메뉴 건너뛰기




Volumn 38, Issue 4, 2010, Pages 767-772

A general theory of crime and computer crime: An empirical test

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77954758024     PISSN: 00472352     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jcrimjus.2010.05.003     Document Type: Article
Times cited : (73)

References (56)
  • 4
    • 0141959203 scopus 로고    scopus 로고
    • Self-control, social consequences, and criminal behavior: Street youth and the general theory of crime
    • Baron S.W. Self-control, social consequences, and criminal behavior: Street youth and the general theory of crime. Journal of Research in Crime and Delinquency 2003, 40:403-425.
    • (2003) Journal of Research in Crime and Delinquency , vol.40 , pp. 403-425
    • Baron, S.W.1
  • 5
    • 0034455522 scopus 로고    scopus 로고
    • Who's wired and who's not: Children's access to and use of computer technology
    • Becker H.J. Who's wired and who's not: Children's access to and use of computer technology. Future of Children 2000, 10:44-75.
    • (2000) Future of Children , vol.10 , pp. 44-75
    • Becker, H.J.1
  • 6
    • 0032622604 scopus 로고    scopus 로고
    • Age, self-control, and adults' offending behaviors: A research note assessing a general theory of crime
    • Burton V., Evans D., Cullen F., Olivares K., Dunaway G. Age, self-control, and adults' offending behaviors: A research note assessing a general theory of crime. Journal of Criminal Justice 1999, 27:45-54.
    • (1999) Journal of Criminal Justice , vol.27 , pp. 45-54
    • Burton, V.1    Evans, D.2    Cullen, F.3    Olivares, K.4    Dunaway, G.5
  • 8
    • 0001865968 scopus 로고
    • Factors influencing software piracy: Implications for accountants
    • Christensen A.L., Eining M.M. Factors influencing software piracy: Implications for accountants. Journal of Information Systems 1991, 5:67-80.
    • (1991) Journal of Information Systems , vol.5 , pp. 67-80
    • Christensen, A.L.1    Eining, M.M.2
  • 9
    • 58449095876 scopus 로고    scopus 로고
    • Retrieved from, Federal Bureau of Investigation
    • Federal Bureau of Investigation 2005 FBI Computer Crime Survey 2005, Retrieved from http://www.digitalriver.com/v2.0-img/operations/naievigi/site/media/pdf/FBIccs2005.pdf.
    • (2005) 2005 FBI Computer Crime Survey
  • 10
    • 77954759406 scopus 로고    scopus 로고
    • Can the general theory of crime account for computer offenders: Testing low self-control as a predictor of computer crime offending. Unpublished master thesis, University of Maryland, College Park.
    • Foster, D. R. (2004). Can the general theory of crime account for computer offenders: Testing low self-control as a predictor of computer crime offending. Unpublished master thesis, University of Maryland, College Park.
    • (2004)
    • Foster, D.R.1
  • 11
    • 0032245475 scopus 로고    scopus 로고
    • International software piracy: Analysis of key issues and impacts
    • Gopal R.D., Sanders L.G. International software piracy: Analysis of key issues and impacts. Information Systems Research 1998, 9:380-397.
    • (1998) Information Systems Research , vol.9 , pp. 380-397
    • Gopal, R.D.1    Sanders, L.G.2
  • 14
    • 0342567170 scopus 로고
    • Teaching ethics in the community college data processing curriculum
    • Gottleber T.T. Teaching ethics in the community college data processing curriculum. Community/Junior College Quarterly 1988, 12:47-54.
    • (1988) Community/Junior College Quarterly , vol.12 , pp. 47-54
    • Gottleber, T.T.1
  • 16
    • 0040968793 scopus 로고    scopus 로고
    • Parenting, self-control, and delinquency: A test of self-control theory
    • Hay C. Parenting, self-control, and delinquency: A test of self-control theory. Criminology 2001, 39:707-736.
    • (2001) Criminology , vol.39 , pp. 707-736
    • Hay, C.1
  • 17
    • 11144230997 scopus 로고    scopus 로고
    • Can low self-control help understand the software piracy problem?
    • Higgins G.E. Can low self-control help understand the software piracy problem?. Deviant Behavior: An Interdisciplinary Journal 2005, 26:1-24.
    • (2005) Deviant Behavior: An Interdisciplinary Journal , vol.26 , pp. 1-24
    • Higgins, G.E.1
  • 18
    • 46349099392 scopus 로고    scopus 로고
    • Gender differences in software piracy: The mediating roles of self-control theory and social learning theory
    • Higgins G.E. Gender differences in software piracy: The mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management 2006, 4:1-22.
    • (2006) Journal of Economic Crime Management , vol.4 , pp. 1-22
    • Higgins, G.E.1
  • 19
    • 34548292493 scopus 로고    scopus 로고
    • Digital piracy: An examination of low self-control and motivation using short-term longitudinal data
    • Higgins G.E. Digital piracy: An examination of low self-control and motivation using short-term longitudinal data. CyberPsychology & Behavior 2007, 10:523-529.
