{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T02:23:59Z","timestamp":1774319039149,"version":"3.50.1"},"reference-count":62,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["101115901"],"award-info":[{"award-number":["101115901"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Dutch Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.chb.2026.108996","type":"journal-article","created":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T15:49:40Z","timestamp":1773589780000},"page":"108996","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["From curiosity to crime: Exploring pathways into criminal hacking"],"prefix":"10.1016","volume":"181","author":[{"given":"E.R.","family":"Leukfeldt","sequence":"first","affiliation":[]},{"given":"L.M.J.","family":"Bekkers","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.chb.2026.108996_bib1","series-title":"Youth pathways into cybercrime","author":"Aiken","year":"2016"},{"issue":"1","key":"10.1016\/j.chb.2026.108996_bib65","doi-asserted-by":"crossref","first-page":"40","DOI":"10.52306\/01010518VMDC9371","article-title":"Juvenile hackers: An empirical test of self-control theory and social bonding theory","volume":"1","author":"Back","year":"2018","journal-title":"The International Journal of Cybersecurity Intelligence and Cybercrime"},{"key":"10.1016\/j.chb.2026.108996_bib2","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.childyouth.2017.05.008","article-title":"The influence of strain factors, social control factors, self-control and computer use on adolescent cyber delinquency: Korean national Panel Study","volume":"78","author":"Bae","year":"2017","journal-title":"Children and Youth Services Review"},{"key":"10.1016\/j.chb.2026.108996_bib3","doi-asserted-by":"crossref","DOI":"10.1016\/j.jcrimjus.2025.102522","article-title":"Exploring the factors that differentiate individual and group offenders in cyber-dependent crime","volume":"101","author":"Bekkers","year":"2025","journal-title":"Journal of Criminal Justice"},{"key":"10.1016\/j.chb.2026.108996_bib4","doi-asserted-by":"crossref","DOI":"10.1177\/14773708251378356","article-title":"The psychological correlates of cybercrime offending: Exploring the self-control\/social learning relationship in serious cyber-dependent crime","author":"Bekkers","year":"2025","journal-title":"European Journal of Criminology"},{"key":"10.1016\/j.chb.2026.108996_bib5","doi-asserted-by":"crossref","DOI":"10.1108\/JCP-03-2025-0035","article-title":"Online gaming as a criminological environment: Exploring criminogenic needs and offending behaviors of gamers","author":"Bekkers","year":"2025","journal-title":"Journal of Criminal Psychology"},{"key":"10.1016\/j.chb.2026.108996_bib6","first-page":"1","article-title":"Recruiting co-offenders for financial cybercrime: An analysis of police investigations into cybercriminal networks","author":"Bekkers","year":"2024","journal-title":"Trends in Organized Crime"},{"key":"10.1016\/j.chb.2026.108996_bib7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/13218719.2025.2546311","article-title":"Distinct group, distinct traits? A comparison of risk factors across cybercrime offenders, traditional offenders and non-offenders","author":"Bekkers","year":"2025","journal-title":"Psychiatry, Psychology and Law"},{"key":"10.1016\/j.chb.2026.108996_bib8","series-title":"2012 IEEE international conference on intelligence and security informatics","first-page":"24","article-title":"Securing cyberspace: Identifying key actors in hacker communities","author":"Benjamin","year":"2012"},{"issue":"1","key":"10.1016\/j.chb.2026.108996_bib55","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1177\/02697580241282782","article-title":"Exploring the impact of cyber and traditional crime victimization: Impact comparisons and explanatory factors","volume":"31","author":"Borwell","year":"2025","journal-title":"International Review of Victimology"},{"issue":"6","key":"10.1016\/j.chb.2026.108996_bib66","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1007\/s12103-021-09654-5","article-title":"Neutralizing cyber attacks: Techniques of neutralization and willingness to commit cyber attacks","volume":"46","author":"Bossler","year":"2021","journal-title":"American Journal of Criminal Justice"},{"key":"10.1016\/j.chb.2026.108996_bib9","series-title":"Cyber crime: Concepts, methodologies, tools and applications","first-page":"1499","article-title":"The general theory of crime and computer hacking: Low self-control hackers?","author":"Bossler","year":"2012"},{"key":"10.1016\/j.chb.2026.108996_bib10","series-title":"Transforming qualitative information: Thematic analysis and code development","author":"Boyatzis","year":"1998"},{"issue":"2","key":"10.1016\/j.chb.2026.108996_bib11","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1191\/1478088706qp063oa","article-title":"Using thematic analysis in