{"id":"https://openalex.org/W2170905651","doi":"https://doi.org/10.4304/jsw.5.6.593-599","title":"A Historical Review of Computer User\u2019s Illegal Behavior Based on Containment Theory","display_name":"A Historical Review of Computer User\u2019s Illegal Behavior Based on Containment Theory","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2170905651","doi":"https://doi.org/10.4304/jsw.5.6.593-599","mag":"2170905651"},"language":"en","primary_location":{"id":"doi:10.4304/jsw.5.6.593-599","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jsw.5.6.593-599","pdf_url":null,"source":{"id":"https://openalex.org/S114141714","display_name":"Journal of Software","issn_l":"1796-217X","issn":["1796-217X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Software","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028810660","display_name":"ChiChao Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I207776796","display_name":"Overseas Chinese University","ror":"https://ror.org/01j9jq089","country_code":"TW","type":"education","lineage":["https://openalex.org/I207776796"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chi-Chao Lu","raw_affiliation_strings":["Overseas Chinese University"],"affiliations":[{"raw_affiliation_string":"Overseas Chinese University","institution_ids":["https://openalex.org/I207776796"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001353175","display_name":"Wen-Yuan Jen","orcid":null},"institutions":[{"id":"https://openalex.org/I125934054","display_name":"National United University","ror":"https://ror.org/04twccc71","country_code":"TW","type":"education","lineage":["https://openalex.org/I125934054"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Wen-Yuan Jen","raw_affiliation_strings":["National\u00a0United\u00a0University"],"affiliations":[{"raw_affiliation_string":"National\u00a0United\u00a0University","institution_ids":["https://openalex.org/I125934054"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5028810660"],"corresponding_institution_ids":["https://openalex.org/I207776796"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.18128415,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"5","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8952716588973999},{"id":"https://openalex.org/keywords/containment","display_name":"Containment (computer programming)","score":0.7877969741821289},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48237505555152893},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11382314562797546}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8952716588973999},{"id":"https://openalex.org/C2777019822","wikidata":"https://www.wikidata.org/wiki/Q390066","display_name":"Containment (computer programming)","level":2,"score":0.7877969741821289},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48237505555152893},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11382314562797546}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jsw.5.6.593-599","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jsw.5.6.593-599","pdf_url":null,"source":{"id":"https://openalex.org/S114141714","display_name":"Journal of Software","issn_l":"1796-217X","issn":["1796-217X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Software","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.550000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W107509755","https://openalex.org/W594525150","https://openalex.org/W1529080334","https://openalex.org/W1538043169","https://openalex.org/W1543014732","https://openalex.org/W1546738276","https://openalex.org/W1548991446","https://openalex.org/W1550621568","https://openalex.org/W1973636831","https://openalex.org/W1976821909","https://openalex.org/W1977009985","https://openalex.org/W1978893767","https://openalex.org/W1979893543","https://openalex.org/W1982210139","https://openalex.org/W1982981577","https://openalex.org/W1991896650","https://openalex.org/W1996281555","https://openalex.org/W1997088403","https://openalex.org/W2001244478","https://openalex.org/W2002238823","https://openalex.org/W2007545270","https://openalex.org/W2010302460","https://openalex.org/W2012322897","https://openalex.org/W2020213850","https://openalex.org/W2027348358","https://openalex.org/W2029821048","https://openalex.org/W2040806443","https://openalex.org/W2041733456","https://openalex.org/W2055017535","https://openalex.org/W2056685523","https://openalex.org/W2056749975","https://openalex.org/W2068928139","https://openalex.org/W2079791519","https://openalex.org/W2088900229","https://openalex.org/W2092596452","https://openalex.org/W2126695368","https://openalex.org/W2136022733","https://openalex.org/W2138654047","https://openalex.org/W2144656255","https://openalex.org/W2153222072","https://openalex.org/W3121786367","https://openalex.org/W3123386313","https://openalex.org/W3123661920","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4252941105","https://openalex.org/W2350808199","https://openalex.org/W2058080364","https://openalex.org/W249480812","https://openalex.org/W4235551436","https://openalex.org/W2061229164","https://openalex.org/W3028091058","https://openalex.org/W2392382023"],"abstract_inverted_index":{"The":[0,19],"aim":[1],"of":[2,21,58],"this":[3,78,80],"study":[4,24,81],"is":[5,53],"to":[6,17,33,54,66],"explore":[7,55],"research":[8,48],"trends":[9],"in":[10,42,70,98],"computer":[11,34,44,72,100],"crime":[12,35],"and":[13,36,38,95],"cybercrime":[14,37],"from":[15],"1968":[16],"2009.":[18],"findings":[20],"the":[22,56,59],"current":[23],"will":[25,39],"provide":[26],"some":[27],"insight":[28],"into":[29],"scholarly":[30],"activity":[31],"related":[32],"be":[40,64],"useful":[41],"tracking":[43],"user\u2019s":[45,73,101],"illegal":[46,74,102],"behavior":[47,75,103],"trends.":[49],"Our":[50,89],"other":[51],"goal":[52],"range":[57],"theoretical":[60],"lens":[61],"that":[62],"can":[63],"used":[65],"understand":[67],"social":[68,92],"controls":[69],"restraining":[71,99],"intention.":[76,104],"Towards":[77],"goal,":[79],"proposed":[82],"five":[83],"propositions":[84,90],"based":[85],"on":[86],"containment":[87],"theory.":[88],"address":[91],"control":[93],"education,":[94],"offer":[96],"insights":[97]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
