16,518
Views
60
CrossRef citations to date
0
Altmetric
Articles

Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap

ORCID Icon, &
Pages 40-55 | Received 24 May 2017, Accepted 23 Aug 2017, Published online: 11 Dec 2017

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (10)

Thomas E. Dearden & Petter Gottschalk. (2024) Convenience Theory and Cybercrime Opportunity: An Analysis of Online Cyber Offending. Deviant Behavior 45:3, pages 348-360.
Read now
Jin R. Lee & Thomas J. Holt. (2023) Assessing the correlates of cyberattacks against high-visibility institutions. Criminal Justice Studies 36:3, pages 251-268.
Read now
Riccardo Milani, Lorena Molnar, Stefano Caneppele & Marcelo F. Aebi. (2022) Convergence of Traditional and Online Property Crime Victimization in a City with Little Offline Crime. Victims & Offenders 17:6, pages 813-830.
Read now
Katalin Parti, Thomas E Dearden & James Hawdon. (2022) Understanding the Overlap of Online Offending and Victimization: Using Cluster Analysis to Examine Group Differences. Victims & Offenders 17:5, pages 712-734.
Read now
Riccardo Milani, Stefano Caneppele & Christine Burkhardt. (2022) Exposure to Cyber Victimization: Results from a Swiss Survey. Deviant Behavior 43:2, pages 228-240.
Read now
Mackenzie Kushner, Ekaterina Botchkovar, Olena Antonaccio & Lorine Hughes. (2021) Exploring Vulnerability to Deviant Coping among Victims of Crime in Two Post-Soviet Cities. Justice Quarterly 38:6, pages 1182-1209.
Read now
Jay P. Kennedy. (2020) From a trickle to a potential torrent: crime and crime prevention as cascade phenomena. International Journal of Comparative and Applied Criminal Justice 44:3, pages 189-199.
Read now
Rustu Deryol & Pamela Wilcox. (2020) Physical Health Risk Factors across Traditional Bullying and Cyberbullying Victim and Offender Groups. Victims & Offenders 15:4, pages 520-547.
Read now

Articles from other publishers (50)

