A Historical Review of Computer User's Illegal Behavior Based on Containment Theory

نویسندگان

  • Chi-Chao Lu
  • Wen-Yuan Jen
چکیده

The aim of this study is to explore research trends in computer crime and cybercrime from 1968 to 2009. The findings of the current study will provide some insight into scholarly activity related to computer crime and cybercrime and will be useful in tracking computer user’s illegal behavior research trends. Our other goal is to explore the range of the theoretical lens that can be used to understand social controls in restraining computer user’s illegal behavior intention. Towards this goal, this study proposed five propositions based on containment theory. Our propositions address social control education, and offer insights in restraining computer user’s illegal behavior intention.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Method for Selecting the Supplier Based on Association Rule Mining

One of important problems in supply chains management is supplier selection. In a company, there are massive data from various departments so that extracting knowledge from the company’s data is too complicated. Many researchers have solved this problem by some methods like fuzzy set theory, goal programming, multi objective programming, the liner programming, mixed integer programming, analyti...

متن کامل

A review on EEG based brain computer interface systems feature extraction methods

The brain – computer interface (BCI) provides a communicational channel between human and machine. Most of these systems are based on brain activities. Brain Computer-Interfacing is a methodology that provides a way for communication with the outside environment using the brain thoughts. The success of this methodology depends on the selection of methods to process the brain signals in each pha...

متن کامل

A review on EEG based brain computer interface systems feature extraction methods

The brain – computer interface (BCI) provides a communicational channel between human and machine. Most of these systems are based on brain activities. Brain Computer-Interfacing is a methodology that provides a way for communication with the outside environment using the brain thoughts. The success of this methodology depends on the selection of methods to process the brain signals in each pha...

متن کامل

A Review of Peridynamics and its Applications; Part1: The Models based on Peridynamics

Peridynamics is a nonlocal version of the continuum mechanics, in which partial differential equations are replaced by integro-differential ones. Due to not using spatial derivatives of the field variables, it can be applied to problems with discontinuities. In the primary studies, peridynamics has been used to simulate crack propagation in brittle materials. With proving the capabilities of pe...

متن کامل

A NOVEL FUZZY-BASED SIMILARITY MEASURE FOR COLLABORATIVE FILTERING TO ALLEVIATE THE SPARSITY PROBLEM

Memory-based collaborative filtering is the most popular approach to build recommender systems. Despite its success in many applications, it still suffers from several major limitations, including data sparsity. Sparse data affect the quality of the user similarity measurement and consequently the quality of the recommender system. In this paper, we propose a novel user similarity measure based...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JSW

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2010