    • (2007) CyberPsychology & Behavior , vol.10 , pp. 523-529
    • Higgins, G.E.1
  • 20
    • 85044912937 scopus 로고    scopus 로고
    • Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling
    • Higgins G.E., Fell B.D., Wilson A.L. Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies: A Critical Journal of Crime, Law, and Society 2006, 19:3-22.
    • (2006) Criminal Justice Studies: A Critical Journal of Crime, Law, and Society , vol.19 , pp. 3-22
    • Higgins, G.E.1    Fell, B.D.2    Wilson, A.L.3
  • 21
    • 29444457666 scopus 로고    scopus 로고
    • Does social learning theory condition the effects of low self-control on college students' software piracy?
    • Higgins G.E., Makin D.A. Does social learning theory condition the effects of low self-control on college students' software piracy?. Journal of Economic Crime Management 2004, 2:1-22.
    • (2004) Journal of Economic Crime Management , vol.2 , pp. 1-22
    • Higgins, G.E.1    Makin, D.A.2
  • 22
    • 12344305644 scopus 로고    scopus 로고
    • Self-control, deviant peers, and software piracy
    • Higgins G.E., Makin D.A. Self-control, deviant peers, and software piracy. Psychological Reports 2004, 95:921-931.
    • (2004) Psychological Reports , vol.95 , pp. 921-931
    • Higgins, G.E.1    Makin, D.A.2
  • 25
    • 12744275983 scopus 로고    scopus 로고
    • Trends and patterns among software pirates
    • Hinduja S. Trends and patterns among software pirates. Ethics and Information Technology 2003, 5:49-61.
    • (2003) Ethics and Information Technology , vol.5 , pp. 49-61
    • Hinduja, S.1
  • 26
    • 77954758106 scopus 로고    scopus 로고
    • An empirical test of the applicability of general criminological theories to Internet crime. Unpublished doctoral Dissertation, Michigan State University, East Lansing.
    • Hinduja, S. (2004). An empirical test of the applicability of general criminological theories to Internet crime. Unpublished doctoral Dissertation, Michigan State University, East Lansing.
    • (2004)
    • Hinduja, S.1
  • 27
    • 33750840328 scopus 로고    scopus 로고
    • A critical examination of the digital music phenomenon
    • Hinduja S. A critical examination of the digital music phenomenon. Critical Criminology 2006, 14:387-409.
    • (2006) Critical Criminology , vol.14 , pp. 387-409
    • Hinduja, S.1
  • 29
    • 84928507306 scopus 로고
    • Computer hackers follow a Guttman-like progression
    • Hollinger R.C. Computer hackers follow a Guttman-like progression. Sociology and Social Research 1988, 72:199-200.
    • (1988) Sociology and Social Research , vol.72 , pp. 199-200
    • Hollinger, R.C.1
  • 30
    • 0039803550 scopus 로고
    • Hackers; Computer heroes or electronic highwaymen?
    • Hollinger R.C. Hackers; Computer heroes or electronic highwaymen?. Computers and Society 1991, 21:6-17.
    • (1991) Computers and Society , vol.21 , pp. 6-17
    • Hollinger, R.C.1
  • 31
    • 0343001536 scopus 로고
    • Crime by computer: Correlates of software piracy and unauthorized account access
    • Hollinger R.C. Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal 1992, 2:2-12.
    • (1992) Security Journal , vol.2 , pp. 2-12
    • Hollinger, R.C.1
  • 32
    • 0023846187 scopus 로고
    • The process of criminalization: The case of computer crime laws
    • Hollinger R.C., Lanza-Kaduce L. The process of criminalization: The case of computer crime laws. Criminology 1988, 26:101-126.
    • (1988) Criminology , vol.26 , pp. 101-126
    • Hollinger, R.C.1    Lanza-Kaduce, L.2
  • 33
    • 11144222150 scopus 로고    scopus 로고
    • The impact of national culture on software piracy
    • Husted B.W. The impact of national culture on software piracy. Journal of Business Ethics 2000, 13:431-438.
    • (2000) Journal of Business Ethics , vol.13 , pp. 431-438
    • Husted, B.W.1
  • 34
    • 0039686012 scopus 로고    scopus 로고
    • Software piracy and its legal implications
    • Koen C.M., Im J.H. Software piracy and its legal implications. Security Journal 1997, 31:265-272.
    • (1997) Security Journal , vol.31 , pp. 265-272
    • Koen, C.M.1    Im, J.H.2
  • 35
    • 84863373137 scopus 로고    scopus 로고
    • Understanding South Korea and Japan's spectacular broadband development: Strategic liberalization of the telecommunications sectors
    • Berkeley Roundtable on the International Economy, Berkeley, CA
    • Kushida K., Oh S. Understanding South Korea and Japan's spectacular broadband development: Strategic liberalization of the telecommunications sectors. BRIE Working Paper 2006, 175. Berkeley Roundtable on the International Economy, Berkeley, CA.
