16,518
Views
60
CrossRef citations to date
0
Altmetric
Articles

Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap

ORCID Icon, &
Pages 40-55 | Received 24 May 2017, Accepted 23 Aug 2017, Published online: 11 Dec 2017

References

  • Averdijk, Margit, Jean-Louis Van Gelder, Manuel Eisner, and Denis Ribeaud. 2016. “Violence Begets Violence… but How? A Decision-Making Perspective on the Victim-Offender Overlap.” Criminology 54(2):282–306. doi:10.1111/1745-9125.12102.
  • Berg, Mark T. and Richard B. Felson. 2016. “Why Are Offenders Victimized So Often?” Pp. 49–65 in The Wiley Handbook on the Psychology of Violence, edited by C. A. Cuevas, C. M. Rennison. John Wiley, and Ltd. Sons. West Sussex, UK.
  • Berg, Mark T., Eric A. Stewart, Christopher J. Schreck, and Ronald L. Simons. 2012. “The Victim–Offender Overlap in Context: Examining the Role of Neighborhood Street Culture.” Criminology 50(2):359–90. doi:10.1111/j.1745-9125.2011.00265.x.
  • Bernasco, Wim, Stijn Ruiter, Gerben J. N. Bruinsma, Lieven J. R Pauwels, and Frank M. Weerman. 2013. “Situational Causes of Offending: A Fixed-Effects Analysis of Space–Time Budget Data.” Criminology 51(4):895–926. doi:10.1111/1745-9125.12023.
  • Blackburn, J., N. Kourtellis, J. Skvoretz, M. Ripeanu, and A. Iamnitchi. 2014. “Cheating in Online Games: A Social Network Perspective.” Acm Transactions on Internet Technology 13(3):1–25. doi:10.1145/2630790.
  • Blokland, Arjan A. J. 2014. “School, Intensive Work, Excessive Alcohol Use and Delinquency during Emerging Adulthood.” Pp. 87–107 in Criminal Behaviour from School to the Workplace: Untangling the Complex Relations between Employment, Education and Crime, edited by F. M. Weerman and C. Bijleveld. New York: Routledge.
  • Bossler, Adam M. and George W. Burruss. 2011. “The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?” Pp. 38–67 in Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by T. J. Holt and B. H. Schell. New York: Information Science Reference.
  • Bossler, Adam M. and Thomas J. Holt. 2009. “On-Line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory.” International Journal of Cyber Criminology 3(1):400–20.
  • Bossler, Adam M. and Thomas J. Holt. 2010. “The Effect of Self-Control on Victimization in the Cyberworld.” Journal of Criminal Justice 38(3):227–36. doi:10.1016/j.jcrimjus.2010.03.001.
  • Choi, Kyung-shick. 2008. “Computer Crime Victimization and Integrated Theory: An Empirical Assessment.” International Journal of Cyber Criminology 2(1):308.
  • Chua, Yi-Ting and Thomas J. Holt. 2016. “A Cross-National Examination of the Techniques of Neutralization to Account for Hacking Behaviors.” Victims & Offenders 11(4):534–55. doi:10.1080/15564886.2015.1121944.
  • De Vries, Reinout E. and Marise PH Born. 2013. “De Vereenvoudigde Hexaco Persoonlijkheidsvragenlijst En Een Additioneel Interstitieel Proactiviteitsfacet.” Gedrag & Organisatie 26(2):223–45.
  • Dirkzwager, Anja J. E. and Paul Nieuwbeerta. unpublished. Prison Project: Codebook and Documentation-D1 Interview. Leiden/Amsterdam, The Netherlands: Leiden University/NSCR.
  • Domenie, Miranda M.L., Eric Rutger Leukfeldt, Johan A. Van Wilsem, Jurjen Jansen, and PH. Stol Wouter. 2013. Slachtofferschap in Een Gedigitaliseerde Samenleving. Den Haag: Boom Lemma.
