The Palgrave Handbook of International Cybercrime and Cyberdeviance 2020
DOI: 10.1007/978-3-319-78440-3_22
|View full text |Cite
|
Sign up to set email alerts
|

Applying the Techniques of Neutralization to the Study of Cybercrime

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…Neutralisation theory has received a lot of attention among academic communities in general, and criminologists in particular (for detail, please see Section II of this paper, which provides a comprehensive literature review regarding the application of neutralisation theory in cybercrime). However, most of the existing research has focused on piracy with a handful of studies on sexting, cyberbullying and computer hacking (e.g., guessing passwords, gaining illegitimate access to a computer or network, and manipulating files or data) [12]. While this is a well-documented area, we have not found any study that investigated ransomware through the lens of neutralisation theory.…”
Section: Introductionmentioning
confidence: 92%
See 1 more Smart Citation
“…Neutralisation theory has received a lot of attention among academic communities in general, and criminologists in particular (for detail, please see Section II of this paper, which provides a comprehensive literature review regarding the application of neutralisation theory in cybercrime). However, most of the existing research has focused on piracy with a handful of studies on sexting, cyberbullying and computer hacking (e.g., guessing passwords, gaining illegitimate access to a computer or network, and manipulating files or data) [12]. While this is a well-documented area, we have not found any study that investigated ransomware through the lens of neutralisation theory.…”
Section: Introductionmentioning
confidence: 92%
“…However, as far as we know, no study specifically focused on ransomware offenders. This is important because offenders' motivations to commit crime may depend on the type of the crime [12].…”
Section: Introductionmentioning
confidence: 99%
“…Reviews. With regard to intrinsic and personality features, a non-systematic review on neutralization techniques and cybercrime suggested that offenders involved in financial cybercrime might use denial of injury and denial of responsibility (Brewer et al, 2019). Another non-systematic review on the human factor in cybercrime and cybersecurity concluded that financial cybercriminals are more likely to have a criminal record than offenders who only commit traditional, offline crimes (Leukfeldt, 2017).…”
Section: Financial-economic Cyber-enabled Crimeundefinedmentioning
confidence: 99%
“…Delving into the psychology of the criminal behaviour, the techniques provide useful insight into why offending occurs that may otherwise be challenging to understand or relate to. The techniques have been applied successfully across many and varied crime types (see for example Alexander & Opsal, 2020;Brewer, Fox & Miller, 2020;Padayachee, 2020;Siponena, Puhakainenb & Vancec, 2020;Wilhelm, Joeckel & Ziegler, 2019). As with the application of any theoretical model, caution must be taken as to its validity and suitability to the relevant research.…”
Section: Techniques To Neutralise Food Fraud Against Consumersmentioning
confidence: 99%