Reference Hub9
The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?

The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?

Adam M. Bossler, George W. Burruss
Copyright: © 2012 |Pages: 29
ISBN13: 9781613503232|ISBN10: 1613503237|EISBN13: 9781613503249
DOI: 10.4018/978-1-61350-323-2.ch707
Cite Chapter Cite Chapter

MLA

Bossler, Adam M., and George W. Burruss. "The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?." Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, IGI Global, 2012, pp. 1499-1527. https://doi.org/10.4018/978-1-61350-323-2.ch707

APA

Bossler, A. M. & Burruss, G. W. (2012). The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?. In I. Management Association (Ed.), Cyber Crime: Concepts, Methodologies, Tools and Applications (pp. 1499-1527). IGI Global. https://doi.org/10.4018/978-1-61350-323-2.ch707

Chicago

Bossler, Adam M., and George W. Burruss. "The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?." In Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, 1499-1527. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-323-2.ch707

Export Reference

Mendeley
Favorite

Abstract

Though in recent years, a number of studies have been completed on hackers’ personality and communication traits by experts in the fields of psychology and criminology, a number of questions regarding this population remain. Does Gottfredson and Hirschi’s concept of low self-control predict the unauthorized access of computer systems? Do computer hackers have low levels of self-control, as has been found for other criminals in mainstream society? If low self-control can predict the commission of computer hacking, this finding would seem to support the generality argument of self-control theory and imply that computer hacking and other forms of cybercrime are substantively similar to terrestrial crime. This chapter focuses on the results of a study where we examined whether Gottfredson and Hirschi’s general theory of crime is applicable to computer hacking in a college sample.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.