Kriminológiai elméletek és informatikai bűnözés
DOI:
https://doi.org/10.59851/imr.10.1.12Kulcsszavak:
hacking, informatikai bűnözés, kibertérfüggő bűnözés, kriminalizálódás, kriminológiaelméletAbsztrakt
Az informatikai bűnözés a mindennapjainkat érintő és a kutatói szférát foglalkoztató kérdéssé vált a XXI. században. A tanulmány ennek okán az online térben jelenlévő bűnelkövetési formák lehetséges okainak elemzését végzi el. A kriminológia elméletein keresztül láthatóvá válik, hogy különböző szemléletek hogyan alapozhatják meg az informatikai bűnelkövetővé válás kutatását. E tanulmány a kriminológiában ismert számos elmélet közül a racionális döntéselmélet, a rutincselekvési elmélet, a bűnözés általános elmélete, a társadalmi kötődéselmélet, a társadalmi tanuláselmélet, a neutralizációelmélet és a fejlődéskriminológia informatikai bűnözésben való alkalmazásának lehetőségeit vizsgálja. Az írás összességében az interakcionista paradigmában és a fejlődéskriminológiában rejlő lehetőségekre, illetve ezek vegyítésének előnyeire hívja fel a figyelmet. Az elemzés tartalmazza a kiválasztott elméletek alapvetéseit, majd a leggyakrabban idézett kriminológiai kutatások eredményeinek segítségével rávilágít e terület kutatási perspektíváira. A tanulmány kitér a vizsgált kutatások hiányosságaira és az ezen elméletek alkalmazáshatóságával kapcsolatos kételyekre is.
Hivatkozások
Adam M. Bossler - George W. Burruss: The General Theory of Crime and Computer Hacking: Low Self-Control Hekkers? In: Thomas j. Holt - Bernadette H. Schell (szerk.): Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. Hershey, Information Science Reference, 2011. 38-67. https://doi.org/10.4018/978-1-61692-805-6.ch003
Albert J. Reiss - A. Lewis Rhodes: An Empirical Test of Differential Association Theory. 1(1) Journal of Research in Crime and Delinquency (1964) 5-18. https://doi.org/10.1177/002242786400100102
Alex Piquero - Stephen Tibbetts: Specifying the Direct and Indirect Effects of Low Self-Control and Situational Factors in Offenders' Decision Making: Toward a More Complete Model of Rational Offending. 13(3) Justice Quarterly (1996) 481-510. https://doi.org/10.1080/07418829600093061
Alexander T. Vazsonyi - Hana Machackova - Anna Sevcikova - David Smahel - Alena Cerna: Cyberbullying in Context: Direct and Indirect Effects by Low Self-Control Across 25 European Countries. 9(2) European Journal of Developmental Psychology (2012) 210-227. https://doi.org/10.1080/17405629.2011.644919
Alfred Blumstein et alii (szerk.): Criminal Careers and "Career Criminals", 1. Report of the Panel on Criminal Careers. Washington, National Academy of Sciences, 1986.
Alice Hutchings: Cybercrime Trajectories: An Intergrated Theory of Initiation, Maintenance and Desistance. In: Thomas J. Holt (szerk..): Crime Online: Correlates, Causes, and Context. Durham, Carolina Academic Press, (3. kiad.) 2016. 122-123.
Alice Hutchings: Hacking and Fraud: Qualitative Analysis of Online Offending and Victimization. In: Karuppannan Jaishankar - Natti Ronel (szerk.): Global Criminology: Crime and Victimization in a Globalized Era. Boca Raton, CRC, 2013. 93-114. https://doi.org/10.1201/b13925-9
Andrew Goldsmith - Russell Brewer: Digital Drift and the Criminal Interaction Order. 19(1) Theoretical Criminology (2015) 112-130. https://doi.org/10.1177/1362480614538645
Balogh Karolina: A fejlődéskriminológia mint a fiatalkori bűnmegelőzés elméleti kerete. In: Fazekas Marianna (szerk.): Jogi tanulmányok: Előadások az Eötvös Loránd Tudományegyetem Állam- és Jogtudományi Kar Doktori Iskoláinak Konferenciáján. 2018 június 7. Budapest, ELTE ÁJK Állam- és jogtudományi Doktori Iskola, 2018. 367-378., 367-368.
