2013
DOI: 10.1093/bjc/azs067
|View full text |Cite
|
Sign up to set email alerts
|

Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network: An Application of the Routine-Activities and Lifestyle Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
39
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(40 citation statements)
references
References 34 publications
1
39
0
Order By: Relevance
“…(Selwyn, 2008). Maimon and collaborators' work that analyzed computer-focused crimes against a large university computer network states that "our findings support the view that the routine-activities and lifestyle perspective could be used to explain cybercrime" (Maimon, 2013). Selwyn explored the propensity of British university students to participate is "lesser" Internet-based online misbehavior (Selwyn, 2008).…”
Section: Routine Activities Theory Pdos and Unethical Student Onlinsupporting
confidence: 60%
“…(Selwyn, 2008). Maimon and collaborators' work that analyzed computer-focused crimes against a large university computer network states that "our findings support the view that the routine-activities and lifestyle perspective could be used to explain cybercrime" (Maimon, 2013). Selwyn explored the propensity of British university students to participate is "lesser" Internet-based online misbehavior (Selwyn, 2008).…”
Section: Routine Activities Theory Pdos and Unethical Student Onlinsupporting
confidence: 60%
“…In fact, in recent research, some co‐authors of Testa et al. (), using honeypots deployed in Israel, China, and the United States, found substantially different conclusions on the country of origin, or on the last observable connecting IP address, of attackers (Maimon et al., , ).…”
Section: Questioning the Validity Of Deterrence For System Intruders mentioning
confidence: 99%
“…Several high-profile cybercrime investigations over the last decade remain open because suspects named in indictments cannot be brought to justice (Holt and Bossler, 2016). In fact, in recent research, some co-authors of Testa et al (2017), using honeypots deployed in Israel, China, and the United States, found substantially different conclusions on the country of origin, or on the last observable connecting IP address, of attackers (Maimon et al, 2013(Maimon et al, , 2015.…”
Section: Questioning the Validity Of Deterrence For System Intruders mentioning
confidence: 99%
See 1 more Smart Citation
“…Another concern is that the behaviors of the computer intruders within that honeypot or network may be unique to that specific honeypot or network. Even comparing findings from honeypot data from universities in three different countries (e.g., United States, China, or Israel) illustrates that computer intrusion patterns differ (Maimon et al., , ). It would therefore be expected that computer intrusion patterns and the deterrent capabilities of warning banners would differ on other factors as well, such as types of organizations (financial, government, industrial, etc.…”
Section: Implications Of Honeypot Limitationsmentioning
confidence: 99%