786
Views
7
CrossRef citations to date
0
Altmetric
Articles

The risk and needs of cyber-dependent offenders sentenced in the United States

&

References

  • Andrews, D. A., and J. Bonta. 2010. The Psychology of Criminal Conduct. 5th ed. New Providence: Mathew Bender and Company, Inc.
  • Andrews, D. A., J. Bonta, and R. D. Hoge. 1990. “Classification for Effective Rehabilitation: Rediscovering Psychology.” Criminal Justice and Behavior 17: 19–52. doi:10.1177/0093854890017001004.
  • Benson, M. L. 1985. “Denying the Guilty Mind: Accounting for Involvement in a White-Collar Crime.” Criminology 23 (4): 583–607. doi:10.1111/crim.1985.23.issue-4.
  • Brenner, S. 2004. “U.S. Cybercrime Law: Defining Offenses.” Information Systems Frontiers 6 (2): 115–132. doi:10.1023/B:ISFI.0000025780.94350.79.
  • Burgess, R. L., and R. L. Akers. 1966. “A Differential Association-Reinforcement Theory of Criminal Behavior.” Social Problems 14 (2): 128–147. doi:10.2307/798612.
  • Chiesa, R., S. Ducci, and S. Ciappi. 2009. Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking. Boca Raton: Auerbach Publication.
  • Cohen, T. H., and K. Bechtel. 2017. “Removal of the Non-scored Items from the Post-Conviction Risk Assessment Instrument: An Evaluation of Data-driven Risk Assessment Research within the Federal System.” Federal Probation 81 (2): 37–51.
  • Department of Homeland Security. 2017. “Critical Infrastructure Sectors.” https://www.dhs.gov/critical-infrastructure-sectors
  • Department of Justice. 2015. “Prosecuting Computer Crimes: Computer Crime and Intellectual Property Section Criminal Division.” Office of Legal Education, Executive Office for United States Attorneys. https://www.justice.gov/sites/default/files/criminalccips/legacy/2015/01/14/ccmanual.pdf
  • Doyle, C. 2014. “Cybercrime: A Sketch of 18 U. S. C. 1030 and Related Federal Criminal Laws.” Congressional Research Service. https://fas.org/sgp/crs/misc/RS20830.pdf
  • Dupont, B. 2013. “Skills and Trust: A Tour inside the Hard Drives of Computer Hackers.” In Illicit Networks, edited by C. Morselli, 195–217. Oxford: Routledge.
  • Fötinger, C., and W. Ziegler. 2004. “Understanding a hacker’s mind – A psychological insight into the hijacking of identities.” White Paper by the Donau-University Krems. https://www.donauuni.ac.at/de/department/gpa/informatik/DanubeUniversityHackersStudy.pdf
  • Gendreau, P., T. Little, and C. Goggin. 1996. “A Meta-analysis of the Predictors of Adult Recidivism: What Works!” Criminology 34 (4): 575–607. doi:10.1111/j.1745-9125.1996.tb01220.x.
  • Gordon, S. 1994. “The Generic Virus Writer.” https://download.adamas.ai/dlbase/Stuff/VX%20Heavens%20Library/asg03.html
  • Hanson, R. K., and K. E. Morton-Bourgon. 2009. “The Accuracy of Recidivism Risk Assessments for Sexual Offenders: A Meta-analysis of 118 Prediction Studies.” Psychological Assessment 21: 1–21. doi:10.1037/a0014421.
  • Harbinson, E., M. L. Benson, and E. J. Latessa. 2019. “Assessing Risk among White-collar Offenders on Federal Supervision in the Community.” Criminal Justice and Behavior 46 (2): 261–279.
  • Harris, G. T., M. E. Rice, and V. L. Quinsey. 1993. “Violent Recidivism of Mentally Disordered Offenders: The Development of a Statistical Prediction Instrument.” Criminal Justice and Behavior 20: 315–335. doi:10.1177/0093854893020004001.
  • Hollinger, R. C. 1991. “Hackers: Computer Heroes or Electronic Highwaymen?” Computers and Society 21 (1): 6–17. doi:10.1145/122246.122248.
  • Holt, T. J., and A. M. Bossler. 2014. “An Assessment of the Current State of Cybercrime Scholarship.” Deviant Behavior 35: 20–40. doi:10.1080/01639625.2013.822209.
  • Holt, T. J., A. M. Bossler, and K. Seigfried-Spellar. 2015. Cybercrime and Digital Forensics. New York: Routledge.
  • Holt, T. J., G. W. Burruss, and A. M. Bossler. 2010. “Social Learning and Cyber-deviance: Examining the Importance of a Full Social Learning Model in the Virtual World.” Journal of Crime and Justice 33 (2): 31–61. doi:10.1080/0735648X.2010.9721287.
  • Holt, T. J., D. Strumsky, O. Smirnova, and M. Kilger. 2012. “Examining the Social Networks of Malware Writers and Hackers.” International Journal of Cyber Criminology 6 (1): 891–903.
  • Johnson, J. L., C. T. Lowenkamp, S. W. van Benschoten, and C. R. Robinson. 2011. “The Construction and Validation of the Federal Post Conviction Risk Assessment.” Federal Probation 75 (2): 16–29.
  • Kim, B., C. Spohn, and E. B. Hedberg. 2015. “Federal Sentencing as a Complex Collaborative Process: Judges, Prosecutors, Judge-prosecutor Dyads, and Disparity in Sentencing.” Criminology 53 (4): 597–623. doi:10.1111/1745-9125.12090.
  • Laub, J. H., and R. J. Sampson. 2003. Shared Beginnings, Divergent Lives: Delinquent Boys to Age 70. Cambridge: Harvard University Press.
