메뉴 건너뛰기




Volumn 32, Issue 1, 2009, Pages 1-34

Cracking the code: An empirical exploration of social learning theory and computer crime

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77954759593     PISSN: 0735648X     EISSN: 21589119     Source Type: Journal    
DOI: 10.1080/0735648X.2009.9721260     Document Type: Article
Times cited : (43)

References (73)
  • 1
    • 84984361600 scopus 로고
    • The Interactive Effect of Peer Variables on Delinquency
    • Agnew, R., 1991. “The Interactive Effect of Peer Variables on Delinquency.”. Criminology, 29: 47–72.
    • (1991) Criminology , vol.29 , pp. 47-72
    • Agnew, R.1
  • 5
    • 0029896618 scopus 로고    scopus 로고
    • A Longitudinal Test of Social Learning Theory: Adolescent Smoking
    • Akers, R. L., and Lee, G., 1996. “A Longitudinal Test of Social Learning Theory: Adolescent Smoking.”. Journal of Drug Issues, 26: 317–343.
    • (1996) Journal of Drug Issues , vol.26 , pp. 317-343
    • Akers, R.L.1    Lee, G.2
  • 7
    • 13444287611 scopus 로고
    • Computer Crime
    • Forester T., (ed), Cambridge, MA: MIT Press,. Edited by
    • Ball, L. D., 1985. “Computer Crime.”. In The Information Technology Revolution., Edited by: Forester, T., Cambridge, MA: MIT Press.
    • (1985) The Information Technology Revolution.
    • Ball, L.D.1
  • 9
    • 0030539836 scopus 로고    scopus 로고
    • Adolescents and Deviance in a Vietnamese American Community
    • Bankston, C. L., and Caldas, S. J., 1996. “Adolescents and Deviance in a Vietnamese American Community.”. Deviant Behavior, 17: 159–182.
    • (1996) Deviant Behavior , vol.17 , pp. 159-182
    • Bankston, C.L.1    Caldas, S.J.2
  • 10
    • 0038437408 scopus 로고    scopus 로고
    • The Contribution of Gang Membership to Delinquency Beyond Delinquent Friends
    • Battin, S. R., Hill, K. G., Abbott, R. D., Catalano, R. F., and Hawkins, D., 1998. “The Contribution of Gang Membership to Delinquency Beyond Delinquent Friends.”. Criminology, 36: 93–115.
    • (1998) Criminology , vol.36 , pp. 93-115
    • Battin, S.R.1    Hill, K.G.2    Abbott, R.D.3    Catalano, R.F.4    Hawkins, D.5
  • 12
    • 8744230918 scopus 로고    scopus 로고
    • Exploring the Relationship Between Social and Non-Social Reinforcement in the Context of Social Learning Theory
    • Akers R.L., Jensen G.F., (eds), New Bruswick, NJ: Transaction Publishers, and,. Edited by
    • Brezina, T., and Piquero, A. R., 2003. “Exploring the Relationship Between Social and Non-Social Reinforcement in the Context of Social Learning Theory.”. In Social Learning Theory and the Explanation of Crime: A Guide for a New Century. Advances in Criminological Theory, Edited by: Akers, R. L., and Jensen, G. F., vol. 11, New Bruswick, NJ: Transaction Publishers.
    • (2003) Social Learning Theory and the Explanation of Crime: A Guide for a New Century. Advances in Criminological Theory , vol.11
    • Brezina, T.1    Piquero, A.R.2
  • 13
    • 0041075825 scopus 로고    scopus 로고
    • A Test of General Strain Theory
    • Broidy, L., 2001. “A Test of General Strain Theory.”. Criminology, 39: 9–33.
    • (2001) Criminology , vol.39 , pp. 9-33
    • Broidy, L.1
  • 14
    • 33845959641 scopus 로고
    • A Differential Association-Reinforcement Theory of Criminal Behavior
    • Burgess, R. L., and Akers, R. L., 1966. “A Differential Association-Reinforcement Theory of Criminal Behavior.”. Social Problems, 14: 128–147.
    • (1966) Social Problems , vol.14 , pp. 128-147
    • Burgess, R.L.1    Akers, R.L.2
  • 15
    • 84868936750 scopus 로고    scopus 로고
    • Retrieved April 16, 2006, from Business Software Alliance Web Site
    • Business Software Alliance. 2005. 2005 Piracy Study. Retrieved April 16, 2006, from Business Software Alliance Web Site: http://www.bsa.org/globalstudy/upload/2005-Global-Study-English.pdf
    • (2005) 2005 Piracy Study.
