IDEAS home Printed from https://ideas.repec.org/a/eee/jcjust/v38yi4p767-772.html
   My bibliography  Save this article

A general theory of crime and computer crime: An empirical test

Author

Listed:
  • Moon, Byongook
  • McCluskey, John D.
  • McCluskey, Cynthia Perez

Abstract

Computer crime has become a global issue and continues to rapidly grow; however, few studies had examined the applicability of a general theory of crime in explaining computer deviance. Using a panel of 2,751 Korean youths, the current study examined whether low self-control theory can be useful as a theoretical framework for explaining computer crime. The results indicated the applicability of low self-control theory in explaining both illegal download of software and illegal use of others' personal identification online. Consistent with the theory's prediction, opportunity variables, especially hours of computer use, were found to be significant predictors of computer crime. The shortcomings of the current research and the directions for future research were discussed.

Suggested Citation

  • Moon, Byongook & McCluskey, John D. & McCluskey, Cynthia Perez, 2010. "A general theory of crime and computer crime: An empirical test," Journal of Criminal Justice, Elsevier, vol. 38(4), pages 767-772, July.
  • Handle: RePEc:eee:jcjust:v:38:y::i:4:p:767-772
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0047-2352(10)00106-6
    Download Restriction: Full text for ScienceDirect subscribers only
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. BurtonJr., Velmer S. & Evans, T. David & Cullen, Francis T. & Olivares, Kathleen M. & Dunaway, R. Gregory, 1999. "Age, self-control, and adults' offending behaviors: A research note assessing A general theory of crime," Journal of Criminal Justice, Elsevier, vol. 27(1), pages 45-54, January.
    2. Ram D. Gopal & G. Lawrence Sanders, 1998. "International Software Piracy: Analysis of Key Issues and Impacts," Information Systems Research, INFORMS, vol. 9(4), pages 380-397, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Bae, Sung Man, 2017. "The influence of strain factors, social control factors, self-control and computer use on adolescent cyber delinquency: Korean National Panel Study," Children and Youth Services Review, Elsevier, vol. 78(C), pages 74-80.
    2. Byung H. Lee, 2018. "Explaining Cyber Deviance among School-Aged Youth," Child Indicators Research, Springer;The International Society of Child Indicators (ISCI), vol. 11(2), pages 563-584, April.
    3. Charlotte Emily De Corte & Patrick Van Kenhove, 2017. "One Sail Fits All? A Psychographic Segmentation of Digital Pirates," Journal of Business Ethics, Springer, vol. 143(3), pages 441-465, July.
    4. Marko Mikkola & Noora Ellonen & Markus Kaakinen & Iina Savolainen & Anu Sirola & Izabela Zych & Hye-Jin Paek & Atte Oksanen, 2022. "Cyberharassment Victimization on Three Continents: An Integrative Approach," IJERPH, MDPI, vol. 19(19), pages 1-15, September.
    5. Ruochen Liao & Shenaz Balasinorwala & H. Raghav Rao, 2017. "Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests," Information Systems Frontiers, Springer, vol. 19(3), pages 443-455, June.
    6. Dennis Sing-wing Wong & Sai-fu Fung, 2020. "Development of the Cybercrime Rapid Identification Tool for Adolescents," IJERPH, MDPI, vol. 17(13), pages 1-13, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Andrés, Antonio R. & Goel, Rajeev K., 2012. "Does software piracy affect economic growth? Evidence across countries," Journal of Policy Modeling, Elsevier, vol. 34(2), pages 284-295.
    2. Gibson, Chris & Schreck, Christopher J. & Miller, J. Mitchell, 2004. "Binge drinking and negative alcohol-related behaviors: A test of self-control theory," Journal of Criminal Justice, Elsevier, vol. 32(5), pages 411-420.
    3. Asongu Simplice & Andrés Antonio, 2014. "Global trajectories, dynamics, and tendencies of business software piracy: benchmarking IPRs harmonization," Working Papers of the African Governance and Development Institute. 14/011, African Governance and Development Institute..
    4. Dan Wu & Guofang Nan & Minqiang Li, 2020. "Optimal Piracy Control: Should a Firm Implement Digital Rights Management?," Information Systems Frontiers, Springer, vol. 22(4), pages 947-960, August.
    5. Eric P. Chiang & Djeto Assane, 2009. "Estimating The Willingness To Pay For Digital Music," Contemporary Economic Policy, Western Economic Association International, vol. 27(4), pages 512-522, October.
    6. Borja, Karla & Dieringer, Suzanne, 2016. "Streaming or stealing? The complementary features between music streaming and music piracy," Journal of Retailing and Consumer Services, Elsevier, vol. 32(C), pages 86-95.
    7. Turner, Michael G. & Piquero, Alex R., 2002. "The stability of self-control," Journal of Criminal Justice, Elsevier, vol. 30(6), pages 457-471.
    8. Arun Sundararajan, 2003. "Managing Digital Piracy: Pricing, Protection and Welfare," Law and Economics 0307001, University Library of Munich, Germany.
    9. Turner, Michael G. & Piquero, Alex R. & Pratt, Travis C., 2005. "The school context as a source of self-control," Journal of Criminal Justice, Elsevier, vol. 33(4), pages 327-339.
    10. Nicolas Dias Gomes & Pedro André Cerqueira & Luís Alçada Almeida, 2015. "Education and Software Piracy in the European Union," GEMF Working Papers 2015-07, GEMF, Faculty of Economics, University of Coimbra.
    11. Antonio Rodriguez Andres, 2006. "Software piracy and income inequality," Applied Economics Letters, Taylor & Francis Journals, vol. 13(2), pages 101-105.
    12. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    13. Insaf Bekir, 2015. "The Causal Relationship between IPR Infringement and Socio-economic Factors," International Journal of Economics and Empirical Research (IJEER), The Economics and Social Development Organization (TESDO), vol. 3(12), pages 577-586, December.
    14. Chechen Liao & Hong-Nan Lin & Yu-Ping Liu, 2010. "Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior," Journal of Business Ethics, Springer, vol. 91(2), pages 237-252, January.
    15. Mishra, Alok & Akman, Ibrahim & Yazici, Ali, 2006. "Software piracy among IT professionals in organizations," International Journal of Information Management, Elsevier, vol. 26(5), pages 401-413.
    16. Deli Yang & Mahmut Sonmez & Derek Bosworth & Gerald Fryxell, 2009. "Global Software Piracy: Searching for Further Explanations," Journal of Business Ethics, Springer, vol. 87(2), pages 269-283, June.
    17. Shin-yi Wu & Pei-yu Chen, 2008. "Versioning and Piracy Control for Digital Information Goods," Operations Research, INFORMS, vol. 56(1), pages 157-172, February.
    18. Gibson, Chris & Wright, John, 2001. "Low self-control and coworker delinquency: A research note," Journal of Criminal Justice, Elsevier, vol. 29(6), pages 483-492.
    19. Ram D. Gopal & Alok Gupta, 2010. "Trading Higher Software Piracy for Higher Profits: The Case of Phantom Piracy," Management Science, INFORMS, vol. 56(11), pages 1946-1962, November.
    20. Williams, Mei Wah M. & Fletcher, Richard B. & Ronan, Kevin R., 2007. "Investigating the theoretical construct and invariance of the self-control scale using confirmatory factor analysis," Journal of Criminal Justice, Elsevier, vol. 35(2), pages 205-218.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:jcjust:v:38:y::i:4:p:767-772. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/jcrimjus .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.