{"id":"https://openalex.org/W2099728526","doi":"https://doi.org/10.1108/09593840610673810","title":"Understanding the offender/environment dynamic for computer crimes","display_name":"Understanding the offender/environment dynamic for computer crimes","publication_year":2006,"publication_date":"2006-04-01","ids":{"openalex":"https://openalex.org/W2099728526","doi":"https://doi.org/10.1108/09593840610673810","mag":"2099728526"},"language":"en","primary_location":{"id":"doi:10.1108/09593840610673810","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09593840610673810","pdf_url":null,"source":{"id":"https://openalex.org/S185256354","display_name":"Information Technology and People","issn_l":"0959-3845","issn":["0959-3845","1758-5813"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Technology &amp; People","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109267318","display_name":"Robert Willison","orcid":null},"institutions":[{"id":"https://openalex.org/I180519160","display_name":"Copenhagen Business School","ror":"https://ror.org/04sppb023","country_code":"DK","type":"education","lineage":["https://openalex.org/I180519160"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Robert Willison","raw_affiliation_strings":["Department of Informatics, Copenhagen Business School, Copenhagen, Denmark"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Copenhagen Business School, Copenhagen, Denmark","institution_ids":["https://openalex.org/I180519160"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5109267318"],"corresponding_institution_ids":["https://openalex.org/I180519160"],"apc_list":null,"apc_paid":null,"fwci":8.6859,"has_fulltext":false,"cited_by_count":46,"citation_normalized_percentile":{"value":0.97120118,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"19","issue":"2","first_page":"170","last_page":"186"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.7528297901153564},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6176092624664307},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.526267409324646},{"id":"https://openalex.org/keywords/rational-choice-theory","display_name":"Rational choice theory (criminology)","score":0.4955374002456665},{"id":"https://openalex.org/keywords/crime-prevention","display_name":"Crime prevention","score":0.4543820917606354},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.42995357513427734},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.36240601539611816},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3494609594345093},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.34694764018058777},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.33648988604545593},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.2853589355945587},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15329360961914062}],"concepts":[{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.7528297901153564},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6176092624664307},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.526267409324646},{"id":"https://openalex.org/C2777031877","wikidata":"https://www.wikidata.org/wiki/Q1308152","display_name":"Rational choice theory (criminology)","level":2,"score":0.4955374002456665},{"id":"https://openalex.org/C2776348852","wikidata":"https://www.wikidata.org/wiki/Q855848","display_name":"Crime prevention","level":2,"score":0.4543820917606354},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.42995357513427734},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.36240601539611816},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3494609594345093},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.34694764018058777},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.33648988604545593},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.2853589355945587},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15329360961914062},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1108/09593840610673810","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09593840610673810","pdf_url":null,"source":{"id":"https://openalex.org/S185256354","display_name":"Information Technology and People","issn_l":"0959-3845","issn":["0959-3845","1758-5813"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Technology &amp; People","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/1bbd7ef0-8eb5-11db-a124-000ea68e967b","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401458","display_name":"CBS Research Portal (Copenhagen Business School)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I180519160","host_organization_name":"Copenhagen Business