  • European Cybercrime Center. 2014. The Internet Organized Crime Threat Assessment (Iocta). The Hague, The Netherlands: European Police Office (Europol).
  • Gottfredson, Michael R and Travis Hirschi. 1990. A General Theory of Crime. Palo Alto, CA: Stanford University Press.
  • Grasmick, Harold G., Charles R. Tittle, Robert J. Bursik, and Bruce J. Arneklev. 1993. “Testing the Core Empirical Implications of Gottfredson and Hirschi’s General Theory of Crime.” Journal of Research in Crime and Delinquency 30(1):5–29. doi:10.1177/0022427893030001002.
  • Hay, Carter and Michelle M. Evans. 2006. “Violent Victimization and Involvement in Delinquency: Examining Predictions from General Strain Theory.” Journal of Criminal Justice 34(3):261–74. doi:10.1016/j.jcrimjus.2006.03.005.
  • Holt, Thomas J. and Adam M. Bossler. 2008. “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization.” Deviant Behavior 30(1):1–25. doi:10.1080/01639620701876577.
  • Holt, Thomas J. and Adam M. Bossler. 2014. “An Assessment of the Current State of Cybercrime Scholarship.” Deviant Behavior 35(1):20–40. doi:10.1080/01639625.2013.822209.
  • Holt, Thomas J., Adam M. Bossler, and David C May. 2012a. “Low Self-Control, Deviant Peer Associations, and Juvenile Cyberdeviance.” American Journal of Criminal Justice 37(3):378–95. doi:10.1007/s12103-011-9117-3.
  • Holt, Thomas J. and Max Kilger. 2008. “Techcrafters and Makecrafters: A Comparison of Two Populations of Hackers.” Pp. 67–78 in WOMBAT Workshop on Information Security Threats Data Collection and Sharing, 2008. Silvia Ceballos. WISTDCS’08. Amsterdam: IEEE computer society.
  • Holt, Thomas J. and Max Kilger. 2012, “Know Your Enemy: The Social Dynamics of Hacking” The Honeynet Project Retrieved (https://honeynet.org/papers/socialdynamics).
  • Holt, Thomas J., Deborah Strumsky, Olga Smirnova, and Max Kilger. 2012b. “Examining the Social Networks of Malware Writers and Hackers.” International Journal of Cyber Criminology 6(1):891–903.
  • Holtfreter, Kristy, Michael D. Reisig, and Travis C. Pratt. 2008. “Low Self-Control, Routine Activities, and Fraud Victimization.” Criminology 46(1):189–220. doi:10.1111/j.1745-9125.2008.00101.x.
  • Hu, Qing, Xu Zhengchuan, and Ali Alper Yayla. 2013. “Why College Students Commit Computer Hacks: Insights from a Cross Culture Analysis.” in Pacific Asia Conference on Information Systems (PACIS). Jeju Island, Korea.
  • Hutchings, Alice. 2014. “Crime from the Keyboard: Organised Cybercrime, Co-Offending, Initiation and Knowledge Transmission.” Crime Law and Social Change 62(1):1–20. doi:10.1007/s10611-014-9520-z.
  • Jennings, Wesley G., George E. Higgins, Richard Tewksbury, Angela R. Gover, and Alex R. Piquero. 2010. “A Longitudinal Assessment of the Victim-Offender Overlap.” Journal of Interpersonal Violence 25(12):2147–74. doi:10.1177/0886260509354888.
  • Jennings, Wesley G., Alex R. Piquero, and Jennifer M. Reingle. 2012. “On the Overlap between Victimization and Offending: A Review of the Literature.” Aggression and Violent Behavior 17(1):16–26. doi:10.1016/j.avb.2011.09.003.
  • Jensen, Gary F and David Brownfield. 1986. “Gender, Lifestyles, and Victimization: Beyond Routine Activity.” Violence and Victims 1(2):85–99.