Bill Chu - Thomas J. Holt - Gail Joon Ahn: Examining the Creation, Distribution, and Function of Malware On-Line. Washington, National Institute of Justice, 2010.
Borbíró Andrea - Győry Csaba: Kultúra és társas interakciók. In: Borbíró i. m. (3. lj.) 129-166., 138.
Borbíró Andrea et alii (szerk.): Kriminológia. Budapest, Wolters Kluwer, 2019. 45-46. https://doi.org/10.55413/9789632959313
Bradford W. Reyns - Billy Henson - Bonnie S. Fisher: Being Pursued Online: Applying CyberlifestyleRoutine Activities Theory to Cyberstalking Victimization. 38(11) Criminal Justice and Behavior (2011) 1149-1169. https://doi.org/10.1177/0093854811421448
Brooke Nodeland - Robert Morris: A Test of Social Learning Theory and Self-Control on Cyber Offending. 41(1) Deviant Behavior (2018) 41-56. https://doi.org/10.1080/01639625.2018.1519135
Carl B. Klockars: The Professional Fence. New York, Free Press, 1974.
Catherine D. Marcum et alii: Hacking in High School: Cybercrime Perpetration by juveniles, 35(7) Deviant Behavior (2014) 581-591. https://doi.org/10.1080/01639625.2013.867721
Chris Gibson - John Wright: Low Self-Control and Coworker Delinquency: A Research Note. 29(6) Journal of Criminal Justice (2001) 483-492. https://doi.org/10.1016/S0047-2352(01)00111-8
Christopher Birkbeck - Gary LaFree: The Situational Analysis of Crime and Deviance. 19 Annual Review of Sociology (1993) 113-137. https://doi.org/10.1146/annurev.so.19.080193.000553
Christopher M. Donner et alii: Low Self-Control and Cybercrime: Exploring the Utility of the General Theory of Crime Beyond Digital Piracy. 34(1) Computers in Human Behavior (2014) 65-172. https://doi.org/10.1016/j.chb.2014.01.040
Clarence R. Jeffery: An Integrate Theory of Crime and Criminal Behavior. 49(6) Journal of Criminal Law, Criminology and Police Science (1959) 533-552. https://doi.org/10.2307/1141517
Clifford R. Shaw - Henry D. McKay: Juvenile Delinquency and Urban Areas. Chicago, University of Chicago Press, 1969.
Dana L. Haynie: Delinquent Peers Revisited: Does Network Structure matter? 106(4) American Journal of Sociology (2001) 1013-1057. https://doi.org/10.1086/320298
Daniel S. Nagin - Raymond Paternoster: Enduring Individual Differences and Rational Choice Theories of Crime. 27 Law & Society Review (1993) 467-496. https://doi.org/10.2307/3054102
David Maimon et alii: Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network: An Application of the Routine-Activities and Lifestyle Perspective. 53 British Journal of Criminology (2013) 319-343. https://doi.org/10.1093/bjc/azs067
Derek B. Cornish - Ronald V. Clarke (szerk.): The Reasoning Criminal. New York, Springer, 1986. 935 https://doi.org/10.1007/978-1-4613-8625-4.
Derek B. Cornish - Ronald V. Clarke: The Rational Choice Perspective. In: Richard Wortley - Lorraine Mazerolle (szerk.): Environmental Criminology and Crime Analysis. Devon, Willan, 2008. 21-47.
