR18","unstructured":"Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet: Academic press."},{"issue":"3","key":"9752_CR19","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1080\/15536548.2005.10855772","volume":"1","author":"M Chan","year":"2005","unstructured":"Chan, M., Woon, I., & Kankanhalli, A. (2005). Perceptions of information security in the workplace: Linking information security climate to compliant behavior. Journal of information privacy and security, 1(3), 18\u201341.","journal-title":"Journal of information privacy and security"},{"issue":"1","key":"9752_CR20","first-page":"308","volume":"2","author":"K-S Choi","year":"2008","unstructured":"Choi, K.-S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308.","journal-title":"International Journal of Cyber Criminology"},{"issue":"10","key":"9752_CR21","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MC.2004.165","volume":"37","author":"CEH Chua","year":"2004","unstructured":"Chua, C. E. H., & Wareham, J. (2004). Fighting internet auction fraud: An assessment and proposal. Computer, 37(10), 31\u201337.","journal-title":"Computer"},{"key":"9752_CR22","unstructured":"Clarke, R. V. G., & Felson, M. (1993). Routine activity and rational choice (Vol. 5): Transaction publishers."},{"key":"9752_CR23","doi-asserted-by":"crossref","unstructured":"Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 588\u2013608.","DOI":"10.2307\/2094589"},{"key":"9752_CR24","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.cose.2012.09.010","volume":"32","author":"RE Crossler","year":"2013","unstructured":"Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90\u2013101.","journal-title":"Computers & Security"},{"issue":"4","key":"9752_CR25","doi-asserted-by":"crossref","first-page":"1381","DOI":"10.1353\/sof.2003.0051","volume":"81","author":"SJ D'Alessio","year":"2003","unstructured":"D'Alessio, S. J., & Stolzenberg, L. (2003). Race and the probability of arrest. Social Forces, 81(4), 1381\u20131397.","journal-title":"Social Forces"},{"issue":"6","key":"9752_CR26","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1111\/j.1540-5915.2012.00383.x","volume":"43","author":"J D'Arcy","year":"2012","unstructured":"D'Arcy, J., & Devaraj, S. (2012). Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43(6), 1091\u20131124.","journal-title":"Decision Sciences"},{"key":"9752_CR27","unstructured":"D'Arcy, J., & Hovav, A. (2004). The role of individual characteristics on the effectiveness of IS security countermeasures. AMCIS 2004 PRO, 176."},{"issue":"1","key":"9752_CR28","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s10551-008-9909-7","volume":"89","author":"J D\u2019Arcy","year":"2009","unstructured":"D\u2019Arcy, J., & Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89(1), 59\u201371.","journal-title":"Journal of Business Ethics"},{"issue":"7","key":"9752_CR29","doi-asserted-by":"crossref","first-page":"386","DOI":"10.17705\/1jais.00133","volume":"8","author":"T Dinev","year":"2007","unstructured":"Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 386.","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"9752_CR30","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.cose.2006.10.009","volume":"26","author":"RC Dodge","year":"2007","unstructured":"Dodge, R. C., Carver, C., & Ferguson, A. J. (2007). Phishing for user security awareness. Computers & Security, 26(1), 73\u201380.","journal-title":"Computers & Security"},{"issue":"1","key":"9752_CR31","first-page":"1","volume":"2","author":"KM Dolan","year":"2004","unstructured":"Dolan, K. M. (2004). Internet auction fraud: The silent victims. Journal of Economic Crime Management, 2(1), 1\u201322.","journal-title":"Journal of Economic Crime Management"},{"issue":"1","key":"9752_CR32","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10796-010-9265-x","volume":"15","author":"F Farahmand","year":"2013","unstructured":"Farahmand, F., & Spafford, E. H. (2013). Understanding insiders: An analysis of risk-taking behavior. Information Systems Frontiers, 15(1), 5\u201315.","journal-title":"Information Systems Frontiers"},{"issue":"3","key":"9752_CR33","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/s10796-009-9178-8","volume":"12","author":"P Gottschalk","year":"2010","unstructured":"Gottschalk, P. (2010). Knowledge management technology for organized crime risk assessment. Information Systems Frontiers, 12(3), 267\u2013275.","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"9752_CR34","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1093\/bjc\/43.1.141","volume":"43","author":"K Hansen","year":"2003","unstructured":"Hansen, K. (2003). Education and the crime-age profile. British Journal of Criminology, 43(1), 141\u2013168.","journal-title":"British Journal of Criminology"},{"key":"9752_CR35","unstructured":"Heidensohn, F., Rock, P., McIntosh, M., Smart, C., & Smart, C. (1977). Women, crime and criminology. JSTOR."