On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory

Document Type

Article

Publication Date

2-2009

Publication Title

International Journal of Cyber Criminology

Abstract

Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for criminals and is partially responsible for the global increase in cybercrime. Criminology, however, has been slow to explore the theoretical causes and correlates of malware victimization. This study uses a routine activities framework to explore data loss caused by malware infection in a college sample. Similar to research on traditional forms of victimization, computer deviance was related with computer victimization. Physical guardianship, however, had little effect. Policy implications to decrease malware victimization in a college sample focus on decreasing computer deviance rather than physical target hardening.

Copyright

IJCC articles are published under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, at the free choice of the authors. Under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, share alike, for non-commercial use, provided the original work is properly cited. This license does not permit commercial exploitation without specific permission. (read full legal code). After publication, the author has the right to quote from, reprint, translate, or reproduce the article in any book or monograph he/she may later write without seeking permission from the Publisher. However, if the author wants to publish the IJCC article to some other author's book or monograph (commercial third party) he/she should get written permission of the Editor-in-Chief to publish the same.

Share

COinS