Asier Moneva, Stijn Ruiter & Daniël Meinsma. (2024) Criminal expertise and hacking efficiency. Computers in Human Behavior 155, pages 108180.
Crossref
Marko Mikkola, Atte Oksanen, Markus Kaakinen, Bryan Lee Miller, Iina Savolainen, Anu Sirola, Izabela Zych & Hye-Jin Paek. (2020) Situational and Individual Risk Factors for Cybercrime Victimization in a Cross-national Context. International Journal of Offender Therapy and Comparative Criminology 68:5, pages 449-467.
Crossref
Siying Guo & Yuchen Wang. (2024) Investigating predictors of juvenile traditional and/or cyber offense using machine learning by constructing a decision support system. Computers in Human Behavior 152, pages 108079.
Crossref
Katie Maras, Abe Sweiry, Aase Villadsen & Emla Fitzsimons. (2024) Cyber offending predictors and pathways in middle adolescence: Evidence from the UK Millennium Cohort Study. Computers in Human Behavior 151, pages 108011.
Crossref
Elizabeth A. Mumford, Poulami MaitraEmily F. RothmanJackie Sheridan-Johnson. (2023) The Victim-Offender Overlap in Technology-Facilitated Abuse: Nationally Representative Findings Among U.S. Young Adults. Cyberpsychology, Behavior, and Social Networking 26:12, pages 904-912.
Crossref
Seung Yeop Paek, Yeon-Jun Choi & Julak Lee. (2023) Exposure to harmful content and cyberbullying perpetration among South Korean adolescents during COVID-19: The moderating role of parental support. Children and Youth Services Review 155, pages 107280.
Crossref
So-Hyun Lee, Ilwoong Kang & Hee-Woong Kim. (2023) Understanding cybercrime from a criminal's perspective: Why and how suspects commit cybercrimes?. Technology in Society 75, pages 102361.
Crossref
Dongsim Kim & Claire Seungeun Lee. (2023) Cyberbullying Victimization and Perpetration in South Korean Youth: Structural Equation Modeling and Latent Means Analysis. Crime & Delinquency.
Crossref
Elizabeth A. Mumford, Emily F. Rothman, Poulami Maitra & Jackie Sheridan-Johnson. (2022) U.S. Young Adults’ Professional Help-Seeking in Response to Technology-Facilitated Abuse. Journal of Interpersonal Violence 38:11-12, pages 7063-7088.
Crossref
Maryja Šupa, Vytautas Kaktinas & Aistė Rinkevičiūtė. (2023) Computer-dependent or computer-assisted? The social context of online crime in Lithuanian court judgements. International Journal of Law, Crime and Justice 73, pages 100577.
Crossref
Matti Näsi, Petri Danielsson & Markus Kaakinen. (2021) Cybercrime Victimisation and Polyvictimisation in Finland—Prevalence and Risk Factors. European Journal on Criminal Policy and Research 29:2, pages 283-301.
Crossref
Candace E. Griffith, Melissa Tetzlaff-Bemiller & Lance Y. Hunter. (2023) Understanding the cyber-victimization of young people: A test of routine activities theory. Telematics and Informatics Reports 9, pages 100042.
Crossref
Marleen Weulen Kranenbarg, Jean-Louis van Gelder, Ard J. Barends & Reinout E. de Vries. (2023) Is there a cybercriminal personality? Comparing cyber offenders and offline offenders on HEXACO personality domains and their underlying facets. Computers in Human Behavior 140, pages 107576.
Crossref
Philipp Müller, Arne Dreißigacker, Anna Isenhardt & Gina Rosa Wollinger. (2023) Täter und Täterinnen von Cyberkriminalität: Ergebnisse einer quantitativen Dunkelfeldbefragung in Niedersachsen. Monatsschrift für Kriminologie und Strafrechtsreform 106:1, pages 5-17.
Crossref
Thomas J. Holt. (2023) Understanding the state of criminological scholarship on cybercrimes. Computers in Human Behavior 139, pages 107493.
Crossref
Vusumuzi Maphosa. (2024) An overview of cybersecurity in Zimbabwe’s financial services sector. F1000Research 12, pages 1251.
Crossref
Vusumuzi Maphosa. (2023) An overview of cybersecurity in Zimbabwe’s financial services sector. F1000Research 12, pages 1251.
Crossref
Silke Van den Eynde, Stefaan Pleysier & Michel Walrave. (2023) Non-consensual dissemination of sexual images: The victim-offender overlap. Social Sciences & Humanities Open 8:1, pages 100611.
Crossref
Wim Bernasco, Marre Lammers, Barbara Menting & Stijn Ruiter. (2020) Are frequent offenders more difficult to find and less willing to participate? An analysis of unit non-response in an online survey among offenders. European Journal of Criminology 19:6, pages 1403-1420.
Crossref
Marko Mikkola, Noora Ellonen, Markus Kaakinen, Iina Savolainen, Anu Sirola, Izabela Zych, Hye-Jin Paek & Atte Oksanen. (2022) Cyberharassment Victimization on Three Continents: An Integrative Approach. International Journal of Environmental Research and Public Health 19:19, pages 12138.
Crossref
Loretta J. Stalans. (2022) Social and Emotional Context of Fraud Scams in Cyberspace. Social and Emotional Context of Fraud Scams in Cyberspace.
Andrea Di Nicola. (2022) Towards digital organized crime and digital sociology of organized crime. Trends in Organized Crime.
Crossref
