2,152
Views
22
CrossRef citations to date
0
Altmetric
Articles

The Victim–Perpetrator Overlap in Financial Cybercrime: Evidence and Reflection on the Overlap of Youth’s On-Line Victimization and Perpetration

&
Pages 585-600 | Received 02 Feb 2015, Accepted 04 Apr 2015, Published online: 03 Mar 2016

References

  • Andriessen, Daan, Jeroen Onstenk, Paul Delnooz, Henk Smeijsters, and Stefan Peij. 2010. Gedragscode praktijkgericht onderzoek voor het hbo; Gedragscode voor het voorbereiden en uitvoeren van praktijkgericht onderzoek binnen het Hoger Beroepsonderwijs in Nederland [Dutch Code of conduct for research in applied sciences]. Delft: Elan Strategie & Creatie.
  • Armsden, Gay C. and Mark T. Greenberg. 1987. “The Inventory of Parent and Peer Attachment: Individual Differences and Their Relationship to Psychological Well-being in Adolescence.” Journal of Youth and Adolescence 16(5):427–454.
  • Berg, Mark T. 2011. “The Overlap between Violent Offending and Violent Victimization: Assessing the Evidence and Explanations.” Pp. 17–38 in Violent Offenders: Theory, Research, Policy, and Practice, edited by M. DeLisi and P. J. Conis. Boston, MA: Jones and Bartlett.
  • Bossler, Adam M. and George W. Burruss. 2010. “The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?” Pp. 57–81 in Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by T. J. Holt and B. Schell. Hershey: IGI Global.
  • Bossler, Adam M. and Thomas J. Holt. 2010. “The Effect of Self-Control on Victimization in the Cyberworld.” Journal of Criminal Justice 38:227–236. doi:10.1016/j.jcrimjus.2010.03.001
  • Craig, Wendy, Yossi Harel-Fisch, Haya Fogel-Grinvald, Suzanne Dotaler, Jorn Hetland, Bruce Simons-Morton, Michal Mocho, Margarida Gaspar de Mato, Mary Overpeck, Pernille Due, and William Pickett. 2009. “A Cross-National Profile of Bullying and Victimization among Adolescents in 40 Countries.” Journal of Public Health 54(Suppl. 2):216–224. doi:10.1007/s00038-009-5413-9
  • Derlega, Valerian J., Sandra Metts, Sandra Petronio, and Stephen T. Margulis. 1993. Self-Disclosure. Newsbury Park, CA: Sage.
  • Dürager, Andrea and Sonia Livingstone. 2012. How Can Parents Support Children’s Internet Safety? LSE, London: EU Kids Online.
  • Esbensen, Finn-Aage, David Huizinga, and Scott Menard. 1999. “Family Context and Criminal Victimization in Adolescence.” Youth & Society 31:168–198.
  • Fairfield, Joshua. 2005. “Virtual Property.” Boston University Law Review 85(4):1047–1102.
  • Görzig, Anke and Kjartan Olafsson. 2013. “What Makes a Bully a Cyberbully? Unravelling the Characteristics of Cyberbullies across Twenty-Five European Countries.” Journal of Children and Media 7(1):9–27. doi:10.1080/17482798.2012.739756
  • Gottfredson, Michael R. and Travis Hirschi. 1990. A General Theory of Crime. Stanford: Stanford University Press.
  • Grasmick, Harold G., Charles R. Tittle, Robert J. Bursik, and Bruce J. Arneklev. 1993. “Testing the Core Empirical Implications of Gottfredson and Hirschi’s General Theory of Crime.” Journal of Research in Crime and Delinquency 30(1):5–29. doi:10.1177/0022427893030001002
  • Hinduja, Sameer and Justin W. Patchin. 2009. Bullying beyond the Schoolyard: Preventing and Responding to Cyberbullying. Thousand Oaks, CA: Sage Publication.
  • Jennings, Wesley G., Alex R. Piquero, and Jennifer M. Reingle. 2012. “On the Overlap between Victimization and Offending: A Review of the Literature.” Aggression and Violent Behavior 17(1):16–26. doi:10.1016/j.avb.2011.09.003
  • Joinson, Adam. 1998. “Causes and Implications of Behavior on the Internet.” Pp. 43–60 in Psychology and the Internet: Intrapersonal, Interpersonal, and Transpersonal Implications, edited by J. Gackenbach. San Diego, CA: Academic Press.
  • Junger-Tas, Josine, Ineke Haen Marshall, Dirk Enzmann, Martin Killias, Majone Steketee, and Beate Gruszczynska. 2010. Juvenile Delinquency in Europe and Beyond: Results of the Second International Self Report Delinquency Study. Berlin, Germany: Springer.
