Assessing the Macro-level Correlates of Malware Infections Using a Routine Activities Framework

Thomas J. Holt, George W. Burruss, Adam M. Bossler

Research output: Contribution to journalArticlepeer-review

26 Scopus citations

Abstract

The ability to gain unauthorized access to computer systems to engage in espionage and data theft poses a massive threat to individuals worldwide. There has been minimal focus, however, on the role of malicious software, or malware, which can automate this process. This study examined the macro-correlates of malware infection at the national level by using an open repository of known malware infections and utilizing a routine activities framework. Negative inflated binomial models for counts indicated that nations with greater technological infrastructure, more political freedoms, and with less organized crime financial impact were more likely to report malware infections. The number of Computer Emergency Response Teams (CERTs) in a nation was not significantly related with reported malware infection. The implications of the study for the understanding of malware infection, routine activity theory, and target-hardening strategies are discussed.

Original languageAmerican English
JournalInternational Journal of Offender Therapy and Comparative Criminology
Volume62
DOIs
StatePublished - Dec 1 2016

Disciplines

  • Criminology
  • Legal Studies
  • Social and Behavioral Sciences
  • Criminology and Criminal Justice

Keywords

  • CERTs
  • cybercrime
  • hacking
  • malware
  • routine activity theory
  • technological infrastructure

Fingerprint

Dive into the research topics of 'Assessing the Macro-level Correlates of Malware Infections Using a Routine Activities Framework'. Together they form a unique fingerprint.

Cite this