},{"key":"9752_CR36","volume-title":"Technical report 10","author":"G Heinze","year":"1999","unstructured":"Heinze, G. (1999). The application of Firth\u2019s procedure to cox and logistic regression. In Technical report 10. Vienna: Department of Medical Computer Sciences, Section of Clinical Biometrics, Vienna University."},{"issue":"7\u20138","key":"9752_CR37","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1002\/sim.3794","volume":"29","author":"G Heinze","year":"2010","unstructured":"Heinze, G., & Puhr, R. (2010). Bias-reduced and separation-proof conditional logistic regression with small or sparse data sets. Statistics in Medicine, 29(7\u20138), 770\u2013777.","journal-title":"Statistics in Medicine"},{"issue":"2","key":"9752_CR38","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","volume":"47","author":"T Herath","year":"2009","unstructured":"Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154\u2013165.","journal-title":"Decision Support Systems"},{"issue":"1","key":"9752_CR39","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/14786010600615934","volume":"19","author":"GE Higgins","year":"2006","unstructured":"Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3\u201322.","journal-title":"Criminal Justice Studies"},{"key":"9752_CR40","unstructured":"Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization: Ballinger Cambridge."},{"key":"9752_CR41","first-page":"165","volume":"54","author":"BD Hittle","year":"2001","unstructured":"Hittle, B. D. (2001). Uphill battle: The difficulty of deterring and detecting perpetrators of internet stock fraud. An. Fed. Comm. LJ, 54, 165.","journal-title":"An. Fed. Comm. LJ"},{"issue":"1","key":"9752_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/01639620701876577","volume":"30","author":"TJ Holt","year":"2008","unstructured":"Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1\u201325.","journal-title":"Deviant Behavior"},{"key":"9752_CR43","doi-asserted-by":"crossref","unstructured":"Howard, R. (2009). Cyber fraud: Tactics, techniques and procedures: CRC press.","DOI":"10.1201\/9781420091281"},{"issue":"1","key":"9752_CR44","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1177\/073401689401900103","volume":"19","author":"JE Jackson","year":"1994","unstructured":"Jackson, J. E. (1994). Fraud masters: Professional credit card offenders and crime. Criminal Justice Review, 19(1), 24\u201355.","journal-title":"Criminal Justice Review"},{"key":"9752_CR45","volume-title":"Crime victims: An introduction to victimology: Cengage learning","author":"A Karmen","year":"2012","unstructured":"Karmen, A. (2012). Crime victims: An introduction to victimology: Cengage learning."},{"key":"9752_CR46","unstructured":"Kauffman, R. J., & Wood, C. A. (2003). An investigation of premium bidding in online auctions. University of Minnesota MISRC Working Paper, 304."},{"issue":"5","key":"9752_CR47","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(10)70051-8","volume":"2010","author":"T Kellermann","year":"2010","unstructured":"Kellermann, T. (2010). Building a foundation for global cybercrime law enforcement. Computer Fraud & Security, 2010(5), 5\u20138.","journal-title":"Computer Fraud & Security"},{"issue":"2","key":"9752_CR48","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1093\/oxfordjournals.pan.a004868","volume":"9","author":"G King","year":"2001","unstructured":"King, G., & Zeng, L. (2001). Logistic regression in rare events data. Political Analysis, 9(2), 137\u2013163.","journal-title":"Political Analysis"},{"issue":"1","key":"9752_CR49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/13691180802158516","volume":"12","author":"B-J Koops","year":"2009","unstructured":"Koops, B.-J., Leenes, R., Meints, M., Van der Meulen, N., & Jaquet-Chiffelle, D.-O. (2009). A typology of identity-related crime: Conceptual, technical, and legal issues. Information, Communication & Society, 12(1), 1\u201324.","journal-title":"Information, Communication & Society"},{"issue":"6","key":"9752_CR50","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1016\/j.im.2003.08.008","volume":"41","author":"SM Lee","year":"2004","unstructured":"Lee, S. M., Lee, S.