4,184
Views
58
CrossRef citations to date
0
Altmetric
Original Articles

Hacking in High School: Cybercrime Perpetration by Juveniles

, , &
Pages 581-591 | Received 28 Sep 2013, Accepted 19 Oct 2013, Published online: 26 Mar 2014

REFERENCES

  • Akers, R. 1998. Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston: Northeastern University Press.
  • Bossler, A. M. and G. W. Burruss. 2011. “The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?” Pp.38–67 in, Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by T. J. Holt and B. H. Schell. Hershey, PA: IGI Global.
  • Chapple, C. L. 2005. “Self-Control, Peer Relations, and Delinquency.” Justice Quarterly 22:89–106.
  • DeLisi, M. 2001. “Designed to Fail: Self-Control and Involvement in the Criminal Justice System.” American Journal of Criminal Justice 26:131–148.
  • Freund, R. and W. Wilson. 1998. Regression Analysis: Statistical Modeling of a Response Variable. San Diego, CA: Academic Press.
  • Gibbs, J. J., D. Giever, and G. E. Higgins. 2003. “A Test of Gottfredson and Hirschi’s General Theory using Structural Equation Modeling.” Criminal Justice and Behavior 30(4):441–458.
  • Gibbs, J. J., D. Giever, and J. S. Martin. 1998. “Parental-Management and Self-Control: An Empirical Test of Gottfredson and Hirschi’s General Theory.” Journal of Research in Crime and Delinquency 35(1):42–72.
  • Gottfredson, M. and T. Hirschi. 1990. A General Theory of Crime. Stanford, CA: Stanford University Press.
  • Higgins, G. E., B. D. Fell, and A. L. Wilson. 2007. “Low Self-Control and Social Learning in Understanding Students’ Intentions to Pirate Movies in the United States.” Social Science Computer Review 25:339–357.
  • Higgins, G. and C. D. Marcum. 2011. Digital Piracy: An Integrated Theoretical Approach. Durham, NC: Carolina Academic Press.
  • Higgins, G. and A. Wilson. 2006. “Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software.” Security Journal 19:75–92.
  • Higgins, G. E., S. E. Wolfe, and C. D. Marcum. 2008. “Digital Piracy: An Examination of Three Measurements of Self-Control.” Deviant Behavior 29:440–460.
  • Hinduja, S. and J. R. Ingram. 2008. “Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft.” Western Criminology Review 9:52–72.
  • Holt, T. J. 2007. “Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures.” Deviant Behavior 28:171–198.
  • Holt, T. J. 2009. “Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers.” Pp. 336–355 in Crimes of the Internet, edited by F. Schmalleger and M. Pittaro. Upper Saddle River, NJ: Pearson Prentice Hall.
  • Holt, T. J. and A. M. Bossler. 2009. “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization.” Deviant Behavior 28:1–25.
  • Holt, T. J. and M. Kilger. 2008. “Techcrafters and Makecrafters: A Comparison of Two Populations of Hackers.” WOMBAT Workshop on Information Security Threats Data Collection and Sharing: 67–78.
  • Holt, T., A. Bossler, and D. May. 2012. “Predicting Online Harassment Victimization among a Juvenile Population.” Youth & Society 44(4):500–523.
  • Holt, T. J., G. W. Burruss, and A. M. Bossler. 2010. “Social Learning and Cyber Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World.” Journal of Crime and Justice 33:15–30.
  • Ingram, J. R. and S. Hinduja. 2008. “Neutralizing Music Piracy: An Empirical Examination.” Deviant Behavior 29:334–366.
  • Jordan, T. and P. Taylor. 1998. “A Sociology of Hackers.” Sociological Review 46:757–780.
  • Krohn, M. D. 1999. “Social Learning Theory: The Continuing Development of a Perspective.” Theoretical Criminology 3:462–475.
