메뉴 건너뛰기




Volumn 34, Issue 4, 1997, Pages 495-518

A social learning theory analysis of computer crime among college students

Author keywords

[No Author keywords available]

Indexed keywords

ADULT; ARTICLE; COLLEGE STUDENT; COMPUTER; CRIME; CRIMINOLOGY; FEMALE; HUMAN; MAJOR CLINICAL STUDY; MALE; SOCIAL LEARNING; THEORY;

EID: 0030668250     PISSN: 00224278     EISSN: None     Source Type: Journal    
DOI: 10.1177/0022427897034004005     Document Type: Article
Times cited : (235)

References (35)
  • 6
    • 0018503050 scopus 로고
    • Social Learning and Deviant Behavior: A Specific Test of a General Theory
    • Akers, Ronald L., Marvin D. Krohn, Lonn Lanza-Kaduce, and Marcia Radosevich. 1979. "Social Learning and Deviant Behavior: A Specific Test of a General Theory." American Sociological Review 44 (4): 636-55.
    • (1979) American Sociological Review , vol.44 , Issue.4 , pp. 636-655
    • Akers, R.L.1    Krohn, M.D.2    Lanza-Kaduce, L.3    Radosevich, M.4
  • 7
    • 0005927747 scopus 로고
    • Alcohol Use among the Elderly: Social Learning, Community Context, and Life Events
    • edited by David Pittman and Helene Reskin White. New Brunswick, NJ: Rutgers Center of Alcohol Studies
    • Akers, Ronald L. and Anthony LaGreca. 1991. "Alcohol Use among the Elderly: Social Learning, Community Context, and Life Events." Pp. 242-62 in Society, Culture, and Drinking Patterns Re-Examined, edited by David Pittman and Helene Reskin White. New Brunswick, NJ: Rutgers Center of Alcohol Studies.
    • (1991) Society, Culture, and Drinking Patterns Re-Examined , pp. 242-262
    • Akers, R.L.1    LaGreca, A.2
  • 8
    • 1542731599 scopus 로고
    • Chicago: Task Force on Computer Crime, Section on Criminal Justice
    • American Bar Association. 1984. Report on Computer Crime: June 1984. Chicago: Task Force on Computer Crime, Section on Criminal Justice.
    • (1984) Report on Computer Crime: June 1984
  • 10
    • 84995164777 scopus 로고
    • Conventional Ties, Peer Influence, and Fear of Apprehension: A Study of Adolescent Marijuana Use
    • Burkett, Stephen and Eric Jensen. 1975. "Conventional Ties, Peer Influence, and Fear of Apprehension: A Study of Adolescent Marijuana Use." Sociological Quarterly 16:522-33.
    • (1975) Sociological Quarterly , vol.16 , pp. 522-533
    • Burkett, S.1    Jensen, E.2
  • 12
    • 0342567170 scopus 로고
    • Teaching Ethics in the Community College Data Processing Curriculum
    • Gottleber, T. T. 1988. "Teaching Ethics in the Community College Data Processing Curriculum." Community/Junior College Quarterly 12:47-54.
    • (1988) Community/Junior College Quarterly , vol.12 , pp. 47-54
    • Gottleber, T.T.1
  • 13
    • 0004047063 scopus 로고
    • Hacker is said to agree to a plea bargain. July 2
    • Hacker is said to agree to a plea bargain. 1995. New York Times, July 2, pp. V144, 22.
    • (1995) New York Times
  • 14
  • 15
    • 0343001538 scopus 로고
    • Computer Users Pack a Keypunch in a High-Tech World of Crime
    • April 15
    • Hanson, Gayle. 1991. "Computer Users Pack a Keypunch in a High-Tech World of Crime." Insight, April 15, pp. 8-17.
    • (1991) Insight , pp. 8-17
    • Hanson, G.1
  • 16
    • 84928507306 scopus 로고
    • Computer Hackers Follow a Guttman-Like Progression
    • Hollinger, Richard C. 1988. "Computer Hackers Follow a Guttman-Like Progression." Sociology and Social Research 72 (3): 199-200.
    • (1988) Sociology and Social Research , vol.72 , Issue.3 , pp. 199-200
    • Hollinger, R.C.1
  • 17
    • 0039803550 scopus 로고
    • Hackers: Computer Heros or Electronic Highwaymen?
    • _. 1991. "Hackers: Computer Heros or Electronic Highwaymen?" Computers & Society 21 (1): 6-17.
    • (1991) Computers & Society , vol.21 , Issue.1 , pp. 6-17
  • 18
    • 0343001536 scopus 로고
    • Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access
    • _. 1992. "Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access." Security Journal 2 (1): 2-12.