psychology","volume":"3","author":"Braun","year":"2006","journal-title":"Qualitative Research in Psychology"},{"key":"10.1016\/j.chb.2026.108996_bib58","series-title":"The Palgrave handbook of international cybercrime and cyberdeviance","first-page":"547","article-title":"Applying the techniques of neutralization to the study of cybercrime","author":"Brewer","year":"2020"},{"issue":"1","key":"10.1016\/j.chb.2026.108996_bib12","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1108\/IMDS-08-2020-0509","article-title":"Online disinhibition: Conceptualization, measurement, and implications for online deviant behavior","volume":"121","author":"Cheung","year":"2021","journal-title":"Industrial Management & Data Systems"},{"issue":"4","key":"10.1016\/j.chb.2026.108996_bib13","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1080\/15564886.2015.1121944","article-title":"A cross-national examination of the techniques of neutralization to account for hacking behaviors","volume":"11","author":"Chua","year":"2016","journal-title":"Victims and Offenders"},{"key":"10.1016\/j.chb.2026.108996_bib14","series-title":"Encyclopedia of critical psychology","first-page":"1947","article-title":"Thematic analysis","author":"Clarke","year":"2014"},{"key":"10.1016\/j.chb.2026.108996_bib63","series-title":"Crime opportunity theories","first-page":"197","article-title":"Understanding crime displacement: An application of rational choice theory","author":"Cornish","year":"2017"},{"issue":"3","key":"10.1016\/j.chb.2026.108996_bib15","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/s11292-010-9098-0","article-title":"The correspondence of family features with problem, aggressive, criminal, and violent behavior: A meta-analysis","volume":"6","author":"Derzon","year":"2010","journal-title":"Journal of Experimental Criminology"},{"issue":"11","key":"10.1016\/j.chb.2026.108996_bib64","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1177\/0002764217734263","article-title":"Darkode: Recruitment patterns and transactional features of \u201cthe most dangerous cybercrime forum in the world","volume":"61","author":"Dupont","year":"2017","journal-title":"American Behavioral Scientist"},{"issue":"2","key":"10.1016\/j.chb.2026.108996_bib16","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1080\/17440572.2016.1157480","article-title":"The ecology of trust among hackers","volume":"17","author":"Dupont","year":"2016","journal-title":"Global Crime"},{"issue":"7","key":"10.1016\/j.chb.2026.108996_bib18","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1177\/0093854820969754","article-title":"Use of a multitheoretic model to understand and classify juvenile computer hacking behavior","volume":"48","author":"Fox","year":"2021","journal-title":"Criminal Justice and Behavior"},{"issue":"1","key":"10.1016\/j.chb.2026.108996_bib59","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1177\/1362480614538645","article-title":"Digital drift and the criminal interaction order","volume":"19","author":"Goldsmith","year":"2015","journal-title":"Theoretical Criminology"},{"issue":"1","key":"10.1016\/j.chb.2026.108996_bib19","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1177\/1477370819887305","article-title":"The seductions of cybercrime: Adolescence and the thrills of digital transgression","volume":"19","author":"Goldsmith","year":"2022","journal-title":"European Journal of Criminology"},{"issue":"2","key":"10.1016\/j.chb.2026.108996_bib20","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1080\/01639620601131065","article-title":"Subcultural evolution? Examining the influence of on-and off-line experiences on deviant subcultures","volume":"28","author":"Holt","year":"2007","journal-title":"Deviant Behavior"},{"issue":"2","key":"10.1016\/j.chb.2026.108996_bib21","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1177\/0894439312452998","article-title":"Examining the forces shaping cybercrime markets online","volume":"31","author":"Holt","year":"2013","journal-title":"Social Science Computer Review"},{"key":"10.1016\/j.chb.2026.108996_bib22","series-title":"Cybercrime in progress: Theory and prevention of technology-enabled offenses","author":"Holt","year":"2015"},{"issue":"3","key":"10.1016\/j.chb.2026.108996_bib23","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1007\/s12103-011-9117-3","article-title":"Low self-control, deviant peer associations, and juvenile cyberdeviance","volume":"37","author":"Holt","year":"2012","journal-title":"American Journal of Criminal Justice"},{"issue":"8","key":"10.1016\/j.chb.2026.108996_bib24","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1177\/0306624X18811101","article-title":"Exploring the factors associated with rejection from a closed cybercrime community","volume":"63","author":"Holt","year":"2019","journal-title":"International Journal of Offender Therapy and Comparative