1,013
Views
6
CrossRef citations to date
0
Altmetric
Articles

Determinants of Cybercrime Originating within a Nation: A Cross-country Study

, , &

References

  • ABI Research. (2014). Global cyber security index and cyberwellness profiles report. Retrieved from https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-SECU-2015-PDF-E.pdf.
  • Ablon, L. (2018). Data thieves: The motivations of cyber threat actors and their use and monetization of stolen data. Rand Corporation Report.
  • Ahmad, A., Maynard, S. B., & Shanks, G. (2015). A case analysis of information systems and security incident responses. International Journal of Information Management, 35(6), 717–723. doi:10.1016/j.ijinfomgt.2015.08.001
  • Ajala, E. B. (2007). Cybercafes, cybercrime detection and prevention. Library Hi Tech News, 24(7), 26–29. doi:10.1108/07419050710824705
  • Akçayır, M., Dündar, H., & Akçayır, G. (2016). What makes you a digital native? Is it enough to be born after 1980? Computers in Human Behavior, 60, 435–440. doi:10.1016/j.chb.2016.02.089
  • Akers, R. L. (1990). Rational choice, deterrence, and social learning theory in criminology: The path not taken. The Journal of Criminal Law and Criminology (1973-), 81(3), 653–676. doi:10.2307/1143850
  • Alcantara, L. (2013). Cybercrime and cybersecurity in the global south: Book review. Journal of Global Information Technology Management, 16(4), 72–74. doi:10.1080/1097198X.2013.10845650
  • Amir, W., Levi, S., & Livne, T. (2018). Do firms underreport information on cyber-attacks? Evidence from capital markets. Review of Accounting Studies, 23(3), 1177–1206. doi:10.1007/s11142-018-9452-4
  • Andersen, T. B. (2009). E-Government as an anti-corruption strategy. Information Economics and Policy, 21(3), 201–210. doi:10.1016/j.infoecopol.2008.11.003
  • Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411–423. doi:10.1037/0033-2909.103.3.411
  • Asghari, H., Van Eeten, M. J. G., & Bauer, J. M. (2015). Economics of fighting botnets: Lessons from a decade of mitigation. IEEE Security and Privacy, 13(5), 16–23. doi:10.1109/MSP.2015.110
  • Assenova, V. (2007). Determinants of the music piracy divide. Undergraduate Economic Review, 3(1), 5.
  • Bagchi, K., Kirs, P., & Cerveny, R. (2006). Global software piracy: Can economic factors alone explain the trend? Communication of the ACM, 49(6), 70–75. doi:10.1145/1132469.1132470
  • Bagchi, K. K., & Tang, Z. (2004). Network size, deterrence effects and internet attack incident growth. Journal of Information Technology Theory and Application, 6(3), 117.
  • Baldwin, A., Gheyas, I., Ioannidis, C., Pym, D., & Williams, J. (2012). Contagion in cybersecurity attacks. Journal of the Operational Research Society, 68(7), 780–791. Retrieved from https://research.aston.ac.uk/portal/files/21754521/Contagion_in_cybersecurity_attacks.pdf
  • Baron, R. M., & Kenny, D. A. (1986). The moderator-mediator variable distinction in social psychological research : Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, 51(6), 1173–1182. doi:10.1037/0022-3514.51.6.1173
  • Bascle, G. (2008). Controlling for endogeneity with instrumental variables in strategic management research. Strategic Organization, 6(3), 285–327. doi:10.1177/1476127008094339
  • Becker, G. S. (1962). Irrational behavior and economic theory. Journal of Political Economy, 70(1), 258–275. doi:10.1086/258584
  • Becker, G. S. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76(2), 169. doi:10.1086/259394
  • Bhattacharjee, S., Gopal, R. D., & Sanders., G. L. (1987). Digital music and online sharing: Software piracy 2.0? Communications of the ACM, 46(7), 107–111. doi:10.1145/792704.792707
  • Borrett, M., Carter, R., & Wespi, A. (2013). How is cyber threat evolving and what do organisations need to consider? Journal of Business Continuity & Emergency Management, 7(1), 163–171.