  • 16
    • 21344433201 scopus 로고    scopus 로고
    • The Changing Definition and Image of Hackers in Popular Discourse
    • Chandler, A., 1996. “The Changing Definition and Image of Hackers in Popular Discourse.”. International Journal of the Sociology of Law, 24: 229–251.
    • (1996) International Journal of the Sociology of Law , vol.24 , pp. 229-251
    • Chandler, A.1
  • 18
    • 84982607491 scopus 로고
    • Social Control and Social Learning Models of Delinquency: A Synthesis
    • Conger, R., 1976. “Social Control and Social Learning Models of Delinquency: A Synthesis.”. Criminology, 14: 17–40.
    • (1976) Criminology , vol.14 , pp. 17-40
    • Conger, R.1
  • 19
    • 0033339151 scopus 로고    scopus 로고
    • Computer Crime and Abuse: A Survey of Public Attitudes and Awareness
    • Dowland, P., Furnell, S., Illingworth, H., and Reynolds, P. L., 1999. “Computer Crime and Abuse: A Survey of Public Attitudes and Awareness.”. Computers and Security, 18: 715–26.
    • (1999) Computers and Security , vol.18 , pp. 715-726
    • Dowland, P.1    Furnell, S.2    Illingworth, H.3    Reynolds, P.L.4
  • 20
    • 21344451327 scopus 로고    scopus 로고
    • Computer Crime in the Global Village: Strategies for Control and Regulation—in Defense of the Hacker
    • Duff, L., and Gardiner, S., 1996. “Computer Crime in the Global Village: Strategies for Control and Regulation—in Defense of the Hacker.”. International Journal of the Sociology of Law, 24: 211–228.
    • (1996) International Journal of the Sociology of Law , vol.24 , pp. 211-228
    • Duff, L.1    Gardiner, S.2
  • 22
    • 0002548604 scopus 로고    scopus 로고
    • Delinquent Friends and Delinquent Behavior: Temporal and Developmental Patterns
    • Hawkins D., (ed), New York: Cambridge University Press, and,. Edited by
    • Elliott, D. S., and Menard, S., 1996. “Delinquent Friends and Delinquent Behavior: Temporal and Developmental Patterns.”. In Delinquency and Crime: Current Theories., Edited by: Hawkins, D., New York: Cambridge University Press.
    • (1996) Delinquency and Crime: Current Theories.
    • Elliott, D.S.1    Menard, S.2
  • 23
    • 11344279136 scopus 로고    scopus 로고
    • Elites, Lamers, Narcs and Whores: Exploring the Computer Underground
    • Cherny L., Elizabeth R., Weise R., (eds), Seattle, WA: Seal Press,. Edited by
    • Gilbora, N., 1996. “Elites, Lamers, Narcs and Whores: Exploring the Computer Underground.”. In Wired Women: Gender and New Realities in Cyberspace., Edited by: Cherny, L., Elizabeth, R., and Weise, R., Seattle, WA: Seal Press.
    • (1996) Wired Women: Gender and New Realities in Cyberspace.
    • Gilbora, N.1
  • 26
    • 21944448888 scopus 로고    scopus 로고
    • Discourses of Danger and the Computer Hacker
    • Halbert, D., 1997. “Discourses of Danger and the Computer Hacker.”. The Information Society, 13: 361–374.
    • (1997) The Information Society , vol.13 , pp. 361-374
    • Halbert, D.1
  • 28
    • 0011664858 scopus 로고
    • Why People Copy Software and Create Computer Viruses: Individual Characteristics Of Situational Factors?
    • Harrington, S. J., 1989. “Why People Copy Software and Create Computer Viruses: Individual Characteristics Of Situational Factors?”. Information Resources Management Journal, 2: 28–37.
    • (1989) Information Resources Management Journal , vol.2 , pp. 28-37
    • Harrington, S.J.1
  • 29
    • 11144230997 scopus 로고    scopus 로고
    • Can Low Self-Control Help with the Understanding of Software Piracy Problem?
    • Higgins, G. E., 2005a. “Can Low Self-Control Help with the Understanding of Software Piracy Problem?”. Deviant Behavior, 26: 1–24.
    • (2005) Deviant Behavior , vol.26 , pp. 1-24
    • Higgins, G.E.1
  • 30
    • 84856727916 scopus 로고    scopus 로고
    • Statistical Significance Testing: The Bootstrap Method and an Application to Self-Control Theory
    • Higgins, G. E., 2005b. “Statistical Significance Testing: The Bootstrap Method and an Application to Self-Control Theory.”. Southwest Journal of Criminal Justice, 2: 54–76.
