4,184
Views
58
CrossRef citations to date
0
Altmetric
Original Articles

Hacking in High School: Cybercrime Perpetration by Juveniles

, , &
Pages 581-591 | Received 28 Sep 2013, Accepted 19 Oct 2013, Published online: 26 Mar 2014

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (7)

Seyyedeh Masoomeh (Shamila) Shadmanfaat, Saeed Kabiri, Hayden Smith & John K. Cochran. (2020) A Longitudinal Study of Iranian Fans’ Cyberbullying: The Utility of Social Learning Theory. Deviant Behavior 41:12, pages 1616-1635.
Read now
Kevin F. Steinmetz, Thomas J. Holt & Karen M. Holt. (2020) Decoding the Binary: Reconsidering the Hacker Subculture through a Gendered Lens. Deviant Behavior 41:8, pages 936-948.
Read now
Jay P. Kennedy. (2020) From a trickle to a potential torrent: crime and crime prevention as cascade phenomena. International Journal of Comparative and Applied Criminal Justice 44:3, pages 189-199.
Read now
Seyyed Masoomeh (Shamila) Shadmanfaat, C. Jordan Howell, Caitlyn N. Muniz, John K. Cochran, Saeed Kabiri & Eva M. Fontaine. (2020) Cyberbullying perpetration: an empirical test of social learning theory in Iran. Deviant Behavior 41:3, pages 278-293.
Read now
Tamar Berenblum, Marleen Weulen Kranenbarg & David Maimon. (2019) Out of control online? A combined examination of peer-offending and perceived formal and informal social control in relation to system-trespassing. Journal of Crime and Justice 42:5, pages 616-631.
Read now
Yi Ting Chua & Thomas J. Holt. (2016) A Cross-National Examination of the Techniques of Neutralization to Account for Hacking Behaviors. Victims & Offenders 11:4, pages 534-555.
Read now

Articles from other publishers (51)

