References
- F. Xu, B. Qi, and H. K. Lo, "Experimental demonstration of phase-remapping attack in a practical quantum key distribution system," New J. Physics, vol. 12, no. 11, pp. 14-28, Nov. 2010.
- L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, "Hacking commercial quantum cryptography systems by tailored bright illumination," Nature Photonics, vol. 4, no. 10, pp. 686-689, Aug. 2010. https://doi.org/10.1038/nphoton.2010.214
- I. Gerhardt, Q. Liu, A. Lamas-Linares, J. Skaar, C. Kurtsiefer, and V. Makarov, "Full-field implementation of a perfect eavesdropper on a quantum cryptography system," Nature Commun., vol. 2, no. 349, Jun. 2011.
- N. Jain, C. Wittmann, L. Lydersen, C. Wiechers, D. Elser, C. Marquardt, and G. Leuchs, "Device calibration impacts security of quantum key distribution," Physical Rev. Lett., vol. 107, no. 11, pp. 110501(1-5), Sept. 2011. https://doi.org/10.1103/PhysRevLett.107.110501
- Y. Liu, Y. Cao, M. Curty, S. K. Liao, J. Wang, K. Cui, and H. F. Zhang, "Experimental unconditionally secure bit commitment," Physical Rev. Lett., vol. 112, no. 1, pp. 010504(1-5), Jan. 2014. https://doi.org/10.1103/PhysRevLett.112.010504
- M. Rogers, Preliminary findings: understanding criminal computer behavior: a personality trait and moral choice analysis, Retrieved June, 27, 2009, from http://homes.cerias.purdue.edu/-mkr/CPA.doc
- G. Rose, H. Khoo, and D. W. Straub, "Current technological impediments to business-to-consumer electronic commerce," Commun. AIS (CAIS), vol. 1, no. 16, Jun. 1999.
- K. Buyens, B. D. Win, and W. Joosen, "Empirical and statistical analysis of risk analysis-driven techniques for threat management," in Proc. IEEE ARES 2007, pp. 1034-1041, Vienna, Austria, Apr. 2007.
- N. L. Beebe and J. Guynes, "A model for predicting hacker behavior," in Proc. AMCIS 2006, vol. 409, Acapulco, Mexico, Dec. 2006.
- D. R. Forsyth, "A taxonomy of ethical ideologies," J. Personality and Social Psychology, vol. 39, no. 1, pp. 175-184, Jul. 1980. https://doi.org/10.1037/0022-3514.39.1.175
- H. J. Woo, "A study on the relationship between hackers' psychological variables and hacking activities," Korean J. Journalism & Commun. Stud., vol. 48, no. 3, pp. 90-115, Jun. 2004.
- M. Bachmann, "The risk propensity and rationality of computer hackers," The Int. J. Cyber Criminology, vol. 4, no. 1-2, pp. 643-656, 2010.
- M. Rogers, N. D. Smoak, and J. Liu, "Self-reported deviant computer behavior: a big-5, moral choice, and manipulative exploitive behavior analysis," Deviant Behavior, vol. 27, no. 3, pp. 245-268, 2006. https://doi.org/10.1080/01639620600605333
- S. A. Jackson and H. W. Marsh, "Development and validation of a scale to measure optimal experience: The flow state scale," J. Sport and Exercise Psychology, vol. 18, no. 1, pp. 17-35, Dec. 1996. https://doi.org/10.1123/jsep.18.1.17
- C. D. Spielberger, G. Jacobs, S. Russell, and R. S. Crane, "Assessment of anger: The state-trait anger scale," in Advances in Personality Assessment, vol. 2, pp. 161-189, Lawrence Erlbaum Associates, 1983.
- E. S. Knowles, H. S. Cutter, D. H. Walsh, and N. A. Casey, "Risk-taking as a personality trait," Social Behavior and Personality: an Int. J., vol. 1, no. 2, pp. 123-136, Jan. 1973. https://doi.org/10.2224/sbp.1973.1.2.123
- J. Y. Hong and Y. H. Cho, "A study the impacts of gamblers' risk taking and maladaptive beliefs on the gambling behavior," J. Tourism Sci., vol. 35, no. 8, pp. 367-388, Oct. 2011.
- L. R. Goldberg, "The development of markers for the Big-Five factor structure," Psychological assessment, vol. 4, no. 1, pp. 26-42, Mar. 1992. https://doi.org/10.1037/1040-3590.4.1.26
- M. Fishbein and I. Azjen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Addison-Wesley, 1975.
- L. K. Trevino, "Moral reasoning and business ethics: Implications for research, education and management," J. Business Ethics, vol. 11, no. 5, pp. 445-464, May 1992. https://doi.org/10.1007/BF00870556
- H. J. Eysenck and M. W. Eysenck, Personality and Individual Differences, Plenum Press, 1985.