    • (2005) Southwest Journal of Criminal Justice , vol.2 , pp. 54-76
    • Higgins, G.E.1
  • 31
    • 85044912937 scopus 로고    scopus 로고
    • Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling
    • Higgins, G. E., Fell, B. D., and Wilson, A., 2006. “Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling.”. Criminal Justice Studies, 19: 3–22.
    • (2006) Criminal Justice Studies , vol.19 , pp. 3-22
    • Higgins, G.E.1    Fell, B.D.2    Wilson, A.3
  • 32
    • 29444457666 scopus 로고    scopus 로고
    • Does Social Learning Theory Condition the Effects of Low Self-Control on College Students’ Software Piracy?
    • Higgins, G. E., and Makin, D. A., 2004a. “Does Social Learning Theory Condition the Effects of Low Self-Control on College Students’ Software Piracy?”. Journal of Economic Crime Management, 2: 1–22.
    • (2004) Journal of Economic Crime Management , vol.2 , pp. 1-22
    • Higgins, G.E.1    Makin, D.A.2
  • 33
    • 12344305644 scopus 로고    scopus 로고
    • Self-control, Deviant Peers, and Software Piracy
    • Higgins, G. E., and Makin, D. A., 2004b. “Self-control, Deviant Peers, and Software Piracy.”. Psychological Reports, 95: 921–931.
    • (2004) Psychological Reports , vol.95 , pp. 921-931
    • Higgins, G.E.1    Makin, D.A.2
  • 36
    • 36949037524 scopus 로고    scopus 로고
    • Neutralization Theory and Online Software Piracy: An Empirical Analysis
    • Hinduja, S., 2007. “Neutralization Theory and Online Software Piracy: An Empirical Analysis.”. Ethics and Information Technology, 9: 187–204.
    • (2007) Ethics and Information Technology , vol.9 , pp. 187-204
    • Hinduja, S.1
  • 37
    • 0343001536 scopus 로고
    • Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access
    • Hollinger, R. C., 1993. “Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access.”. Security Journal, 4: 2–12.
    • (1993) Security Journal , vol.4 , pp. 2-12
    • Hollinger, R.C.1
  • 38
    • 0023846187 scopus 로고
    • The Process of Criminalization: The Case of Computer Crime Laws
    • Hollinger, R. C., and Lanza-Kaduce, L., 1988. “The Process of Criminalization: The Case of Computer Crime Laws.”. Criminology, 26: 101–126.
    • (1988) Criminology , vol.26 , pp. 101-126
    • Hollinger, R.C.1    Lanza-Kaduce, L.2
  • 39
    • 33846081431 scopus 로고    scopus 로고
    • Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?
    • Hughes, L. A., and DeLone, G. J., 2007. “Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?”. Social Science Computer Review, 25: 79–98.
    • (2007) Social Science Computer Review , vol.25 , pp. 79-98
    • Hughes, L.A.1    DeLone, G.J.2
  • 40
    • 45949086382 scopus 로고    scopus 로고
    • Neutralizing Music Piracy: An Empirical Examination
    • Ingram, J., and Hinduja, S., 2008. “Neutralizing Music Piracy: An Empirical Examination.”. Deviant Behavior, 29: 334–366.
    • (2008) Deviant Behavior , vol.29 , pp. 334-366
    • Ingram, J.1    Hinduja, S.2
  • 41
    • 85063701458 scopus 로고    scopus 로고
    • Retrieved November 12, 2007 from
    • International Federation of Phonographic Industries. 2005. Commercial Piracy Report Key Figures Summary. Retrieved November 12, 2007 from http://www.ifpi.org/site-content/press/20050623a.html
    • (2005) Commercial Piracy Report Key Figures Summary.
  • 43
    • 0042855099 scopus 로고    scopus 로고
    • A Sociology of Hackers
    • Jordan, T., and Taylor, P., 1998. “A Sociology of Hackers.”. Sociological Review, 46: 757–780.
    • (1998) Sociological Review , vol.46 , pp. 757-780
    • Jordan, T.1    Taylor, P.2
  • 47
    • 0041181067 scopus 로고    scopus 로고
    • The Dynamics of Delinquent Peers and Delinquent Behavior
    • Matsueda, R. L., and Anderson, K., 1998. “The Dynamics of Delinquent Peers and Delinquent Behavior.”. Criminology, 36: 269–308.