    • (1992) Security Journal , vol.2 , Issue.1 , pp. 2-12
  • 19
    • 0023846187 scopus 로고
    • The Process of Criminalization: The Case of Computer Crime Laws
    • Hollinger, Richard C. and Lonn Lanza-Kaduce. 1988. "The Process of Criminalization: The Case of Computer Crime Laws." Criminology 26:101-26.
    • (1988) Criminology , vol.26 , pp. 101-126
    • Hollinger, R.C.1    Lanza-Kaduce, L.2
  • 20
    • 0017214429 scopus 로고
    • Adolescent Involvement in Legal and Illegal Drug Use: A Multiple Classification Analysis
    • Kandel, Denise, Donald Treiman, Richard Faust, and Eric Single. 1976. "Adolescent Involvement in Legal and Illegal Drug Use: A Multiple Classification Analysis." Social Forces 55:438-58.
    • (1976) Social Forces , vol.55 , pp. 438-458
    • Kandel, D.1    Treiman, D.2    Faust, R.3    Single, E.4
  • 21
    • 0343872896 scopus 로고    scopus 로고
    • Kentucky Council on Higher Education. 1992. University of Kentucky fall 1992 enrollment figures
    • Kentucky Council on Higher Education. 1992. University of Kentucky fall 1992 enrollment figures.
  • 22
    • 0343437160 scopus 로고
    • Sections 434.845, 434.850 and 434.855
    • Kentucky Revised Statutes. 1984. Sections 434.845, 434.850 and 434.855.
    • (1984) Kentucky Revised Statutes
  • 23
    • 84958896603 scopus 로고
    • Social Learning Theory and Adolescent Cigarette Smoking: A Longitudinal Study
    • Krohn, Marvin L., William F. Skinner, James L. Massey, and Ronald Akers. 1985. "Social Learning Theory and Adolescent Cigarette Smoking: A Longitudinal Study." Social Problems 32 (5): 455-73.
    • (1985) Social Problems , vol.32 , Issue.5 , pp. 455-473
    • Krohn, M.L.1    Skinner, W.F.2    Massey, J.L.3    Akers, R.4
  • 24
    • 0343001534 scopus 로고
    • Why the Legion of Doom Has Little Fear of the Feds
    • August 6
    • Lewyn, Mark and Evan Schwartz. 1991. "Why the Legion of Doom Has Little Fear of the Feds." Business Week, August 6, p. 31.
    • (1991) Business Week , pp. 31
    • Lewyn, M.1    Schwartz, E.2
  • 25
    • 0342567168 scopus 로고
    • Contract no. OJP-85-C-006. Washington, DC: National Institute of Justice
    • McEwen, J. Thomas, Dennis Fester, and Hugh Nugent. 1989. Dedicated Computer Crime Units. Contract no. OJP-85-C-006. Washington, DC: National Institute of Justice.
    • (1989) Dedicated Computer Crime Units
    • McEwen, J.T.1    Fester, D.2    Nugent, H.3
  • 28
    • 0343001533 scopus 로고
    • Information Crime and Security
    • _. 1987. "Information Crime and Security." Computer Fraud & Security Bulletin 9 (5): 1-4.
    • (1987) Computer Fraud & Security Bulletin , vol.9 , Issue.5 , pp. 1-4
  • 29
    • 84928455890 scopus 로고
    • Computer Abuse: Problems of Instrumental Control
    • Pfuhl, Edwin H., Jr. 1987. "Computer Abuse: Problems of Instrumental Control." Deviant Behavior 8 (2): 113-30.
    • (1987) Deviant Behavior , vol.8 , Issue.2 , pp. 113-130
    • Pfuhl E.H., Jr.1
  • 30
    • 0343001532 scopus 로고
    • Viruses? Who You Gonna Call 'Hackbusters.'
    • August 6
    • Schwartz, Evan I., Jeffrey Rothfeder, and Mark Lewyn. 1990. "Viruses? Who You Gonna Call 'Hackbusters.'" Business Week, August 6, pp. 71-72.
    • (1990) Business Week , pp. 71-72
    • Schwartz, E.I.1    Rothfeder, J.2    Lewyn, M.3
  • 32
    • 0342567165 scopus 로고
    • Legal Analysis of Electronic Bulletin Board Activities
    • Soma, John T., P. Smith, and R. Sprague. 1985. "Legal Analysis of Electronic Bulletin Board Activities." Western New England Law Review 7:571-626.
    • (1985) Western New England Law Review , vol.7 , pp. 571-626
    • Soma, J.T.1    Smith, P.2    Sprague, R.3
  • 35
    • 0342567164 scopus 로고
    • Computer Fraud in the UK - The 1986 Picture
    • Wong, Ken and Bill Farquhar. 1986. "Computer Fraud in the UK - The 1986 Picture." Computer Fraud & Security Bulletin 9 (1): 3-11.
    • (1986) Computer Fraud & Security Bulletin , vol.9 , Issue.1 , pp. 3-11
    • Wong, K.1    Farquhar, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.