[1]
S. H. Chan and L. J. Yao, “An Empirical Investigation Of Hacking Behavior”, RBIS, vol. 9, no. 4, pp. 41–58, Oct. 2005.