Access the full text.
Sign up today, get DeepDyve free for 14 days.
Jonathan Lusthaus (2018)
Industry of Anonymity
J. Shapland, Anne‐Marie Atkinson, Helen Atkinson, Emily Colledge, J. Dignan, Marie Howes, J. Johnstone, Gwen Robinson, A. Sorsby (2006)
Situating restorative justice within criminal justiceTheoretical Criminology, 10
J. Braithwaite (1989)
Crime, Shame, And Reintegration
Renushka Madarie (2017)
Hackers' Motivations: Testing Schwartz's Theory of Motivational Types of Values in a Sample of HackersInternational Journal of Cyber Criminology, 11
H. Zehr (2002)
The little book of restorative justice
H. Strang, J. Braithwaite (2017)
Restorative Justice : Philosophy to Practice
F. Marsh, N. Wager (2015)
Restorative justice in cases of sexual violenceProbation Journal, 62
J. Braithwaite (1982)
Enforced Self-Regulation: A New Strategy for Corporate Crime ControlMichigan Law Review, 80
R. Merton (1958)
Social Theory and Social Structure
D. Wall (2008)
Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime1International Review of Law, Computers & Technology, 22
N Henry, A Powell (2015)
Embodied harms: Gender, shame, and technology-facilitated sexual violenceViolence against Women, 21
Andrew Schrock (2016)
Civic hacking as data activism and advocacy: A history from publicity to open government dataNew Media & Society, 18
(2018)
Tesla encouraging “Good Faith” security research in bug bounty program
Vince Mercer, Karen Madesen, M. Keenan, Estelle Zinsstag (2015)
Doing restorative justice in cases of sexual violence: A practice guide
Angkasa (2018)
Legal Protection for Cyber Crime Victims on Victimological Perspective, 54
K Daly (2017)
Restorative justice: The real storyPunishment & Society, 4
Loretta Stalans, Christopher Donner (2018)
Explaining Why Cybercrime Occurs: Criminological and Psychological Theories
F Marsh, NM Wager (2015)
Restorative justice in cases of sexual violence: Exploring the views of the public and survivorsProbation Journal, 62
Aimée Quinn (2002)
Smart Regulation: Designing Environmental PolicyJournal of Government Information, 29
Eiad Yafi, Katya Yefimova, K. Fisher (2018)
Young Hackers: Hacking Technology at Za'atari Syrian Refugee CampExtended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems
(1975)
The Isoro: Social and Psychological Factors of Dispute Settlement and Punishment Avoidance in Fiji
(2018)
Lizard squad
Vulnerability disclosure guidelines
Benoît Dupont, A. Côté, C. Savine, D. Décary‐Hétu (2016)
The ecology of trust among hackersGlobal Crime, 17
N. Henry, A. Powell (2015)
Embodied HarmsViolence Against Women, 21
B. Sculos (2017)
Who’s Afraid of ‘Toxic Masculinity’?, 5
Jianhong Liu, M. Travers, L. Chang (2017)
Comparative Criminology in Asia
L. Chang, Souvik Mukherjee, Nicholas Coppel (2020)
We Are All Victims: Questionable Content and Collective Victimisation in the Digital AgeAsian Journal of Criminology, 16
Tony Krone (2005)
Hacking Offences: High Tech Crime Brief
G. Johnstone (2017)
Restorative justice for victims: inherent limits?Restorative Justice, 5
Hsiao-fen Huang, Lennon Chang (2013)
Evaluating Restorative Justice Programs in TaiwanAsian Journal of Criminology, 8
Kathleen Daly (2000)
Revisiting the relationship between retributive and restorative justice
I. Ayres, J. Braithwaite (1993)
Responsive Regulation: Transcending the Deregulation DebateOUP Catalogue
Masahiro Suzuki, Chen-Fu Pai, M. Islam (2018)
Systematic Quantitative Literature Review on Criminological Theories in AsiaAsian Journal of Criminology, 13
(2016)
Hacking : Truth or treason
Alina Das (2010)
The Immigration Penalties of Criminal Convictions: Resurrecting Categorical Analysis in Immigration LawLabor: Public Policy & Regulation eJournal
Jan Kleijssen, P. Perri (2017)
Cybercrime, Evidence and Territoriality: Issues and OptionsNetherlands Yearbook of International Law
(2018)
The rise of Chinese cyberwarriors: Towards a theoretical model of online hacktivism
(2015)
Organising monkeys or how to run a hacking club
(2019)
Meet the hacker who busts child pornographers on the dark net
E. Durkheim
Suicide: A Study in Sociology
Agus Raharjo, Luthfi Adi, Y. Saefudin (2018)
Access to Justice for Victims of Structural Violence in Makassar, South Sulawesi, 54
Kathleen Daly (2008)
Setting the Record Straight and a Call for Radical Change: A Reply to Annie Cossins on Restorative Justice and Child Sex OffencesBritish Journal of Criminology, 48
S. Merry (2005)
Human Rights & Gender Violence: Translating International Law into Local JusticeInternational Dialogue
Lennon Chang, Ryan Poon (2017)
Internet Vigilantism: Attitudes and Experiences of University Students Toward Cyber Crowdsourcing in Hong KongInternational Journal of Offender Therapy and Comparative Criminology, 61
Sue Palmer (2004)
Time to talk.Nature, 502 7473
(2018)
Cybersecurity Training & Education (VIBRANT15)
A Das (2011)
The immigration penalties of criminal convictions: Resurrecting categorical analysis in immigration lawNew York University Law Review, 86
(2005)
Human Rights and Gender Violence
P. Grabosky (1995)
Regulation by Reward: On the Use of Incentives as Regulatory Instruments*Law & Policy, 17
Da-Yu Kao, F. Huang, Shiuh-Jeng Wang (2009)
Persistence and desistance: Examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackersComput. Law Secur. Rev., 25
Lennon Chang, Lena Zhong, P. Grabosky (2018)
Citizen co‐production of cyber security: Self‐help, vigilantes, and cybercrimeRegulation & Governance, 12
I. Senarathna, M. Warren (2017)
A Sri Lankan hacking case study
(2020)
Pornhub removes all user-uploaded videos amid legality row
Alice Marwick (2017)
Scandal or sex crime? Gendered privacy and the celebrity nude photo leaksEthics and Information Technology, 19
L. Chang (2012)
Cybercrime in the Greater China Region
(2019)
The 2019 Hacker Report
Kathleen Daly (2002)
Restorative justicePunishment & Society, 4
Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations
Like most criminological research, much of the research on hacking has predominantly focused upon the Northern Metropolis. As a result, there is a lack of focus on cybercrime within the Global South, particularly on illegal intrusions into computer systems, more colloquially known as hacking. This article provides a critical overview of hacking in the Global South, highlighting the role of strain in this offending behaviour. In particular, the authors note the role of Australian, American, and Taiwanese immigration policies that act to block offenders’ transitions from illicit hacking to legitimate employment in technological hubs outside of the Global South. To address these blocked opportunities, this article suggests the use of innovative justice paradigms, particularly restorative justice and regulatory self-enforcement, that respond to innovation-based cybercrime while also facilitating offender movement into “white hat” employment, even in cases of technology-facilitated sexual violence.
Asian Journal of Criminology – Springer Journals
Published: Jun 1, 2022
Keywords: Cybercrime; Hacking; Regulatory self-enforcement; Restorative justice; Strain theory; Smart regulation
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.