On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory

Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for criminals and is partially responsible for the global increase in cybercrime. Criminology, however, has been slow to explore the theoretical causes and correlates of malware victimization. This study...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of cyber criminology 2009-01, Vol.3 (1), p.400
Hauptverfasser: Bossler, Adam M, Holt, Thomas J
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page 400
container_title International journal of cyber criminology
container_volume 3
creator Bossler, Adam M
Holt, Thomas J
description Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for criminals and is partially responsible for the global increase in cybercrime. Criminology, however, has been slow to explore the theoretical causes and correlates of malware victimization. This study uses a routine activities framework to explore data loss caused by malware infection in a college sample. Similar to research on traditional forms of victimization, computer deviance was related with computer victimization. Physical guardianship, however, had little effect. Policy implications to decrease malware victimization in a college sample focus on decreasing computer deviance rather than physical target hardening. [PUBLICATION ABSTRACT]
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_89069444</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1988429601</sourcerecordid><originalsourceid>FETCH-LOGICAL-p111t-f6272e06df57230598842333264ddd9725a533b54e83e0b2d0623c4f5f20bdb93</originalsourceid><addsrcrecordid>eNpVjctKAzEYRoMgtNa-Q9w3kPlzmcTdUGotVApS1yXTJDRlTMZJxsvbW9GNq48Dh_NdoSnVNSegdDVBNzmfKZVSKD1FdhdJF6LDzbGE91CCywu8Hs1gg4n5FPoFNtHiJ9N9mMHhTfTuIqZ4j5uIV5_mNUTzwzh5_JzG8j-F9yeXhq9bdO1Nl938b2fo5WG1Xz6S7W69WTZb0ldVVYiXUIOj0npRA6NCK8WBMQaSW2t1DcIIxlrBnWKOtmCpBHbkXnigrW01m6G7324_pLfR5XI4p3GIl8uD0lRqzjn7BiLmT78</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>89069444</pqid></control><display><type>article</type><title>On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Bossler, Adam M ; Holt, Thomas J</creator><creatorcontrib>Bossler, Adam M ; Holt, Thomas J</creatorcontrib><description>Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for criminals and is partially responsible for the global increase in cybercrime. Criminology, however, has been slow to explore the theoretical causes and correlates of malware victimization. This study uses a routine activities framework to explore data loss caused by malware infection in a college sample. Similar to research on traditional forms of victimization, computer deviance was related with computer victimization. Physical guardianship, however, had little effect. Policy implications to decrease malware victimization in a college sample focus on decreasing computer deviance rather than physical target hardening. [PUBLICATION ABSTRACT]</description><identifier>EISSN: 0974-2891</identifier><language>eng</language><publisher>Thirunelveli: International Journal of Cyber Criminology</publisher><subject>Computer viruses ; Cybersecurity ; Identity theft ; Software</subject><ispartof>International journal of cyber criminology, 2009-01, Vol.3 (1), p.400</ispartof><rights>Copyright International Journal of Cyber Criminology Jan-Jun 2009</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Bossler, Adam M</creatorcontrib><creatorcontrib>Holt, Thomas J</creatorcontrib><title>On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory</title><title>International journal of cyber criminology</title><description>Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for criminals and is partially responsible for the global increase in cybercrime. Criminology, however, has been slow to explore the theoretical causes and correlates of malware victimization. This study uses a routine activities framework to explore data loss caused by malware infection in a college sample. Similar to research on traditional forms of victimization, computer deviance was related with computer victimization. Physical guardianship, however, had little effect. Policy implications to decrease malware victimization in a college sample focus on decreasing computer deviance rather than physical target hardening. [PUBLICATION ABSTRACT]</description><subject>Computer viruses</subject><subject>Cybersecurity</subject><subject>Identity theft</subject><subject>Software</subject><issn>0974-2891</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpVjctKAzEYRoMgtNa-Q9w3kPlzmcTdUGotVApS1yXTJDRlTMZJxsvbW9GNq48Dh_NdoSnVNSegdDVBNzmfKZVSKD1FdhdJF6LDzbGE91CCywu8Hs1gg4n5FPoFNtHiJ9N9mMHhTfTuIqZ4j5uIV5_mNUTzwzh5_JzG8j-F9yeXhq9bdO1Nl938b2fo5WG1Xz6S7W69WTZb0ldVVYiXUIOj0npRA6NCK8WBMQaSW2t1DcIIxlrBnWKOtmCpBHbkXnigrW01m6G7324_pLfR5XI4p3GIl8uD0lRqzjn7BiLmT78</recordid><startdate>20090101</startdate><enddate>20090101</enddate><creator>Bossler, Adam M</creator><creator>Holt, Thomas J</creator><general>International Journal of Cyber Criminology</general><scope>0-V</scope><scope>3V.</scope><scope>7XB</scope><scope>8AM</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGRYB</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>K7.</scope><scope>M0O</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20090101</creationdate><title>On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory</title><author>Bossler, Adam M ; Holt, Thomas J</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p111t-f6272e06df57230598842333264ddd9725a533b54e83e0b2d0623c4f5f20bdb93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Computer viruses</topic><topic>Cybersecurity</topic><topic>Identity theft</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bossler, Adam M</creatorcontrib><creatorcontrib>Holt, Thomas J</creatorcontrib><collection>ProQuest Social Sciences Premium Collection</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Criminal Justice Database (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Social Science Premium Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Criminology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Criminal Justice Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of cyber criminology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bossler, Adam M</au><au>Holt, Thomas J</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory</atitle><jtitle>International journal of cyber criminology</jtitle><date>2009-01-01</date><risdate>2009</risdate><volume>3</volume><issue>1</issue><spage>400</spage><pages>400-</pages><eissn>0974-2891</eissn><abstract>Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for criminals and is partially responsible for the global increase in cybercrime. Criminology, however, has been slow to explore the theoretical causes and correlates of malware victimization. This study uses a routine activities framework to explore data loss caused by malware infection in a college sample. Similar to research on traditional forms of victimization, computer deviance was related with computer victimization. Physical guardianship, however, had little effect. Policy implications to decrease malware victimization in a college sample focus on decreasing computer deviance rather than physical target hardening. [PUBLICATION ABSTRACT]</abstract><cop>Thirunelveli</cop><pub>International Journal of Cyber Criminology</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 0974-2891
ispartof International journal of cyber criminology, 2009-01, Vol.3 (1), p.400
issn 0974-2891
language eng
recordid cdi_proquest_journals_89069444
source EZB-FREE-00999 freely available EZB journals
subjects Computer viruses
Cybersecurity
Identity theft
Software
title On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T23%3A19%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On-line%20Activities,%20Guardianship,%20and%20Malware%20Infection:%20An%20Examination%20of%20Routine%20Activities%20Theory&rft.jtitle=International%20journal%20of%20cyber%20criminology&rft.au=Bossler,%20Adam%20M&rft.date=2009-01-01&rft.volume=3&rft.issue=1&rft.spage=400&rft.pages=400-&rft.eissn=0974-2891&rft_id=info:doi/&rft_dat=%3Cproquest%3E1988429601%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=89069444&rft_id=info:pmid/&rfr_iscdi=true