On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory
Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for criminals and is partially responsible for the global increase in cybercrime. Criminology, however, has been slow to explore the theoretical causes and correlates of malware victimization. This study...
Gespeichert in:
Veröffentlicht in: | International journal of cyber criminology 2009-01, Vol.3 (1), p.400 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | 400 |
container_title | International journal of cyber criminology |
container_volume | 3 |
creator | Bossler, Adam M Holt, Thomas J |
description | Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for criminals and is partially responsible for the global increase in cybercrime. Criminology, however, has been slow to explore the theoretical causes and correlates of malware victimization. This study uses a routine activities framework to explore data loss caused by malware infection in a college sample. Similar to research on traditional forms of victimization, computer deviance was related with computer victimization. Physical guardianship, however, had little effect. Policy implications to decrease malware victimization in a college sample focus on decreasing computer deviance rather than physical target hardening. [PUBLICATION ABSTRACT] |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_89069444</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1988429601</sourcerecordid><originalsourceid>FETCH-LOGICAL-p111t-f6272e06df57230598842333264ddd9725a533b54e83e0b2d0623c4f5f20bdb93</originalsourceid><addsrcrecordid>eNpVjctKAzEYRoMgtNa-Q9w3kPlzmcTdUGotVApS1yXTJDRlTMZJxsvbW9GNq48Dh_NdoSnVNSegdDVBNzmfKZVSKD1FdhdJF6LDzbGE91CCywu8Hs1gg4n5FPoFNtHiJ9N9mMHhTfTuIqZ4j5uIV5_mNUTzwzh5_JzG8j-F9yeXhq9bdO1Nl938b2fo5WG1Xz6S7W69WTZb0ldVVYiXUIOj0npRA6NCK8WBMQaSW2t1DcIIxlrBnWKOtmCpBHbkXnigrW01m6G7324_pLfR5XI4p3GIl8uD0lRqzjn7BiLmT78</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>89069444</pqid></control><display><type>article</type><title>On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Bossler, Adam M ; Holt, Thomas J</creator><creatorcontrib>Bossler, Adam M ; Holt, Thomas J</creatorcontrib><description>Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for criminals and is partially responsible for the global increase in cybercrime. Criminology, however, has been slow to explore the theoretical causes and correlates of malware victimization. This study uses a routine activities framework to explore data loss caused by malware infection in a college sample. Similar to research on traditional forms of victimization, computer deviance was related with computer victimization. Physical guardianship, however, had little effect. Policy implications to decrease malware victimization in a college sample focus on decreasing computer deviance rather than physical target hardening. [PUBLICATION ABSTRACT]</description><identifier>EISSN: 0974-2891</identifier><language>eng</language><publisher>Thirunelveli: International Journal of Cyber Criminology</publisher><subject>Computer viruses ; Cybersecurity ; Identity theft ; Software</subject><ispartof>International journal of cyber criminology, 2009-01, Vol.3 (1), p.400</ispartof><rights>Copyright International Journal of Cyber Criminology Jan-Jun 2009</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Bossler, Adam M</creatorcontrib><creatorcontrib>Holt, Thomas J</creatorcontrib><title>On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory</title><title>International journal of cyber criminology</title><description>Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for criminals and is partially responsible for the global increase in cybercrime. Criminology, however, has been slow to explore the theoretical causes and correlates of malware victimization. This study uses a routine activities framework to explore data loss caused by malware infection in a college sample. Similar to research on traditional forms of victimization, computer deviance was related with computer victimization. Physical guardianship, however, had little effect. Policy implications to decrease malware victimization in a college sample focus on decreasing computer deviance rather than physical target hardening. [PUBLICATION ABSTRACT]</description><subject>Computer viruses</subject><subject>Cybersecurity</subject><subject>Identity theft</subject><subject>Software</subject><issn>0974-2891</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpVjctKAzEYRoMgtNa-Q9w3kPlzmcTdUGotVApS1yXTJDRlTMZJxsvbW9GNq48Dh_NdoSnVNSegdDVBNzmfKZVSKD1FdhdJF6LDzbGE91CCywu8Hs1gg4n5FPoFNtHiJ9N9mMHhTfTuIqZ4j5uIV5_mNUTzwzh5_JzG8j-F9yeXhq9bdO1Nl938b2fo5WG1Xz6S7W69WTZb0ldVVYiXUIOj0npRA6NCK8WBMQaSW2t1DcIIxlrBnWKOtmCpBHbkXnigrW01m6G7324_pLfR5XI4p3GIl8uD0lRqzjn7BiLmT78</recordid><startdate>20090101</startdate><enddate>20090101</enddate><creator>Bossler, Adam M</creator><creator>Holt, Thomas J</creator><general>International Journal of Cyber Criminology</general><scope>0-V</scope><scope>3V.</scope><scope>7XB</scope><scope>8AM</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGRYB</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>K7.</scope><scope>M0O</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20090101</creationdate><title>On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory</title><author>Bossler, Adam M ; Holt, Thomas J</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p111t-f6272e06df57230598842333264ddd9725a533b54e83e0b2d0623c4f5f20bdb93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Computer viruses</topic><topic>Cybersecurity</topic><topic>Identity theft</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bossler, Adam M</creatorcontrib><creatorcontrib>Holt, Thomas J</creatorcontrib><collection>ProQuest Social Sciences Premium Collection</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Criminal Justice Database (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Social Science Premium Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Criminology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Criminal Justice Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of cyber criminology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bossler, Adam M</au><au>Holt, Thomas J</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory</atitle><jtitle>International journal of cyber criminology</jtitle><date>2009-01-01</date><risdate>2009</risdate><volume>3</volume><issue>1</issue><spage>400</spage><pages>400-</pages><eissn>0974-2891</eissn><abstract>Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for criminals and is partially responsible for the global increase in cybercrime. Criminology, however, has been slow to explore the theoretical causes and correlates of malware victimization. This study uses a routine activities framework to explore data loss caused by malware infection in a college sample. Similar to research on traditional forms of victimization, computer deviance was related with computer victimization. Physical guardianship, however, had little effect. Policy implications to decrease malware victimization in a college sample focus on decreasing computer deviance rather than physical target hardening. [PUBLICATION ABSTRACT]</abstract><cop>Thirunelveli</cop><pub>International Journal of Cyber Criminology</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 0974-2891 |
ispartof | International journal of cyber criminology, 2009-01, Vol.3 (1), p.400 |
issn | 0974-2891 |
language | eng |
recordid | cdi_proquest_journals_89069444 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Computer viruses Cybersecurity Identity theft Software |
title | On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T23%3A19%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On-line%20Activities,%20Guardianship,%20and%20Malware%20Infection:%20An%20Examination%20of%20Routine%20Activities%20Theory&rft.jtitle=International%20journal%20of%20cyber%20criminology&rft.au=Bossler,%20Adam%20M&rft.date=2009-01-01&rft.volume=3&rft.issue=1&rft.spage=400&rft.pages=400-&rft.eissn=0974-2891&rft_id=info:doi/&rft_dat=%3Cproquest%3E1988429601%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=89069444&rft_id=info:pmid/&rfr_iscdi=true |