ABSTRACT Title of Thesis: CAN THE GENERAL THEORY OF CRIME ACCOUNT FOR COMPUTER OFFENDERS: TESTING LOW SELF-CONTROL AS A PREDICTOR OF COMPUTER CRIME OFFENDING

نویسندگان

  • David Robert Foster
  • Amelia Arria
چکیده

Title of Thesis: CAN THE GENERAL THEORY OF CRIME ACCOUNT FOR COMPUTER OFFENDERS: TESTING LOW SELF-CONTROL AS A PREDICTOR OF COMPUTER CRIME OFFENDING David Robert Foster Master of Arts, 2004 Thesis directed by: Professor Sally Simpson Department of Criminology and Criminal Justice Using self-report measures of attitudinal and behavioral self-control, this study tests the applicability of Gottfredson and Hirschi’s theory of low self-control as it applies to self-reported computer crime offending among a college student sample. Computer crime was found to be relatively common, with more than ninety-five percent of the sample reported having engaged in some form of illegal computer activity. The results offer moderate support for Gottfredson and Hirschi’s general theory of crime, finding direct and positive effects for self-control and opportunity on computer offending, but not for the interaction between self-control and opportunity. The prevalence of computerrelated offending is discussed in the context of the growing need to address the serious and widespread nature of computer crime. The study concludes by discussing the empirical and theoretical fit between the components of low self control, opportunity, and computer crime, as well as directions for future research.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved K-Means with Artificial Bee Colony Algorithm for Clustering Crimes

Crime detection is one of the major issues in the field of criminology. In fact, criminology includes knowing the details of a crime and its intangible relations with the offender. In spite of the enormous amount of data on offenses and offenders, and the complex and intangible semantic relationships between this information, criminology has become one of the most important areas in the field o...

متن کامل

An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering

The detection and prevention of crime, in the past few decades, required several years of research and analysis. However, today, thanks to smart systems based on data mining techniques, it is possible to detect and prevent crime in a considerably less time. Classification and clustering-based smart techniques can classify and cluster the crime-related samples. The most important factor in the c...

متن کامل

Motivations, substance use and other correlates amongst property and violent offenders who regularly inject drugs.

OBJECTIVE To examine the prevalence, correlates and motivations for the commission of property and violent crime amongst a sample of people who inject drugs (PWID). METHOD Data were obtained from the 2013 Illicit Drug Reporting System (IDRS), which includes a cross-sectional sample of 887 PWID. RESULTS Eighteen percent of PWID had committed a property offence and 3% had committed a violent ...

متن کامل

Gender and Crime: An Empirical Test of General Strain Theory among Youth in Babol (A City in Northern Part of Iran)

This  paper  presents  an attempt  to use Agnew’s General Strain Theory ( GST) (1992) for explanation of the  criminal behavior  differences between  young males and females in Babol, a city in northern part of Iran. General Strain Theory (GST) is essentially regarded as a set of ideas formulated to explain the occurrence of crime as a result of the strain in social life. This study explores th...

متن کامل

The General Theory of Crime and Computer Hacking : Low Self - Control Hackers ?

Though in recent years, a number of studies have been completed on hackers’ personality and communication traits by experts in the fields of psychology and criminology, a number of questions regarding this population remain. Does Gottfredson and Hirschi’s concept of low self-control predict the unauthorized access of computer systems? Do computer hackers have low levels of self-control, as has ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004