  • Junger-Tas, Josine, Majone Steketee, and Marit Moll. 2008. Achtergronden van jeugddelinquentie en middelen gebruik [The background of juvenile delinquency and substance use]. Utrecht: Verweij-Jonker Instituut.
  • Kerstens, Joyce and Wouter P. Stol. 2012. Jeugd en Cybersafety: Online slachtoffer- en daderschap onder Nederlandse jongeren [Youth & Cybersafety: Online victimization and perpetration among Dutch youth]. Den Haag: Boom Lemma uitgevers.
  • Koops, Bert-Jaap and Ronald E. Leenes. 2006. “ID Theft, ID Fraud and/or ID-Related Crime. Definitions Matter.” Datenschutz und Datensicherheit 30(9):553–556.
  • Lauritsen, Janet L. and John H. Laub. 2007. “Understanding the Link between Victimization and Offending: New Reflections on an Old Idea.” Crime Prevention Studies 22:55–75.
  • Lauritsen, Janet L., Robert J. Sampson, and John H. Laub. 1991. “The Link between Offending and Victimization among Adolescents.” Criminology 29:265–292. doi:10.1111/j.1745-9125.1991.tb01067.x
  • Li, Qing. 2007. “New Bottle but Old Wine: A Research of Cyberbullying in Schools.” Computers in Human Behavior 23(4):1777–1791. doi:10.1016/j.chb.2005.10.005
  • Lodder, Arno R. 2011. “Conflict Resolution in Virtual Worlds: General Characteristics and the 2009 Dutch Convictions on Virtual Theft.” Pp. 79–93 in Virtual Worlds and Criminality, edited by K. Cornelius and D. Hermann. Berlin: Springer.
  • Mesch, Gustavo S. 2009. “Parental Mediation, Online Activities and Cyberbullying.” CyberPsychology & Behavior 2(4):387–393. doi:10.1089/cpb.2009.0068
  • Miethe, Terance D. and Robert F. Meier. 1994. Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations. Albany: State University of New York Press.
  • Nagin, Daniel and Raymond Paternoster. 2000. “Population Heterogeneity and State Dependence: State of Evidence and Directions for Future Research.” Journal of Quantitative Criminology 16(2):117–144. doi:10.1023/A:1007502804941
  • Nikken, Peter and Jeroen Jansz. 2011. Parental Mediation of Young Children’s Internet Use. London: EU Kids Online Conference 2011, September 22–23.
  • Ousey, Graham, C., Pamela Wilcox, and Sara Brummel. 2008. “Déjà Vu All Over Again: Investigating Temporal Continuity of Adolescent Victimization.” Journal of Quantitative Criminology 24:307–335. doi:10.1007/s10940-008-9046-6
  • Patchin, Justin W. and Sameer Hinduja. 2006. “Bullies Move Beyond the Schoolyard. A Preliminary Look at Cyberbullying.” Youth Violence and Juvenile Justice 4(2):148–169. doi:10.1177/1541204006286288
  • Pijpers, Remco, Thomas Marteijn, and Eline Dijkerman. 2010. Einstein bestaat niet. Over usability en surfgedrag van jongeren [Einstein does not exist: Usability and youth surfing the Internet]. Amsterdam: Digivaardig & Digibewust.
  • Posick, Chad. 2013. “The Overlap between Offending and Victimization among Adolescents: Results from the Second International Self-Report Delinquency Study.” Journal of Contemporary Criminal Justice 29(1):106–124. doi:10.1177/1043986212471250
  • Pratt, Travis C. and Francis T. Cullen. 2000. “The Empirical Status of Gottfredson and Hirschi’s General Theory of Crime: A Meta-Analysis.” Criminology 38:931–964. doi:10.1111/j.1745-9125.2000.tb00911.x
  • Rannenberg, Kai, Denis Royer, and André Deuker (Eds.). 2009. The Future of Identity in the Information Society: Challenges and Opportunities. Berlin: Springer.
  • Rumbles, Wayne. 2011. “Theft in the Digital: Can You Steal Virtual Property?” Canterbury Law Review 17:354–374.
  • Schouten, Alexander P., Patti M. Valkenburg, and Jochen Peter. 2007. “Precursors and Underlying Processes of Adolescents’ Online Self-Disclosure: Developing and Testing an ‘Internet-Attribute-Perception’ Model.” Media Psychology 10(2):292–314. doi:10.1080/15213260701375686
  • Schreck, Christopher J. 1999. “Criminal Victimization and Low Self-Control: An Extension and Test of a General Theory of Crime.” Justice Quarterly 16(3):633–654.