  • Boudon, R. (2003). Beyond rational choice theory. Annual Review of Sociology, 29(1), 1–21. doi:10.1146/annurev.soc.29.010202.100213
  • Brar, H., & Kumar, G. (2018). Cybercrimes: A proposed taxonomy and challenges. Journal of Computer Networks and Communications, 2018, 1–11. doi:10.1155/2018/1798659
  • Butkovic, A., Mrdovic, S., Uludag, S., & Tanovic, A. (2019). Geographic profiling for serial cybercrime investigation. Digital Investigation, 28, 176–182. doi:10.1016/j.diin.2018.12.001
  • Chang, A. J., & Yeh, Q.-J. (2006). On security preparations against possible IS threats across industries. Information Management & Computer Security, 14(4), 343–360. doi:10.1108/09685220610690817
  • Chang, L. Y., Zhong, L. Y., & Grabosky, P. N. (2016). Citizen co‐production of cyber security: Self‐help, vigilantes, and cybercrime. Regulation & Governance, 12(1), 101–114. doi:10.1111/rego.12125
  • Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39(B), 447–459. doi:10.1016/j.cose.2013.09.009
  • Choo, K. K. R. (2010). High tech criminal threats to the national information infrastructure. Information Security Technical Report, 15(3), 104–111. doi:10.1016/j.istr.2009.09.001
  • Choo, -K.-K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719–731. doi:10.1016/j.cose.2011.08.004
  • Chun, H. (2003). Information technology and the demand for educated workers: Disentangling the impacts of adoption versus use. The Review of Economics and Statistics, 85(1), 1–8. doi:10.1162/003465303762687668
  • Chun, H., Kim, J. W., Morck, R., & Yeung, B. (2008). Creative destruction and firm-specific performance heterogeneity. Journal of Financial Economics, 89(1), 109–135. doi:10.1016/j.jfineco.2007.06.005
  • Chung, W., Chen, H., Chang, W., & Chou, S. (2006). Fighting cybercrime: A review and the Taiwan experience. Decision Support Systems, 41(3), 669–682. doi:10.1016/j.dss.2004.06.006
  • CIA. (2014). The World fact book: GINI Index. Retrieved from https://www.cia.gov/library/publications/resources/the-world-factbook/fields/2172.html#51
  • Cornish, D. B., & Clarke, R. V. (1987). Understanding crime displacement: An application of rational choice theory. Criminology, 25(4), 933–948. doi:10.1111/j.1745-9125.1987.tb00826.x
  • Das, S., Mukhopadhyay, A., & Bagchi, K. K. (2014, June 17). National-level determinants of global music piracy and online music sales: An exploratory study. Journal of Global Information Technology Management, 17(1), 6–25. doi:10.1080/1097198X.2014.910988
  • Detica Report. (2011). The cost of cyber crime.
  • Donalds, C., & Osei-Bryson, K. M. (2019). Toward a cybercrime classification ontology: A knowledge-based approach. Computers in Human Behavior, 92, 403–418. doi:10.1016/j.chb.2018.11.039
  • Elbahnasawy, N. G. (2014). E-government, internet adoption, and corruption: An empirical investigation. World Development, 57, 114–126. doi:10.1016/j.worlddev.2013.12.005
  • Farmer, D. J. (2014). ECONOMIC THEORY AND THE BIG ECONOMY. Public Administration Quarterly, 38(1), 97–124.
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. doi:10.1177/002224378101800104
  • Friedman, E., Johnson, S., Kaufmann, D., & Zoido-Lobaton, P. (2000). Dodging the grabbing hand: The determinants of unofficial activity in 69 countries. Journal of Public Economics, 76(3), 459–493. doi:10.1016/S0047-2727(99)00093-6
  • Fung. (2017). How to protect yourself from the global ransomware attack. Retrieved from https://www.washingtonpost.com/news/the-switch/wp/2017/05/15/how-to-protect-yourself-from-the-global-ransomware-attack/?noredirect=on&utm_term=.0fc63b75409c
  • Garg, V., Koster, T., & Camp, L. (2013). Cross-country analysis of spambots. EURASIP Journal on Information Security, (2013(1), 3. doi:10.1186/1687-417X-2013-3
  • Gefen, D., & Straub, D. (2005). A practical guide to factorial validity using pls-graph : Tutorial and annotated example. Communications of the Association for Information Systems, 16, 91–109. doi:10.17705/1CAIS.01605
  • Gefen, D., Straub, D. W., & Boudreau, M.-C. (2000, October). Structural equation modeling and regression : Guidelines for research practice. Communications of the Association for Information Systems, 4, 7.