Derek B. Cornish - Ronald V. Clarke: Understanding Crime Displacement: An Application of Rational Choice Theory. 25(4) Criminology (1987) 933-948. https://doi.org/10.1111/j.1745-9125.1987.tb00826.x
Donald R. Cressey: Application and Verification of the Differential Association Theory. 43(1) Journal of Criminal Law, Criminology and Police Science (1952-1953) 43-52. https://doi.org/10.2307/1138991
Donald R. Cressey: Epidemiology and Individual Conduct: A Case from Criminology. 3 Pacific Sociological Review (1960) 47-58., 49. https://doi.org/10.2307/1388200
Donald R. Cressey: Other People's Money. Glencoe, Free Press, 1953;
Edwin H. Sutherland - Donald R. Cressey: Criminology. Philadelphia, Lippincott, (9. kiad.) 1974.
Edwin H. Sutherland: Principles of Criminology. Chicago, Lippincott, (3. kiad.) 1939. 55.
Eric R. Leukfeldt - Majid Yar: Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis. 37(3) Deviant Behavior (2016) 263-280. https://doi.org/10.1080/01639625.2015.1012409
Gary S. Becker: The Economic Approach to Human Behavior. Chicago, University of Chicago Press, 1976.
George E Higgins - Scott E. Wolfe - Catherine D. Marcum: Digital Piracy: An Examination of Three Measurements of Self-Control. 29(5) Deviant Behavior (2008) 440-460. https://doi.org/10.1080/01639620701598023
George E Higgins: Digital Piracy: An Examination of Low Self-Control and Motivation Using ShortTerm Longitudinal Data. 10(4) Cyberpsychology and Behavior (2007) 523-529. https://doi.org/10.1089/cpb.2007.9995
George E. Higgins - Abby L. Wilson - Brian D. Fell: An Application of Deterrence Theory to Software Piracy. 12(3) Journal of Criminal Justice and Popular Culture (2005) 166-184.
George E. Higgins - Abby L. Wilson: Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students' Intentions to Pirate Software. 19(2) Security Journal (2006) 75-92. https://doi.org/10.1057/palgrave.sj.8350002
George E. Higgins - Catherine D. Marcum: Can the Theory of Planned Behavior Mediate the Effects of Low Self-Control on Alcohol Use? 39 College Student Journal (2005) 90-103.;
George E. Higgins - David A. Makin: Does Social Learning Theory Condition the Effects of Low Self-Control on College Students' Software Piracy. 2(2) Journal of Economic Crime Management (2004) 1-22.;
George E. Higgins: Digital Piracy, Self-Control Theory, and Rational Choice: An Examination of the Role of Value. 1(1) International Journal of Cyber Criminology (2007) 33-55.
Gordon R. Meyer: The Social Organization of the Computer Underground. Szakdolgozat, Northern Illinois University (1989), http://aom.jku.at/archiv/cmc/text/meyer_89.pdf.
Grasham M. Sykes - David Matza: Techniques of Neutralization: A Theory of Delinquency. 22(6) American Sociological Review (1957) 664-670. https://doi.org/10.2307/2089195
Gustavo S. Mesch: Social Bonds and Internet Pornographic Exposure among Adolescents. 32(3) Journal of Adolescence (2009) 601-618. https://doi.org/10.1016/j.adolescence.2008.06.004
Győry Csaba: Kontrollelméletek. In: Borbíró i. m. (3. lj.) 186.
Heng C. O. Chan - Dennis S. W. Wong: The Overlap Between School Bullying Perpetration and Victimization: Assessing the Psychological, Familial, and School Factors of Chinese Adolescents in Hong Kong. 24(11) Journal of Child and Family Studies (2015) 3224-3234. https://doi.org/10.1007/s10826-015-0125-7
Holt-Bossler i. m. (4. lj.) 70. A fiatalok harassment viktimizációja és a fejlettebb technológiai készségek kapcsolatáról l. Adam M. Bossler - Thomas J. Holt - David C. May: Predicting Online Harassment Victimization Among a Juvenile Population. 44(4) Youth & Society (2012) 500-523. https://doi.org/10.1177/0044118X11407525
Holt-Bossler i. m. (4. lj.) 71. L. még Scott E. Wolfe - George E Higgins - Catherine D. Marcum: Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses. 26(3) Social Science Computer Review (2008) 317-333. https://doi.org/10.1177/0894439307309465
Hyunin Baek - Michael M. Losavio - George E. Higgins: The Impact of Low Self-Control on Online Harassment: Interaction with Opportunity. 11(3) Journal of Digital Forensics, Security and Law (2016) 27-42. https://doi.org/10.15394/jdfsl.2016.1417
Inzelt Éva: A kriminológiai gondolkodás kezdetei. In: Borbíró i. m. (3. lj.) 59-62.
