Follow

Articles from 2019

PDF

Digital First: The Ontological Reversal and New Challenges for IS Research, Richard L. Baskerville, Michael D. Myers, and Youngjin Yoo

Link

Cyber-Dependent Crimes: An Interdisciplinary Review, David Maimon and Eric L. Louderback

Articles from 2018

PDF

Continuous Restricted Boltzmann Machines, Robert W. Harrison

Articles from 2017

Link

Illegal Roaming and File Manipulation on Target Computers: Assessing the Effect of Sanction Threats on System Trespassers’ Online Behaviors, Alexander Testa, David Maimon, Bertrand Sobesto, and Michel Cukier

Articles from 2015

Link

On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents, David Maimon, Theodore Wilson, Wuling Ren, and Tamar Berenblaum

Link

The Effect of a Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyberspace, Theodore Wilson, David = Maimon, Bertrand Sobesto, and Michel Cukier

Articles from 2013

Link

Daily Trends and Origin of Computer-Focused Crimes against a Large University Computer Network: An Application of the Routine-Activities and Lifestyle Perspective, David Maimon, Amy Kamerdze, Michel Cukier, and Bertrand Sobesto

Link

Restrictive Deterrent Effects of a Warning Banner in an Attacked Computer System, David Maimon, Bertrand Sobesto, and Michel Cukier