On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory

نویسندگان

  • Adam M. Bossler
  • Thomas J. Holt
چکیده

Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for criminals and is partially responsible for the global increase in cybercrime. Criminology, however, has been slow to explore the theoretical causes and correlates of malware victimization. This study uses a routine activities framework to explore data loss caused by malware infection in a college sample. Similar to research on traditional forms of victimization, computer deviance was related with computer victimization. Physical guardianship, however, had little effect. Policy implications to decrease malware victimization in a college sample focus on decreasing computer deviance rather than physical

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An automated approach to analysis and classification of Crypto-ransomwares’ family

There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...

متن کامل

Exploring the ecological association between crime and medical marijuana dispensaries.

OBJECTIVE Routine activities theory purports that crime occurs in places with a suitable target, motivated offender, and lack of guardianship. Medical marijuana dispensaries may be places that satisfy these conditions, but this has not yet been studied. The current study examined whether the density of medical marijuana dispensaries is associated with crime. METHOD An ecological, cross-sectio...

متن کامل

A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities

This paper presents a new approach to infer worldwide malware-infected machines by solely analyzing their generated probing activities. In contrary to other adopted methods, the proposed approach does not rely on symptoms of infection to detect compromised machines. This allows the inference of malware infection at very early stages of contamination. The approach aims at detecting whether the m...

متن کامل

The Criminal Justice Response to Elder Abuse in Nursing Homes: A Routine Activities Perspective

Politicians and researchers have begun to pay more attention to elder abuse in recent times. Most of the research on elder abuse has focused on cases of abuse perpetrated by family members, treating the phenomenon as a social problem, but it is increasingly being conceptualized as a crime problem. The current study examines elder abuse in nursing homes from a criminological perspective. Using r...

متن کامل

An Activity Theoretical Investigation into the Dominant Composition and Translation Activities of EFL learners across Persian and English

The present study aimed at investigating the impact of a genre-specific strategy-based instructional inter- vention on translation quality, dominant translation and writing activities in the persuasive essays of a group of EFL learners within the perspective of activity theory. The main purpose of the study was to see, taking translation as a sort of writing in its own right, whether the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010