(1)
Chan, S. H.; Yao, L. J. An Empirical Investigation Of Hacking Behavior. RBIS 2005, 9, 41-58.