메뉴 건너뛰기




Volumn , Issue , 2010, Pages 38-67

The general theory of crime and computer hacking: Low self-control hackers?

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84899252279     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-61692-805-6.ch003     Document Type: Chapter
Times cited : (89)

References (88)
  • 1
    • 34247826989 scopus 로고
    • Self-control theory as a general theory of crime
    • doi:10.1007/BF01268629
    • Akers, R. L. (1991). Self-control theory as a general theory of crime. Journal of Quantitative Criminology, 7, 201-211. doi:10.1007/BF01268629
    • (1991) Journal of Quantitative Criminology , vol.7 , pp. 201-211
    • Akers, R.L.1
  • 3
    • 69649088123 scopus 로고    scopus 로고
    • The empirical status of social learning theory of crime and deviance: The past, present, and future
    • In Cullen, F. T., Wright, J. P., & Blevins, K. R. (Eds.), New Brunswick, NJ: Transaction Publishers
    • Akers, R. L., & Jensen, G. F. (2006). The empirical status of social learning theory of crime and deviance: The past, present, and future. In Cullen, F. T., Wright, J. P., & Blevins, K. R. (Eds.), Taking stock: The status of criminological theory. New Brunswick, NJ: Transaction Publishers.
    • (2006) Taking Stock: The Status of Criminological Theory
    • Akers, R.L.1    Jensen, G.F.2
  • 4
    • 0029896618 scopus 로고    scopus 로고
    • A longitudinal test of social learning theory: Adolescent smoking
    • Akers, R. L., & Lee, G. (1996). A longitudinal test of social learning theory: Adolescent smoking. Journal of Drug Issues, 26, 317-343.
    • (1996) Journal of Drug Issues , vol.26 , pp. 317-343
    • Akers, R.L.1    Lee, G.2
  • 6
    • 0026673759 scopus 로고
    • Are whitecollar and common offenders the same? An empirical and theoretical critique of a recently proposed general theory of crime
    • doi:10.1177/0022427892029003001
    • Benson, M. L., & Moore, E. (1992). Are whitecollar and common offenders the same? An empirical and theoretical critique of a recently proposed general theory of crime. Journal of Research in Crime and Delinquency, 29, 251-272. doi:10.1177/0022427892029003001
    • (1992) Journal of Research in Crime and Delinquency , vol.29 , pp. 251-272
    • Benson, M.L.1    Moore, E.2
  • 8
    • 1642445414 scopus 로고    scopus 로고
    • A conceptual model of hacker development and motivations
    • Beveren, J. V. (2001). A conceptual model of hacker development and motivations. The Journal of Business, 1, 1-9.
    • (2001) The Journal of Business , vol.1 , pp. 1-9
    • Beveren, J.V.1
  • 10
    • 0347973105 scopus 로고
    • Conventional wisdom on measurement: A structural equation perspective
    • doi:10.1037/0033-2909.110.2.305
    • Bollen, K.A., & Lennox, R. (1991). Conventional wisdom on measurement: a structural equation perspective. Psychological Bulletin, 110, 305-314. doi:10.1037/0033-2909.110.2.305
    • (1991) Psychological Bulletin , vol.110 , pp. 305-314
    • Bollen, K.A.1    Lennox, R.2
  • 11
    • 0034149798 scopus 로고    scopus 로고
    • A tetrad test for causal indicators
    • doi:10.1037/1082-989X.5.1.3
    • Bollen, K. A., & Ting, T. (2000). A tetrad test for causal indicators. Psychological Methods, 15, 3-22. doi:10.1037/1082-989X.5.1.3
    • (2000) Psychological Methods , vol.15 , pp. 3-22
    • Bollen, K.A.1    Ting, T.2
  • 12
    • 80052980820 scopus 로고    scopus 로고
    • On-line activities, guardianship, and malware infection: An examination of routine activities theory
    • Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3, 400-420.
    • (2009) International Journal of Cyber Criminology , vol.3 , pp. 400-420
    • Bossler, A.M.1    Holt, T.J.2
  • 13
    • 33748656935 scopus 로고    scopus 로고
    • Explaining use of online pornography: A test of self-control theory and opportunities for deviance
    • Buzzell, T., Foss, D., & Middleton, Z. (2006). Explaining use of online pornography: A test of self-control theory and opportunities for deviance. Journal of Criminal Justice and Popular Culture, 13, 96-116.
