Ransomware crime through the lens of neutralisation theory
This study examines ransomware crime through the lens of neutralisation theory, and explores techniques used by alleged offenders to justify their involvement in ransomware attacks. This work focuses on highly organised ransomware groups that not only conduct attacks but also operate as Ransomware-a...
| Autores principales: | ; ; |
|---|---|
| Tipo de documento: | Electrónico Artículo |
| Lenguaje: | Inglés |
| Publicado: |
2025
|
| En: |
European journal of criminology
Año: 2025, Volumen: 22, Número: 4, Páginas: 534-556 |
| Acceso en línea: |
Volltext (kostenfrei) |
| Journals Online & Print: | |
| Verificar disponibilidad: | HBZ Gateway |
| Palabras clave: |
MARC
| LEADER | 00000naa a22000002c 4500 | ||
|---|---|---|---|
| 001 | 1939333148 | ||
| 003 | DE-627 | ||
| 005 | 20251023110330.0 | ||
| 007 | cr uuu---uuuuu | ||
| 008 | 251023s2025 xx |||||o 00| ||eng c | ||
| 024 | 7 | |a 10.1177/14773708251320464 |2 doi | |
| 035 | |a (DE-627)1939333148 | ||
| 035 | |a (DE-599)KXP1939333148 | ||
| 040 | |a DE-627 |b ger |c DE-627 |e rda | ||
| 041 | |a eng | ||
| 084 | |a 2,1 |2 ssgn | ||
| 100 | 1 | |a Connolly, Lena Yuryna |e VerfasserIn |0 (orcid)0000-0002-7110-9594 |4 aut | |
| 245 | 1 | 0 | |a Ransomware crime through the lens of neutralisation theory |
| 264 | 1 | |c 2025 | |
| 336 | |a Text |b txt |2 rdacontent | ||
| 337 | |a Computermedien |b c |2 rdamedia | ||
| 338 | |a Online-Ressource |b cr |2 rdacarrier | ||
| 520 | |a This study examines ransomware crime through the lens of neutralisation theory, and explores techniques used by alleged offenders to justify their involvement in ransomware attacks. This work focuses on highly organised ransomware groups that not only conduct attacks but also operate as Ransomware-as-a-Service businesses. The interview data (n?=?9) used in this research were collected by several media and cyber security companies. Drawing on Kaptein and Van Helvoort model of neutralisation techniques, we discovered that interviewees ? reported ransomware offenders ? distorted the facts (n?=?5) and negated societal norms (n?=?8). Less common, some interviewees admitted breaking norms, but they rejected responsibility by blaming the circumstances (n?=?8) or their own shortcomings (n?=?3). These results offer new insights that can support the development of counter-narratives. | ||
| 650 | 4 | |a Cybercrime community | |
| 650 | 4 | |a neutralisation theory | |
| 650 | 4 | |a offender justifications | |
| 650 | 4 | |a ransomware | |
| 700 | 1 | |a Borrion, Hervé |e VerfasserIn |0 (orcid)0000-0003-3624-4763 |4 aut | |
| 700 | 1 | |a Budiman, Arief |d 1941-2020 |e VerfasserIn |0 (DE-588)1046033263 |0 (DE-627)775251720 |0 (DE-576)183715144 |4 aut | |
| 773 | 0 | 8 | |i Enthalten in |t European journal of criminology |d London [u.a.] : Sage, 2004 |g 22(2025), 4, Seite 534-556 |h Online-Ressource |w (DE-627)379048256 |w (DE-600)2135314-1 |w (DE-576)112775543 |x 1741-2609 |7 nnas |
| 773 | 1 | 8 | |g volume:22 |g year:2025 |g number:4 |g pages:534-556 |
| 856 | 4 | 0 | |u https://doi.org/10.1177/14773708251320464 |x Resolving-System |z kostenfrei |3 Volltext |
| 951 | |a AR | ||
| ELC | |a 1 | ||
| LOK | |0 000 xxxxxcx a22 zn 4500 | ||
| LOK | |0 001 4790936317 | ||
| LOK | |0 003 DE-627 | ||
| LOK | |0 004 1939333148 | ||
| LOK | |0 005 20251023120644 | ||
| LOK | |0 008 251023||||||||||||||||ger||||||| | ||
| LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
| LOK | |0 092 |o n | ||
| LOK | |0 852 |a DE-2619 | ||
| LOK | |0 852 1 |9 00 | ||
| LOK | |0 935 |a krzo |a tiep | ||
| OAS | |a 1 | ||
| ORI | |a WA-MARC-krimdoka001.raw | ||
