Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes
Author
Abstract
Suggested Citation
DOI: 10.1007/s10796-019-09949-3
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Charmaz, Kathy, 1990. "'Discovering' chronic illness: Using grounded theory," Social Science & Medicine, Elsevier, vol. 30(11), pages 1161-1172, January.
- Paul Benjamin Lowry & Jun Zhang & Chuang Wang & Mikko Siponen, 2016. "Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model," Information Systems Research, INFORMS, vol. 27(4), pages 962-986, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Wang, Lin & Ngai, Steven Sek-yum, 2020. "The effects of anonymity, invisibility, asynchrony, and moral disengagement on cyberbullying perpetration among school-aged children in China," Children and Youth Services Review, Elsevier, vol. 119(C).
- Alessia Bertolazzi & Katarzyna Marzęda-Młynarska & Justyna Kięczkowska & Maria Letizia Zanier, 2024. "Datafication of Care: Security and Privacy Issues with Health Technology for People with Diabetes," Societies, MDPI, vol. 14(9), pages 1-25, August.
- Dena Yadin & Inbal Yahav & Lior Zalmanson & Nira Munichor, 2024. "Resolving the Ethical Tension Between Creating a Civil Environment and Facilitating Free Expression Online: Comment Reordering as an Alternative to Comment Moderation," Journal of Business Ethics, Springer, vol. 192(2), pages 261-283, June.
- Scales, Ashley N. & Quincy Brown, H., 2020. "The effects of organizational commitment and harmonious passion on voluntary turnover among social workers: A mixed methods study," Children and Youth Services Review, Elsevier, vol. 110(C).
- Ji Wu & Zhiqiang (Eric) Zheng & J. Leon Zhao, 2021. "FairPlay: Detecting and Deterring Online Customer Misbehavior," Information Systems Research, INFORMS, vol. 32(4), pages 1323-1346, December.
- Stuart Holland & Teresa Carla Oliveira, 2013. "Missing Links: Hume, Smith, Kant and Economic Methodology," Economic Thought, World Economics Association, vol. 2(2), pages 1-46, October.
- Arnett, Rachel D. & Sidanius, Jim, 2018. "Sacrificing status for social harmony: Concealing relatively high status identities from one’s peers," Organizational Behavior and Human Decision Processes, Elsevier, vol. 147(C), pages 108-126.
- Arjeta Shaqiri Latifi, 2021. "The Impact of Education in Combating the Development of the Trafficking in Human Beings Process," European Journal of Social Sciences Education and Research Articles, Revistia Research and Publishing, vol. 8, ejser_v8_.
- Daria Denti & Alessandra Faggian, 2021.
"Where do angry birds tweet? Income inequality and online hate in Italy,"
Cambridge Journal of Regions, Economy and Society, Cambridge Political Economy Society, vol. 14(3), pages 483-506.
- Denti, Daria & Faggian, Alessandra, 2021. "Where do angry birds tweet? Income inequality and online hate in Italy," LSE Research Online Documents on Economics 112200, London School of Economics and Political Science, LSE Library.
- Broom, Alex & Adams, Jon & Tovey, Philip, 2009. "Evidence-based healthcare in practice: A study of clinician resistance, professional de-skilling, and inter-specialty differentiation in oncology," Social Science & Medicine, Elsevier, vol. 68(1), pages 192-200, January.
- São José, José & Barros, Rosanna & Samitca, Sanda & Teixeira, Ana, 2013. "Social Care and Well-being. Experiences and Perspectives of an Old-aged Group," Journal of Tourism, Sustainability and Well-being, Cinturs - Research Centre for Tourism, Sustainability and Well-being, University of Algarve, vol. 1(3), pages 187-201.
- Christine Abdalla Mikhaeil & Richard Baskerville, 2019. "Using semiotics to analyze representational complexity in social media," Post-Print hal-02509212, HAL.
- Hildreth, John Angus D., 2024. "When loyalty binds: Examining the effectiveness of group versus personal loyalty calls on followers’ compliance with leaders’ unethical requests," Organizational Behavior and Human Decision Processes, Elsevier, vol. 181(C).
- Sam Ransbotham & Robert G. Fichman & Ram Gopal & Alok Gupta, 2016. "Special Section Introduction—Ubiquitous IT and Digital Vulnerabilities," Information Systems Research, INFORMS, vol. 27(4), pages 834-847, December.
- Kathy Charmaz & Virginia Olesen, 1997. "Ethnographic Research in Medical Sociology," Sociological Methods & Research, , vol. 25(4), pages 452-494, May.
- Benson, Outi & Gibson, Susanne & Boden, Zoë V.R. & Owen, Gareth, 2016. "Exhausted without trust and inherent worth: A model of the suicide process based on experiential accounts," Social Science & Medicine, Elsevier, vol. 163(C), pages 126-134.
- Marten Risius & Kai Spohrer, 2017. "A Blockchain Research Framework," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 59(6), pages 385-409, December.
- Tommy K. H. Chan & Christy M. K. Cheung & Izak Benbasat & Bo Xiao & Zach W. Y. Lee, 2023. "Bystanders Join in Cyberbullying on Social Networking Sites: The Deindividuation and Moral Disengagement Perspectives," Information Systems Research, INFORMS, vol. 34(3), pages 828-846, September.
- Alexandra Ainz-Galende & Rubén Rodríguez-Puertas, 2020. "The Demands of Niqabi Women in the Telegram Subaltern Corner Orgullo Niqabi," Social Inclusion, Cogitatio Press, vol. 8(3), pages 286-295.
- Lez Trujillo Torres & Benét DeBerry-Spence, 2019. "Consumer valorization strategies in traumatic extraordinary experiences," Journal of the Academy of Marketing Science, Springer, vol. 47(3), pages 516-531, May.
More about this item
Keywords
Black hat hacker; Security; Criminology nerve management; General strain theory; Routine activity theory (RAT);All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:23:y:2021:i:2:d:10.1007_s10796-019-09949-3. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.