    • (2006) Journal of Criminal Justice and Popular Culture , vol.13 , pp. 96-116
    • Buzzell, T.1    Foss, D.2    Middleton, Z.3
  • 15
    • 0000204509 scopus 로고
    • Social change and crime rate trends: A routine activityapproach
    • doi:10.2307/2094589
    • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activityapproach. American Sociological Review, 44, 588-608. doi:10.2307/2094589
    • (1979) American Sociological Review , vol.44 , pp. 588-608
    • Cohen, L.E.1    Felson, M.2
  • 16
    • 60949853654 scopus 로고    scopus 로고
    • Hacker practice: Moral genres and the cultural articulation of liberalism
    • doi:10.1177/1463499608093814
    • Coleman, E. G., & Golub, A. (2008). Hacker practice: Moral genres and the cultural articulation of liberalism. Anthropological Theory, 8, 255-277. doi:10.1177/1463499608093814
    • (2008) Anthropological Theory , vol.8 , pp. 255-277
    • Coleman, E.G.1    Golub, A.2
  • 17
    • 0002529520 scopus 로고
    • A revised definition for suppressor variables: A guide to their identification and interpretation
    • doi:10.1177/001316447403400105
    • Conger, A. J. (1974). A revised definition for suppressor variables: A guide to their identification and interpretation. Educational and Psychological Measurement, 34, 35-46. doi:10.1177/001316447403400105
    • (1974) Educational and Psychological Measurement , vol.34 , pp. 35-46
    • Conger, A.J.1
  • 18
    • 33745903904 scopus 로고    scopus 로고
    • Piracy, computer crime, and IS misuse at the university
    • doi:10.1145/1132469.1132472
    • Cronan, T. P., Foltz, C. B., & Jones, T. W. (2006). Piracy, computer crime, and IS misuse at the university. Communications of the ACM, 49, 85-90. doi:10.1145/1132469.1132472
    • (2006) Communications of the ACM , vol.49 , pp. 85-90
    • Cronan, T.P.1    Foltz, C.B.2    Jones, T.W.3
  • 21
    • 33748994575 scopus 로고    scopus 로고
    • Nonnormal and categorical data
    • In Hancock, G. R., & Mueller, R. O. (Eds.), Greenwhich, CT: Information Age Publishing
    • Finney, S. J., & DiStefano, C. (2006). Nonnormal and categorical data. In Hancock, G. R., & Mueller, R. O. (Eds.), Structural equation modeling: A second course. Greenwhich, CT: Information Age Publishing.
    • (2006) Structural Equation Modeling: A Second Course
    • Finney, S.J.1    Distefano, C.2
  • 22
    • 0037273472 scopus 로고    scopus 로고
    • Higher order factor structure of a self-control test: Evidence from confirmatory factor analysis with polychoric correlations
    • doi:10.1177/0013164402239320
    • Flora, D. B., Finkel, E. J., & Foshee, V. A. (2003). Higher order factor structure of a self-control test: Evidence from confirmatory factor analysis with polychoric correlations. Educational and Psychological Measurement, 63, 112-127. doi:10.1177/0013164402239320
    • (2003) Educational and Psychological Measurement , vol.63 , pp. 112-127
    • Flora, D.B.1    Finkel, E.J.2    Foshee, V.A.3
  • 24
    • 0002189123 scopus 로고    scopus 로고
    • On the absence of self-control as the basis for a general theory of crime: A critique
    • doi:10.1177/1362480600004001002
    • Geis, G. (2000). On the absence of self-control as the basis for a general theory of crime: A critique. Theoretical Criminology, 4, 35-53. doi:10.1177/1362480600004001002
    • (2000) Theoretical Criminology , vol.4 , pp. 35-53
    • Geis, G.1
  • 25
    • 84946455323 scopus 로고
    • Self-control and its manifestations among university students: An empirical test of Gottfredson and Hirschi's general theory
    • doi:10.1080/07418829500092661
    • Gibbs, J. J., & Giever, D. M. (1995). Self-control and its manifestations among university students: An empirical test of Gottfredson and Hirschi's general theory. Justice Quarterly, 12, 231-255. doi:10.1080/07418829500092661
    • (1995) Justice Quarterly , vol.12 , pp. 231-255
    • Gibbs, J.J.1    Giever, D.M.2
  • 26
    • 0035510792 scopus 로고    scopus 로고
    • Low self-control and coworker delinquency: A research note
    • doi:10.1016/S0047-2352(01)00111-8
    • Gibson, C., & Wright, J. (2001). Low self-control and coworker delinquency: A research note. Journal of Criminal Justice, 29, 483-492. doi:10.1016/S0047-2352(01)00111-8
    • (2001) Journal of Criminal Justice , vol.29 , pp. 483-492
    • Gibson, C.1    Wright, J.2
  • 31
    • 0035381384 scopus 로고    scopus 로고
    • Virtual criminality: Old wine in new bottles?
    • Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10, 243-249.
    • (2001) Social & Legal Studies , vol.10 , pp. 243-249
    • Grabosky, P.N.1
  • 33
    • 11144230997 scopus 로고    scopus 로고
    • Can low self-control help with the understanding of the software piracy problem?
    • doi:10.1080/01639620490497947
    • Higgins, G. E. (2005). Can low self-control help with the understanding of the software piracy problem? Deviant Behavior, 26, 1-24. doi:10.1080/01639620490497947
    • (2005) Deviant Behavior , vol.26 , pp. 1-24
    • Higgins, G.E.1
  • 34
    • 46349099392 scopus 로고    scopus 로고
    • Gender differences in software piracy: The mediating roles of self-control theory and social learning theory
    • Higgins, G. E. (2006). Gender differences in software piracy: The mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management, 4, 1-30.
    • (2006) Journal of Economic Crime Management , vol.4 , pp. 1-30
    • Higgins, G.E.1
  • 35
    • 84869092516 scopus 로고    scopus 로고
    • Digital piracy, self-control theory, and rational choice: An examination of the role of value
    • Higgins, G. E. (2007). Digital piracy, self-control theory, and rational choice: An examination of the role of value. International Journal of Cyber Criminology, 1, 33-55.
    • (2007) International Journal of Cyber Criminology , vol.1 , pp. 33-55
    • Higgins, G.E.1
  • 36
    • 85044912937 scopus 로고    scopus 로고
    • Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling
    • doi:10.1080/14786010600615934
    • Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19, 3-22. doi:10.1080/14786010600615934
    • (2006) Criminal Justice Studies , vol.19 , pp. 3-22
    • Higgins, G.E.1    Fell, B.D.2    Wilson, A.L.3
  • 37
    • 34548057051 scopus 로고    scopus 로고
    • Low self-control and social learning in understanding students' intentions to pirate movies in the United States
    • doi:10.1177/0894439307299934
    • Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students' intentions to pirate movies in the United States. Social Science Computer Review, 25, 339-357. doi:10.1177/0894439307299934
    • (2007) Social Science Computer Review , vol.25 , pp. 339-357
    • Higgins, G.E.1    Fell, B.D.2    Wilson, A.L.3
  • 38
    • 12344305644 scopus 로고    scopus 로고
    • Selfcontrol, deviant peers, and software piracy
    • doi:10.2466/PR0.95.7.921-931
    • Higgins, G. E., & Makin, D. A. (2004a). Selfcontrol, deviant peers, and software piracy. Psychological Reports, 95, 921-931. doi:10.2466/PR0.95.7.921-931
    • (2004) Psychological Reports , vol.95 , pp. 921-931
    • Higgins, G.E.1    Makin, D.A.2
  • 39
    • 29444457666 scopus 로고    scopus 로고
    • Does social learning theory condition the effects of low self-control on college students' software piracy?
    • Higgins, G. E., & Makin, D. A. (2004b). Does social learning theory condition the effects of low self-control on college students' software piracy? Journal of Economic Crime Management, 2, 1-22.