  • Gibson, W. (1984). Neuromancer. Ace Books, USA.
  • Gottschalk, P., Filstad, C., Glomseth, R., & Solli-Sæther, H. (2011). Information management for investigation and prevention of white-collar crime. International Journal of Information Management, 31(3), 226–233. doi:10.1016/j.ijinfomgt.2010.07.002
  • Grobler, M., & Van Vuuren, J. J. (2010). Broadband broadens scope for cyber crime in Africa. Proceedings of the Information Security for South Africa Conference,ISSA. doi:10.1109/ISSA.2010.5588287
  • Guttman, B., & Roback, E. A. (1995). An Introduction to computer security: The NIST handbook. DIANE Publishing.
  • Hair, J. F., Black, W., Babin, B., Anderson, R., & Tatham, R. (2006). Multivariate Data Analysis. Pearson Prentice Hall Upper Saddle River, NJ, 6. doi:10.1080/19447013008687143
  • Hayward, K. (2007). Situational crime prevention and its discontents: Rational choice theory verses the “culture of now.”. Social Policy & Administration, 41(3), 232–250. doi:10.1111/j.1467-9515.2007.00550.x
  • Hechter, M., & Kanazawa, S. (1997). Sociological rational choice theory. Annual Review of Sociology, 23(1), 191–214. doi:10.1146/annurev.soc.23.1.191
  • Hediger, W., & Hediger, W. (2000). Sustainable development and social welfare. Sustainable Development, 32, 481–492.
  • Hedstrom, K., Dhillon, G., & Karlsson, F. (2010). Using actor network theory to understand information security management. In IFIP advances in information and communication technology edited by Rannenberg, K, (pp. 43–54). Springer.
  • Henseler, J., Ringle, C. M., & Sinkovics, R. R. (2009). The use of partial least squares path modeling in international marketing. Advances in International Marketing, 20, 277–319. doi:10.1016/0167-8116(92)90003-4
  • Higgins, G. (2011). Value and choice examining their roles in digital piracy. In Cyber criminology: Exploring internet crimes and criminal behavior, edited by K. Jaishankar. New York, US: Taylor & Francis Group.
  • Holt, T., Burruss, G., & Bossler, A. (2018). Assessing the macro-level correlates of malware infections using a routine activities framework. International Journal of Offender Therapy and Comparative Criminology, 62(6), 1720–1741. doi:10.1177/0306624X16679162
  • Holt, T. J., Brewer, R., & Goldsmith, A. (2018). Digital drift and the “sense of injustice”: Counter-productive policing of youth cybercrime. Deviant Behavior, 40(9), 1–13.
  • Howell, D. C. (2013). Statistical methods for psychology (8th ed.). Belmont, CA: Wadsworth.
  • Hu, Y. P., Chang, I. C., & Hsu, W. Y. (2017). Mediating effects of business process for international trade industry on the relationship between information capital and company performance. International Journal of Information Management, 37(5), 473–483. doi:10.1016/j.ijinfomgt.2017.04.004
  • Huang, D.-L., Rau, P.-L. P., & Salvendy, G. (2010). Perception of information security. Behaviour & Information Technology, 29(3), 221–232. doi:10.1080/01449290701679361
  • Hui, K., Kim, S., & Wang, Q. (2017). Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks. MIS Quarterly, 41(2), 497–523. doi:10.25300/MISQ/2017/41.2.08
  • Hutchison, D., & Mitchell, J. C. (2003). Intelligence and security informatics. South Korea: Springer.
