Assessing the Macro-Level Correlates of malware infections using a routine activities framework
The ability to gain unauthorized access to computer systems to engage in espionage and data theft poses a massive threat to individuals worldwide. There has been minimal focus, however, on the role of malicious software, or malware, which can automate this process. This study examined the macro-corr...
Autor principal: | |
---|---|
Otros Autores: | ; |
Tipo de documento: | Electrónico Artículo |
Lenguaje: | Inglés |
Publicado: |
2018
|
En: |
International journal of offender therapy and comparative criminology
Año: 2018, Volumen: 62, Número: 6, Páginas: 1720-1741 |
Acceso en línea: |
Volltext (Verlag) |
Journals Online & Print: | |
Verificar disponibilidad: | HBZ Gateway |
Palabras clave: |
Sumario: | The ability to gain unauthorized access to computer systems to engage in espionage and data theft poses a massive threat to individuals worldwide. There has been minimal focus, however, on the role of malicious software, or malware, which can automate this process. This study examined the macro-correlates of malware infection at the national level by using an open repository of known malware infections and utilizing a routine activities framework. Negative inflated binomial models for counts indicated that nations with greater technological infrastructure, more political freedoms, and with less organized crime financial impact were more likely to report malware infections. The number of Computer Emergency Response Teams (CERTs) in a nation was not significantly related with reported malware infection. The implications of the study for the understanding of malware infection, routine activity theory, and target-hardening strategies are discussed. |
---|---|
ISSN: | 1552-6933 |
DOI: | 10.1177/0306624X16679162 |