IDEAS home Printed from https://ideas.repec.org/a/eee/jcjust/v38yi4p767-772.html
   My bibliography  Save this article

A general theory of crime and computer crime: An empirical test

Author

Listed:
  • Moon, Byongook
  • McCluskey, John D.
  • McCluskey, Cynthia Perez

Abstract

Computer crime has become a global issue and continues to rapidly grow; however, few studies had examined the applicability of a general theory of crime in explaining computer deviance. Using a panel of 2,751 Korean youths, the current study examined whether low self-control theory can be useful as a theoretical framework for explaining computer crime. The results indicated the applicability of low self-control theory in explaining both illegal download of software and illegal use of others' personal identification online. Consistent with the theory's prediction, opportunity variables, especially hours of computer use, were found to be significant predictors of computer crime. The shortcomings of the current research and the directions for future research were discussed.

Suggested Citation

  • Moon, Byongook & McCluskey, John D. & McCluskey, Cynthia Perez, 2010. "A general theory of crime and computer crime: An empirical test," Journal of Criminal Justice, Elsevier, vol. 38(4), pages 767-772, July.
  • Handle: RePEc:eee:jcjust:v:38:y::i:4:p:767-772
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0047-2352(10)00106-6
    Download Restriction: Full text for ScienceDirect subscribers only
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Ram D. Gopal & G. Lawrence Sanders, 1998. "International Software Piracy: Analysis of Key Issues and Impacts," Information Systems Research, INFORMS, vol. 9(4), pages 380-397, December.
    2. BurtonJr., Velmer S. & Evans, T. David & Cullen, Francis T. & Olivares, Kathleen M. & Dunaway, R. Gregory, 1999. "Age, self-control, and adults' offending behaviors: A research note assessing A general theory of crime," Journal of Criminal Justice, Elsevier, vol. 27(1), pages 45-54, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Bae, Sung Man, 2017. "The influence of strain factors, social control factors, self-control and computer use on adolescent cyber delinquency: Korean National Panel Study," Children and Youth Services Review, Elsevier, vol. 78(C), pages 74-80.
    2. Byung H. Lee, 2018. "Explaining Cyber Deviance among School-Aged Youth," Child Indicators Research, Springer;The International Society of Child Indicators (ISCI), vol. 11(2), pages 563-584, April.
    3. Charlotte Emily De Corte & Patrick Van Kenhove, 2017. "One Sail Fits All? A Psychographic Segmentation of Digital Pirates," Journal of Business Ethics, Springer, vol. 143(3), pages 441-465, July.
    4. Marko Mikkola & Noora Ellonen & Markus Kaakinen & Iina Savolainen & Anu Sirola & Izabela Zych & Hye-Jin Paek & Atte Oksanen, 2022. "Cyberharassment Victimization on Three Continents: An Integrative Approach," IJERPH, MDPI, vol. 19(19), pages 1-15, September.
    5. Ruochen Liao & Shenaz Balasinorwala & H. Raghav Rao, 2017. "Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests," Information Systems Frontiers, Springer, vol. 19(3), pages 443-455, June.
    6. Dennis Sing-wing Wong & Sai-fu Fung, 2020. "Development of the Cybercrime Rapid Identification Tool for Adolescents," IJERPH, MDPI, vol. 17(13), pages 1-13, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Eric Chiang & Djeto Assane, 2007. "Determinants of music copyright violations on the university campus," Journal of Cultural Economics, Springer;The Association for Cultural Economics International, vol. 31(3), pages 187-204, September.
    2. Andrés, Antonio R. & Goel, Rajeev K., 2012. "Does software piracy affect economic growth? Evidence across countries," Journal of Policy Modeling, Elsevier, vol. 34(2), pages 284-295.
    3. Gibson, Chris & Schreck, Christopher J. & Miller, J. Mitchell, 2004. "Binge drinking and negative alcohol-related behaviors: A test of self-control theory," Journal of Criminal Justice, Elsevier, vol. 32(5), pages 411-420.
    4. Asongu Simplice & Andrés Antonio, 2014. "Global trajectories, dynamics, and tendencies of business software piracy: benchmarking IPRs harmonization," Working Papers of the African Governance and Development Institute. 14/011, African Governance and Development Institute..
    5. Asongu Simplice & Antonio R. Andrés, 2012. "Fighting software piracy: which governance tools matter in Africa?," Working Papers of the African Governance and Development Institute. 12/017, African Governance and Development Institute..
    6. Dan Wu & Guofang Nan & Minqiang Li, 2020. "Optimal Piracy Control: Should a Firm Implement Digital Rights Management?," Information Systems Frontiers, Springer, vol. 22(4), pages 947-960, August.
    7. Eric P. Chiang & Djeto Assane, 2009. "Estimating The Willingness To Pay For Digital Music," Contemporary Economic Policy, Western Economic Association International, vol. 27(4), pages 512-522, October.
    8. Borja, Karla & Dieringer, Suzanne, 2016. "Streaming or stealing? The complementary features between music streaming and music piracy," Journal of Retailing and Consumer Services, Elsevier, vol. 32(C), pages 86-95.
    9. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
    10. Turner, Michael G. & Piquero, Alex R., 2002. "The stability of self-control," Journal of Criminal Justice, Elsevier, vol. 30(6), pages 457-471.
    11. Arun Sundararajan, 2003. "Managing Digital Piracy: Pricing, Protection and Welfare," Law and Economics 0307001, University Library of Munich, Germany.
    12. Casidy, Riza & Phau, Ian & Lwin, Michael, 2016. "The role of religious leaders on digital piracy attitude and intention," Journal of Retailing and Consumer Services, Elsevier, vol. 32(C), pages 244-252.
    13. Turner, Michael G. & Piquero, Alex R. & Pratt, Travis C., 2005. "The school context as a source of self-control," Journal of Criminal Justice, Elsevier, vol. 33(4), pages 327-339.
    14. Ahn, Illtae & Shin, Ilsoon, 2010. "On the optimal level of protection in DRM," Information Economics and Policy, Elsevier, vol. 22(4), pages 341-353, December.
    15. Liza Rybina, 2011. "Music Piracy in Transitional Post-Soviet Economies: Ethics, Legislation, and Expertise," Eurasian Business Review, Springer;Eurasia Business and Economics Society, vol. 1(1), pages 3-17, June.
    16. Nicolas Dias Gomes & Pedro André Cerqueira & Luís Alçada Almeida, 2015. "Education and Software Piracy in the European Union," GEMF Working Papers 2015-07, GEMF, Faculty of Economics, University of Coimbra.
    17. Ivan Png, 2006. "Copyright: A Plea for Empirical Research," Levine's Working Paper Archive 321307000000000484, David K. Levine.
    18. Antonio Rodriguez Andres, 2006. "Software piracy and income inequality," Applied Economics Letters, Taylor & Francis Journals, vol. 13(2), pages 101-105.
    19. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    20. Rúben Meireles & Pedro Campos, 2016. "Digital Piracy: Factors That Influence The Intention To Pirate – A Structural Equation Model Approach," FEP Working Papers 573, Universidade do Porto, Faculdade de Economia do Porto.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:jcjust:v:38:y::i:4:p:767-772. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/jcrimjus .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.