Assessing the Macro-Level Correlates of malware infections using a routine activities framework

The ability to gain unauthorized access to computer systems to engage in espionage and data theft poses a massive threat to individuals worldwide. There has been minimal focus, however, on the role of malicious software, or malware, which can automate this process. This study examined the macro-corr...

Full description

Saved in:  
Bibliographic Details
Authors: Holt, Thomas J. 1978- (Author) ; Burruss, George W. (Author) ; Bossler, Adam M. (Author)
Format: Electronic Article
Language:English
Published: 2018
In: International journal of offender therapy and comparative criminology
Year: 2018, Volume: 62, Issue: 6, Pages: 1720-1741
Online Access: Volltext (Verlag)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a22000002 4500
001 1586870920
003 DE-627
005 20230427034224.0
007 cr uuu---uuuuu
008 190201s2018 xx |||||o 00| ||eng c
024 7 |a 10.1177/0306624X16679162  |2 doi 
035 |a (DE-627)1586870920 
035 |a (DE-576)516870920 
035 |a (DE-599)BSZ516870920 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
100 1 |a Holt, Thomas J.  |d 1978-  |e VerfasserIn  |0 (DE-588)14391930X  |0 (DE-627)704643197  |0 (DE-576)167596403  |4 aut 
109 |a Holt, Thomas J. 1978-  |a Holt, Thomas Jeffrey 1978- 
245 1 0 |a Assessing the Macro-Level Correlates of malware infections using a routine activities framework  |c Thomas J. Holt, George W. Burruss, and Adam M. Bossler 
264 1 |c 2018 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a The ability to gain unauthorized access to computer systems to engage in espionage and data theft poses a massive threat to individuals worldwide. There has been minimal focus, however, on the role of malicious software, or malware, which can automate this process. This study examined the macro-correlates of malware infection at the national level by using an open repository of known malware infections and utilizing a routine activities framework. Negative inflated binomial models for counts indicated that nations with greater technological infrastructure, more political freedoms, and with less organized crime financial impact were more likely to report malware infections. The number of Computer Emergency Response Teams (CERTs) in a nation was not significantly related with reported malware infection. The implications of the study for the understanding of malware infection, routine activity theory, and target-hardening strategies are discussed. 
700 1 |a Burruss, George W.  |e VerfasserIn  |0 (DE-588)107361669X  |0 (DE-627)829219072  |0 (DE-576)18498355X  |4 aut 
700 1 |a Bossler, Adam M.  |e VerfasserIn  |0 (DE-588)1068897945  |0 (DE-627)82099846X  |0 (DE-576)283974648  |4 aut 
773 0 8 |i Enthalten in  |t International journal of offender therapy and comparative criminology  |d London [u.a.] : Sage Publ., 1966  |g 62(2018), 6, Seite 1720-1741  |h Online-Ressource  |w (DE-627)325163286  |w (DE-600)2034467-3  |w (DE-576)094533156  |x 1552-6933  |7 nnns 
773 1 8 |g volume:62  |g year:2018  |g number:6  |g pages:1720-1741 
856 4 0 |u https://doi.org/10.1177/0306624X16679162  |x Verlag  |3 Volltext 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3052299751 
LOK |0 003 DE-627 
LOK |0 004 1586870920 
LOK |0 005 20190226111005 
LOK |0 008 190201||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21-110  |c DE-627  |d DE-21-110 
LOK |0 689   |a s  |a Cybercrime 
LOK |0 689   |a s  |a Malware 
LOK |0 689   |a s  |a Routine activity theory 
LOK |0 689   |a s  |a Technological infrastructure 
LOK |0 689   |a s  |a Hacking 
LOK |0 689   |a s  |a CERTs 
LOK |0 689   |a s  |a Gefahren 
LOK |0 689   |a s  |a Schadsoftware 
LOK |0 689   |a s  |a Internetkriminalität 
LOK |0 852   |a DE-21-110 
LOK |0 852 1  |9 00 
LOK |0 935   |a krub  |a krzo 
ORI |a SA-MARC-krimdoka001.raw