    • (2006) BRIE Working Paper , vol.175
    • Kushida, K.1    Oh, S.2
  • 36
    • 77954758327 scopus 로고    scopus 로고
    • Path analysis on the relationship between Internet-related crime and related factors among juveniles
    • Lee K., Ha Y. Path analysis on the relationship between Internet-related crime and related factors among juveniles. Journal of Home Economics 2004, 42:127-143.
    • (2004) Journal of Home Economics , vol.42 , pp. 127-143
    • Lee, K.1    Ha, Y.2
  • 37
    • 77954760540 scopus 로고    scopus 로고
    • Internet and adolescents' attitude toward sex
    • Lee S. Internet and adolescents' attitude toward sex. Information and Society 2000, 2:154-182.
    • (2000) Information and Society , vol.2 , pp. 154-182
    • Lee, S.1
  • 38
    • 77954758398 scopus 로고    scopus 로고
    • An empirical study on causes of juvenile delinquency in cyberspace
    • Lee S. An empirical study on causes of juvenile delinquency in cyberspace. Research on Criminal Justice Policy 2005, 16:145-174.
    • (2005) Research on Criminal Justice Policy , vol.16 , pp. 145-174
    • Lee, S.1
  • 40
    • 0032376197 scopus 로고    scopus 로고
    • >>NetCrime: More change in the organization of thieving
    • Mann D., Sutton M. >>NetCrime: More change in the organization of thieving. British Journal of Criminology 1998, 38:201-229.
    • (1998) British Journal of Criminology , vol.38 , pp. 201-229
    • Mann, D.1    Sutton, M.2
  • 43
    • 66349104050 scopus 로고    scopus 로고
    • Ministry of Information and Communication, Seoul, South Korea, National Internet Development Agency of Korea
    • National Internet Development Agency of Korea Survey on the computer and Internet usage 2008, Ministry of Information and Communication, Seoul, South Korea.
    • (2008) Survey on the computer and Internet usage
  • 45
    • 33847216920 scopus 로고    scopus 로고
    • Something old, something new: A preliminary investigation of Hirschi's redefined self-control
    • Piquero A.R., Bouffard J.A. Something old, something new: A preliminary investigation of Hirschi's redefined self-control. Justice Quarterly 2007, 24:1-27.
    • (2007) Justice Quarterly , vol.24 , pp. 1-27
    • Piquero, A.R.1    Bouffard, J.A.2
  • 46
    • 0039842473 scopus 로고    scopus 로고
    • The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis
    • Pratt T.C., Cullen F.T. The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis. Criminology 2000, 38:931-964.
    • (2000) Criminology , vol.38 , pp. 931-964
    • Pratt, T.C.1    Cullen, F.T.2
  • 47
    • 0007391492 scopus 로고    scopus 로고
    • Software piracy among computing students: A Bruneian scenario
    • Rahim M., Seyal A., Rahman M. Software piracy among computing students: A Bruneian scenario. Computers and Education 1999, 32:301-321.
    • (1999) Computers and Education , vol.32 , pp. 301-321
    • Rahim, M.1    Seyal, A.2    Rahman, M.3
  • 49
    • 0030668250 scopus 로고    scopus 로고
    • A social learning theory analysis of computer crime among college students
    • Skinner W.F., Fream A.M. A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency 1997, 34:495-518.
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 52
    • 33846041841 scopus 로고    scopus 로고
    • Cybercrime and the Internet
    • Routledge, London, D.S. Wall (Ed.)
    • Wall D. Cybercrime and the Internet. Crime and theIinternet 2001, Routledge, London. D.S. Wall (Ed.).
    • (2001) Crime and theIinternet
    • Wall, D.1
  • 53
    • 84949564522 scopus 로고    scopus 로고
    • The Internet as a conduit for criminal activity
    • Sage, Thousand Oaks, CA, A. Pattavina (Ed.)
    • Wall D. The Internet as a conduit for criminal activity. Information technology and the criminal justice system 2005, Sage, Thousand Oaks, CA. A. Pattavina (Ed.).
    • (2005) Information technology and the criminal justice system
    • Wall, D.1
  • 54
    • 33745439944 scopus 로고    scopus 로고
    • Understanding the offender/context dynamic for computer crimes
    • Willison R. Understanding the offender/context dynamic for computer crimes. Information Technology and People 2006, 19:170-186.
    • (2006) Information Technology and People , vol.19 , pp. 170-186
    • Willison, R.1
  • 56
    • 34247657469 scopus 로고    scopus 로고
    • The novelty of 'cybercrime': An assessment in light of routine activity theory
    • Yar M. The novelty of 'cybercrime': An assessment in light of routine activity theory. European Criminology 2005, 2:407-427.
    • (2005) European Criminology , vol.2 , pp. 407-427
    • Yar, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.