James D. Unnever - Dewey G. Cornell: Bullying, Self-Control, and ADHD. 18(2) Journal of Interpersonal Violence (2003) 129-147. https://doi.org/10.1177/0886260502238731
James F. Short, Jr.: Differential Association as a Hypothesis: Problems of Empirical Testing. 8(1) Social Problems (1960) 14-25. https://doi.org/10.2307/798626
James W. Coleman: The Criminal Elite: The Sociology of White Collar Crime. New York, St. Martin's, 1985.
Jason R. Ingram - Sameer Hinduja: Neutralizing Music Piracy: An Empirical Examination. 29(4) Deviant Behavior (2008) 334-366. https://doi.org/10.1080/01639620701588131
John E. Eck - Ronald V. Clarke: Classifying Common Police Problems: A Routine Activity Approach. 16(7) Crime Prevention Studies (2003) 7-39.
John Suler: The Online Disinhibition Effect. 7(3) Cyberpsychology and Behavior (2004) 321-326. https://doi.org/10.1089/1094931041291295
Jordana N. Navarro - Catherine D. Marcum: Deviant Instruction: The Applicability of Social Learning Theory to Understanding Cybercrime. In: Thomas J. Holt - Adam M. Bossler (szerk.): The Palgrave Handbook of International Cybercrime and Cyberdeviance. Cham, Palgrave Macmillan, 2020. 1-18. https://doi.org/10.1007/978-3-319-90307-1_18-1
Karuppannan Jaishankar: Space Transition Theory of Cyber Crimes. In: Frank Schmalleger -Michael Pittaro (szerk.): Crimes of the Internet. Upper Saddle River, Prentice Hall, 2008. 283-301.;
Katalin Parti: Suitable Targets and Capable Guardians Online. An Expansion of The Integrated CyberLifestyle/Routine Activity Theory Explaining Online Victimization. Victims & Offenders (megjelenés előtt).
Lawrence E. Cohen - Marcus Felson: Social Change and Crime Rate Trends: A Routine Activity Approach. 44(4) American Sociological Review (1979) 588-608. https://doi.org/10.2307/2094589
Marcus K. Rogers: A Social Learning Theory and Moral Disengagement Analysis of Criminal Computer Behavior: An Exploratory STUDY. Doktori értekezés (2003), 57-58.
Marjie T. Britz: Computer Forensics and Cyber Crime: An Introduction. Upper Saddle River, Prentice Hall, 2006.
Mark Lanier - Stuart Henry: Essential Criminology. Boulder, Westview, 1998.
Marleen W. Kranenbarg: Cyber-Offenders Versus Traditional Offenders: An Empirical Comparison. Doktori értekezés, Vrije Universiteit (2018) https://research.vu.nl/ws/portalfiles/portal/56319015/complete+dissertation.pdf.
Michael Bachmann: The Risk Propensity Computer Hekkers and Rationality. 4(1-2) International Journal of Cyber Criminology (2010) 643-656.
Michael Bachmann: What Makes Them Click? Applying The Rational Choice Perspective To The Hacking Underground. Doktori értekezés, MA University of Mannheim (2004), https://stars.library.ucf.edu/cgi/viewcontent.cgi?article=4790&context=etd.