    • (2004) Journal of Economic Crime Management , vol.2 , pp. 1-22
    • Higgins, G.E.1    Makin, D.A.2
  • 40
    • 36949001461 scopus 로고    scopus 로고
    • Low selfcontrol, moral beliefs, and social learning theory in university students' intentions to pirate software
    • doi:10.1057/palgrave.sj.8350002
    • Higgins, G. E., & Wilson, A. L. (2006). Low selfcontrol, moral beliefs, and social learning theory in university students' intentions to pirate software. Security Journal, 19, 75-92. doi:10.1057/palgrave.sj.8350002
    • (2006) Security Journal , vol.19 , pp. 75-92
    • Higgins, G.E.1    Wilson, A.L.2
  • 41
    • 46349084062 scopus 로고    scopus 로고
    • Digital piracy: An examination of three measurements of self-control
    • doi:10.1080/01639620701598023
    • Higgins, G. E., Wolfe, S. E., & Marcum, C. (2008). Digital piracy: An examination of three measurements of self-control. Deviant Behavior, 29, 440-460. doi:10.1080/01639620701598023
    • (2008) Deviant Behavior , vol.29 , pp. 440-460
    • Higgins, G.E.1    Wolfe, S.E.2    Marcum, C.3
  • 42
    • 84996223978 scopus 로고    scopus 로고
    • Correlates of internet software piracy
    • doi:10.1177/1043986201017004006
    • Hinduja, S. (2001). Correlates of Internet software piracy. Journal of Contemporary Criminal Justice, 17(4), 369-382. doi:10.1177/1043986201017004006
    • (2001) Journal of Contemporary Criminal Justice , vol.17 , Issue.4 , pp. 369-382
    • Hinduja, S.1
  • 43
    • 0001847390 scopus 로고
    • The generality of deviance
    • In Hirschi, T., & Gottfredson, M. R. (Eds.), New Brunswick, NJ: Transaction
    • Hirschi, T., & Gottfredson, M. R. (1994). The generality of deviance. In Hirschi, T., & Gottfredson, M. R. (Eds.), Generality of deviance (pp. 1-22). New Brunswick, NJ: Transaction.
    • (1994) Generality of Deviance , pp. 1-22
    • Hirschi, T.1    Gottfredson, M.R.2
  • 44
    • 0002835735 scopus 로고    scopus 로고
    • In defense of self-control
    • doi:10.1177/1362480600004001003
    • Hirschi, T., & Gottfredson, M. R. (2000). In defense of self-control. Theoretical Criminology, 4, 55-69. doi:10.1177/1362480600004001003
    • (2000) Theoretical Criminology , vol.4 , pp. 55-69
    • Hirschi, T.1    Gottfredson, M.R.2
  • 45
    • 0343001536 scopus 로고
    • Crime by computer: Correlates of software piracy and unauthorized account access
    • Hollinger, R. C. (1992). Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal, 2, 2-12.
    • (1992) Security Journal , vol.2 , pp. 2-12
    • Hollinger, R.C.1
  • 46
    • 33847270657 scopus 로고    scopus 로고
    • Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures
    • doi:10.1080/01639620601131065
    • Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171-198. doi:10.1080/01639620601131065
    • (2007) Deviant Behavior , vol.28 , pp. 171-198
    • Holt, T.J.1
  • 47
    • 55149123066 scopus 로고    scopus 로고
    • Lone hacks or group: Examining the social organization of computer hackers
    • In Schmalleger, F. J., & Pittaro, M. (Eds.), Upper Saddle River, NJ, Prentice Hall
    • Holt, T. J. (2009). Lone hacks or group: Examining the social organization of computer hackers. In Schmalleger, F. J., & Pittaro, M. (Eds.), Crimes of the Internet. Upper Saddle River, NJ: Prentice Hall.
    • (2009) Crimes of the Internet
    • Holt, T.J.1
  • 48
    • 57649120953 scopus 로고    scopus 로고
    • Examining the applicability of lifestyle-routine activities theory for cybercrime victimization
    • doi:10.1080/01639620701876577
    • Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1-25. doi:10.1080/01639620701876577
    • (2009) Deviant Behavior , vol.30 , pp. 1-25
    • Holt, T.J.1    Bossler, A.M.2
  • 50
    • 67650706330 scopus 로고    scopus 로고
    • Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives
    • doi:10.1080/10705519909540118
    • Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling, 6, 1-55. doi:10.1080/10705519909540118
    • (1999) Structural Equation Modeling , vol.6 , pp. 1-55
    • Hu, L.1    Bentler, P.M.2
  • 51
    • 0042855099 scopus 로고    scopus 로고
    • A sociology of hackers
    • doi:10.1111/1467-954X.00139
    • Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46, 757-780. doi:10.1111/1467-954X.00139
    • (1998) The Sociological Review , vol.46 , pp. 757-780
    • Jordan, T.1    Taylor, P.2
  • 54
    • 33746850571 scopus 로고    scopus 로고
    • An empirical test of the relationship between employee theft and self-control
    • doi:10.1080/01639620600781548
    • Langton, L., Piquero, N. L., & Hollinger, R. C. (2006). An empirical test of the relationship between employee theft and self-control. Deviant Behavior, 27, 537-565. doi:10.1080/01639620600781548
    • (2006) Deviant Behavior , vol.27 , pp. 537-565
    • Langton, L.1    Piquero, N.L.2    Hollinger, R.C.3
  • 55
    • 3042616646 scopus 로고    scopus 로고
    • Social learning and structural factors in adolescent substance use
    • Lee, G., Akers, R. L., & Borg, M. J. (2004). Social learning and structural factors in adolescent substance use. Western Criminology Review, 5, 17-34.