School","host_organization_lineage":["https://openalex.org/I180519160"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W11527013","https://openalex.org/W249343203","https://openalex.org/W308251696","https://openalex.org/W607764481","https://openalex.org/W1509585873","https://openalex.org/W1513874426","https://openalex.org/W1531869710","https://openalex.org/W1538043169","https://openalex.org/W1566168400","https://openalex.org/W1594418501","https://openalex.org/W1605209333","https://openalex.org/W1705714200","https://openalex.org/W1979572581","https://openalex.org/W1981822199","https://openalex.org/W1982981577","https://openalex.org/W1997603734","https://openalex.org/W2000142521","https://openalex.org/W2000900121","https://openalex.org/W2003464762","https://openalex.org/W2004268877","https://openalex.org/W2018175205","https://openalex.org/W2026328911","https://openalex.org/W2061610479","https://openalex.org/W2063016611","https://openalex.org/W2072047708","https://openalex.org/W2072581077","https://openalex.org/W2087075744","https://openalex.org/W2088047416","https://openalex.org/W2096492281","https://openalex.org/W2119587968","https://openalex.org/W2124210747","https://openalex.org/W2314190422","https://openalex.org/W2505768305","https://openalex.org/W2605936336","https://openalex.org/W3164549185","https://openalex.org/W4232356386","https://openalex.org/W4234860236","https://openalex.org/W4245491493","https://openalex.org/W4249855545","https://openalex.org/W4285719527","https://openalex.org/W6823332178"],"related_works":["https://openalex.org/W4241263575","https://openalex.org/W2349781066","https://openalex.org/W2322423391","https://openalex.org/W2280548356","https://openalex.org/W2986377062","https://openalex.org/W4242629129","https://openalex.org/W2908212647","https://openalex.org/W2063485980","https://openalex.org/W576591308","https://openalex.org/W4246457023"],"abstract_inverted_index":{"Purpose":[0],"While":[1,160,211],"a":[2,21,62,175,304,315],"number":[3],"of":[4,23,43,65,77,118,166,218,238,257,264,277,306,317,341],"IS":[5,84,228,298,330],"security":[6,49,85,271,285,299],"researchers":[7],"consider":[8],"the":[9,27,31,66,75,83,104,110,119,126,137,142,149,156,167,177,183,192,206,219,227,236,239,251,262,265,278,309,329,339,344],"threat":[10],"posed":[11],"by":[12,51,141,170,287],"employees":[13],"who":[14],"perpetrate":[15],"computer":[16],"crime,":[17],"there":[18,301],"is":[19,179,302],"currently":[20,303],"lack":[22,191,305],"insight":[24,307],"into":[25,308],"how":[26],"offender":[28],"interacts":[29],"with":[30,250,269],"criminal":[32,111,345],"context":[33],"both":[34,347],"prior":[35,348],"to":[36,73,82,131,136,152,190,195,221,235,349],"and":[37,103,155,185,198,201,242,350],"during":[38,351],"commission.":[39,352],"A":[40],"greater":[41,63],"understanding":[42,64],"this":[44,69],"relationship":[45],"may":[46,260,281,334],"complement":[47],"existing":[48,270,284],"practices":[50,286],"possibly":[52,288],"highlighting":[53,289],"new":[54,290],"areas":[55,291],"for":[56,148,226,292,326],"safeguard":[57,293],"implementation.":[58,294],"To":[59],"help":[60],"facilitate":[61],"offender/environment":[67],"dynamic,":[68],"paper,":[70],"therefore,":[71],"aims":[72],"assess":[74,132,223],"feasibility":[76],"applying":[78],"three":[79,252],"criminological":[80,253,318],"theories":[81,96,138,220,266,333],"context.":[86,331],"Rather":[87],"than":[88],"focusing":[89],"on":[90,109,115,338],"why":[91],"people":[92],"become":[93],"criminals,":[94],"these":[95],"entitled":[97],"routine":[98,171],"activity":[99,172],"theory,":[100,173],"environmental":[101,153],"criminology":[102,154],"rational":[105,157],"choice":[106,158],"perspective,":[107,300],"focus":[108],"act.":[112],"Design/methodology/approach":[113],"Drawing":[114],"an":[116,297],"account":[117],"Barings":[120],"Bank":[121],"collapse,":[122],"events":[123],"highlighted":[124],"in":[125,205,248,267,328,343],"case":[127,161,207],"study":[128,162],"are":[129,139],"used":[130],"whether":[133],"concepts":[134,150,168,188],"central":[135,151],"supported":[140],"data.":[143],"Findings":[144],"Analysis":[145],"indicates":[146],"support":[147],"perspective.":[159],"evidence":[163],"supports":[164],"two":[165],"advanced":[169],"as":[174,182],"whole":[176],"theory":[178],"found":[180],"wanting,":[181],"\u201cguardianship\u201d":[184],"\u201chandled":[186],"offender\u201d":[187],"appear":[189],"necessary":[193],"sophistication":[194],"theoretically":[196],"accommodate":[197],"explain":[199],"supervisory":[200],"control":[202],"failings":[203],"cited":[204],"study.":[208],"Research":[209],"limitations/implications":[210],"future":[212,258],"research":[213,259],"could":[214,231],"encompass":[215],"continued":[216],"application":[217,237,263,327],"further":[222],"their":[224],"suitability":[225],"domain,":[229],"consideration":[230],"also":[232],"be":[233],"given":[234],"preventive":[240],"tools":[241],"methods":[243],"which":[244,320],"have":[245,321],"been":[246,324],"developed":[247],"tandem":[249],"approaches.":[254],"Another":[255],"stream":[256],"involve":[261],"conjunction":[268],"practices.":[272],"Practical":[273],"implications":[274],"Greater":[275],"knowledge":[276],"offender/context":[279,310],"dynamic":[280],"feasibly":[282,335],"enhance":[283],"Originality/value":[295],"From":[296],"dynamic.":[311],"The":[312,332],"paper":[313],"presents":[314],"group":[316],"theories,":[319],"previously":[322],"not":[323],"considered":[325],"throw":[336],"light":[337],"behaviour":[340],"offenders":[342],"context,":[346]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2025-10-10T00:00:00"}