Michael Cherbonneau - Heith Copes: "Drive It Like You Stole It": Auto Theft and the Illusion of Normalcy. 46(2) British Journal of Criminology (2006) 193-211. https://doi.org/10.1093/bjc/azi059
Michael R. Gottfredson - Travis Hirschi: A General Theory of Crime. Palo Alto, Stanford University Press, 1990. https://doi.org/10.1515/9781503621794
Nick Flynn: Criminal Behaviour in Context. Space, Place and Desistance from Crime. New York, Willian, 2010.
Parti Katalin - Virág György: A szájbergyerek és a bicikli. A kelet-európai gyerekek nethasználatának specifikumai. In: Virág György (szerk.): Kriminológiai Tanulmányok 48. Budapest, OKRI, 2011. 29-48., 42-43.
Parti Katalin: Devianciák a virtuális valóságban, avagy a virtuális közösségek személyiségformáló ereje. Infokommunikáció és Jog, 2007/2. 57-64., 60.;
Parti Katalin: Számítástechnikai devianciák és társadalmi kötődés (ISRD-2). Kriminológiai Tanulmányok 45. (2008), 149-174.
Patrick T. Kinkade - Michael Bachmann - Brittany Smith-Bachmann: Hekker Woodstock: Observations on an Offline Cyber Culture at the Chaos Communication Camp 2011. In: Thomas J. Holt (szerk.): Crime Online: Correlates, Causes, and Context. Durham, Carolina Academic Press, 2016. 29-55.
Paul Cromwell - Quint Thurman: The Devil Made Me Do It: Use of Neutralizations by Shoplifters. 24(6) Deviant Behavior (2003) 535-550. https://doi.org/10.1080/713840271
Podoletz Léna: Környezeti kriminológia. In: Borbíró i. m. (3. lj.) 233-253., 241.;
Reinis Udris: Cyber Deviance among Adolescents and the Role of Family, School, and Neighborhood: A Cross-National Study. 10(2) International Journal of Cyber Criminology (2016) 127-146.
Richard A. Cloward - Lloyd E. Ohlin: Delinquency and Opportunity: A Theory of Delinquent Gangs. New York, Free Press, 1960. https://doi.org/10.2307/2090685
Richard C. Hollinger: Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access. 4 Security Journal (1993) 2-12. https://doi.org/10.1016/0142-0496(93)90253-S
Robert G. Morris - Ashley G. Blackburn: Cracking the Code: An Empirical Exploration of Social Learning Theory and Computer Crime. 32(1) Journal of Crime and Justice (2009) 1-34. https://doi.org/10.1080/0735648X.2009.9721260
Robert G. Morris - George E. Higgins: Neutralizing Potential and Self-Reported Digital Piracy: A Multitheoretical Exploration among College Undergraduates. 34(2) Criminal Justice Review (2009) 173-195. https://doi.org/10.1177/0734016808325034
Robert G. Morris: Computer Hacking and the Techniques of Neutralization: An Empirical Assessment. In: Thomas J. Holt - Bernadette H. Schell (szerk.): Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. Hershey, Information Science Reference, 2011. 1-17. https://doi.org/10.4018/978-1-61692-805-6.ch001
Robert J. Sampson - John Laub: A Life-Course Theory of Cumulative Disadvantage and the Stability of Delinquency. In: Terence Thornberry (szerk.): Developmental Theories of Crime and Delinquency: Advances in Theoretical Criminology, 7. New Brunswick, Transaction, 1997.
Robert L. Burgess - Ronald L. Akers: A Differential Association-Reinforcement Theory of Criminal Behavior. 14(2) Social Problems (1966) 128-147. https://doi.org/10.2307/798612
Robin M. Kowalski - Gary W. Giumetti: Bullying in the Digital Age. In: Elena Martellozzo - Emma A. Jane (szerk.): Cybercrime and its Victims. London, Routledge, 2017. 167-169. https://doi.org/10.4324/9781315637198-10
Rolf Loeber: Developmental Continuity, Change, and Pathways in Male Juvenile Problem Behaviors and Delinquency. In: J. David Hawkins (szerk.): Delinquencyand Crime: Current Theories. New York, Cambridge University Press, 1996. 1-27.