    • (2004) Western Criminology Review , vol.5 , pp. 17-34
    • Lee, G.1    Akers, R.L.2    Borg, M.J.3
  • 56
    • 4744366792 scopus 로고    scopus 로고
    • Self-control and social bonds: A combined control perspective on deviance
    • doi:10.1177/0011128703260684
    • Longshore, D., Chang, E., Hsieh, S. C., & Messina, N. (2004). Self-control and social bonds: A combined control perspective on deviance. Crime and Delinquency, 50, 542-564. doi:10.1177/0011128703260684
    • (2004) Crime and Delinquency , vol.50 , pp. 542-564
    • Longshore, D.1    Chang, E.2    Hsieh, S.C.3    Messina, N.4
  • 59
    • 57849145161 scopus 로고    scopus 로고
    • Mutual suppression: Comment on Paulhus et al
    • (2004), doi:10.1080/00273170802490640
    • Nickerson, C. (2008). Mutual Suppression: Comment on Paulhus et al. (2004). Multivariate Behavioral Research, 43, 556-563. doi:10.1080/00273170802490640
    • (2008) Multivariate Behavioral Research , vol.43 , pp. 556-563
    • Nickerson, C.1
  • 60
    • 4544319811 scopus 로고    scopus 로고
    • Two replicable suppressor situations in personality research
    • doi:10.1207/s15327906mbr3902_7
    • Paulhus, D. L., Robins, R. W., Trzesniewski, K. H., & Tracy, J. L. (2004). Two replicable suppressor situations in personality research. Multivariate Behavioral Research, 39, 303-328. doi:10.1207/s15327906mbr3902_7
    • (2004) Multivariate Behavioral Research , vol.39 , pp. 303-328
    • Paulhus, D.L.1    Robins, R.W.2    Trzesniewski, K.H.3    Tracy, J.L.4
  • 61
    • 47949109234 scopus 로고    scopus 로고
    • Using student samples in criminological. research
    • doi:10.1080/10511250802137226
    • Payne, B. K., & Chappell, A. T. (2008). Using student samples in criminological. research. Journal of Criminal Justice Education, 19, 177-194. doi:10.1080/10511250802137226
    • (2008) Journal of Criminal Justice Education , vol.19 , pp. 177-194
    • Payne, B.K.1    Chappell, A.T.2
  • 62
    • 0000392842 scopus 로고    scopus 로고
    • Specifying the direct and indirect effects of low self control and situational factors in offenders' decision making: Toward a more complete model of rational offending
    • doi:10.1080/07418829600093061
    • Piquero, A., & Tibbetts, S. (1996). Specifying the direct and indirect effects of low self control and situational factors in offenders' decision making: Toward a more complete model of rational offending. Justice Quarterly, 13, 481-510. doi:10.1080/07418829600093061
    • (1996) Justice Quarterly , vol.13 , pp. 481-510
    • Piquero, A.1    Tibbetts, S.2
  • 63
    • 0041029300 scopus 로고    scopus 로고
    • Does self-control affect survey response? Applying exploratory, confirmatory, and item response theory analysis to Grasmick et al.'s self-control scale
    • doi:10.1111/j.1745-9125.2000.tb00910.x
    • Piquero, A. R., MacIntosh, R., & Hickman, M. (2000). Does self-control affect survey response? Applying exploratory, confirmatory, and item response theory analysis to Grasmick et al.'s self-control scale. Criminology, 38, 897-929. doi:10.1111/j.1745-9125.2000.tb00910.x
    • (2000) Criminology , vol.38 , pp. 897-929
    • Piquero, A.R.1    Macintosh, R.2    Hickman, M.3
  • 64
    • 84937188382 scopus 로고    scopus 로고
    • The reliability and validity of grasmick et al. 's self-control scale. A comment on Longshore et al