  • Kerstens, Joyce and Jurjen Jansen. 2016. “The Victim–Perpetrator Overlap in Financial Cybercrime: Evidence and Reflection on the Overlap of Youth’s On-Line Victimization and Perpetration.” Deviant Behavior 37(5):585–600. doi:10.1080/01639625.2015.1060796.
  • Lauritsen, Janet L. and John H. Laub. 2007. “Understanding the Link between Victimization and Offending: New Reflections on an Old Idea.” Crime Prevention Studies 22:55–75.
  • Lauritsen, Janet L., Robert J. Sampson, and John H. Laub. 1991. “The Link between Offending and Victimization among Adolescents.” Criminology 29(2):265–92. doi:10.1111/j.1745-9125.1991.tb01067.x.
  • Leukfeldt, Eric Rutger. 2014. “Phishing for Suitable Targets in the Netherlands: Routine Activity Theory and Phishing Victimization.” Cyberpsychology Behavior and Social Networking 17(8):551–55. doi:10.1089/cyber.2014.0008.
  • Leukfeldt, Eric Rutger and Majid Yar. 2016. “Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis.” Deviant Behavior 37(3):263–80. doi:10.1080/01639625.2015.1012409.
  • Longshore, Douglas, Eunice Chang, Shih-chao Hsieh, and Nena Messina. 2004. “Self-Control and Social Bonds: A Combined Control Perspective on Deviance.” Crime & Delinquency 50(4):542–64. doi:10.1177/0011128703260684.
  • Morris, R.G. 2011. “Computer Hacking and the Techniques of Neutralization: An Empirical Assessment.” Pp. 1–17 in Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by T. J. Holt and B. H. Schell. New York: Information Science Reference.
  • National Cyber Security Centre. 2012. Cybercrime: From Recognition to Report [Cybercrime. Van Herkenning Tot Aangifte]. The Hague, The Netherlands: NCSC [Nationaal Cyber Security Centrum], Ministry of Security and Justice.
  • Netherlands, Statistics. 2014. Safetymonitor 2014 [Veiligheidsmonitor 2014]. The Hague, The Netherlands: Statistics Netherlands.
  • Ngo, Fawn T and Raymond Paternoster. 2011. “Cybercrime Victimization: An Examination of Individual and Situational Level Factors.” International Journal of Cyber Criminology 5(1):773–93.
  • Office for National Statistics. 2015. “Improving Crime Statistics in England and Wales.” Crime Statistics, Year Ending June 2015 Release. Retrieved February 19, 2016 (http://webarchive.nationalarchives.gov.uk/20160105160709/http://www.ons.gov.uk/ons/rel/crime-stats/crime-statistics/year-ending-june-2015/sty-fraud.html).
  • Ousey, Graham C., Pamela Wilcox, and Bonnie S. Fisher. 2011. “Something Old, Something New: Revisiting Competing Hypotheses of the Victimization-Offending Relationship among Adolescents.” Journal of Quantitative Criminology 27(1):53–84. doi:10.1007/s10940-010-9099-1.
  • Piquero, Alex R., John MacDonald, Adam Dobrin, Leah E. Daigle, and Francis T. Cullen. 2005. “Self-Control, Violent Offending, and Homicide Victimization: Assessing the General Theory of Crime.” Journal of Quantitative Criminology 21(1):55–71. doi:10.1007/s10940-004-1787-2.
  • Pontell, H. and S. Rosoff. 2009. “White-Collar Delinquency.” Crime Law and Social Change 51(1):147–62. doi:10.1007/s10611-008-9146-0.
  • Pratt, Travis C., Jillian J. Turanovic, Kathleen A. Fox, and Kevin A. Wright. 2014. “Self-Control and Victimization: A Meta-Analysis.” Criminology 52(1):87–116. doi:10.1111/1745-9125.12030.
  • Rogers, M. 2001. A Social Learning Theory and Moral Disengagement Analysis of Criminal Computer Behavior: An Exploratory Study. University of Manitoba.