Siying Guo & Yuchen Wang. (2024) Investigating predictors of juvenile traditional and/or cyber offense using machine learning by constructing a decision support system. Computers in Human Behavior 152, pages 108079.
Crossref
Katie Maras, Abe Sweiry, Aase Villadsen & Emla Fitzsimons. (2024) Cyber offending predictors and pathways in middle adolescence: Evidence from the UK Millennium Cohort Study. Computers in Human Behavior 151, pages 108011.
Crossref
Mary P. Aiken, Julia C. Davidson, Michel Walrave, Koen S. Ponnet, Kirsty Phillips & Ruby R. Farr. (2024) Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking. Forensic Sciences 4:1, pages 24-41.
Crossref
Tyson Whitten, Jesse Cale, Russell Brewer, Katie Logos, Thomas J. Holt & Andrew Goldsmith. (2024) Exploring the Role of Self-Control Across Distinct Patterns of Cyber-Deviance in Emerging Adolescence. International Journal of Offender Therapy and Comparative Criminology.
Crossref
Tony Khaoya Barasa, Ferdinand Nabiswa & Maurice Pepela. (2023) Nature and Extent of Deviant Behaviour among Secondary Students in Public Schools within Bungoma County, Kenya. African Journal of Empirical Research 4:2, pages 861-877.
Crossref
Judith E. Noordegraaf & Marleen Weulen Kranenbarg. (2023) Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers. Criminology & Public Policy 22:4, pages 803-824.
Crossref
Carolina Roque, Maria Canudo, Samuel Moreira & Inês Sousa Guedes. 2023. Contemporary Challenges for Cyber Security and Data Privacy. Contemporary Challenges for Cyber Security and Data Privacy 83 107 .
Dongsim Kim & Claire Seungeun Lee. (2023) Cyberbullying Victimization and Perpetration in South Korean Youth: Structural Equation Modeling and Latent Means Analysis. Crime & Delinquency.
Crossref
Marleen Weulen Kranenbarg, Jean-Louis van Gelder, Ard J. Barends & Reinout E. de Vries. (2023) Is there a cybercriminal personality? Comparing cyber offenders and offline offenders on HEXACO personality domains and their underlying facets. Computers in Human Behavior 140, pages 107576.
Crossref
Asier Moneva, E. Rutger Leukfeldt & Marco Romagna. 2023. Fieldwork Experiences in Criminology and Security Studies. Fieldwork Experiences in Criminology and Security Studies 511 533 .
Hansika Kapoor & Simon Henderson. 2023. Creativity, Innovation, and Change Across Cultures. Creativity, Innovation, and Change Across Cultures 143 173 .
Steve G.A. van de Weijer & Asier Moneva. (2022) Familial concentration of crime in a digital era: Criminal behavior among family members of cyber offenders. Computers in Human Behavior Reports 8, pages 100249.
Crossref
Jihoon Kim, Lindsay Leban & Yeungjeom Lee. (2022) Theoretical Explanations of the Development of Youth Hacking. Crime & Delinquency, pages 001112872211156.
Crossref
Simon Parkin & Yi Ting Chua. (2022) A cyber-risk framework for coordination of the prevention and preservation of behaviours1. Journal of Computer Security 30:3, pages 327-356.
Crossref
Jeong Ah Yoo. (2022) What shapes cyber delinquency in adolescents?: A holistic and comparative analysis of cyber and traditional offline delinquencies. Children and Youth Services Review 136, pages 106445.
Crossref
Marleen Weulen Kranenbarg. (2022) When do they offend together? Comparing co-offending between different types of cyber-offenses and traditional offenses. Computers in Human Behavior 130, pages 107186.
Crossref
Jonathan Nii Barnor & Alfred A. Patterson. 2022. Research Anthology on Combating Cyber-Aggression and Online Negativity. Research Anthology on Combating Cyber-Aggression and Online Negativity 1560 1582 .
Jim A.M. Schiks, Steve G.A. van de Weijer & E. Rutger Leukfeldt. (2022) High tech crime, high intellectual crime? Comparing the intellectual capabilities of cybercriminals, traditional criminals and non-criminals. Computers in Human Behavior 126, pages 106985.
Crossref
Eric Rutger Leukfeldt & Thomas J. Holt. (2022) Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals. Computers in Human Behavior 126, pages 106979.
Crossref
Thomas E. Dearden & Katalin Parti. (2021) Cybercrime, Differential Association, and Self-Control: Knowledge Transmission Through Online Social Learning. American Journal of Criminal Justice 46:6, pages 935-955.
Crossref
Lijun Zhao & Junjian Yu. (2021) A Meta-Analytic Review of Moral Disengagement and Cyberbullying. Frontiers in Psychology 12.
Crossref
Thomas J. Holt & Kevin F. Steinmetz. (2020) Examining the Role of Power-Control Theory and Self-Control to Account for Computer Hacking. Crime & Delinquency 67:10, pages 1491-1512.