    • doi:10.1111/j.1745-9125.1998.tb01244.x
    • Piquero, A. R., & Rosay, A. B. (1998). The reliability and validity of Grasmick et al. 's self-control scale. A comment on Longshore et al. Criminology, 36, 157-174. doi:10.1111/j.1745-9125.1998.tb01244.x
    • (1998) Criminology , vol.36 , pp. 157-174
    • Piquero, A.R.1    Rosay, A.B.2
  • 65
    • 0039842473 scopus 로고    scopus 로고
    • The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis
    • doi:10.1111/j.1745-9125.2000.tb00911.x
    • Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis. Criminology, 38, 931-964. doi:10.1111/j.1745-9125.2000.tb00911.x
    • (2000) Criminology , vol.38 , pp. 931-964
    • Pratt, T.C.1    Cullen, F.T.2
  • 67
    • 0040304844 scopus 로고    scopus 로고
    • Organizational offending and neoclassical criminology: Challenging the reach of a general theory of crime
    • doi:10.1111/j.1745-9125.1996.tb01211.x
    • Reed, G. E., & Yeager, P. C. (1996). Organizational offending and neoclassical criminology: Challenging the reach of A General Theory of Crime. Criminology, 34, 357-382. doi:10.1111/j.1745-9125.1996.tb01211.x
    • (1996) Criminology , vol.34 , pp. 357-382
    • Reed, G.E.1    Yeager, P.C.2
  • 68
  • 69
    • 33745740196 scopus 로고    scopus 로고
    • Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis
    • doi:10.1080/01639620600605333
    • Rogers, M., Smoak, N. D., & Liu, J. (2006). Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior, 27, 245-268. doi:10.1080/01639620600605333
    • (2006) Deviant Behavior , vol.27 , pp. 245-268
    • Rogers, M.1    Smoak, N.D.2    Liu, J.3
  • 72
    • 61449213998 scopus 로고    scopus 로고
    • On the use, misuse, and the very limited usefulness of Cronbach's alpha
    • doi:10.1007/s11336-008-9101-0
    • Sijtsma, K. (2009). On the use, misuse, and the very limited usefulness of Cronbach's alpha. Psychometrika, 1, 107-120. doi:10.1007/s11336-008-9101-0
    • (2009) Psychometrika , vol.1 , pp. 107-120
    • Sijtsma, K.1
  • 73
    • 0036939060 scopus 로고    scopus 로고
    • Low self-control, organizational theory, and corporate crime
    • doi:10.2307/1512161
    • Simpson, S. S., & Piquero, N. L. (2002). Low self-control, organizational theory, and corporate crime. Law & Society Review, 36, 509-548. doi:10.2307/1512161
    • (2002) Law & Society Review , vol.36 , pp. 509-548
    • Simpson, S.S.1    Piquero, N.L.2
  • 74
    • 0030668250 scopus 로고    scopus 로고
    • A social learning theory analysis of computer crime among college students
    • doi:10.1177/0022427897034004005
    • Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495-518. doi:10.1177/0022427897034004005
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 75
    • 0038500642 scopus 로고    scopus 로고
    • The fruits of good work: Early work experiences and adolescent deviance
    • doi:10.1177/0022427803253799
    • Staff, J., & Uggen, C. (2003). The fruits of good work: Early work experiences and adolescent deviance. Journal of Research in Crime and Delinquency, 40, 263-290. doi:10.1177/0022427803253799
    • (2003) Journal of Research in Crime and Delinquency , vol.40 , pp. 263-290
    • Staff, J.1    Uggen, C.2
  • 78
    • 0345257994 scopus 로고    scopus 로고
    • Minneapolis, MN, University of Minnesota Press
    • Thomas, D. (2002). Hacker culture. Minneapolis, MN: University of Minnesota Press.
