The hacker's dictionary
Hacker Crackdown: Law and Disorder on the Electronic Frontier
Hacker Crackdown: Law and Disorder on the Electronic Frontier
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
The Simple Economics of Cybercrimes
IEEE Security and Privacy
Spamalytics: an empirical analysis of spam marketing conversion
Proceedings of the 15th ACM conference on Computer and communications security
Proceedings of the 5th annual conference on Information security curriculum development
Born Digital: Understanding the First Generation of Digital Natives
Born Digital: Understanding the First Generation of Digital Natives
Positive externality, increasing returns, and the rise in cybercrimes
Communications of the ACM - Finding the Fun in Computer Science Education
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Communications of the ACM
Examining the Role of Technology in the Formation of Deviant Subcultures
Social Science Computer Review
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
Hi-index | 0.00 |
A growing number of scholars state that the Internet presents "some unique opportunities for deviant behavior" Rogers et al, 2006. However, although some researchers have studied this issue, the factors leading teenagers to adopt a web-deviant behavior have received less attention. From this background, the present article sets out to explore the facilitators of cybercrime. The author will explain the diffusion of web-deviant behavior amongst young people through an analysis of the literature while taking into consideration the conceptual model of diffusion of innovation by Greenhalgh et al. 2004.