ابوطالبی نایینی سمانه، پیکری حمید رضا، احتشامی اصغر. 1398. همبستگی استفاده از سیستمهای اطلاعات سلامت با رابطه پرستار-بیمار؛ نقش میانجی عدالت سازمانی ادراکشده. فصلنامه مدیریت ارتقای سلامت. ۸ (۲):۱-۸
الهی، شعبان، طاهری، مهدی و حسنزاده خوشطینت علیرضا 1388. اراﺋﺔ ﭼﺎرﭼﻮﺑﻲ ﺑﺮای ﻋﻮاﻣﻞ انسانی مرتبط در امنیت سیستمهای اطلاعاتی. پژوهشهای مدیریت در ایران، 2: 1-22.
پور نقدی، بهزاد 1388. اخلاق در فناوری اطلاعات و آسیبشناسی اخـلاق ارتباطـات. اخلاق در علوم و فناوری، 1 و 2: 21-28.
پور مهر, سمانه، پیکری, حمید رضا، گلشیری پرستو. 1397. رابطه عدالت سازمانی ادراکشده و رعایت حریم شخصی با نقش تعدیل گر مؤلفههای بازدارندگی، مدیریت اطلاعات سلامت، 15(5):208-213
موسویان، سمانه سادات، نیلی، محمدرضا و ملکی حسن 1394. طراحی درس اخلاق فناوری اطلاعات برای دانشجویان علوم تربیتی. متون و برنامههای علوم انسانی، 4: 165-182.
مولوی، مهران، سلطانی، لقمان و زیرک طلاپه بهنام 1395. نقش فناوری اطلاعات در جرائم اینترنتی شبکه بانکی. مطالعات علوم کاربردی در مهندسی،1: 1-5.
Bachman, R., R. Paternoster, and S. Ward. 1992. The rationality of sexual offending: testing a deterrence/rational choice conception of sexual assault. Law and Society Review, 26 (2): 343–372.
Beebe, N.L., and V.S. Rao. 2005. Using situational crime prevention theory to explain the effectiveness of information systems security. Proceedings of the 2005 Software Conference, Las Vegas, NV, (ISBN: 0-9772107-0-7).
Clarke R.V. 1997. Situational Crime Prevention: Successful Case Studies. Albany: Harrow and Heston.
Dowland P.S., S.M. Furnell, H.M. llingworth, and P.L. Reynolds. 1999. Computer Crime and Abuse: Survey of Public Attitudes and Awareness. Computer and Security, 18 (8): 715- 726.
Frijda, N.H. 2007. The Laws of Emotion. Lawrence Erlbaum Associates, Mahwah.
Ghazi-Asgar, M., H.R., Peikari, and A. Ehteshami, A. 2018. Health Information Management: Psychological factors influencing information privacy concerns in psychiatric hospitals. Bali Medical Journal, 7(1): 120-126
Goldberg, L.R. 1999. A broad-bandwidth, public domain, personality inventory measuring the lower-level facets of several five-factor models. Personality psychology in Europe, 7: 7–28.
Hayward, K. 2007. Situational Crime Prevention and its Discontents: Rational Choice Theory versus the ‘Culture of Now’. Sociology and Social Research, 41 (3): 232–250.
Hova, A, and J. D’Arcy. 2012. Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea. Information & Management, 49: 99–110.
Hsu, C.L., and J.C.C. Lin. 2016. An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives. Computers in human behavior, 62: 516- 527.
Johnston, A.C., and M. Warkentin. 2010. Fear appeals and information security behaviors: an empirical study. Management Information Systems Quarterly, 34 (3): 549–566.
Karimi Z., and Peikari H.R. 2018. The Impact of Nurses’ Perceived Information Security Training and Information Security Policy Awareness on their Perceived Severity and Certainty of Information Security Breach Penalties (Case: the Educational Specialized Hospitals of Isfahan City). Journal of Nurses, Education; 7 (2) :17-24
Kim, J.J. E.H. Park, and R.L. Baskerville. 2016. A model of emotion and computer abuse. Information and Management, 53 (1): 91-108.
Lee, Y., and K.A. Kozar. 2008. An empirical investigation of anti-spyware software adoption.
Information and Management, 45 (2): 109–119.
Lowry, P.B., C. Posey, T.L. Roberts, and R.J. Bennett. 2014. Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse.
Journal of Business Ethics, 121 (3): 385–401.
Morrison, E.W., and S.L. Robinson. 1997. When employees feel betrayed: a model of how psychological contract violation develops.
Academy of Management Review, 22 (1): 226–256.
Office for National statistics, (2018). https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/articles/overviewoffraudandcomputermisusestatisticsforenglandandwales/2018-01-25 (Last Access: 24 Aug 2019).
Owdley, B., and G.I. Hacker. 2010. Internet fraud casebook: The world wide web of deceit, Wiley, Hoboken, 245–252.
Russell, J.A. 2003. Core affect and the psychological construction of emotion. Psychological Review, 110 (1): 145–172.
Seymour, L., and K. Nadasen. 2007. Web access for IT staff: a developing world perspective on web abuse. The Electronic Library, 25(5): 543-557.
Siponen, M., and A. Vance. 2010. Neutraliztion: new insights into the problem of employee information systems security policy violations. Management Information Systems Quarterly, 34 (3): 487–A12.
Stahl, B.C., N.F. Doherty, and M. Shaw. 2012. Information security policies in the UK healthcare sector: a critical evaluation. Information systems journal, 22: 77-94.
Strelan, P., and R.J. Boeckmann. 2006. Why drug testing in elite sport does not work: perceptual deterrence theory and the role of personal moral beliefs.
Journal of Applied Social Psychology, 36 (12): 2909–2934.
Watson, D., D. Wiese, J. Vaidya, and A. Tellegen. 1999. The two general activation systems of affect: structural findings, evolutionary considerations, and psychobiological evidence. Journal of Personality and Social Psychology, 76 (5): 820–838.
Willison, R. 2002. Opportunities for Computer Abuse: Assessing a Crime-Specific Approach in the Case of Barings Bank, London School of Economics and Political Science.
Willison, R., M. Warkentin, and A.C. Johnston. 2016. Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Information Systems Journal, 28 (2): 266-293.
Young, K.S., and Case, C.J. 2004. Internet Abuse in the Workplace: New Trends in Risk Management. CyberPsychology & Behavior, 7(1): 105-111.