2007
DOI: 10.1177/0894439306292346
|View full text |Cite
|
Sign up to set email alerts
|

Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?

Abstract: This study examines the functionality and propagation patterns of computer viruses, worms, and Trojan horses detected during a 12-month period beginning on January 1, 2004. Using data obtained from threat reports prepared by a major vendor of computer security products, the authors find that these unique forms of cybercrime warrant general concern but that their overall threat to corporate, government, and end computer users thus far has been exaggerated. The authors conclude that greater attention must be pai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0
1

Year Published

2008
2008
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 8 publications
0
8
0
1
Order By: Relevance
“…These negative social attitudes may be shared and learned through associations with peers who are involved in destructive activities by way of computer hacking. While some research has suggested that malicious hackers are the exception, not the rule, the outcome of their behaviors can take a toll on a multitude of victims which makes the problem especially worthy of systematic exploration (Hughes and DeLone, 2007).…”
Section: Types Of Computer Hackingmentioning
confidence: 99%
See 3 more Smart Citations
“…These negative social attitudes may be shared and learned through associations with peers who are involved in destructive activities by way of computer hacking. While some research has suggested that malicious hackers are the exception, not the rule, the outcome of their behaviors can take a toll on a multitude of victims which makes the problem especially worthy of systematic exploration (Hughes and DeLone, 2007).…”
Section: Types Of Computer Hackingmentioning
confidence: 99%
“…This analogy is interesting from a social learning perspective as studies on delinquency and delinquent groups, specifically gangs, have supported social learning principles (Akers, 1998;Battin et al, 1998;Winfree et al, 1994). Further, Warr (2002) discussed the concept of "virtual peer groups'' and suggested a need for increased criminological attention (see also Harrington, 1989;Hughes and DeLone, 2007). Skinner and Fream (1997) built on the work of Hollinger (1993), who reported a strong relationship between computer crime (unauthorized account access) and friends' involvement as well as perceived certainty of detection.…”
Section: Types Of Computer Hackingmentioning
confidence: 99%
See 2 more Smart Citations
“…For backup information, it should be done centrally and individually by central IT unit and individual user [8]. Further, data security also covers other aspects around computer viruses, worms and Trojan horses which may cause and spread from adware, spyware or cybercrime [9].…”
Section: A Information Security Device Security and Data Security Tmentioning
confidence: 99%