NCJ Number
227547
Journal
Journal of Crime and Justice Volume: 32 Issue: 1 Dated: 2009 Pages: 1-34
Date Published
2009
Length
34 pages
Annotation
This study explored the etiology of four forms of computer hacking (guessing passwords, attempted hacking, malicious file manipulation, and using/creating computer malware).
Abstract
The findings modestly supported social learning theory's (SLT's) applicability toward a variety of illegal computer related activities. Findings suggest that the more serious the computer crime (attempted hacking, malicious file manipulation, and developing or implementating computer malware), the more prominent the role of negative peer association in the expected level of participation, compared to the impact from one's attitude about the behaviors alone. No statistically significant impact on computer crime as it relates to gender was found; however, being White did have some impact on the expected counts of less serious (guessing/attempted hacking) forms of computer crime among the participants. The stronger impact of imitation and peer association on the more serious computer crimes may be due to the possibility that individuals seek out others who engage in similar behavior; this follows the major tenet of SLT. Data were collected from college students at a mid-sized university in the Southwest United States during the fall of 2005.