Ronald L. Akers - Christine S. Sellers: Criminological Theories: Introduction, Evaluation, and Application. Los Angeles, Roxbury, (4. kiad.) 2004. 91.
Ronald L. Akers: Deviant Behavior: A Social Learning Approach. Belmont, Wadsworth, (3. kiad.) 1985.
Ronald L. Akers: Self-Control as a General Theory of Crime. 7(2) Journal of Quantitative Criminology (1991) 201-211. https://doi.org/10.1007/BF01268629
Ronald L. Akers: Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston, Northeastern University Press, 1998.
Ronald R. Sims - Hsing K. Cheng - Hildy Teegen: Toward a Profile of Student Software Pirates. 15 Journal of Business Ethics (1996) 839-849. https://doi.org/10.1007/BF00381852
Russell Brewer - Sarah Fox - Caitlan Miller: Applying the Techniques of Neutralization to the Study of Cybercrime. In: Thomas J. Holt - Adam M. Bossler (szerk.): The Palgrave Handbook of International Cybercrime and Cyberdeviance. London, Palgrave Macmillan, 2020. 547-565., 552. https://doi.org/10.1007/978-3-319-78440-3_22
Sameer Hinduja: Neutralization Theory and Online Software Piracy. 9(1) Ethics and Information Technology (2007) 187-204. https://doi.org/10.1007/s10676-007-9143-5
Sigi Goode - Sam Cruise: What Motivates Software Crackers? 65(2) Journal of Business Ethics (2006) 173-201. https://doi.org/10.1007/s10551-005-4709-9
Sinchul Back - Sadhika Soor - Jennifer LaPrade: Juvenile Hekkers: An Empirical Test of Self-Control Theory and Social Bonding Theory. 1(1) International Journal of Cybersecurity Intelligence & Cybercrime (2018) 40-55. https://doi.org/10.52306/2578-3289.1005
Stephen G. Tibbetts - David L. Myers: Low Self-Control, Rational Choice, and Student Test Cheating. 23(2) American Journal of Criminal Justice (1999) 179-200. https://doi.org/10.1007/BF02887271
Steven Furnell: Cybercrime: Vandalizing the Information Society. London, Addison-Wesley, 2002 https://doi.org/10.1007/3-540-45068-8_2
Stuart Henry (szerk.): Degrees of Deviance: Student Accounts of Their Deviant Behaviour. Salem, Sheffield, 1990.
Sung M. Bae: The Influence Ofstrain Factors, Social Control Factors, Self-Control and Computer Use on Adolescent Cyber Delinquency: Korean National Panel Study. 78 Children and Youth Services Review (2017) 74-80. https://doi.org/10.1016/j.childyouth.2017.05.008
Susan J. Harrington: The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions. 20(3) MIS Quarterly (1996) 257-278. https://doi.org/10.2307/249656
Szabó Judit: A bűnözői karrierből való kilépés kutatásának aktuális kérdései. Magyar Rendészet, 2011/1. 32-48.
T. David Evans et alii: The Social Consequences of Self-Control: Testing the General Theory of Crime. 35(3) Criminology (1997) 475-504. https://doi.org/10.1111/j.1745-9125.1997.tb01226.x
Tara Renae McGee - David P. Farrington: Developmental and Life-Course Theories of Crime. In: Alex R. Piquero: The Handbook of Criminological Theory. Oxford, Wiley Blackwell, 2016. 337. https://doi.org/10.1002/9781118512449.ch18
Terrie E. Moffitt: Adolescence-Limited and Life-Coures-Persistent Antisocial Behavior: A Developmental Taxonomy. 100(4) Psychological Review (1993) 674-701. https://doi.org/10.1037//0033-295X.100.4.674
Thomas j. Holt - Adam M. Bossler - David C. May: Low Self-Control, Deviant Peer Associations, And juvenile Cyberdeviance. 37(3) American Journal of Criminal Justice (2012) 378-395. https://doi.org/10.1007/s12103-011-9117-3
Thomas J. Holt - Adam M. Bossler - Katheryn C. Seigfried-Spellar: Cybercrime and Digital Forensics: An Introduction. London, Routledge, 2017. 465.
