E. N. Andoh, Theoretical and legal aspects of cybercrimes in Ghana

T. Apostolidis, N. Fieulaine, L. Simonin, and G. Rolland, Cannabis use, time perspective and risk perception: Evidence of a moderating effect, Psychology and health, vol.21, issue.5, pp.571-592, 2006.
URL : https://hal.archives-ouvertes.fr/halshs-00408109

C. Z. Barnes, An investigation into the techniques of neutralization theory and their \ effects on compulsive consumption behavior, 2007.

S. Biegler, Beyond our control? Confronting the limits of our legal system in the age of cyberspace, 2003.

R. Boateng, O. Longe, R. S. Isabalija, and J. Budu, Sakawa -Cybercrime and Criminality in Ghana, Journal of Information Technology Impact, vol.11, issue.2, pp.85-100, 2011.

K. M. Boyle and L. S. Walker, The neutralization and denial of sexual violence in college party subcultures, Deviant Behavior, vol.37, issue.12, pp.1392-1410, 2016.

G. Brooks, Explaining Corruption: Drifting In and Out of Corruption and Techniques of Neutralization, Criminology of Corruption, pp.107-125, 2016.

K. Bullock and R. Condry, Responding to denial, minimization and blame in correctional settings: The 'real world 'implications of offender neutralizations, European Journal of Criminology, vol.10, issue.5, pp.572-590, 2013.

S. Chatterjee, A. K. Kar, Y. K. Dwivedi, and H. Kizgin, Prevention of cybercrimes in smart cities of India: from a citizen's perspective. Information Technology & People, 2018.

K. K. Choo, Cyber threat landscape faced by financial and insurance industry. Trends and issues in crime and criminal justice, p.1, 2011.

J. Choudrie and Y. K. Dwivedi, Investigating the research approaches for examining technology adoption issues, Journal of Research Practice, vol.1, issue.1, 2005.

J. D'arcy, A. Hovav, and D. Galletta, User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach, Information Systems Research, vol.20, issue.1, pp.79-98, 2009.

S. Das and T. Nayak, Impact of cybercrime: Issues and challenges, International journal of engineering sciences & Emerging technologies, vol.6, issue.2, pp.142-153, 2013.

J. J. Esala, Communities of denial: The co-construction of gendered adolescent violence, Deviant behavior, vol.34, issue.2, pp.97-114, 2013.

P. Gottschalk and R. Smith, Criminal entrepreneurship, white-collar criminality, and neutralization theory, Journal of Enterprising Communities: People and Places in the Global Economy, vol.5, issue.4, pp.300-308, 2011.

P. Grabosky, Organized cybercrime and national security, Cybercrime Risks and Responses, pp.67-80, 2015.

L. C. Harris and A. Dumas, Online consumer misbehavior: an application of neutralization theory, vol.9, pp.379-402, 2009.

A. Hutchings, Hacking and fraud: Qualitative analysis of online offending and victimization. Global criminology: Crime and victimization in the globalized era, pp.93-114, 2013.

J. R. Ingram and S. Hinduja, Neutralizing music piracy: An empirical examination, Deviant Behavior, vol.29, issue.4, pp.334-366, 2008.

A. E. Jegede and I. E. Olowookere, Cyber Risks and Fraud in the Nigeria's Business Environment: A Postmortem of Youth Crime, Journal of Social and Development Sciences, vol.5, issue.4, pp.258-265, 2014.

A. E. Jegede, I. E. Olowookere, and A. O. Elegbeleye, Youth Identity, Peer Influence and Internet Crime Participation in Nigeria: A Reflection, Ife Psycholog, vol.24, issue.1, pp.37-47, 2016.

A. E. Jegede, K. Oyesomi, and B. R. Olorunyomi, Youth crime and the organized attributes of cyber fraud in the modern technological age: a thematic review, International Journal of Social Sciences and Humanities Reviews, vol.6, issue.1, pp.153-164, 2016.

W. Kim, O. R. Jeong, C. Kim, and J. So, The dark side of the Internet: Attacks, costs and responses, Information systems, vol.36, issue.3, pp.675-705, 2011.

K. Y. Koay, Understanding consumers' purchase intention towards counterfeit luxury goods: An integrated model of neutralization techniques and perceived risk theory, Asia Pacific Journal of Marketing and Logistics, vol.30, issue.2, pp.495-516, 2001.

