Is there a cybercriminal personality? Comparing cyber offenders and offline offenders on HEXACO personality domains and their underlying facets

[1]  M. Kranenbarg Cyber-Dependent Crime Versus Traditional Crime: Empirical Evidence for Clusters of Offenses and Related Motives , 2021 .

[2]  Neil Shortland,et al.  Personality and online deviance: The role of reinforcement sensitivity theory in cybercrime , 2021, Comput. Hum. Behav..

[3]  M. Donnellan,et al.  A multi-method investigation of the personality correlates of digital aggression , 2020 .

[4]  M. Ashton,et al.  Is there a G in HEXACO? Testing for a general factor in personality self-reports under different conditions of responding , 2020 .

[5]  Patrick D. Dunlop,et al.  Liar! Liar! (when stakes are higher): Understanding how the overclaiming technique can be used to measure faking in personnel selection. , 2019, The Journal of applied psychology.

[6]  C. Nee,et al.  Learning on the job: Studying expertise in residential burglars using virtual environments* , 2019, Criminology.

[7]  M. Brosnan,et al.  Is There a Relationship Between Cyber-Dependent Crime, Autistic-Like Traits and Autism? , 2019, Journal of Autism and Developmental Disorders.

[8]  R. D. de Vries,et al.  Noncompliant responding: Comparing exclusion criteria in MTurk personality research to improve data quality , 2019, Personality and Individual Differences.

[9]  T. Holt,et al.  Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap , 2019 .

[10]  C. Jenaro,et al.  Testing the generality of the general factor of personality: An exploratory bifactor approach , 2018, Personality and Individual Differences.

[11]  Michael B. Madson,et al.  The HEXACO Model of Personality and Dark Triad In Relational Aggression , 2018 .

[12]  M. V. D. Laan,et al.  Juvenile Delinquency in the Virtual World : Similarities and Differences between Cyber-Enabled , Cyber-Dependent and Offline Delinquents in the Netherlands , 2018 .

[13]  W. Wagen The Cyborgian Deviant: An Assessment of the Hacker Through the Lens of Actor-Network Theory , 2017 .

[14]  Kathryn C. Seigfried-Spellar,et al.  Computer criminal behavior is related to psychopathy and other antisocial behavior , 2017 .

[15]  T. V. Pollet,et al.  Evolution, situational affordances, and the HEXACO model of personality , 2016 .

[16]  Wytske van der Wagen,et al.  De andere ‘anderen’ : Een exploratieve studie naar processen van labelling van, door en tussen hackers , 2016 .

[17]  Elena Rusconi,et al.  Systemizers Are Better Code-Breakers: Self-Reported Systemizing Predicts Code-Breaking Performance in Expert Hackers and Naïve Participants , 2016, Front. Hum. Neurosci..

[18]  Richard Clayton,et al.  Exploring the Provision of Online Booter Services , 2016 .

[19]  T. Holt,et al.  A Cross-National Examination of the Techniques of Neutralization to Account for Hacking Behaviors , 2016 .

[20]  R. Mills,et al.  A preliminary study of autism and cybercrime in the context of international law enforcement , 2015 .

[21]  Kathryn C. Seigfried-Spellar,et al.  Assessing the relationship between autistic traits and cyberdeviancy in a sample of college students , 2015, Behav. Inf. Technol..

[22]  Kevin F. Steinmetz Craft(y)ness An Ethnographic Study of Hacking , 2015 .

[23]  Kathryn C. Seigfried-Spellar,et al.  Differentiating Hackers, Identity Thieves, Cyberbullies, and Virus Writers by College Major and Individual Differences , 2014 .

[24]  Wesley G. Jennings,et al.  Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy , 2014, Comput. Hum. Behav..

[25]  Catherine D. Marcum,et al.  Hacking in High School: Cybercrime Perpetration by Juveniles , 2014 .

[26]  R. D. Vries,et al.  Rational Misbehavior? Evaluating an Integrated Dual-Process Model of Criminal Decision Making , 2014 .

[27]  M. Ashton,et al.  The HEXACO Honesty-Humility, Agreeableness, and Emotionality Factors , 2014, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[28]  Michel Cukier,et al.  RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM , 2014 .

[29]  M. Born,et al.  De Vereenvoudigde HEXACO Persoonlijkheidsvragenlijst en een additioneel interstitieel Proactiviteitsfacet , 2013 .

[30]  R. D. Vries,et al.  Tales of two self-control scales: Relations with Five-Factor and HEXACO traits , 2013 .

[31]  Michaela Gummerum,et al.  Characteristics of offenders: the HEXACO model of personality as a framework for studying offenders’ personality , 2013 .

[32]  T. Holt,et al.  Low Self-Control, Deviant Peer Associations, and Juvenile Cyberdeviance , 2012 .

[33]  D. Lynam,et al.  Examining the utility of general models of personality in the study of psychopathy: a comparison of the HEXACO-PI-R and NEO PI-R. , 2012, Journal of personality disorders.

[34]  R. D. Vries,et al.  TRAITS AND STATES: INTEGRATING PERSONALITY AND AFFECT INTO A MODEL OF CRIMINAL DECISION MAKING ∗ , 2012 .

[35]  M. Ashton,et al.  Getting mad and getting even: Agreeableness and Honesty-Humility as predictors of revenge intentions , 2012 .

[36]  D. Lynam,et al.  Personality, antisocial behavior, and aggression: A meta-analytic review , 2011 .