  • Sampson, Robert J. and Janet L. Lauritsen. 1990. “Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence.” Journal of Research in Crime and Delinquency 27(2):110–39. doi:10.1177/0022427890027002002.
  • Schreck, Christopher J. 1999. “Criminal Victimization and Low Self-Control: An Extension and Test of a General Theory of Crime.” Justice Quarterly 16(3):633–54. doi:10.1080/07418829900094291.
  • Schreck, Christopher J., Eric A. Stewart, and Bonnie S. Fisher. 2006. “Self-Control, Victimization, and Their Influence on Risky Lifestyles: A Longitudinal Analysis Using Panel Data.” Journal of Quantitative Criminology 22(4):319–40. doi:10.1007/s10940-006-9014-y.
  • Schreck, Christopher J., Eric A. Stewart, and D. Wayne Osgood. 2008. “A Reappraisal of the Overlap of Violent Offenders and Victims.” Criminology 46(4):871–906. doi:10.1111/j.1745-9125.2008.00127.x.
  • Schreck, Christopher J., Richard A. Wright, and J. Mitchell Miller. 2002. “A Study of Individual and Situational Antecedents of Violent Victimization.” Justice Quarterly 19(1):159–80. doi:10.1080/07418820200095201.
  • Suler, John. 2004. “The Online Disinhibition Effect.” CyberPsychology & Behavior 7(3):321–26. doi:10.1089/1094931041291295.
  • Svensson, Robert, Frank M. Weerman, J. R. Lieven, Gerben J. Pauwels, N. Bruinsma, and Wim Bernasco. 2013. “Moral Emotions and Offending: Do Feelings of Anticipated Shame and Guilt Mediate the Effect of Socialization on Offending?.” European Journal of Criminology 10(1):22–39. doi:10.1177/1477370812454393.
  • Tcherni, M., A. Davies, G. Lopes, and A. Lizotte. 2016. “The Dark Figure of Online Property Crime: Is Cyberspace Hiding a Crime Wave?.” Justice Quarterly 33(5):890–911. doi:10.1080/07418825.2014.994658.
  • Turanovic, Jillian J. and Travis C. Pratt. 2013. “The Consequences of Maladaptive Coping: Integrating General Strain and Self-Control Theories to Specify a Causal Pathway between Victimization and Offending.” Journal of Quantitative Criminology 29(3):321–45. doi:10.1007/s10940-012-9180-z.
  • Van Gelder, Jean-Louis, Margit Averdijk, Manuel Eisner, and Denis Ribeaud. 2015. “Unpacking the Victim-Offender Overlap: On Role Differentiation and Socio-Psychological Characteristics.” Journal of Quantitative Criminology 31(4):653–75. doi:10.1007/s10940-014-9244-3.
  • Van Gelder, Jean-Louis and Reinout E. De Vries. 2012. “Traits and States: Integrating Personality and Affect into a Model of Criminal Decision Making.” Criminology 50(3):637–71. doi:10.1111/j.1745-9125.2012.00276.x.
  • Van Wilsem, Johan A. 2013. “Hacking and Harassment—Do They Have Something in Common? Comparing Risk Factors for Online Victimization.” Journal of Contemporary Criminal Justice 29(4):437–53. doi:10.1177/1043986213507402.
  • Wall, David S. 2001. “Cybercrimes and the Internet.” Pp. 1–17 in Crime and the Internet. London: Routledge.
  • Weesie, Jeroen. 1999. “Sg21: Seemingly Unrelated Estimation and the Cluster-Adjusted Sandwich Estimator.” Stata Technical Bulletin 52:34–47.
  • Wolfe, Scott E., George E. Higgins, and Catherine D. Marcum. 2008. “Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses.” Social Science Computer Review 26(3):317–33. doi:10.1177/0894439307309465.
  • Yar, Majid. 2005. “The Novelty of ‘Cybercrime’. An Assessment in Light of Routine Activity Theory.” European Journal of Criminology 2(4):407–27. doi:10.1177/147737080556056.