S. Lazarus, Birds of a Feather Flock Together: The Nigerian Cyber Fraudsters (Yahoo Boys) and Hip Hop Artists, Criminology, Criminal Justice, Law & Society, vol.19, issue.2, pp.63-80, 2018.

J. Li-chi-mei, Neutralization techniques, crime decision-making and juvenile thieves, International Journal of Adolescence and Youth, vol.14, issue.3, pp.251-265, 2008.

W. Li and L. Cheng, Effects of Neutralization Techniques and Rational Choice Theory on Internet Abuse in the Workplace, PACIS, p.169, 2013.

J. L. Mcmullan and A. Rege, Online crime and internet gambling, Journal of Gambling Issues, issue.24, pp.54-85, 2010.

M. E. Meesters and J. H. Behagel, The Social Licence to Operate: Ambiguities and the neutralization of harm in Mongolia, Resources Policy, vol.53, pp.274-282, 2017.

S. Mekonnen, K. Padayachee, and M. Meshesha, A privacy preserving contextaware insider threat prediction and prevention model predicated on the components of the fraud diamond, 2015 Annual Global Online Conference on Information and Computer Technology (GOCICT), pp.60-65, 2015.

R. G. Morris and G. E. Higgins, Neutralizing potential and self-reported .digital piracy: A Multitheoretical exploration among college undergraduates, Criminal JusticeReview, vol.34, issue.2, pp.173-195, 2009.

P. Odou and G. Bonnin, Consumers' neutralization strategies to counter normative pressure: The case of illegal downloading, Recherche et Applications en Marketing, vol.29, issue.1, pp.103-121, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02048742

J. Park and C. Sung, The effect of online piracy deterrence on self-control and piracy intention, vol.33, 2000.

P. Peretti-watel, Neutralization theory and the denial of risk: some evidence from cannabis use among French adolescents*, The British Journal of Sociology, vol.54, pp.21-42, 2003.

J. Prasad, I. Roslina, and A. Azizah, Understanding Cybercrime in Malaysia: An Overview, Advanced Informatics School, vol.2, issue.2, pp.109-115, 2014.

A. Schuchter and M. Levi, The fraud triangle revisited, Security Journal, vol.29, issue.2, pp.107-121, 2016.

K. Scott and M. Straus, Denial, minimization, partner blaming, and intimate aggression in dating partners, Journal of Interpersonal Violence, vol.22, issue.7, pp.851-871, 2007.

M. A. Shareef, Y. K. Dwivedi, V. Kumar, G. Davies, N. Rana et al., Purchase intention in an electronic commerce environment: a trade-off between controlling measures and operational performance, Information Technology & People. DoI, 2018.

M. Sigala, How "bad" are you? Justification and normalization of online deviant customer behavior, Information and Communication Technologies in Tourism, pp.607-622, 2017.

M. Silic, J. B. Barlow, and A. Back, A new perspective on neutralization and deterrence: Predicting shadow IT usage, Information & management, vol.54, issue.8, pp.1023-1037, 2017.

M. Siponen and A. Vance, Neutralization: new insights into the problem of employee information systems security policy violations, MIS quarterly, pp.487-502, 2010.

W. R. Smith, M. Torstensson, and K. Johansson, Perceived risk and fear of crime: Gender differences in contextual sensitivity, International Review of Victimology, vol.8, issue.2, pp.159-181, 2001.

M. Spurrier and A. Blaszczynski, Risk perception in gambling: A systematic review, Journal of Gambling Studies, vol.30, issue.2, pp.253-276, 2014.

L. Sugiura, Challenging the Risks in Online Medicine Purchasing: Respectable Deviance, Respectable Deviance and Purchasing Medicine Online Palgrave Macmillan, pp.101-138, 2018.

A. Vasquez and L. M. Vieraitis, It's Just Paint": Street Taggers' Use of Neutralization Techniques, Deviant Behavior, vol.37, issue.10, pp.1179-1195, 2016.

I. Vida, M. Kos-kokli?, M. Kukar-kinney, and E. Penz, Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences, Journal of Research in Interactive Marketing, vol.6, issue.4, pp.298-313, 2012.

D. Whyte, It's common sense, stupid! Corporate crime and techniques of neutralization in the automobile industry, Crime, Law and Social Change, vol.66, issue.2, pp.165-181, 2016.

D. J. Wiebe and C. Korbel, Defensive denial, affect, and the self-regulation of health threats. The self-regulation of health and illness behavior, pp.184-204, 2003.