Assessing the Macro-Level Correlates of malware infections using a routine activities framework

The ability to gain unauthorized access to computer systems to engage in espionage and data theft poses a massive threat to individuals worldwide. There has been minimal focus, however, on the role of malicious software, or malware, which can automate this process. This study examined the macro-corr...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autor principal: Holt, Thomas J. (Autor)
Otros Autores: Burruss, George W. ; Bossler, Adam M.
Tipo de documento: Electrónico Artículo
Lenguaje:Inglés
Publicado: 2018
En: International journal of offender therapy and comparative criminology
Año: 2018, Volumen: 62, Número: 6, Páginas: 1720-1741
Acceso en línea: Volltext (Verlag)
Journals Online & Print:
Gargar...
Verificar disponibilidad: HBZ Gateway
Palabras clave:
Descripción
Sumario:The ability to gain unauthorized access to computer systems to engage in espionage and data theft poses a massive threat to individuals worldwide. There has been minimal focus, however, on the role of malicious software, or malware, which can automate this process. This study examined the macro-correlates of malware infection at the national level by using an open repository of known malware infections and utilizing a routine activities framework. Negative inflated binomial models for counts indicated that nations with greater technological infrastructure, more political freedoms, and with less organized crime financial impact were more likely to report malware infections. The number of Computer Emergency Response Teams (CERTs) in a nation was not significantly related with reported malware infection. The implications of the study for the understanding of malware infection, routine activity theory, and target-hardening strategies are discussed.
ISSN:1552-6933
DOI:10.1177/0306624X16679162