Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks

Cyber attacks on critical infrastructure by ideology-based hackers may have both significant financial costs and public safety consequences. Scholars have been increasingly using Sykes and Matza’s (1957) techniques of neutralization to better understand the commission of various forms of cybercrime,...

Full description

Saved in:  
Bibliographic Details
Main Author: Bossler, Adam M. (Author)
Format: Electronic Article
Language:English
Published: 2021
In: American journal of criminal justice
Year: 2021, Volume: 46, Issue: 6, Pages: 911-934
Online Access: Volltext (lizenzpflichtig)
Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a22000002 4500
001 1785942425
003 DE-627
005 20220114105158.0
007 cr uuu---uuuuu
008 220113s2021 xx |||||o 00| ||eng c
024 7 |a 10.1007/s12103-021-09654-5  |2 doi 
035 |a (DE-627)1785942425 
035 |a (DE-599)KXP1785942425 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Bossler, Adam M.  |e VerfasserIn  |0 (DE-588)1068897945  |0 (DE-627)82099846X  |0 (DE-576)283974648  |4 aut 
109 |a Bossler, Adam M. 
245 1 0 |a Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks 
264 1 |c 2021 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Cyber attacks on critical infrastructure by ideology-based hackers may have both significant financial costs and public safety consequences. Scholars have been increasingly using Sykes and Matza’s (1957) techniques of neutralization to better understand the commission of various forms of cybercrime, including that of computer hacking. This study examines the effects of techniques of neutralization on college students’ willingness to commit cyber attacks, specifically defacing websites and compromising financial and government servers, against both domestic and foreign targets. An overall techniques of neutralization scale significantly predicted being willing to commit all examined forms of cyber attacks even after controlling for peer behavior, computer skills, time spent online, and being male. The strongest support was found for the techniques of condemnation of the condemners and claim of entitlement. The implications of the findings for our understanding of why certain individuals are more willing to commit cyber attacks and the situational crime prevention efforts to remove excuses for offenders are both explored. 
650 4 |a Computer intrusions 
650 4 |a Cyber attacks 
650 4 |a Cybercrime 
650 4 |a Hacking 
650 4 |a Website defacement 
650 4 |a Drift 
650 4 |a Techniques of neutralization 
773 0 8 |i Enthalten in  |t American journal of criminal justice  |d New York, NY [u.a.] : Springer, 1975  |g 46(2021), 6, Seite 911-934  |h Online-Ressource  |w (DE-627)545782163  |w (DE-600)2387971-3  |w (DE-576)306834987  |x 1936-1351  |7 nnns 
773 1 8 |g volume:46  |g year:2021  |g number:6  |g pages:911-934 
856 4 0 |u https://doi.org/10.1007/s12103-021-09654-5  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://link.springer.com/openurl/fulltext?id=doi:10.1007/s12103-021-09654-5  |x Verlag  |z lizenzpflichtig  |3 Volltext 
935 |a mkri 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4034372664 
LOK |0 003 DE-627 
LOK |0 004 1785942425 
LOK |0 005 20220113065010 
LOK |0 008 220113||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2022-01-12#72308FB693B115509DA3D6A25B9A08C6AAC6AE44 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
ORI |a SA-MARC-krimdoka001.raw