  • Schreck, Christopher J. and Eric A. Stewart. 2012. “The Victim-Offender Overlap and Its Implications for Juvenile Justice.” Pp. 47–72 in The Oxford Handbook of Juvenile Crime and Juvenile Justice, edited by D. M. Bishop and B. C. Feld. New York: Oxford University Press. doi:10.1093/oxfordhb/9780195385106.013.0003
  • Schreck, Christopher J., Eric A. Stewart, and D. Wayne Osgood. 2008. “A Reappraisal of the Overlap of Violent Offenders and Victims.” Criminology 46(4):871–904. doi:10.1111/j.1745-9125.2008.00127.x
  • Singer, Simon I. 1986. “Victims of Serious Violence and Their Criminal Behavior: Subcultural Theory and Beyond.” Violence and Victims 1:61–70.
  • Slonje, Robert and Peter K. Smith. 2008. “Cyberbullying: Another Main Type of Bullying.” Scandinavian Journal of Psychology 49(2):147–154. doi:10.1111/j.1467-9450.2007.00611.x
  • Smith, Peter K., Jess Mahdavi, Manuel Carvalho, Sonja Fisher, Shanette Russell, and Neil Tippett. 2008. “Cyberbullying: Its Nature and Impact in Secondary School Pupils.” Child Psychology and Psychiatry 49(4):376–385. doi:10.1111/j.1469-7610.2007.01846.x
  • Spears, B., P. Slee, P., L. Owens, and B. Johnson. 2009. “Behind the Scenes and Screens: Insights into the Human Dimension of Covert and Cyberbullying.” Zeitschrift für Psychologie/Journal of Psychology 217:189–196. doi:10.1027/0044-3409.217.4.189
  • Stol, Wouter P. 2012. “Cyberspace and Safety.” Pp. 19–30 in Cyber Safety: An Introduction, edited by E.R. Leukfeldt and W. P. Stol. The Hague: Eleven International Publishing.
  • Strikwerda, Litska. 2012. “Theft of Virtual Items in Online Multiplayer Computer Games: An Ontological and Moral Analysis.” Ethics and Information Technology 14:89–97. doi:10.1007/s10676-011-9285-3
  • Suler, John. 2004. “The Online Disinhibition Effect.” CyberPsychology & Behavior 7(3):321–326. doi:10.1089/1094931041291295
  • Taylor, Robert W., Tory J. Caeti, D. Kall Loper, Eric J. Fritsch, and John R. Liederbach. 2006. Digital Crime and Digital Terrorism: The Criminology of Computer Crime. Upper Saddle River, NJ: Pearson Prentice Hall.
  • Van Rooij, Tony and Regina van den Eijnden. 2007. Monitor Internet en jongeren 2006 en 2007: Ontwikkelingen in internetgebruik en de rol van opvoeding [Monitor Internet and Youth 2006 and 2007: Developments in Internet use and the role of education]. Rotterdam: IVO.
  • Vandebosch, Heidi and Katrien van Cleemput. 2009. “Cyberbullying among Youngsters: Profiles of Bullies and Victims.” New Media & Society 11(8):1349–1371. doi:10.1177/1461444809341263.
  • Vazsonyi, Alexander T., Hana Machackova, Anna Sevcikova, David Smahel, and Alena Cerna. 2012. “Cyberbullying in Context: Direct and Indirect Effects by Low Self-Control across 25 European Countries.” Pp. 48–65 in Cyberbullying: Development, Consequences, Risk and Protective Factors, edited by E. Menesini and C. Spiel. Oxon: Psychology Press.
  • Veenstra, Sander. 2012. “Cyberpesten” [Cyberbullying]. Pp. 73–103 in Jeugd en Cybersafety: Online slachtoffer- en daderschap onder Nederlandse jongeren [Youth & Cybersafety: Online victimization and perpetration among Dutch youth], edited by J. Kerstens and W.P. Stol. Den Haag: Boom Lemma uitgevers.
  • Walrave, Michel and Wim Heirman. 2011. “Cyberbullying: Predicting Victimization and Perpetration.” Children & Society 25:59–72. doi:10.1111/j.1099-0860.2009.00260.x
  • Ybarra, Michele L. and Kimberly J. Mitchell. 2004a. “Online Aggressor/Targets, Aggressors, and Targets: A Comparison of Associated Youth Characteristics.” Journal of Child Psychology and Psychiatry 45(7):1308–1316. doi:111/j.1469-7610.2004.00328.x
  • Ybarra, Michele L. and Kimberly J. Mitchell. 2004b. “Youth Engaging in Online Harassment: Associations with Caregiver-Child Relationships, Internet Use and Personal Characteristics.” Journal of Adolescence 27(3):319–336. doi:10.1016/j.adolescence.2004.03.007

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.