-G., & Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information Management, 41(6), 707\u2013718.","journal-title":"Information Management"},{"issue":"1","key":"9752_CR51","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s10796-010-9270-0","volume":"13","author":"J Li","year":"2011","unstructured":"Li, J., Wang, G. A., & Chen, H. (2011). Identity matching using personal and social identity features. Information Systems Frontiers, 13(1), 101\u2013113.","journal-title":"Information Systems Frontiers"},{"issue":"1\u20132","key":"9752_CR52","first-page":"125","volume":"5","author":"X Li","year":"2008","unstructured":"Li, X. (2008). The criminal phenomenon on the internet: Hallmarks of criminals and victims revisited through typical cases prosecuted. University of Ottawa Law & Technology Journal, 5(1\u20132), 125\u2013140.","journal-title":"University of Ottawa Law & Technology Journal"},{"issue":"4","key":"9752_CR53","first-page":"249","volume":"2","author":"MC McCarron","year":"2004","unstructured":"McCarron, M. C. (2004). Management of Internet Fraud by law enforcement agencies. Canadian Journal of Police and Security Services, 2(4), 249.","journal-title":"Canadian Journal of Police and Security Services"},{"key":"9752_CR54","volume-title":"Organised crime in the digital age","author":"M McGuire","year":"2012","unstructured":"McGuire, M. (2012). Organised crime in the digital age. London: John Grieve Centre for Policing and Security."},{"key":"9752_CR55","unstructured":"Messerschmidt, J. W. (1993). Masculinities and crime: Critique and reconceptualization of theory: Rowman & Littlefield Publishers."},{"issue":"4","key":"9752_CR56","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1016\/j.jcrimjus.2010.05.003","volume":"38","author":"B Moon","year":"2010","unstructured":"Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767\u2013772.","journal-title":"Journal of Criminal Justice"},{"issue":"1","key":"9752_CR57","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/S0165-1765(97)00042-6","volume":"55","author":"WS Neilson","year":"1997","unstructured":"Neilson, W. S., & Winter, H. (1997). On criminals' risk attitudes. Economics Letters, 55(1), 97\u2013102.","journal-title":"Economics Letters"},{"issue":"1","key":"9752_CR58","first-page":"773","volume":"5","author":"FT Ngo","year":"2011","unstructured":"Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773.","journal-title":"International Journal of Cyber Criminology"},{"key":"9752_CR59","doi-asserted-by":"crossref","unstructured":"Pahnila, S., Siponen, M., & Mahmood, A. Employees' behavior towards IS security policy compliance. In System sciences, 2007. HICSS 2007. 40Th annual hawaii international conference on, 2007 (pp. 156b-156b): IEEE","DOI":"10.1109\/HICSS.2007.206"},{"issue":"12","key":"9752_CR60","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1016\/S0895-4356(96)00236-3","volume":"49","author":"P Peduzzi","year":"1996","unstructured":"Peduzzi, P., Concato, J., Kemper, E., Holford, T. R., & Feinstein, A. R. (1996). A simulation study of the number of events per variable in logistic regression analysis. Journal of Clinical Epidemiology, 49(12), 1373\u20131379.","journal-title":"Journal of Clinical Epidemiology"},{"key":"9752_CR61","volume-title":"Security in computing: Prentice hall Professional technical reference","author":"CP Pfleeger","year":"2002","unstructured":"Pfleeger, C. P., & Pfleeger, S. L. (2002). Security in computing: Prentice hall Professional technical reference."},{"issue":"3","key":"9752_CR62","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.cose.2006.10.004","volume":"26","author":"GV Post","year":"2007","unstructured":"Post, G. V., & Kagan, A. (2007). Evaluating information security tradeoffs: Restricting access can interfere with user tasks. Computers & Security, 26(3), 229\u2013237.","journal-title":"Computers & Security"},{"issue":"3","key":"9752_CR63","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1177\/0022427810365903","volume":"47","author":"TC Pratt","year":"2010","unstructured":"Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267\u2013296.","journal-title":"Journal of Research in Crime and Delinquency"},{"key":"9752_CR64","first-page":"291","volume":"47","author":"KV Ryan","year":"2012","unstructured":"Ryan, K. V., & Krotoski, M. L. (2012). Caution advised: Avoid undermining the legitimate needs of law enforcement to solve crimes involving the internet in amending the electronic communications privacy act. USFL Rev., 47, 291.","journal-title":"USFL Rev."},{"issue":"1","key":"9752_CR65","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1080\/09627250408553240","volume":"58","author":"GP Smith","year":"2004","unstructured":"Smith, G. P., & Urbas, G. (2004). Cyber criminals on trial. Criminal Justice Matters, 58(1), 22\u201323.","journal-title":"Criminal Justice Matters"},{"issue":"1","key":"9752_CR66","doi-asserted-by":"crossref","first-page":"234","DOI":"10.2307\/1143211","volume":"75","author":"DA Smith","year":"1984","unstructured":"Smith, D. A., Visher, C. A., & Davidson, L. A. (1984). Equity and discretionary justice: The influence of race on police arrest decisions. The Journal of Criminal Law and Criminology (1973-), 75(1), 234\u2013249.","journal-title":"The Journal of Criminal Law and Criminology (1973-)"},{"issue":"5","key":"9752_CR67","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s10796-007-9055-2","volume":"9","author":"DS