[37]  Orly Turgeman-Goldschmidt,et al.  Between Hackers and White-Collar Offenders , 2011 .

[38]  D. Denning Cyber Conflict as an Emergent Social Phenomenon , 2011 .

[39]  Michael Bachmann,et al.  Deciphering the Hacker Underground: First Quantitative Insights , 2011 .

[40]  Robert G. Morris,et al.  Computer Hacking and the Techniques of Neutralization: An Empirical Assessment , 2011 .

[41]  Adam M. Bossler,et al.  The General Theory of Crime and Computer Hacking: Low Self-control Hackers? , 2011 .

[42]  Bernadette H. Schell,et al.  Female and Male Hacker Conferences Attendees: Their Autism-Spectrum Quotient (AQ) Scores and Self-Reported Adulthood Experiences , 2011 .

[43]  J. Archer,et al.  Adaptive and maladaptive personality traits as predictors of violent and nonviolent offending behavior in men and women. , 2010, Aggressive behavior.

[44]  Michael Bachmann The Risk Propensity and Rationality of Computer Hackers , 2010 .

[45]  R. D. de Vries,et al.  The HEXACO and 5DPT models of personality: a comparison and their relationships with psychopathy, egoism, pretentiousness, immorality, and Machiavellianism. , 2010, Journal of personality disorders.

[46]  Klaas Sijtsma,et al.  On the Use, the Misuse, and the Very Limited Usefulness of Cronbach’s Alpha , 2008, Psychometrika.

[47]  W. Revelle,et al.  Coefficients Alpha, Beta, Omega, and the glb: Comments on Sijtsma , 2009 .

[48]  M. Ashton,et al.  The prediction of Honesty–Humility-related criteria by the HEXACO and Five-Factor Models of personality , 2008 .

[49]  A. Pincus,et al.  Externalizing pathology and the five-factor model: a meta-analysis of personality traits associated with antisocial personality disorder, substance use disorder, and their co-occurrence. , 2008, Journal of personality disorders.

[50]  Orly Turgeman-Goldschmidt Meanings that Hackers Assign to their Being a Hacker , 2008 .

[51]  T. Holt,et al.  Techcrafters and Makecrafters: A Comparison of Two Populations of Hackers , 2008, 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing.

[52]  Lixuan Zhang,et al.  Hacking into the Minds of Hackers , 2007, Inf. Syst. Manag..

[53]  T. Holt subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures , 2007 .

[54]  Marcus K. Rogers,et al.  Self-reported computer criminal behavior: A psychological analysis , 2006, Digit. Investig..

[55]  Marc Rogers,et al.  Self-reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis , 2006 .

[56]  M. Ashton,et al.  Further assessment of the HEXACO Personality Inventory: two new facet scales and an observer report form. , 2006, Psychological assessment.

[57]  M. Ashton,et al.  Psychopathy, Machiavellianism, and Narcissism in the Five-Factor Model and the HEXACO model of personality structure , 2005 .

[58]  Orly Turgeman-Goldschmidt Hackers' Accounts , 2005 .

[59]  R. Bijl,et al.  Verdacht van criminaliteit : Allochtonen en autochtonen nader bekeken , 2005 .

[60]  John Suler,et al.  The Online Disinhibition Effect , 2004, Cyberpsychology Behav. Soc. Netw..

[61]  M. Ashton,et al.  Psychometric Properties of the HEXACO Personality Inventory , 2004, Multivariate behavioral research.

[62]  Joseph R. Dominick,et al.  Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages , 2004 .

[63]  Marco Perugini,et al.  A six-factor structure of personality-descriptive adjectives: solutions from psycholexical studies in seven languages. , 2004, Journal of personality and social psychology.

[64]  Robert Willison,et al.  Understanding the offender/environment dynamic for computer crimes: assessing the feasibility of applying criminological theory to the IS security context , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[65]  Olga V. Smyslova,et al.  Flow-Based Model of Computer Hackers' Motivation , 2003, Cyberpsychology Behav. Soc. Netw..

[66]  Donald R. Lynam,et al.  STRUCTURAL MODELS OF PERSONALITY AND THEIR RELATION TO ANTISOCIAL BEHAVIOR: A META‐ANALYTIC REVIEW* , 2001 .

[67]  D N Jackson,et al.  What is beyond the big five? Plenty! , 2000, Journal of personality.

[68]  T. Pratt,et al.  THE EMPIRICAL STATUS OF GOTTFREDSON AND HIRSCHI'S GENERAL THEORY OF CRIME: A META‐ANALYSIS , 2000 .

[69]  A. Caspi,et al.  PARTNER ABUSE AND GENERAL CRIME: HOW ARE THEY THE SAME? HOW ARE THEY DIFFERENT?* , 2000 .

[70]  P. Costa,et al.  Personality trait structure as a human universal. , 1997, The American psychologist.

[71]  Avshalom Caspi,et al.  ARE SOME PEOPLE CRIME‐PRONE? REPLICATIONS OF THE PERSONALITY‐CRIME RELATIONSHIP ACROSS COUNTRIES, GENDERS, RACES, AND METHODS* , 1994 .

[72]  Paul T. Costa,et al.  Personality Disorders and the Five-Factor Model of Personality , 1994 .

[73]  A. Tellegen,et al.  An alternative "description of personality": the big-five factor structure. , 1990, Journal of personality and social psychology.