  • Lewis-Beck, Michael S. 1979. “Maintaining Economic Competition: The Causes and Consequences of Antitrust.” Journal of Politics 41:169–191.
  • Longshore, D., E. Chang, S. Hsieh, and N. Messina. 2004. “Self-Control and Social Bonds: A Combined Control Perspective on Deviance.” Crime & Delinquency 50:542–564.
  • Loper, K. 2000. “The Criminology of Computer Hackers: A Qualitative and Quantitative Analysis.” Ph.D. Dissertation, Michigan State University.
  • McDowell, M. 2009. National Cyber Alert System. Cyber Security Tip ST04-014. Avoiding Social Engineering and Phishing Attacks. Retrieved April 30, 2013 from (http://www.us-cert.gov/cas/tips/ST04-014.html).
  • Menard, S. 2002. Logistic Regression. Thousand Oaks, CA: Sage.
  • Meyer, G. 1989. “The Social Organization of the Computer Underground.” Master’s thesis, Northern Illinois University.
  • Moon, B., J. D. McCluskey, and C. P. McCluskey. 2010. “A General Theory of Crime and Computer Crime: An Empirical Test.” Journal of Criminal Justice 38:767–772.
  • Morris, R. G. 2011. “Computer Hacking and the Techniques of Neutralization: An Empirical Assessment.” Pp. 1–17 in Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by T. J. Holt and B. Schell. Hershey, PA: IGI-Global Press.
  • Morris, R. G. and G. E. Higgins. 2010. “Criminological Theory in the Digital Age: The Case of Social Learning Theory and Digital Piracy.” Journal of Criminal Justice 38:470–480.
  • Pratt, T. C. and F. T. Cullen. 2000. “The Empirical Status of Gottfredson and Hirschi's General Theory of Crime: A Meta-Analysis.” Criminology 38:931–964.
  • Pratt, T. C., F. T. Cullen, C. S. Sellers, L. T. Winfree, T. Madensen, L. E. Daigle, et al. 2009. “The Empirical Status of Social Learning Theory: A Meta-Analysis.” Justice Quarterly 27:765–802.
  • Rogers, M., N. Smoak, and J. Liu. 2005. “Self-Reported Deviant Computer Behavior: A Big-5,Moral Choice, and Manipulative Exploitive Behavior Analysis.” Deviant Behavior 27: 245–268.
  • Schreck, C. 1999. “Criminal Victimization and Low Self-Control: An Extension of and Test of General Theory of Crime.” Justice Quarterly 16(3):633–654.
  • Segan, S. 2000. “Female Hackers Battle Sexism to Get Ahead.” ABC News. Retrieved May 1, 2012 (http://abcnews.go.com/Technology/story?id=99341&page=1).
  • Skinner, W. and A. Fream. 1997. “A Social Learning Theory Analysis of Computer Crime among College Students.” Journal of Research in Crime and Delinquency 34:495–518.
  • Stambaugh, H., D. S. Beaupre, D. J. Icove, R. Baker, W. Cassady, and W. P. Williams. 2001. Vol. 186276, Electronic Crime Needs Assessment for State and Local Law Enforcement, NCJ 186276, National Institute of Justice, Washington, DC.
  • Taylor, P. 1999. Hackers: Crime in the Digital Sublime. London: Routledge.
  • Taylor, R. W., E. J. Fritsch, J. Liederbach, and T. J. Holt. 2010. Digital Crime and Digital Terrorism, 2nd Edition. Upper Saddle River, NJ: Pearson Prentice Hall.
  • Thomas, D. 2002. Hacker Culture. Minneapolis, MN: University of Minnesota Press.
  • Turgeman-Goldschmidt, O. 2008. “Meanings that Hackers Assign to Their Being a Hacker.” International Journal of Cyber Criminology 2:382–396.
  • Wade, H., D. Hylender, and A. Valentine. 2008. Verizon Business 2008 Data Breach Investigation Report. Retrieved September 26, 2013 (http://www.verizonbusiness.com/resources/security/databreachreport.pdfS).
  • Wolfe, S. E. and G. E. Higgins. 2009. “Explaining Deviant Peer Associations: An Examination of Low Self-Control, Ethical Predispositions, Definitions, and Digital Piracy.” Western Criminology Review 10:43–55.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.