2021
DOI: 10.1007/s12103-021-09654-5
|View full text |Cite
|
Sign up to set email alerts
|

Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(15 citation statements)
references
References 42 publications
0
15
0
Order By: Relevance
“…questionnaires, interviews, analysis of court cases), and assessing different participants (e.g. students, law enforcement, and active or former hackers) (Berenblum et al, 2019;Bossler, 2019Bossler, , 2021bBossler & Burruss, 2011;Fox & Holt, 2021;Holt et al, 2017Holt et al, , 2020Hu et al, 2012;Hutchings, 2013;Lee & Holt, 2020;Marcum et al, 2014;McBrayer, 2014;Skinner & Fream, 1997;Steinmetz, 2015;Turgeman-Goldschmidt, 2011;Udris, 2016). It seems that men stand a greater chance of being part of the social learning process of hacking, and are therefore more likely to hack (Bossler & Burruss, 2011).…”
Section: Hackingmentioning
confidence: 99%
“…questionnaires, interviews, analysis of court cases), and assessing different participants (e.g. students, law enforcement, and active or former hackers) (Berenblum et al, 2019;Bossler, 2019Bossler, , 2021bBossler & Burruss, 2011;Fox & Holt, 2021;Holt et al, 2017Holt et al, , 2020Hu et al, 2012;Hutchings, 2013;Lee & Holt, 2020;Marcum et al, 2014;McBrayer, 2014;Skinner & Fream, 1997;Steinmetz, 2015;Turgeman-Goldschmidt, 2011;Udris, 2016). It seems that men stand a greater chance of being part of the social learning process of hacking, and are therefore more likely to hack (Bossler & Burruss, 2011).…”
Section: Hackingmentioning
confidence: 99%
“…A comprehensive literature review demonstrated that researchers have examined the relationship between cybercrime and techniques of neutralisation to understand the justification processes involved in online crime. However, most of scholarly research has focused on digital piracy (see [11], [28][29][30][31][32][33]), with some additional studies on sexting [27], cyberbullying [34] and computer hacking [35].…”
Section: Neutralisation Theory and Cybercrimementioning
confidence: 99%
“…Ransomware is a complex phenomenon that involves at least two types of crime: hacking and cyber extortion [39]. Considering the first one, reference [33] has argued that very limited work has focused on the use of neutralisation techniques in hacking. For instance, reference [40] found that software crackers do not deny responsibility for their actions and argue that some of their targets (i.e., vendors of expensive software) deserve to be victimised.…”
Section: Neutralisation Theory and Cybercrimementioning
confidence: 99%
See 1 more Smart Citation
“…The financial industry faced numerous cyber security attacks during the COVID-19 crisis. At 5.85 million dollars, the mean cost of cybercrime in the financial services business is also among the highest of any industry ( ibm.com, 2020 , Najaf et al, 2020 , Bossler, 2021 ). It has compelled financial institutions like banks and insurance firms to continue providing online assistance to their customers.…”
Section: Existing Workmentioning
confidence: 99%