[图书][B] Cybercrime in progress: Theory and prevention of technology-enabled offenses

T Holt, A Bossler - 2015 - taylorfrancis.com
The emergence of the World Wide Web, smartphones, and computers has transformed the
world and enabled individuals to engage in crimes in a multitude of new ways …

Scaling the security wall: Developing a security behavior intentions scale (sebis)

S Egelman, E Peer - Proceedings of the 33rd annual ACM conference …, 2015 - dl.acm.org
Despite the plethora of security advice and online education materials offered to end-users,
there exists no standard measurement tool for end-user security behaviors. We present the …

[图书][B] Cybercrime and digital forensics: An introduction

TJ Holt, AM Bossler, KC Seigfried-Spellar - 2022 - taylorfrancis.com
This book offers a comprehensive and integrative introduction to cybercrime. It provides an
authoritative synthesis of the disparate literature on the various types of cybercrime, the …

Cybercrime and society

M Yar, KF Steinmetz - 2023 - torrossa.com
The previous chapters explored cybercriminal activities associated with computer intrusion
and manipulation, which are generally labelled as hacking. This chapter critically explores …

Low self-control, deviant peer associations, and juvenile cyberdeviance

TJ Holt, AM Bossler, DC May - American journal of criminal justice, 2012 - Springer
Abstract Gottfredson and Hirschi's (1990) general theory of crime and Akers'(1998) social
learning theory have received strong empirical support for explaining crime in both the …

Systematic quantitative literature review on criminological theories in Asia

M Suzuki, CF Pai, MJ Islam - Asian Journal of Criminology, 2018 - Springer
Empirical work on criminological theories in Asia has been increasing. However, few
comprehensive and systematic reviews on the application of criminological theories in Asia …

Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy

CM Donner, CD Marcum, WG Jennings… - Computers in Human …, 2014 - Elsevier
While technological innovations over the last thirty years have markedly improved the ways
in which people communicate and gather information, these advances have also led to …

Personality and online deviance: The role of reinforcement sensitivity theory in cybercrime

M Palmieri, N Shortland, P McGarry - Computers in human behavior, 2021 - Elsevier
The Internet has afforded people a multitude of opportunities to engage in crime and
deviance online. Despite recent research efforts the application of criminological theories to …

Anger or fear? Effects of discrete emotions on employee's computer-related deviant behavior

F Xu, XR Luo, C Hsu - Information & Management, 2020 - Elsevier
Security research on the employees' expressive motives in committing computer-related
deviant behavior is limited. In this research, drawing on the appraisal tendency framework …

Impacts of online risky behaviors and cybersecurity management on cyberbullying and traditional bullying victimization among Korean youth: Application of cyber …

KS Choi, S Cho, JR Lee - Computers in Human Behavior, 2019 - Elsevier
Previous studies have demonstrated that higher Internet and digital technology usage
increases adolescents' likelihood of experiencing online victimization, including …