  • Ibrahim, S. (2016). Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals. International Journal of Law, Crime and Justice, 47(4), 44–57. doi:10.1016/j.ijlcj.2016.07.002
  • Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31(1), 83–95. doi:10.1016/j.cose.2011.10.007
  • Jones, B. H., & Chin, A. G. (2015). On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time. International Journal of Information Management, 35(5), 561–571. doi:10.1016/j.ijinfomgt.2015.06.003
  • Juniper Research. (2015). Cybercrime will cost businesses over $2 trillion by 2019. Retrieved from https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion.
  • Kamat, P., & Gautam, A. S. (2018). Recent trends in the era of cybercrime and the measures to control them. In Handbook of e-business security (pp. 243–258). CRC Press, Florida, USA.
  • Kelly, P. M., & Adger, W. N. (2000). Theory and practice in assessing vulnerability to climate change and facilitating adaptation. Climatic Change, 47(4), 325–352. doi:10.1023/A:1005627828199
  • Ki, E. J., Chang, B. H., & Khang, H. (2006). Exploring influential factors on music piracy across countries. Journal of Communication, 56(2), 406–426. doi:10.1111/j.1460-2466.2006.00026.x
  • Kigerl, A. (2011). Routine activity theory and the determinants of high cybercrime countries. Social Science Computer Review, 30(4), 470–486. doi:10.1177/0894439311422689
  • Kiiski, S., & Pohjola, M. (2002). Cross-country diffusion of the Internet. Information Economics and Policy, 14(2), 297–310. doi:10.1016/S0167-6245(01)00071-3
  • Kim, S. H., Wang, Q. H., & Ullrich, J. B. (2012). A comparative study of cyberattacks. Communication of the ACM, 55(3), 66–73. doi:10.1145/2093548.2093568
  • Kleist, V. F. (2018). An interview with maria vello: Chief executive officer of the cyber defence alliance (CDA). Journal of Global Information Technology Management, 21(4), 301–305. doi:10.1080/1097198X.2018.1542263
  • Kock, N. (2017). WarpPLS 5.0 user manual. Retrieved from http://cits.tamiu.edu/WarpPLS/UserManual_v_5_0.pdf
  • KPMG report. (2017). Cybercrime survey report: Insights and perspectives.
  • Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541–562. doi:10.1016/j.intman.2005.09.009
  • Kshetri, N. (2006). The Simple Economics of Cybercrimes. IEEE Security and Privacy, 4(1), 33–39. doi:10.1109/MSP.2006.27
  • Kshetri, N. (2010). Diffusion and effects of cyber-crime in developing economies. Third Wolrd Quarterly, 31(7), 1057–1079. doi:10.1080/01436597.2010.518752
  • Kshetri, N. (2013). Cybercrime and cybersecurity in the global south. USA: Springer.
  • Kshetri, N. (2015). Cybercrime and cybersecurity issues in the BRICS Economies. Journal of Global Information Technology Management, 18(4), 245–249. doi:10.1080/1097198X.2015.1108093
  • Lagazio, M., Sherif, N., & Cushman, M. (2014). A multi-level approach to understanding the impact of cyber crime on the financial sector. Computers & Security, 45, 58–74. doi:10.1016/j.cose.2014.05.006
  • Lee, S. M., Lee, S. G., & Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information and Management, 41(6), 707–718. doi:10.1016/j.im.2003.08.008
  • Lessig, L. (1999). The law of the horse: What cyberlaw might teach. Harvard Law Review, 113(2), 501. doi:10.2307/1323828
  • Lobonţ, O. R., Nicolescu, A. C., Moldovan, N. C., & Kuloğlu, A. (2017). The effect of socioeconomic factors on crime rates in Romania: A macro-level analysis. Economic Research-Ekonomska Istrazivanja, 30(1), 91–111. doi:10.1080/1331677X.2017.1305790
  • Loughran, T., Paternoster, R., Chalfin, A., & Wilson, T. (2016). Can rational choice be considered a general theory of crime: Evidence from individual-level panel data. Criminology, 54(1), 86–112. doi:10.1111/1745-9125.12097
  • Lowry, P. B., & Gaskin, J. (2014). Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: When to choose it and how to use it. IEEE Transactions on Professional Communication, 57(2), 123–146. doi:10.1109/TPC.2014.2312452
  • Maimon, D., Kamerdze, A., Cukier, M., & Sobesto, B. (2013). Daily trends and origin of computer-focused crimes against a large university computer network: An application of the routine-activities and lifestyle perspective. The British Journal of Criminology, 53(2), 319–343. doi:10.1093/bjc/azs067
  • Mandelcorn, S., Modarres, M., & Mosleh, A. (2013). An explanatory model of motivation for cyber-attacks drawn from criminological theories. Proceedings of transactions in American nuclear society. Washington DC, USA.
  • Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Computers in Human Behavior, 92, 139–150. doi:10.1016/j.chb.2018.11.002
  • Mcmillan, S. J. (2002). A four-part model of cyber-interactivity : Some cyber-places are more interactive than others. New Media & Society, 4(2), 271–291. doi:10.1177/14614440222226370
  • Miller, S., Wagner, C., Aickelin, U., & Garibaldi, J. M. (2016). Modelling cyber - security experts â€TM decision making processes using aggregation operators. Computers & Security, 62, 229–245. doi:10.1016/j.cose.2016.08.001
  • Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767–772. doi:10.1016/j.jcrimjus.2010.05.003
  • Mousa Jaradat, M.-I. R., & Al Rababaa, M. S. (2013). Assessing key factor that influence on the acceptance of mobile commerce based on modified UTAUT. International Journal of Business and Management, 8(23), 102–113. doi:10.5539/ijbm.v8n23p102
  • Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: an examination of individual and situational level factors. International Journal of Cyber, 5(1), 773–793.
  • Nuth, M. S. (2008). Crime and technology – Challenges or solutions? Taking advantage of new technologies: For and against crime. Computer Law and Security Report, 24(5), 437–446. doi:10.1016/j.clsr.2008.07.003
  • Overvest, B., & Straathov, B. (2015). What drives cybercrime? Empirical evidence from DDoS attacks. CPB Netherlands Bureau for Economic Policy Analysis. Retrieved from https://www.cpb.nl/sites/default/files/publicaties/download/cpb-discussion-paper-306-what-drives-cybercrime-empirical-evidence-ddos-attacks.pdf
  • Pawlak, P., & Wendling, C. (2013). Trends in cyberspace: Can governments keep up? Environment Systems and Decisions, 33(4), 536–543. doi:10.1007/s10669-013-9470-5
  • Preacher, K. J., & Hayes, A. F. (2004). SPSS and SAS procedures for estimating indirect effects in simple mediation models. Behavior Research Methods, Instruments, & Computers : A Journal of the Psychonomic Society, Inc, 36(4), 717–731. doi:10.3758/BF03206553
  • Rand Corporation Report. (2018). Estimating the global cost of cyber risk.
  • Ransbotham, S., & Mitra, S. (2009). Choice and chance: A conceptual model of paths to information security compromise. Information Systems Research, 20(1), 121–139. doi:10.1287/isre.1080.0174
  • Reichl, P., Tuffin, B., & Schatz, R. (2013). Logarithmic laws in service quality perception: Where microeconomics meets psychophysics and quality of experience. Telecommunication Systems, 52, 587–600. doi:10.1007/s11235-011-9503-7
  • SANS Institute. (2014). Country report. Retrieved from https://isc.sans.edu/country.html
  • Sarma, S. (2016). Cyber security mechanism in European Union. Indian Council of World Affairs. Retrieved from https://icwa.in/pdfs/vp/2014/cybersecuritymechanismineuropeanunionvp26042016.pdf
  • Schwab, K. (2014). WEF Global Competitiveness report, 2013-14. Retrieved from http://www3.weforum.org/docs/WEF_GlobalCompetitivenessReport_2013-14.pdf
  • Shameli-Sendi, A., Aghababaei-Barzegar, R., & Cheriet, M. (2016). Taxonomy of information security risk assessment (ISRA). Computers & Security, 57, 14–30. doi:10.1016/j.cose.2015.11.001
  • Silberman, M. (1976). Toward a Theory of Criminal Deterrence Author. American Sociological Review, 41(3), 442–461. doi:10.2307/2094253
  • Smith, K., Jones, A., Johnson, L., & Smith, L. (2019). Examination of cybercrime and its effects on corporate stock value. Journal of Information, Communication and Ethics in Society, 17(1), 42–60. doi:10.1108/JICES-02-2018-0010
  • Solano, P. C., & Peinado, A. J. R. (2017). Socio-economic factors in cybercrime: Statistical study of the relation between socio-economic factors and cybercrime. Proceedings of International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), IEEE. (pp. 1–4). London, UK.