  • Leukfeldt, E. R., S. Veenstra, and W. Stol. 2013. “High Volume Cyber Crime and the Organization of the Police: The Results of Empirical Studies in the Netherlands.” International Journal of Cyber Criminology 7 (1): 1–17.
  • Levi, M., M. Button, and M. Whitty 2017. “Economic Crime: Learnings from Offender Methodologies, and Pathways into (and out of) Crime.” https://core.ac.uk/download/pdf/153572728.pdf
  • Li, X. 2008. “The Criminal Phenomenon on the Internet: Hallmarks of Criminals and Victims Revisited through Typical Cases Prosecuted.” University of Ottawa Law and Technology Journal 5 (1–2): 125–140.
  • Loeber, R. 1982. “The Stability of Antisocial and Delinquent Child Behavior: A Review.” Child Development 53: 1431–1446. doi:10.2307/1130070.
  • Lowenkamp, C. T., A. M. Holsinger, and T. H. Cohen. 2015. “PCRA Revisited: Testing the Validity of the Federal Post Conviction Risk Assessment (PCRA).” Psychological Services 12 (2): 149–157. doi:10.1037/ser0000024.
  • Lowenkamp, C. T., and E. J. Latessa. 2004. “Understanding the Risk Principle: How and Why Correctional Interventions Can Harm Low Risk Offenders.” In Topics in Community Corrections, 3–8. Washington, DC: U. S. Department of Justice, National Institute of Justice.
  • McGuire, M., and S. Dowling. 2013a. “Cyber Crime: A Review of the Evidence.” Research Report 75. Chapter 1: Cyber-dependent crimes. London: Home Office.
  • McGuire, M., and S. Dowling. 2013b. “Cyber Crime: A Review of the Evidence.” Research Report 75. Chapter 2: Cyber-enabled crimes. London: Home Office.
  • Sampson, R. J., and J. H. Laub. 1993. Crime in the Making: Pathways and Turning Points through Life. Cambridge: Harvard University Press.
  • Selzer, N. 2018. “IT-Sicherheit Mit Nachdruck.” In Kriminologische Welt in Bewegung. Neue Kriminologische Schriftenreihe Der Kriminologischen Gesellschaft e.V. Band 117, S, edited by K. Boers and M. Schaerff, 290–301. Mönchengladbach: Forum Verlag Godesberg GmbH.
  • Skibell, R. 2002. “The Myth of the Computer Hacker.” Information, Communication and Society 5 (3): 336–356. doi:10.1080/13691180210159292a.
  • Skibell, R. 2003. “Cybercrime and Misdemeanors: A Reevalution of the Computer Fraud and Abuse Act.” Berkeley Technology Law Journal 18 (3/4): 909–944.
  • Stadler, W. A., and M. L. Benson. 2012. “Revisiting the Guilty Mind: The Neutralization of White-Collar Crime.” Criminal Justice Review 37 (4): 494–511. doi:10.1177/0734016812465618.
  • Steinmetz, K. 2015a. “Becoming a Hacker: Demographic Characteristics and Developmental Factors.” Journal of Qualitative Criminal Justice and Criminology 3 (19): 31–60.
  • Steinmetz, K. 2015b. “craft(y)ness: An Ethnographic Study of Hacking.” British Journal of Criminology 55 (1): 125–145. doi:10.1093/bjc/azu061.
  • Suler, J. 2004. “The Online Disinhibition Effect.” CyberPsychology and Behavior 7 (3): 321–326. doi:10.1089/1094931041291295.
  • Sung, H. E., A. M. Mahoney, and J. Mellow. 2011. “Substance Abuse Treatment Gap among Adult Parolees: Prevalence, Correlates, and Barriers.” Criminal Justice Review 36: 40–57. doi:10.1177/0734016810389808.
  • Sutherland, E. H. 1998. “Differential Association.” In Criminology Theory: Selected Classic Readings, edited by F. P. Williams III and M. D. McShane, 77–82. Cincinnati, OH: Anderson.
  • Sykes, G. M., and D. Matza. 1957. “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22 (6): 664–670. doi:10.2307/2089195.
  • Turgeman-Goldschmidt, O. 2011. “Identity Construction Among Hackers.” In Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, edited by K. Jaishankar, 31–51. Boca Raton: Taylor and Francis.
  • United Nations Office on Drug and Crime. 2013. “Comprehensive Study on Cybercrime.” https://www.sbs.ox.ac.uk/cybersecurity-capacity/system/files/Comprehensive%20Study%20on%20Cybercrime.pdf
  • Wall, D. S. 2015. “Dis-organised Crime: Towards a Distributed Model of the Organization of Cybercrime.” The European Review of Organised Crime 2 (2): 71–90.
  • Weulen Kranenbarg, M. 2018. “Cyber-offenders versus traditional offenders. An empirical comparison.” Dissertation, Universiteit Amsterdam.
  • Weulen Kranenbarg, M., A. van der Laan, C. de Poot, M. Verhoeven, W. van der Wagen, and G. Weijters. 2017. “Individual Cybercrime Offenders.” In Research Agenda: The Human Factor in Cybercrime and Cybersecurity, edited by E. R. Leukfeldt, 23–31. Hague: Eleven International Publishing. https://www.thehaguesecuritydelta.com/media/com_hsd/report/141/document/Research-Agenda-The-Human-Factor-in-Cybercrime-and-Cybersecurity.pdf
  • Woo, H.-J. 2003. “The Hacker Mentality: Exploring the Relationship between Psychological Variables and Hacking Activities.” Dissertation, University of Georgia.
  • Yar, M. 2006. Cybercrime and Society. London: SAGE Publications.
  • Young, R., L. Zhang, and V. Prybutok. 2007. “Hacking into the Minds of Hackers.” Information Systems Management 24: 281–287. doi:10.1080/10580530701585823.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.