Crossref
Adam M. Bossler. (2021) Perceived Formal and Informal Sanctions in Deterring Cybercrime in a College Sample. Journal of Contemporary Criminal Justice 37:3, pages 452-470.
Crossref
Bryanna Fox & Thomas J. Holt. (2020) Use of a Multitheoretic Model to Understand and Classify Juvenile Computer Hacking Behavior. Criminal Justice and Behavior 48:7, pages 943-963.
Crossref
Tim Hall, Ben Sanders, Mamadou Bah, Owen King & Edward Wigley. (2020) Economic geographies of the illegal: the multiscalar production of cybercrime. Trends in Organized Crime 24:2, pages 282-307.
Crossref
Marleen Weulen Kranenbarg, Stijn Ruiter & Jean-Louis Van Gelder. (2019) Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders. European Journal of Criminology 18:3, pages 386-406.
Crossref
Thomas J. Holt, Jesse Cale, Russell Brewer & Andrew Goldsmith. (2020) Assessing the Role of Opportunity and Low Self-Control in Juvenile Hacking. Crime & Delinquency 67:5, pages 662-688.
Crossref
Siqi Chen, Yufei Yuan, Xin (Robert) Luo, Jie Jian & Yan Wang. (2021) Discovering group-based transnational cyber fraud actives: A polymethodological view. Computers & Security 104, pages 102217.
Crossref
Simon Parkin & Yi Ting Chua. 2021. Socio-Technical Aspects in Security and Trust. Socio-Technical Aspects in Security and Trust 23 42 .
Francisco J. Castro-Toledo & Fernando Miró-Llinares. 2021. Researching Cybercrimes. Researching Cybercrimes 327 345 .
Maria Bada, Yi Ting Chua, Ben Collier & Ildiko Pete. 2021. Cybercrime in Context. Cybercrime in Context 237 257 .
Thomas J. Holt, Jordana N. Navarro & Shelly Clevenger. (2019) Exploring the Moderating Role of Gender in Juvenile Hacking Behaviors. Crime & Delinquency 66:11, pages 1533-1555.
Crossref
Jin Ree Lee & Thomas J. Holt. (2020) Assessing the Factors Associated With the Detection of Juvenile Hacking Behaviors. Frontiers in Psychology 11.
Crossref
Jonathan Nii Barnor & Alfred A. Patterson. 2020. Handbook of Research on Managing Information Systems in Developing Economies. Handbook of Research on Managing Information Systems in Developing Economies 480 502 .
George E. Higgins & Jason Nicholson. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 16 .
Marleen Weulen Kranenbarg. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 771 792 .
George E. Higgins & Jason Nicholson. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 567 581 .
Jordana N. Navarro & Catherine D. Marcum. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 527 545 .
Erik Moore, Daniel Likarish, Bobbie Bastian & Michael Brooks. 2020. Information Security Education. Information Security in Action. Information Security Education. Information Security in Action 18 31 .
David MaimonEric R. Louderback. (2019) Cyber-Dependent Crimes: An Interdisciplinary Review. Annual Review of Criminology 2:1, pages 191-216.
Crossref
Marleen Weulen Kranenbarg. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 22 .
Jordana N. Navarro & Catherine D. Marcum. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 20 .
Russell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith & David MaimonRussell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith & David Maimon. 2019. Cybercrime Prevention. Cybercrime Prevention 93 108 .
Catherine D. Marcum & George E. Higgins. 2019. Handbook on Crime and Deviance. Handbook on Crime and Deviance 459 475 .
Marleen Weulen Kranenbarg, Stijn Ruiter, Jean-Louis van Gelder & Wim Bernasco. (2018) Cyber-Offending and Traditional Offending over the Life-Course: an Empirical Comparison. Journal of Developmental and Life-Course Criminology 4:3, pages 343-364.
Crossref
Byung H. Lee. (2017) Explaining Cyber Deviance among School-Aged Youth. Child Indicators Research 11:2, pages 563-584.
Crossref
Loretta J. Stalans & Christopher M. Donner. 2018. Cyber Criminology. Cyber Criminology 25 45 .
Egbert Zavala & Don L. Kurtz. (2017) Using Gottfredson and Hirschi’s A General Theory of Crime to Explain Problematic Alcohol Consumption by Police Officers: A Test of Self-Control as Self-Regulation . Journal of Drug Issues 47:3, pages 505-522.
Crossref
Bradford W. Reyns. (2015) A routine activity perspective on online victimisation. Journal of Financial Crime 22:4, pages 396-411.
Crossref
Ryan Seebruck. (2015) A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model. Digital Investigation 14, pages 36-45.
Crossref
Kevin F. Steinmetz. (2015) Craft(y)ness. British Journal of Criminology 55:1, pages 125-145.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.