Exploring the Correlates of Malware Victimization in a College Sample

Adam Bossler, Thomas J. Holt, George W. Burruss

Research output: Contribution to conferencePresentation

Abstract

Malicious software infections, such as viruses and Trojan horse programs, have particular utility for cybercriminals because they automate attacks and enable offenders to remotely control victim computers. It is difficult to determine when an infection has occurred due to the ability of these programs to hide and mimic system errors that may otherwise occur within a computing environment. Limited criminological research examining the correlates of malware infections have found limited success in identifying behavioral or protective factors that reduce the risk of victimization. In order to expand our understanding of the problem of malware, this study utilizes multiple measures for infection in a sample of university students. A routine activities framework will be used to identify the role that social and physical protective measures, as well as personal activities play in this form of online victimization.
Original languageAmerican English
StatePublished - Mar 15 2012
EventAcademy of Criminal Justice Sciences - Philadelphia, PA
Duration: Feb 19 2014 → …

Conference

ConferenceAcademy of Criminal Justice Sciences
Period02/19/14 → …

Disciplines

  • Criminology and Criminal Justice
  • Criminology

Keywords

  • Criminology
  • Malware
  • Malware victimization
  • Viruses

Fingerprint

Dive into the research topics of 'Exploring the Correlates of Malware Victimization in a College Sample'. Together they form a unique fingerprint.

Cite this