Marleen Weulen Kranenbarg. (2022) When do they offend together? Comparing co-offending between different types of cyber-offenses and traditional offenses. Computers in Human Behavior 130, pages 107186.
Crossref
Wahyuddin Naro, Abdul Syatar, Muhammad Majdy Amiruddin, Islamul Haq, Achmad Abubakar & Chaerul Risal. (2022) Shariah Assessment Toward the Prosecution of Cybercrime in Indonesia. International Journal of Criminology and Sociology 9, pages 572-586.
Crossref
Boris Sturc, Tatyana Gurova & Sergei Chernov. (2022) The Specifics and Patterns of Cybercrime in the Field of Payment Processing. International Journal of Criminology and Sociology 9, pages 2021-2030.
Crossref
Kenji Yokotani & Masanori Takano. (2022) Predicting cyber offenders and victims and their offense and damage time from routine chat times and online social network activities. Computers in Human Behavior 128, pages 107099.
Crossref
Asier Moneva, E. Rutger Leukfeldt, Steve G.A. Van De Weijer & Fernando Miró-Llinares. (2022) Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective. Computers in Human Behavior 126, pages 106984.
Crossref
Eric Rutger Leukfeldt & Thomas J. Holt. (2022) Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals. Computers in Human Behavior 126, pages 106979.
Crossref
Dr.Yusuf Perwej, Syed Qamar Abbas, Jai Pratap Dixit, Dr. Nikhat Akhtar & Anurag Kumar Jaiswal. (2021) A Systematic Literature Review on the Cyber Security. International Journal of Scientific Research and Management 9:12, pages 669-710.
Crossref
Adam M. Bossler. (2021) Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks. American Journal of Criminal Justice 46:6, pages 911-934.
Crossref
Mark Button, Dean Blackbourn, Lisa Sugiura, David Shepherd, Richard Kapend & Victoria Wang. (2021) From feeling like rape to a minor inconvenience: Victims’ accounts of the impact of computer misuse crime in the United Kingdom. Telematics and Informatics 64, pages 101675.
Crossref
Mudit Kumar Verma & Shyam Sundar Kushwaha. (2021) Awareness towards cybercrime among secondary school students: the role of gender and school management. Safer Communities 20:3, pages 150-158.
Crossref
Adam M. Bossler. (2021) Perceived Formal and Informal Sanctions in Deterring Cybercrime in a College Sample. Journal of Contemporary Criminal Justice 37:3, pages 452-470.
Crossref
Maria Bada & Jason R.C. Nurse. (2021) Profiling the Cybercriminal: A Systematic Review of Research. Profiling the Cybercriminal: A Systematic Review of Research.
Miloslava Plachkinova. (2021) Exploring the Shift from Physical to Cybercrime at the Onset of the COVID-19 Pandemic. International Journal of Cyber Forensics and Advanced Threat Investigations 2:1, pages 50-62.
Crossref
Lloyd C. Harris & Andrew Pressey. (2021) Dirty work or working dirty? Deceiving cruise tourists. Annals of Tourism Research 88, pages 103183.
Crossref
Marleen Weulen Kranenbarg. 2021. Researching Cybercrimes. Researching Cybercrimes 107 126 .
James F. Popham. 2021. Cybercrime in Context. Cybercrime in Context 103 122 .
Bradford W. Reyns & Ryan Randa. (2019) No honor among thieves: personal and peer deviance as explanations of online identity fraud victimization. Security Journal 33:2, pages 228-243.
Crossref
James Popham, Mary McCluskey, Michael Ouellet & Owen Gallupe. (2020) Exploring police-reported cybercrime in Canada. Policing: An International Journal 43:1, pages 35-48.
Crossref
Marleen Weulen Kranenbarg. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 771 792 .
Billy Henson. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 469 489 .
Thomas J. Holt, Shelly Clevenger & Jordana Navarro. (2019) Exploring digital evidence recognition among officers and troopers in a sample of a state police force. Policing: An International Journal 43:1, pages 91-103.
Crossref
Nikolina Ljepava, Duško Tomić, Dženana Nuhodžić & Marko Gnjatović. (2019) Cyberbullying, online behavior, and the students' psychological well-being: An engineering management approach. Serbian Journal of Engineering Management 4:1, pages 9-14.
Crossref
Marleen Weulen Kranenbarg. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 22 .
Billy Henson. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 22 .
Russell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith & David MaimonRussell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith & David Maimon. 2019. Cybercrime Prevention. Cybercrime Prevention 93 108 .
Russell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith & David MaimonRussell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith & David Maimon. 2019. Cybercrime Prevention. Cybercrime Prevention 63 76 .
Marleen Weulen Kranenbarg, Thomas J. Holt & Jeroen van der Ham. (2018) Don’t shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure. Crime Science 7:1.
Crossref
Loretta J. Stalans & Christopher M. Donner. 2018. Cyber Criminology. Cyber Criminology 25 45 .