Thomas J. Holt - Adam M. Bossler: An Assessment of the Current State of Cybercrime Scholarship. 35(1) Deviant Behavior (2014) 20-40. https://doi.org/10.1080/01639625.2013.822209
Thomas J. Holt - Adam M. Bossler: Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses. London, Routledge, 2015. 73.
Thomas J. Holt - George W. Burruss - Adam M. Bossler: Social Learning and Cyber-Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World. 33(2) Journal of Crime and Justice (2010) 31-61. https://doi.org/10.1080/0735648X.2010.9721287
Thomas J. Holt - Heith Copes: Transferring Subcultural Knowledge On-Line: Practices and Beliefs of Persistent Digital Pirates. 31(7) Deviant Behavior (2010) 625-654. https://doi.org/10.1080/01639620903231548
Thomas J. Holt - Kristie R. Blevins - Joseph B. Kuhns: Examining the Displacement Practices of Johns with On-Line Data. 36(6) Journal of Criminal Justice (2008) 522-528. https://doi.org/10.1016/j.jcrimjus.2008.09.009
Thomas J. Holt - Max Kilger: Examining Willingness to Attack Critical Infrastructure Online and Offline. 58 (5) Crime and Delinquency (2012) 798-822. https://doi.org/10.1177/0011128712452963
Thomas J. Holt: Subcultural Evolution? Examining the Influence of On- And Off-Line Experiences on Deviant Subcultures. 28(2) Deviant Behavior (2007) 171-198. https://doi.org/10.1080/01639620601131065
Travis C. Pratt - Francis T. Cullen: The Empirical Status of Gottfredson and Hirschi's General Theory of Crime: A Meta-Analysis. 38(3) Criminology (2000) 931-964. https://doi.org/10.1111/j.1745-9125.2000.tb00911.x
Travis C. Pratt et alii: The Empirical Status of Social Learning Theory: A Meta-Analysis. 27(6) Justice Quarterly (2010) 765-802. https://doi.org/10.1080/07418820903379610
Travis Hirschi: Causes of Delinquency. New York, Routledge, 2001. 334.
Varga Árpád: Az informatikai bűnözés fogalmi meghatározása, csoportosítása és helye a hazai jogfejlődésben. In Medias Res, 2019/1. 145-167.
W. William Minor: Techniques of Neutralization: A Reconceptualization and Empirical Examination. 18(2) Journal of Research in Crime and Delinquency (1981) 295-318., 298. https://doi.org/10.1177/002242788101800206
Wesley G. Jennings: Life-Course/Developmental Theories. In: Wesley G. Jennings (szerk.): The Encyclopedia of Crime and Punishment. Chichester, John Wiley & Sons, 2016. https://doi.org/10.1002/9781118519639.wbecp152
William F. Skinner - Anne M. Fream: A Social Learning Theory Analysis of Computer Crime among College Students. 34(4) Journal of Research in Crime and Delinquency (1997) 495-518. https://doi.org/10.1177/0022427897034004005
Yi Ting Chua - Thomas J. Holt: A Cross-National Examination of the Techniques of Neutralization to Account for Hacking Behaviors. 11(4) Victims & Offenders (2016) 534-555. https://doi.org/10.1080/15564886.2015.1121944
Zhengchuan Xu - Qing Hu - Chenghong Zhang: Why Computer Computer Become Talents Hekkers. 56(4) Communications of the ACM (2013) 64-74., 71. https://doi.org/10.1145/2436256.2436272
Megjelent
Hogyan kell idézni
Folyóirat szám
Rovat
License
Copyright (c) 2021 Varga Árpád

This work is licensed under a Creative Commons Attribution 4.0 International License.