International Journal of Cyber Criminology

Articles from Vol. 11, No. 1, January-June

Commemorating a Decade in Existence of the International Journal of Cyber Criminology: A Research Agenda to Advance the Scholarship on Cyber Crime
IntroductionIn 2013, approximately 40% of the world population had access to the Internet. There is evidence that the rate of adoption of the Internet doubles every 100 days (Department of Commerce, 1998). A recent search of prior literature also reveals...
Digital Natives and Digital Immigrants: Exploring Online Harassment Victimization by Generational Age
IntroductionUnlike with any generation before, human interaction is entering a new phase of social evolution as we are confronted by the paradoxical abstractions of telecommunications (Wilson & Peterson, 2002). Online messaging between senders and...
Dynamics of Cyber Hate in Social Media: A Comparative Analysis of Anti-Muslim Movements in the Czech Republic and Germany
IntroductionThe "refugee crisis" and recent terrorist attacks in Europe are connected with the rise of anti-Muslim and anti-immigration movements around Europe. Online manifestations (Awan, 2014) and offline hate as well as anti-Muslim hate crimes are...
Hackers' Motivations: Testing Schwartz's Theory of Motivational Types of Values in a Sample of Hackers
IntroductionThe activity of hacking is a contested topic as scientists, practitioners, the general public, and even hackers themselves continuously debate about what "hacking" exactly is and who can be considered a hacker. The definition of hacking has...
Mobile Phone Technology and Online Sexual Harassment among Juveniles in South Korea: Effects of Self-Control and Social Learning
IntroductionPresent day society has increasing juvenile populations who come into contact with technology and electronic devices every day. According to a CNN report, 90% of American children by the age of 2 have some form of online Internet history....
Patterns of Cyber Harassment and Perpetration among College Students in the United States: A Test of Routine Activities Theory
IntroductionNew electronic technologies have contributed to the prevalence of intimate partner violence (IPV) by enabling perpetrators with convenient tools to intimidate, isolate, and stalk their victims in new and damaging ways (Dixon & Bowen,...
Predictive Roles of Depression and Demographic Factors in Internet Addiction: A Cross-Sectional Study of Students in a Nigerian University
IntroductionAddiction is an age-old global problem; people get addicted to different things for different reasons. With the advent of the internet, a new from of addiction, the Internet addiction, emerged. Many people are getting increasingly attached...
Revenge Porn Victimization of College Students in the United States: An Exploratory Analysis
IntroductionHaving someone share a sexually suggestive or explicit photo that was intended to be private not only disrupts the life of the victim but can be even worse because the images can be shared and continue to reappear on the internet in multiple...
System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination
IntroductionSystem trespassing, the unauthorized access of computer systems, has rapidly become a worldwide phenomenon with an estimated annual cost to the global economy of over $400 billion (McAfee, 2014). The average cost of system trespassing to...
Webcam Child Prostitution: An Exploration of Current and Futuristic Methods of Detection
IntroductionThe Internet and related technological developments have made the communication between people faster and cheaper. Voice-over-IP (VoIP) is one of those more efficient ways which users have greatly benefited since the beginning of the 2000s....
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.