    • (1998) Criminology , vol.36 , pp. 269-308
    • Matsueda, R.L.1    Anderson, K.2
  • 48
    • 4043097445 scopus 로고
    • The Baudy World of the Byte Bandit: A Postmodernist Interpretation of the Computer Underground
    • Schmalleger F., (ed), Bristol, IN: Wyndham Hall, and,. Edited by
    • Meyer, G., and Thomas, J., 1990. “The Baudy World of the Byte Bandit: A Postmodernist Interpretation of the Computer Underground.”. In Computers in Criminal Justice., Edited by: Schmalleger, F., Bristol, IN: Wyndham Hall.
    • (1990) Computers in Criminal Justice.
    • Meyer, G.1    Thomas, J.2
  • 49
    • 85063697349 scopus 로고    scopus 로고
    • Retrieved January 13, 2008 from
    • Motion Picture Association of America. 2005. 2005 U.S. Piracy Fact Sheet. Retrieved January 13, 2008 from http://www.mpaa.org/USPiracyFactSheet.pdf
    • (2005) 2005 U.S. Piracy Fact Sheet.
  • 53
    • 13444299304 scopus 로고
    • Hackers: Taking a Byte Out of Computer Crime
    • Roush, W., 1995. Hackers: Taking a Byte Out of Computer Crime. Technology Review, 98: 32–40.
    • (1995) Technology Review , vol.98 , pp. 32-40
    • Roush, W.1
  • 58
    • 0030668250 scopus 로고    scopus 로고
    • A Social Learning Theory Analysis of Computer Crime Among College Students
    • Skinner, W. F., and Fream, A. M., 1997. “A Social Learning Theory Analysis of Computer Crime Among College Students.”. Journal of Research in Crime and Delinquency, 34: 495–518.
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 65
    • 84984308480 scopus 로고
    • Delinquent Peers, Beliefs, and Delinquent Behavior: A Longitudinal Test of Interactional Theory
    • Thornberry, T. P., Lizotte, A. J., Krohn, M. D., Farnworth, M., and Jang, S. J., 1994. “Delinquent Peers, Beliefs, and Delinquent Behavior: A Longitudinal Test of Interactional Theory.”. Criminology, 32: 47–84.
    • (1994) Criminology , vol.32 , pp. 47-84
    • Thornberry, T.P.1    Lizotte, A.J.2    Krohn, M.D.3    Farnworth, M.4    Jang, S.J.5
  • 66
    • 13444293285 scopus 로고    scopus 로고
    • Hackers’ Accounts: Hacking as a Social Entertainment
    • Turgeman-Goldschmidt, O., 2005. “Hackers’ Accounts: Hacking as a Social Entertainment.”. Social Science Computer Review, 23: 8–23.
    • (2005) Social Science Computer Review , vol.23 , pp. 8-23
    • Turgeman-Goldschmidt, O.1
  • 69
    • 21144484341 scopus 로고
    • Age, Peers, and Delinquency
    • Warr, M., 1993. “Age, Peers, and Delinquency.”. Criminology, 31: 17–40.
    • (1993) Criminology , vol.31 , pp. 17-40
    • Warr, M.1
  • 71
    • 84984380590 scopus 로고
    • The Influence of Delinquent Peers: What They Think or What They Do?
    • Warr, M., and Stafford, M., 1991. “The Influence of Delinquent Peers: What They Think or What They Do?”. Criminology, 29: 851–866.
    • (1991) Criminology , vol.29 , pp. 851-866
    • Warr, M.1    Stafford, M.2
  • 72
    • 84965760422 scopus 로고
    • Social Learning Theory, Self-Reported Delinquency, and Young Gangs: A New Twist on a General Theory of Crime and Delinquency
    • Winfree, L. T., Backstrom, T. V., and Mays, G. L., 1994. “Social Learning Theory, Self-Reported Delinquency, and Young Gangs: A New Twist on a General Theory of Crime and Delinquency.”. Youth and Society, 26: 147–177.
    • (1994) Youth and Society , vol.26 , pp. 147-177
    • Winfree, L.T.1    Backstrom, T.V.2    Mays, G.L.3
  • 73
    • 85045160218 scopus 로고    scopus 로고
    • Computer Hacking: Just another Case of Juvenile Delinquency?
    • Yar, M., 2005. “Computer Hacking: Just another Case of Juvenile Delinquency?”. The Howard Journal of Criminal Justice, 44: 387–399.
    • (2005) The Howard Journal of Criminal Justice , vol.44 , pp. 387-399
    • Yar, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.