International Journal of Soft Computing

Year: 2021
Volume: 16
Issue: 1
Page No. 9 - 19

Adventurism, Information Technology Self-Efficacy and Age as Predictors of Cybercrime among University Undergraduates

Authors : NwabuezeCletus Offor

References

Ajzen, I. and M. Fishbein, 1980. Understanding Attitudes and Predicting Social Behavior. Prentice-Hall, Englewood Cliffs, New Jersey, ISBN-13: 978-0139364358, Pages: 278.

Ajzen, I., 1991. The theory of planned behavior. Organiz. Behav. Hum. Decis. Process., 50: 179-211.
CrossRef  |  Direct Link  |  

Aspan, M. and K. Soh, 2011. Citi says 360000 accounts hacked in May cyber attack. Thomson Reuters Corporation, Toronto, Canada.

Bort, J., 2013. The American library association has given Aaron Swartz its first ever posthumous award. Inside Inc., London, UK.

Broadhurst, R., P. Grabosky, M. Alazab, B. Bouhours and S. Chon, 2014. An analysis of the nature of groups engaged in cyber crime. Anal. Nature Groups Engaged Cyber Crime Int. J. Cyber Criminology, 8: 1-20.
Direct Link  |  

Burt, C.H. and R.L. Simons, 2013. Self-control, thrill seeking and crime: Motivation matters. Criminal Justice Behav., 40: 1326-1348.
CrossRef  |  Direct Link  |  

Cai, T., L. Du, Y. Xin and L.Y. Chang, 2018. Characteristics of cybercrimes: Evidence from Chinese judgment documents. Police Pract. Res., 19: 582-595.
CrossRef  |  Direct Link  |  

Chickowski, E., 2011. The most notorious cybercrooks of 2011-and how they got caught. Dark Reading, Informa PLC, London UK.

Choi, M., Y. Levy and A. Hovav, 2013. The role of user computer self-efficacy, cybersecurity countermeasures awareness and cybersecurity skills influence on computer misuse. Proceedings of the 8th Pre-ICIS Workshop on Information Security and Privacy, December 14, 2013, AISeL, Milano, pp: 1-19.

Cluley, G., 2016. Citibank IT guy deliberately wiped routers, short down 90% of firm’s network across America. DataBreaches LLC., USA.

Cohen, A., 2013. Was Aaron Swartz really killed by government. TIME USA, LLC., USA.

Constantin, L., 2012. Improved Carberp banking malware will target North American banks. IDG Communication, Framingham, Massachusetts.

Cronan, T.P. and S. Al-Rafee, 2008. Factors that influence the intention to pirate software and media. J. Bus. Ethics, 78: 527-545.
CrossRef  |  Direct Link  |  

Cronan, T.P., C.B. Foltz and T.W. Jones, 2006. Piracy, computer crime and IS misuse at the university. Commun. ACM., 49: 84-90.
CrossRef  |  Direct Link  |  

Davies, C., 2010. Welcome to dark market-global one-stop shop for cybercrime and banking fraud. The Guardian, London, UK.

Eimiller, L., 2011. Florida man arrested in operation hackerazzi for targeting celebrities with computer intrusion, wiretapping and identity theft. Federal Bureau of Investigation, Washington, USA.

Glenny, M., 2011. DarkMarket: CyberThieves, CyberCops and You. Alfred A. Knopf, New York, USA., Pages: 296.

Gopal, R.D. and G.L. Sanders, 1997. Preventive and deterrent controls for software piracy. J. Manage. Inf. Syst., 13: 29-47.
CrossRef  |  Direct Link  |  

Hinduja, S., 2003. Trends and patterns among online software pirates. Ethics Inf. Technol., 5: 49-61.
CrossRef  |  Direct Link  |  

Hu, Q., N.C. Vukadinovic and D.R. Lynam, 2017. Computer criminal behavior is related to psychopathology and other psychosocial behavior. Criminal Justice, 51: 67-73.

Italino, L., 2012. Ex-staffer sentenced to 2-6 years for hacking into Gucci’s system. NYP Holdings, Inc., New York, USA.

Leonard, L.N., T.P. Cronan and J. Kreie, 2014. What influences IT ethical behavior intentions-planned behavior, reasoned action, perceived importance or individual characteristics?. Inf. Manage., 42: 143-158.
CrossRef  |  Direct Link  |  

Liebowitz, M., 2012. UK hacker sentenced for stealing 8 million identities. NBC News, New York, USA.

Okeshola, F.B. and A.K. Adeta, 2013. The nature, causes and consequences of cyber crime in tertiary institutions in Zaria-Kaduna state, Nigeria. Am. Int. J. Contemp. Res., 3: 98-114.
Direct Link  |  

Omodunbi, B.A., P.O. Odiase, O.M. Olaniyan and A.O. Esan, 2016. Cybercrime in Nigeria: Analysis, detection and prevention. FUOYE J. Eng. Technol., 1: 37-41.
CrossRef  |  Direct Link  |  

Seale, D.A., M. Polakowski and S. Schneider, 1998. It’s not really theft!: Personal and workplace ethics that enable software piracy. Behav. Inf. Technol., 17: 27-40.
CrossRef  |  Direct Link  |  

Shinder, D.L., 2002. Scene of the Cybercrime: Computer Forensic Handbook. Syngress Publishing Inc, Massachusetts, USA., Pages: 719.

The Free Dictionary, 2016. American Heritage Dictionary of English Language. 5th Edn., Houghton Mifflin Harcourt, Boston, Massachusetts, USA.,.

The Guardian, 2013. LulzSec hacktivists handed long jail sentence for hacking. Guardian News & Media Limited, London, UK.

US Atorney’s Office, 2013. Eight members of New York cell of cyber crime organization indicted in $45 million cyber crime campaign. US Atorney’s Office, Charleston, West Virginia.

US Departmenst of Justice, 2002. Warez leader sentenced to 46 months. US Department of Justice, Washington, USA.

US Federal Bureau of Investigation, 2011. Malware click fraud kingpin arrested in Estonia. US Federal Bureau of Investigation, Washington, USA.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved