doi: 10.4304/jsw.5.6.593-599
A Historical Review of Computer User’s Illegal Behavior Based on Containment Theory
2National United University/Institute of Information and Society, Taichung, Taiwan
Abstract—The aim of this study is to explore research trends in computer crime and cybercrime from 1968 to 2009. The findings of the current study will provide some insight into scholarly activity related to computer crime and cybercrime and will be useful in tracking computer user’s illegal behavior research trends. Our other goal is to explore the range of the theoretical lens that can be used to understand social controls in restraining computer user’s illegal behavior intention. Towards this goal, this study proposed five propositions based on containment theory. Our propositions address social control education, and offer insights in restraining computer user’s illegal behavior intention.
Index Terms—containment theory; computer crime; cybercrime; social control, user illegal behavior.
Cite: Chi-Chao Lu, Wen-Yuan Jen, "A Historical Review of Computer User’s Illegal Behavior Based on Containment Theory," Journal of Software vol. 5, no. 6, pp. 593-599, 2010.
General Information
ISSN: 1796-217X (Online)
Abbreviated Title: J. Softw.
Frequency: Quarterly
APC: 500USD
DOI: 10.17706/JSW
Editor-in-Chief: Prof. Antanas Verikas
Executive Editor: Ms. Cecilia Xie
Abstracting/ Indexing: DBLP, EBSCO,
CNKI, Google Scholar, ProQuest,
INSPEC(IET), ULRICH's Periodicals
Directory, WorldCat, etcE-mail: jsweditorialoffice@gmail.com
-
Oct 22, 2024 News!
Vol 19, No 3 has been published with online version [Click]
-
Jan 04, 2024 News!
JSW will adopt Article-by-Article Work Flow
-
Apr 01, 2024 News!
Vol 14, No 4- Vol 14, No 12 has been indexed by IET-(Inspec) [Click]
-
Apr 01, 2024 News!
Papers published in JSW Vol 18, No 1- Vol 18, No 6 have been indexed by DBLP [Click]
-
Jun 12, 2024 News!
Vol 19, No 2 has been published with online version [Click]