Theoretical and legal aspects of cybercrimes in Ghana ,
Cannabis use, time perspective and risk perception: Evidence of a moderating effect, Psychology and health, vol.21, issue.5, pp.571-592, 2006. ,
URL : https://hal.archives-ouvertes.fr/halshs-00408109
An investigation into the techniques of neutralization theory and their \ effects on compulsive consumption behavior, 2007. ,
Beyond our control? Confronting the limits of our legal system in the age of cyberspace, 2003. ,
Sakawa -Cybercrime and Criminality in Ghana, Journal of Information Technology Impact, vol.11, issue.2, pp.85-100, 2011. ,
The neutralization and denial of sexual violence in college party subcultures, Deviant Behavior, vol.37, issue.12, pp.1392-1410, 2016. ,
Explaining Corruption: Drifting In and Out of Corruption and Techniques of Neutralization, Criminology of Corruption, pp.107-125, 2016. ,
Responding to denial, minimization and blame in correctional settings: The 'real world 'implications of offender neutralizations, European Journal of Criminology, vol.10, issue.5, pp.572-590, 2013. ,
Prevention of cybercrimes in smart cities of India: from a citizen's perspective. Information Technology & People, 2018. ,
Cyber threat landscape faced by financial and insurance industry. Trends and issues in crime and criminal justice, p.1, 2011. ,
Investigating the research approaches for examining technology adoption issues, Journal of Research Practice, vol.1, issue.1, 2005. ,
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach, Information Systems Research, vol.20, issue.1, pp.79-98, 2009. ,
Impact of cybercrime: Issues and challenges, International journal of engineering sciences & Emerging technologies, vol.6, issue.2, pp.142-153, 2013. ,
Communities of denial: The co-construction of gendered adolescent violence, Deviant behavior, vol.34, issue.2, pp.97-114, 2013. ,
Criminal entrepreneurship, white-collar criminality, and neutralization theory, Journal of Enterprising Communities: People and Places in the Global Economy, vol.5, issue.4, pp.300-308, 2011. ,
Organized cybercrime and national security, Cybercrime Risks and Responses, pp.67-80, 2015. ,
Online consumer misbehavior: an application of neutralization theory, vol.9, pp.379-402, 2009. ,
Hacking and fraud: Qualitative analysis of online offending and victimization. Global criminology: Crime and victimization in the globalized era, pp.93-114, 2013. ,
Neutralizing music piracy: An empirical examination, Deviant Behavior, vol.29, issue.4, pp.334-366, 2008. ,
Cyber Risks and Fraud in the Nigeria's Business Environment: A Postmortem of Youth Crime, Journal of Social and Development Sciences, vol.5, issue.4, pp.258-265, 2014. ,
Youth Identity, Peer Influence and Internet Crime Participation in Nigeria: A Reflection, Ife Psycholog, vol.24, issue.1, pp.37-47, 2016. ,
Youth crime and the organized attributes of cyber fraud in the modern technological age: a thematic review, International Journal of Social Sciences and Humanities Reviews, vol.6, issue.1, pp.153-164, 2016. ,
The dark side of the Internet: Attacks, costs and responses, Information systems, vol.36, issue.3, pp.675-705, 2011. ,
Understanding consumers' purchase intention towards counterfeit luxury goods: An integrated model of neutralization techniques and perceived risk theory, Asia Pacific Journal of Marketing and Logistics, vol.30, issue.2, pp.495-516, 2001. ,
Birds of a Feather Flock Together: The Nigerian Cyber Fraudsters (Yahoo Boys) and Hip Hop Artists, Criminology, Criminal Justice, Law & Society, vol.19, issue.2, pp.63-80, 2018. ,
Neutralization techniques, crime decision-making and juvenile thieves, International Journal of Adolescence and Youth, vol.14, issue.3, pp.251-265, 2008. ,
Effects of Neutralization Techniques and Rational Choice Theory on Internet Abuse in the Workplace, PACIS, p.169, 2013. ,
Online crime and internet gambling, Journal of Gambling Issues, issue.24, pp.54-85, 2010. ,
The Social Licence to Operate: Ambiguities and the neutralization of harm in Mongolia, Resources Policy, vol.53, pp.274-282, 2017. ,
A privacy preserving contextaware insider threat prediction and prevention model predicated on the components of the fraud diamond, 2015 Annual Global Online Conference on Information and Computer Technology (GOCICT), pp.60-65, 2015. ,
Neutralizing potential and self-reported .digital piracy: A Multitheoretical exploration among college undergraduates, Criminal JusticeReview, vol.34, issue.2, pp.173-195, 2009. ,
Consumers' neutralization strategies to counter normative pressure: The case of illegal downloading, Recherche et Applications en Marketing, vol.29, issue.1, pp.103-121, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02048742
The effect of online piracy deterrence on self-control and piracy intention, vol.33, 2000. ,
Neutralization theory and the denial of risk: some evidence from cannabis use among French adolescents*, The British Journal of Sociology, vol.54, pp.21-42, 2003. ,
Understanding Cybercrime in Malaysia: An Overview, Advanced Informatics School, vol.2, issue.2, pp.109-115, 2014. ,
The fraud triangle revisited, Security Journal, vol.29, issue.2, pp.107-121, 2016. ,
Denial, minimization, partner blaming, and intimate aggression in dating partners, Journal of Interpersonal Violence, vol.22, issue.7, pp.851-871, 2007. ,
Purchase intention in an electronic commerce environment: a trade-off between controlling measures and operational performance, Information Technology & People. DoI, 2018. ,
How "bad" are you? Justification and normalization of online deviant customer behavior, Information and Communication Technologies in Tourism, pp.607-622, 2017. ,
A new perspective on neutralization and deterrence: Predicting shadow IT usage, Information & management, vol.54, issue.8, pp.1023-1037, 2017. ,
Neutralization: new insights into the problem of employee information systems security policy violations, MIS quarterly, pp.487-502, 2010. ,
Perceived risk and fear of crime: Gender differences in contextual sensitivity, International Review of Victimology, vol.8, issue.2, pp.159-181, 2001. ,
Risk perception in gambling: A systematic review, Journal of Gambling Studies, vol.30, issue.2, pp.253-276, 2014. ,
Challenging the Risks in Online Medicine Purchasing: Respectable Deviance, Respectable Deviance and Purchasing Medicine Online Palgrave Macmillan, pp.101-138, 2018. ,
It's Just Paint": Street Taggers' Use of Neutralization Techniques, Deviant Behavior, vol.37, issue.10, pp.1179-1195, 2016. ,
Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences, Journal of Research in Interactive Marketing, vol.6, issue.4, pp.298-313, 2012. ,
It's common sense, stupid! Corporate crime and techniques of neutralization in the automobile industry, Crime, Law and Social Change, vol.66, issue.2, pp.165-181, 2016. ,
Defensive denial, affect, and the self-regulation of health threats. The self-regulation of health and illness behavior, pp.184-204, 2003. ,