Criminology"},{"key":"10.1016\/j.chb.2026.108996_bib25","doi-asserted-by":"crossref","DOI":"10.1080\/30679125.2026.2615793","article-title":"The death of the hero hacker: Getting real about computer hacking","author":"Holt","year":"2026","journal-title":"Evidence Base"},{"key":"10.1016\/j.chb.2026.108996_bib26","series-title":"Why college students commit computer hacks: Insights from a cross culture analysis","author":"Hu","year":"2013"},{"key":"10.1016\/j.chb.2026.108996_bib27","series-title":"2019 APWG symposium on electronic crime research (eCrime)","first-page":"1","article-title":"From playing games to committing crimes: A multi-technique approach to predicting key actors on an online gaming forum","author":"Hughes","year":"2019"},{"key":"10.1016\/j.chb.2026.108996_bib61","series-title":"Global Criminology: Crime and Victimization in a Globalized Era","first-page":"93","article-title":"Hacking and fraud","author":"Hutchings","year":"2013"},{"issue":"10","key":"10.1016\/j.chb.2026.108996_bib28","doi-asserted-by":"crossref","first-page":"1163","DOI":"10.1080\/01639625.2016.1169829","article-title":"Exploring the provision of online booter services","volume":"37","author":"Hutchings","year":"2016","journal-title":"Deviant Behavior"},{"issue":"5","key":"10.1016\/j.chb.2026.108996_bib29","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1080\/01639625.2015.1060796","article-title":"The victim\u2013perpetrator overlap in financial cybercrime: Evidence and reflection on the overlap of youth's on-line victimization and perpetration","volume":"37","author":"Kerstens","year":"2016","journal-title":"Deviant Behavior"},{"key":"10.1016\/j.chb.2026.108996_bib30","doi-asserted-by":"crossref","first-page":"840","DOI":"10.3389\/fpsyg.2020.00840","article-title":"Assessing the factors associated with the detection of juvenile hacking behaviors","volume":"11","author":"Lee","year":"2020","journal-title":"Frontiers in Psychology"},{"key":"10.1016\/j.chb.2026.108996_bib31","series-title":"Research agenda the human factor in cybercrime and cybersecurity","year":"2017"},{"key":"10.1016\/j.chb.2026.108996_bib32","series-title":"The human factor of cybercrime","year":"2019"},{"issue":"2","key":"10.1016\/j.chb.2026.108996_bib67","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/s12117-022-09448-z","article-title":"Unraveling the crime scripts of phishing networks: An analysis of 45 court cases in the Netherlands","volume":"25","author":"Loggen","year":"2022","journal-title":"Trends in Organized Crime"},{"key":"10.1016\/j.chb.2026.108996_bib34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/15564886.2024.2370295","article-title":"Pathways into, desistance from, and risk factors related to cyber-dependent crime: A systematic narrative review","author":"Loggen","year":"2024","journal-title":"Victims and Offenders"},{"key":"10.1016\/j.chb.2026.108996_bib35","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1146\/annurev-criminol-032317-092057","article-title":"Cyber-dependent crimes: An interdisciplinary review","volume":"2","author":"Maimon","year":"2019","journal-title":"Annual Review of Criminology"},{"key":"10.1016\/j.chb.2026.108996_bib36","doi-asserted-by":"crossref","DOI":"10.1016\/j.chb.2023.108011","article-title":"Cyber offending predictors and pathways in middle adolescence: Evidence from the UK Millennium Cohort Study","volume":"151","author":"Maras","year":"2024","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"10.1016\/j.chb.2026.108996_bib37","first-page":"47","article-title":"Juveniles and cyber stalking in the United States: An analysis of theoretical predictors of patterns of online perpetration","volume":"8","author":"Marcum","year":"2014","journal-title":"International Journal of Cyber Criminology"},{"issue":"4","key":"10.1016\/j.chb.2026.108996_bib38","doi-asserted-by":"crossref","first-page":"647","DOI":"10.3390\/forensicsci4040045","article-title":"Pathways to criminal hacking: Connecting lived experiences with theoretical explanations","volume":"4","author":"Martineau","year":"2024","journal-title":"Forensic Science"},{"key":"10.1016\/j.chb.2026.108996_bib68","first-page":"1","article-title":"Your files have been encrypted: A crime script analysis of ransomware attacks","author":"Matthijsse","year":"2023","journal-title":"Trends in Organized Crime"},{"key":"10.1016\/j.chb.2026.108996_bib69","series-title":"2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","first-page":"477","article-title":"Knowledge is power: An analysis of discussions on hacking forums","author":"McAlaney","year":"2020"},{"key":"10.1016\/j.chb.2026.108996_bib57","first-page":"1","article-title":"Cyber crime: A review of the evidence. Summary of key findings and implications","volume":"75","author":"McGuire","year":"2013","journal-title":"Home Office Research Report"},{"issue":"3","key":"10.1016\/j.chb.2026.108996_bib62","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1007\/s11292-022-09504-2","article-title":"Alerting