Is there a cybercriminal personality? Comparing cyber offenders and offline offenders on HEXACO personality domains and their underlying facets
暂无分享,去创建一个
[1] M. Kranenbarg. Cyber-Dependent Crime Versus Traditional Crime: Empirical Evidence for Clusters of Offenses and Related Motives , 2021 .
[2] Neil Shortland,et al. Personality and online deviance: The role of reinforcement sensitivity theory in cybercrime , 2021, Comput. Hum. Behav..
[3] M. Donnellan,et al. A multi-method investigation of the personality correlates of digital aggression , 2020 .
[4] M. Ashton,et al. Is there a G in HEXACO? Testing for a general factor in personality self-reports under different conditions of responding , 2020 .
[5] Patrick D. Dunlop,et al. Liar! Liar! (when stakes are higher): Understanding how the overclaiming technique can be used to measure faking in personnel selection. , 2019, The Journal of applied psychology.
[6] C. Nee,et al. Learning on the job: Studying expertise in residential burglars using virtual environments* , 2019, Criminology.
[7] M. Brosnan,et al. Is There a Relationship Between Cyber-Dependent Crime, Autistic-Like Traits and Autism? , 2019, Journal of Autism and Developmental Disorders.
[8] R. D. de Vries,et al. Noncompliant responding: Comparing exclusion criteria in MTurk personality research to improve data quality , 2019, Personality and Individual Differences.
[9] T. Holt,et al. Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap , 2019 .
[10] C. Jenaro,et al. Testing the generality of the general factor of personality: An exploratory bifactor approach , 2018, Personality and Individual Differences.
[11] Michael B. Madson,et al. The HEXACO Model of Personality and Dark Triad In Relational Aggression , 2018 .
[12] M. V. D. Laan,et al. Juvenile Delinquency in the Virtual World : Similarities and Differences between Cyber-Enabled , Cyber-Dependent and Offline Delinquents in the Netherlands , 2018 .
[13] W. Wagen. The Cyborgian Deviant: An Assessment of the Hacker Through the Lens of Actor-Network Theory , 2017 .
[14] Kathryn C. Seigfried-Spellar,et al. Computer criminal behavior is related to psychopathy and other antisocial behavior , 2017 .
[15] T. V. Pollet,et al. Evolution, situational affordances, and the HEXACO model of personality , 2016 .
[16] Wytske van der Wagen,et al. De andere ‘anderen’ : Een exploratieve studie naar processen van labelling van, door en tussen hackers , 2016 .
[17] Elena Rusconi,et al. Systemizers Are Better Code-Breakers: Self-Reported Systemizing Predicts Code-Breaking Performance in Expert Hackers and Naïve Participants , 2016, Front. Hum. Neurosci..
[18] Richard Clayton,et al. Exploring the Provision of Online Booter Services , 2016 .
[19] T. Holt,et al. A Cross-National Examination of the Techniques of Neutralization to Account for Hacking Behaviors , 2016 .
[20] R. Mills,et al. A preliminary study of autism and cybercrime in the context of international law enforcement , 2015 .
[21] Kathryn C. Seigfried-Spellar,et al. Assessing the relationship between autistic traits and cyberdeviancy in a sample of college students , 2015, Behav. Inf. Technol..
[22] Kevin F. Steinmetz. Craft(y)ness An Ethnographic Study of Hacking , 2015 .
[23] Kathryn C. Seigfried-Spellar,et al. Differentiating Hackers, Identity Thieves, Cyberbullies, and Virus Writers by College Major and Individual Differences , 2014 .
[24] Wesley G. Jennings,et al. Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy , 2014, Comput. Hum. Behav..
[25] Catherine D. Marcum,et al. Hacking in High School: Cybercrime Perpetration by Juveniles , 2014 .
[26] R. D. Vries,et al. Rational Misbehavior? Evaluating an Integrated Dual-Process Model of Criminal Decision Making , 2014 .
[27] M. Ashton,et al. The HEXACO Honesty-Humility, Agreeableness, and Emotionality Factors , 2014, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.
[28] Michel Cukier,et al. RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM , 2014 .
[29] M. Born,et al. De Vereenvoudigde HEXACO Persoonlijkheidsvragenlijst en een additioneel interstitieel Proactiviteitsfacet , 2013 .
[30] R. D. Vries,et al. Tales of two self-control scales: Relations with Five-Factor and HEXACO traits , 2013 .
[31] Michaela Gummerum,et al. Characteristics of offenders: the HEXACO model of personality as a framework for studying offenders’ personality , 2013 .
[32] T. Holt,et al. Low Self-Control, Deviant Peer Associations, and Juvenile Cyberdeviance , 2012 .
[33] D. Lynam,et al. Examining the utility of general models of personality in the study of psychopathy: a comparison of the HEXACO-PI-R and NEO PI-R. , 2012, Journal of personality disorders.
[34] R. D. Vries,et al. TRAITS AND STATES: INTEGRATING PERSONALITY AND AFFECT INTO A MODEL OF CRIMINAL DECISION MAKING ∗ , 2012 .
[35] M. Ashton,et al. Getting mad and getting even: Agreeableness and Honesty-Humility as predictors of revenge intentions , 2012 .
[36] D. Lynam,et al. Personality, antisocial behavior, and aggression: A meta-analytic review , 2011 .
