Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
Cyber attacks on critical infrastructure by ideology-based hackers may have both significant financial costs and public safety consequences. Scholars have been increasingly using Sykes and Matza’s (1957) techniques of neutralization to better understand the commission of various forms of cybercrime,...
Main Author: | |
---|---|
Format: | Electronic Article |
Language: | English |
Published: |
2021
|
In: |
American journal of criminal justice
Year: 2021, Volume: 46, Issue: 6, Pages: 911-934 |
Online Access: |
Volltext (lizenzpflichtig) Volltext (lizenzpflichtig) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000caa a22000002c 4500 | ||
---|---|---|---|
001 | 1785942425 | ||
003 | DE-627 | ||
005 | 20220114105158.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220113s2021 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s12103-021-09654-5 |2 doi | |
035 | |a (DE-627)1785942425 | ||
035 | |a (DE-599)KXP1785942425 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Bossler, Adam M. |e VerfasserIn |0 (DE-588)1068897945 |0 (DE-627)82099846X |0 (DE-576)283974648 |4 aut | |
109 | |a Bossler, Adam M. | ||
245 | 1 | 0 | |a Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks |
264 | 1 | |c 2021 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Cyber attacks on critical infrastructure by ideology-based hackers may have both significant financial costs and public safety consequences. Scholars have been increasingly using Sykes and Matza’s (1957) techniques of neutralization to better understand the commission of various forms of cybercrime, including that of computer hacking. This study examines the effects of techniques of neutralization on college students’ willingness to commit cyber attacks, specifically defacing websites and compromising financial and government servers, against both domestic and foreign targets. An overall techniques of neutralization scale significantly predicted being willing to commit all examined forms of cyber attacks even after controlling for peer behavior, computer skills, time spent online, and being male. The strongest support was found for the techniques of condemnation of the condemners and claim of entitlement. The implications of the findings for our understanding of why certain individuals are more willing to commit cyber attacks and the situational crime prevention efforts to remove excuses for offenders are both explored. | ||
650 | 4 | |a Computer intrusions | |
650 | 4 | |a Cyber attacks | |
650 | 4 | |a Cybercrime | |
650 | 4 | |a Hacking | |
650 | 4 | |a Website defacement | |
650 | 4 | |a Drift | |
650 | 4 | |a Techniques of neutralization | |
773 | 0 | 8 | |i Enthalten in |t American journal of criminal justice |d New York, NY [u.a.] : Springer, 1975 |g 46(2021), 6, Seite 911-934 |h Online-Ressource |w (DE-627)545782163 |w (DE-600)2387971-3 |w (DE-576)306834987 |x 1936-1351 |7 nnas |
773 | 1 | 8 | |g volume:46 |g year:2021 |g number:6 |g pages:911-934 |
856 | 4 | 0 | |u https://doi.org/10.1007/s12103-021-09654-5 |x Resolving-System |z lizenzpflichtig |3 Volltext |
856 | 4 | 0 | |u http://link.springer.com/openurl/fulltext?id=doi:10.1007/s12103-021-09654-5 |x Verlag |z lizenzpflichtig |3 Volltext |
935 | |a mkri | ||
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4034372664 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1785942425 | ||
LOK | |0 005 20220113065010 | ||
LOK | |0 008 220113||||||||||||||||ger||||||| | ||
LOK | |0 035 |a (DE-2619)KrimDok#2022-01-12#72308FB693B115509DA3D6A25B9A08C6AAC6AE44 | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a zota | ||
ORI | |a SA-MARC-krimdoka001.raw |