consciences to reduce cybercrime: A quasi-experimental design using warning banners","volume":"19","author":"Moneva","year":"2023","journal-title":"Journal of Experimental Criminology"},{"key":"10.1016\/j.chb.2026.108996_bib40","series-title":"Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference","first-page":"71","article-title":"An analysis of underground forums","author":"Motoyama","year":"2011"},{"key":"10.1016\/j.chb.2026.108996_bib41","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s10610-021-09497-0","article-title":"Cybercrime victimisation and polyvictimisation in Finland\u2014Prevalence and risk factors","volume":"29","author":"N\u00e4si","year":"2023","journal-title":"European Journal on Criminal Policy and Research"},{"key":"10.1016\/j.chb.2026.108996_bib60","series-title":"Pathways Into Cyber Crime","year":"2017"},{"issue":"4","key":"10.1016\/j.chb.2026.108996_bib43","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1111\/1745-9133.12650","article-title":"Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers","volume":"22","author":"Noordegraaf","year":"2023","journal-title":"Criminology & Public Policy"},{"key":"10.1016\/j.chb.2026.108996_bib44","doi-asserted-by":"crossref","DOI":"10.1016\/j.ridd.2020.103681","article-title":"Self-reported motivations for engaging or declining to engage in cyber-dependent offending and the role of autistic traits","volume":"104","author":"Payne","year":"2020","journal-title":"Research in Developmental Disabilities"},{"key":"10.1016\/j.chb.2026.108996_bib56","doi-asserted-by":"crossref","first-page":"106985","DOI":"10.1016\/j.chb.2021.106985","article-title":"High tech crime, high intellectual crime? Comparing the intellectual capabilities of cybercriminals, traditional criminals and non-criminals","volume":"126","author":"Schiks","year":"2022","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"10.1016\/j.chb.2026.108996_bib47","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s12117-012-9159-z","article-title":"Cybercrime and virtual offender convergence settings","volume":"15","author":"Soudijn","year":"2012","journal-title":"Trends in Organized Crime"},{"issue":"1","key":"10.1016\/j.chb.2026.108996_bib49","first-page":"31","article-title":"Becoming a hacker: Demographic characteristics and developmental factors","volume":"3","author":"Steinmetz","year":"2015","journal-title":"Journal of qualitative criminal justice & criminology"},{"issue":"3","key":"10.1016\/j.chb.2026.108996_bib50","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1111\/nhs.12048","article-title":"Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study","volume":"15","author":"Vaismoradi","year":"2013","journal-title":"Nursing and Health Sciences"},{"issue":"3","key":"10.1016\/j.chb.2026.108996_bib51","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s10802-009-9368-3","article-title":"Serious, minor, and non-delinquents in early adolescence: The impact of cumulative risk and promotive factors. The TRAILS study","volume":"38","author":"Van der Laan","year":"2010","journal-title":"Journal of Abnormal Child Psychology"},{"key":"10.1016\/j.chb.2026.108996_bib52","series-title":"Cybercrime in context: The human factor in victimization, offending, and policing","first-page":"371","article-title":"Unique offender, unique response? Assessing the suitability and effectiveness of interventions for cyber offenders","author":"Van der Wagen","year":"2021"},{"issue":"1","key":"10.1016\/j.chb.2026.108996_bib53","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1080\/01639625.2017.1411030","article-title":"Offending and victimization in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap","volume":"40","author":"Weulen Kranenbarg","year":"2019","journal-title":"Deviant Behavior"},{"key":"10.1016\/j.chb.2026.108996_bib54","doi-asserted-by":"crossref","DOI":"10.1016\/j.avb.2023.101836","article-title":"Risk factors for juvenile cybercrime: A meta-analytic review","volume":"70","author":"Wissink","year":"2023","journal-title":"Aggression and Violent Behavior"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563226000932?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563226000932?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T01:48:28Z","timestamp":1774316908000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563226000932"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":62,"alternative-id":["S0747563226000932"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2026.108996","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"From curiosity to crime: Exploring pathways into criminal hacking","name":"articletitle","label":"Article Title"},{"value":"Computers in Human Behavior","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.chb.2026.108996","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"108996"}}