Soper","year":"2007","unstructured":"Soper, D. S., Demirkan, H., & Goul, M. (2007). An interorganizational knowledge-sharing security model with breach propagation detection. Information Systems Frontiers, 9(5), 469\u2013479.","journal-title":"Information Systems Frontiers"},{"key":"9752_CR68","first-page":"2005","volume":"6","author":"RB Standler","year":"2002","unstructured":"Standler, R. B. (2002). Computer crime. Retrieved February, 6, 2005.","journal-title":"Retrieved February"},{"key":"9752_CR69","doi-asserted-by":"crossref","unstructured":"Stanton, J. M., Stam, K. R., Guzman, I., & Caledra, C. Examining the linkage between organizational commitment and information security. In Systems, Man and Cybernetics, 2003. IEEE International Conference on, 2003 (Vol. 3, pp. 2501\u20132506): IEEE","DOI":"10.1109\/ICSMC.2003.1244259"},{"issue":"11","key":"9752_CR70","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S1361-3723(00)11018-8","volume":"2000","author":"Stevenson","year":"2000","unstructured":"Stevenson. (2000). Computer fraud: Detection and prevention. Computer Fraud & Security, 2000(11), 13\u201315.","journal-title":"Computer Fraud & Security"},{"key":"9752_CR71","first-page":"6","volume":"2005","author":"Stevenson","year":"2005","unstructured":"Stevenson. (2005). Plugging the\" phishing\" hole: Legislation versus technology. Duke L. & Tech. Rev., 2005, 6\u201326.","journal-title":"Duke L. & Tech. Rev."},{"issue":"2","key":"9752_CR72","first-page":"101","volume":"95","author":"RJ Sullivan","year":"2010","unstructured":"Sullivan, R. J. (2010). The changing nature of US card payment fraud: Industry and public policy options. Economic Review-Federal Reserve Bank of Kansas City, 95(2), 101.","journal-title":"Economic Review-Federal Reserve Bank of Kansas City"},{"issue":"2","key":"9752_CR73","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1111\/j.1467-9930.2005.00200.x","volume":"27","author":"D Thornton","year":"2005","unstructured":"Thornton, D., Gunningham, N. A., & Kagan, R. A. (2005). General deterrence and corporate environmental behavior. Law & Policy, 27(2), 262\u2013288.","journal-title":"Law & Policy"},{"key":"9752_CR74","doi-asserted-by":"crossref","unstructured":"Wall, D. (2003). 1 cybercrimes and the internet. Crime and the Internet, 1.","DOI":"10.4324\/9780203299180"},{"issue":"1","key":"9752_CR75","doi-asserted-by":"crossref","first-page":"91","DOI":"10.25300\/MISQ\/2015\/39.1.05","volume":"39","author":"J Wang","year":"2015","unstructured":"Wang, J., Gupta, M., & Rao, H. R. (2015). Insider threats in a financial institution: Analysis of attack-proneness of information systems applications. MIS Quarterly, 39(1), 91\u2013112.","journal-title":"MIS Quarterly"},{"key":"9752_CR76","volume-title":"Women, crime, and criminal justice: Anderson Cincinnati","author":"R Weisheit","year":"1988","unstructured":"Weisheit, R., & Mahan, S. (1988). Women, crime, and criminal justice: Anderson Cincinnati."},{"key":"9752_CR77","doi-asserted-by":"crossref","unstructured":"Williams, K. R., & Hawkins, R. (1986). Perceptual research on general deterrence: A critical review. Law and Society Review, 545\u2013572.","DOI":"10.2307\/3053466"},{"issue":"2","key":"9752_CR78","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1108\/09593840610673810","volume":"19","author":"R Willison","year":"2006","unstructured":"Willison, R. (2006). Understanding the offender\/environment dynamic for computer crimes. Information Technology & People, 19(2), 170\u2013186.","journal-title":"Information Technology & People"},{"issue":"4","key":"9752_CR79","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1057\/palgrave.ejis.3000592","volume":"15","author":"R Willison","year":"2006","unstructured":"Willison, R., & Backhouse, J. (2006). Opportunities for computer crime: Considering systems risk from a criminological perspective. European Journal of Information Systems, 15(4), 403\u2013414.","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"9752_CR80","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1177\/147737080556056","volume":"2","author":"M Yar","year":"2005","unstructured":"Yar, M. (2005). The novelty of \u2018cybercrime\u2019 an assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407\u2013427.","journal-title":"European Journal of Criminology"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9752-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-017-9752-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9752-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T06:48:15Z","timestamp":1568962095000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-017-9752-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,30]]},"references-count":80,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["9752"],"URL":"https:\/\/doi.org\/10.1007\/s10796-017-9752-4","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,30]]}}}