    • (2002) Hacker Culture
    • Thomas, D.1
  • 79
    • 3542999954 scopus 로고    scopus 로고
    • Self-control and crime/deviance: Cognitive vs. behavioral measures
    • doi:10.1023/B:JOQC.0000005439.45614.24
    • Tittle, C. R., Ward, D. A., & Grasmick, H. G. (2003). Self-control and crime/deviance: Cognitive vs. behavioral measures. Journal of Quantitative Criminology, 19, 333-365. doi:10.1023/B:JOQC.0000005439.45614.24
    • (2003) Journal of Quantitative Criminology , vol.19 , pp. 333-365
    • Tittle, C.R.1    Ward, D.A.2    Grasmick, H.G.3
  • 80
    • 13444293285 scopus 로고    scopus 로고
    • Hacker's accounts: Hacking as a social entertainment
    • doi:10.1177/0894439304271529
    • Turgeman-Goldschmidt, O. (2005). Hacker's accounts: Hacking as a social entertainment. Social Science Computer Review, 23, 8-23. doi:10.1177/0894439304271529
    • (2005) Social Science Computer Review , vol.23 , pp. 8-23
    • Turgeman-Goldschmidt, O.1
  • 81
    • 84970396607 scopus 로고
    • Relationships between variables in three variable linear regression and the concept of suppressor
    • doi:10.1177/001316447803800213
    • Tzelgov, J., & Stern, I. (1978). Relationships between variables in three variable linear regression and the concept of suppressor. Educational and Psychological Measurement, 38, 325-335. doi:10.1177/001316447803800213
    • (1978) Educational and Psychological Measurement , vol.38 , pp. 325-335
    • Tzelgov, J.1    Stern, I.2
  • 82
    • 84949564522 scopus 로고    scopus 로고
    • The internet as a conduit for criminal activity
    • In Pattavina, A. (Ed.), Thousand Oaks, CA: Sage
    • Wall, D. S. (2005). The Internet as a conduit for criminal activity. In Pattavina, A. (Ed.), Information technology and the criminal justice system (pp. 78-94). Thousand Oaks, CA: Sage.
    • (2005) Information Technology and the Criminal Justice System , pp. 78-94
    • Wall, D.S.1
  • 83
    • 51949085108 scopus 로고    scopus 로고
    • Cybercrime, media, and insecurity: The shaping of public perceptions of cybercrime
    • doi:10.1080/13600860801924907
    • Wall, D. S. (2008). Cybercrime, media, and insecurity: The shaping of public perceptions of cybercrime. International Review of Law Computers & Technology, 22, 45-63. doi:10.1080/13600860801924907
    • (2008) International Review of Law Computers & Technology , vol.22 , pp. 45-63
    • Wall, D.S.1
  • 85
    • 14544293551 scopus 로고    scopus 로고
    • Rave and straightedge, the virtual and the real: Exploring online and offline experiences in Canadian youth subcultures
    • doi:10.1177/0044118X03260498
    • Wilson, B., & Atkinson, M. (2005). Rave and straightedge, the virtual and the real: Exploring online and offline experiences in Canadian youth subcultures. Youth & Society, 36, 276-311. doi:10.1177/0044118X03260498
    • (2005) Youth & Society , vol.36 , pp. 276-311
    • Wilson, B.1    Atkinson, M.2
  • 86
    • 33344475682 scopus 로고    scopus 로고
    • Employment, peers, and life-course transitions
    • doi:10.1080/07418820400095781
    • Wright, J. P., & Cullen, F. T. (2004). Employment, peers, and life-course transitions. Justice Quarterly, 21, 183-205. doi:10.1080/07418820400095781
    • (2004) Justice Quarterly , vol.21 , pp. 183-205
    • Wright, J.P.1    Cullen, F.T.2
  • 87
    • 85045160218 scopus 로고    scopus 로고
    • Computer hacking: Just another case of juvenile delinquency?
    • doi:10.1111/j.14682311.2005.00383.x
    • Yar, M. (2005a). Computer hacking: Just another case of juvenile delinquency? The Howard Journal, 44, 387-399. doi:10.1111/j.14682311.2005.00383.x
    • (2005) The Howard Journal , vol.44 , pp. 387-399
    • Yar, M.1
  • 88
    • 34247657469 scopus 로고    scopus 로고
    • The novelty of "cybercrime": An assessment in light of routine activity theory
    • doi:10.1177/147737080556056
    • Yar, M. (2005b). The novelty of "cybercrime": An assessment in light of routine activity theory. European Journal of Criminology, 2, 407-427. doi:10.1177/147737080556056
    • (2005) European Journal of Criminology , vol.2 , pp. 407-427
    • Yar, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.