[1]瑞星网.瑞星2012年中国信息安全综合报告[DB/OL]. http://www.rising.com.cn/about/news/rising/2013-01-15/13051.html. 2012.Rising.Chinese information security comprehensive report in 2012[DB/OL]. http://www.rising.com.cn/about/news/rising/2013-01-15/13051.html. 2012.
[2] Chao C H, Tao Y H. Human flesh search:A supplemental review[J]. Cyberpsychology, Behavior, and Social Networking. 2012, 15(7):350-356.
[3] Phelps J E, D'Souza G, Nowak G J. Antecedents and consequences of consumer privacy concerns:An empirical investigation[J]. Journal of Interactive Marketing. 2001, 15(4):2-17.
[4] Li Y. Theories in online information privacy research:A critical review and an integrated framework[J]. Decision Support Systems. 2012, 54(1):471-481.
[5] Moon Y. Intimate exchanges:Using computers to elicit self-disclosure from consumers[J]. Journal of Consumer Research. 2000, 26(4):323-339.
[6]王洪伟,周曼,何绍义.影响个人在线提供隐私信息意愿的实证研究[J].系统工程理论与实践. 2012, 32(10):2186-2197.Wang H W,Zhou M,He S Y. Empirical research of individual's intention to provide privacy information online[J].Sytems engineering-theory and practice. 2012, 32(10):2186-2197.
[7] Special W P, Li-Barber K T. Self-disclosure and student satisfaction with facebook[J]. Computers in Human Behavior. 2011.
[8] Sykes G M, Matza D. Techniques of neutralization:A theory of delinquency[J]. American Sociological Review. 1957, 22(6):664-670.
[9] Garrett D E, Bradford J L, Meyers R A, et al. Issues management and organizational accounts:An analysis of corporate responses to accusations of unethical business practices[J]. Journal of Business Ethics. 1989, 8(7):507-520.
[10] Eliason S L, Dodder R A. Techniques of neutralization used by deer poachers in the western united states:A research note[J]. Deviant Behavior. 1999, 20(3):233-252.
[11] Priest T B, Mcgrath Iii J H. Techniques of neutralization:Young adult marijuana smokers[J]. Criminology. 1970, 8(2):185-194.
[12] Thurman Q C, John C S, Riggs L. Neutralization and tax evasion:How effective would a moral appeal be in improving compliance to tax laws?[J]. Law & Policy. 1984, 6(3):309-327.
[13] Pershing J L. To snitch or not to snitch? Applying the concept of neutralization techniques to the enforcement of occupational misconduct[J]. Sociological Perspectives. 2003, 46(2):149-178.
[14] Harrington S J. The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions[J]. MIS Quarterly. 1996:257-278.
[15] Lim V K G. The IT way of loafing on the job:Cyberloafing, neutralizing and organizational justice[J]. Journal of Organizational Behavior. 2002, 23(5):675-694.
[16] Harris L C, Dumas A. Online consumer misbehaviour:An application of neutralization theory[J]. Marketing Theory. 2009, 9(4):379-402.
[17] Siponen M, Vance A. Neutralization:New insights into the problem of employee information systems security policy violations[J]. MIS Quarterly. 2010, 34(3):487.
[18] Mccabe D L. The influence of situational ethics on cheating among college students[J]. Sociological Inquiry. 1992, 62(3):365-374.
[19]雍自元.犯罪心理的解析与启示——以许霆案为例[J].安徽师范大学学报(人文社会科学版). 2008, 36(5).Yong Z Y. Parsing and revelations of the criminal mentality-xu ting case as an example. Journal of Anhui Normal University(Humanities and Social Sciences). 2008, 36(5).
[20] Choi N, Kim D, Goo J, et al. Knowing is doing:An empirical validation of the relationship between managerial information security awareness and action[J]. Information Management & Computer Security. 2008, 16(5):484-501.
[21] Tsohou A, Kokolakis S, Karyda M, et al. Investigating information security awareness:Research and practice gaps[J]. Information Security Journal:A Global Perspective. 2008, 17(5-6):207-227.
[22] Bulgurcu B, Cavusoglu H, Benbasat I. Information security policy compliance:An empirical study of rationality-based beliefs and information security awareness.[J]. MIS Quarterly. 2010, 34(3).
[23] Goodhue D L, Straub D W. Security concerns of system users:A study of perceptions of the adequacy of security[J]. Information & Management. 1991, 20(1):13-27.
[24] Siponen M T. Five dimensions of information security awareness[J]. Computers and Society. 2001, 31(2):24-29.
[25] Kumar N, Mohan K, Holowczak R. Locking the door but leaving the computer vulnerable:Factors inhibiting home users' adoption of software firewalls[J]. Decision Support Systems. 2008, 46(1):254-264.
[26] Phelps J, Nowak G, Ferrell E. Privacy concerns and consumer willingness to provide personal information[J]. Journal of Public Policy & Marketing. 2000:27-41.
[27] P tzsch S. Privacy awareness:A means to solve the privacy paradox?[M]. The Future of Identity in the Information Society, Springer, 2009, 226-236.
[28] Dinev T, Hu Q. The centrality of awareness in the formation of user behavioral intention toward protective information technologies.[J]. Journal of the Association for Information Systems. 2007, 8(7).
[29] Ingram J R, Hinduja S. Neutralizing music piracy:An empirical examination[J]. Deviant Behavior. 2008, 29(4):334-366. |