  • Soldo. (2009). Technical Report: Predicting future attacks Data analysis of Dshield data set. Retrieved from http://www.ece.uci.edu/~athina/PAPERS/dshield-analysis-tr.pdf
  • Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215–225. doi:10.1016/j.ijinfomgt.2015.11.009
  • Stalans, L., & Donnor, C. (2018). Explaining why cybercrime occurs: Criminological and psychological theories. cyber criminology. In H. Jahankhani (Ed.), Cyber criminology. Advanced sciences and technologies for security applications. Cham: Springer. doi:10.1007/978-3-319-97181-0_2
  • Straub, D., Boudreau, M., & Gefen, D. (2004). Validation guidelines for IS positivist research. The Communications of the Association for Information Systems, 13, 380–427. Retrieved from http://aisel.aisnet.org/cgi/viewcontent.cgi?article=3243&context=cais
  • Tabachnick, B. G., & Fidell, L. S. (2007). Using multivariate statistics. Pearson (5th ed.). Boston, USA. doi:10.1037/022267
  • Tatarinova, L., Shakirov, K., & Tatarinov, D. (2016). Criminological analysis of determinants of cybercrime technologies. IEJME — Mathematics Education, 11(5), 1127–1134.
  • The Heritage Foundation. (2014). Heritage foundation, index of economic freedom. Retrieved from https://www.heritage.org/index/
  • The White House Report. (2018). National Cyber Strategy of the United States of America. Retrieved from https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
  • Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers and Security, 24(6), 472–484. doi:10.1016/j.cose.2005.05.002
  • Transparency International. (2013). Corruption Perception Index 2013. Retrieved from https://www.transparency.org/cpi2013/results
  • Transparency International. (2014). Corruption perception index. Retrieved from https://www.transparency.org/
  • UNDP. (2014). Human development report 2014.
  • United Nations. (2014). E-government survey 2014. Retrieved from https://www.un.org/en/development/desa/publications/e-government-survey-2014.html
  • United Nations. (2014). E-Government Survey 2014.
  • Van de Weijer, S., Leukfeldt, R., & Bernasco, W. (2018). Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking. European Journal of Criminology. doi:10.1177/1477370818773610
  • Veerasamy, N., & Taute, B. (2009). An Introduction to emerging threats and vulnerabilities to creat user awareness. Retrieved from https://pdfs.semanticscholar.org/8e42/e7b968e4dd4e896f32d54fada995bed53123.pdf
  • Vigil, M., Buchmann, J., Cararcas, D., Weinert, C., & Wiesmaier, A. (2015). Integrity, authenticity, non - repudiation, and proof of existence for long - term archiving : A survey. Computers & Security, 50, 16–32. doi:10.1016/j.cose.2014.12.004
  • Walters, G. D. (2015). Proactive criminal thinking and the transmission of differential association: A cross-lagged multi-wave path analysis. Criminal Justice and Behavior, XX(X), 1–17. doi:10.1177/0093854815582042
  • Workman, M., Bommer, W. H., & Straub, D. (2009). The amplification effects of procedural justice on a threat control model of information systems security behaviours. Behaviour & Information Technology, 28(6), 563–575. doi:10.1080/01449290802556021
  • Wu, Y. (2014). Protecting personal data in E-government: A cross-country study. Government Information Quarterly, 31(1), 150–159. doi:10.1016/j.giq.2013.07.003
  • Zhang, J., Porras, P., & Ullrich, J. (2008). Highly Predictive Blacklisting. In Proceedings of the 17th Conference on Security symposium. USA, CA. Retrieved from http://www.usenix.org/event/sec08/tech/full_papers/zhang/zhang_html/

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.