[37] Orly Turgeman-Goldschmidt,et al. Between Hackers and White-Collar Offenders , 2011 .
[38] D. Denning. Cyber Conflict as an Emergent Social Phenomenon , 2011 .
[39] Michael Bachmann,et al. Deciphering the Hacker Underground: First Quantitative Insights , 2011 .
[40] Robert G. Morris,et al. Computer Hacking and the Techniques of Neutralization: An Empirical Assessment , 2011 .
[41] Adam M. Bossler,et al. The General Theory of Crime and Computer Hacking: Low Self-control Hackers? , 2011 .
[42] Bernadette H. Schell,et al. Female and Male Hacker Conferences Attendees: Their Autism-Spectrum Quotient (AQ) Scores and Self-Reported Adulthood Experiences , 2011 .
[43] J. Archer,et al. Adaptive and maladaptive personality traits as predictors of violent and nonviolent offending behavior in men and women. , 2010, Aggressive behavior.
[44] Michael Bachmann. The Risk Propensity and Rationality of Computer Hackers , 2010 .
[45] R. D. de Vries,et al. The HEXACO and 5DPT models of personality: a comparison and their relationships with psychopathy, egoism, pretentiousness, immorality, and Machiavellianism. , 2010, Journal of personality disorders.
[46] Klaas Sijtsma,et al. On the Use, the Misuse, and the Very Limited Usefulness of Cronbach’s Alpha , 2008, Psychometrika.
[47] W. Revelle,et al. Coefficients Alpha, Beta, Omega, and the glb: Comments on Sijtsma , 2009 .
[48] M. Ashton,et al. The prediction of Honesty–Humility-related criteria by the HEXACO and Five-Factor Models of personality , 2008 .
[49] A. Pincus,et al. Externalizing pathology and the five-factor model: a meta-analysis of personality traits associated with antisocial personality disorder, substance use disorder, and their co-occurrence. , 2008, Journal of personality disorders.
[50] Orly Turgeman-Goldschmidt. Meanings that Hackers Assign to their Being a Hacker , 2008 .
[51] T. Holt,et al. Techcrafters and Makecrafters: A Comparison of Two Populations of Hackers , 2008, 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing.
[52] Lixuan Zhang,et al. Hacking into the Minds of Hackers , 2007, Inf. Syst. Manag..
[53] T. Holt. subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures , 2007 .
[54] Marcus K. Rogers,et al. Self-reported computer criminal behavior: A psychological analysis , 2006, Digit. Investig..
[55] Marc Rogers,et al. Self-reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis , 2006 .
[56] M. Ashton,et al. Further assessment of the HEXACO Personality Inventory: two new facet scales and an observer report form. , 2006, Psychological assessment.
[57] M. Ashton,et al. Psychopathy, Machiavellianism, and Narcissism in the Five-Factor Model and the HEXACO model of personality structure , 2005 .
[58] Orly Turgeman-Goldschmidt. Hackers' Accounts , 2005 .
[59] R. Bijl,et al. Verdacht van criminaliteit : Allochtonen en autochtonen nader bekeken , 2005 .
[60] John Suler,et al. The Online Disinhibition Effect , 2004, Cyberpsychology Behav. Soc. Netw..
[61] M. Ashton,et al. Psychometric Properties of the HEXACO Personality Inventory , 2004, Multivariate behavioral research.
[62] Joseph R. Dominick,et al. Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages , 2004 .
[63] Marco Perugini,et al. A six-factor structure of personality-descriptive adjectives: solutions from psycholexical studies in seven languages. , 2004, Journal of personality and social psychology.
[64] Robert Willison,et al. Understanding the offender/environment dynamic for computer crimes: assessing the feasibility of applying criminological theory to the IS security context , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[65] Olga V. Smyslova,et al. Flow-Based Model of Computer Hackers' Motivation , 2003, Cyberpsychology Behav. Soc. Netw..
[66] Donald R. Lynam,et al. STRUCTURAL MODELS OF PERSONALITY AND THEIR RELATION TO ANTISOCIAL BEHAVIOR: A META‐ANALYTIC REVIEW* , 2001 .
[67] D N Jackson,et al. What is beyond the big five? Plenty! , 2000, Journal of personality.
[68] T. Pratt,et al. THE EMPIRICAL STATUS OF GOTTFREDSON AND HIRSCHI'S GENERAL THEORY OF CRIME: A META‐ANALYSIS , 2000 .
[69] A. Caspi,et al. PARTNER ABUSE AND GENERAL CRIME: HOW ARE THEY THE SAME? HOW ARE THEY DIFFERENT?* , 2000 .
[70] P. Costa,et al. Personality trait structure as a human universal. , 1997, The American psychologist.
[71] Avshalom Caspi,et al. ARE SOME PEOPLE CRIME‐PRONE? REPLICATIONS OF THE PERSONALITY‐CRIME RELATIONSHIP ACROSS COUNTRIES, GENDERS, RACES, AND METHODS* , 1994 .
[72] Paul T. Costa,et al. Personality Disorders and the Five-Factor Model of Personality , 1994 .
[73] A. Tellegen,et al. An alternative "description of personality": the big-five factor structure. , 1990, Journal of personality and social psychology.