5,770
Views
25
CrossRef citations to date
0
Altmetric
Articles

Digital Drift and the “Sense of Injustice”: Counter-Productive Policing of Youth Cybercrime

, &
Pages 1144-1156 | Received 12 Jan 2018, Accepted 24 Mar 2018, Published online: 21 May 2018

References

  • Ahrens, Frank. 2003. “RIAA’s Lawsuits Meet Surprised Targets.” Washington Post, September 10.
  • Akers, Ronald. 1998. Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston: Northeastern University Press.
  • Bishop, Jonathon. 2013. Examining the Concepts, Issues, and Implications of Internet Trolling. UK: IGI Global.
  • Brenner, Susan. 2008. Cyberthreats: The Emerging Fault Lines of the Nation State. New York: Oxford University Press.
  • Brenner, Susan. 2010. Cybercrime: Criminal Threats from Cyberspace. USA: Prager.
  • Business Software Alliance. 2016. “Seizing Opportunity Through License Compliance.” Retrieved November 15, 2017 (http://globalstudy.bsa.org/2016/downloads/studies/BSA_GSS_US.pdf).
  • Chang, Lennon and Peter Grabosky. 2017. “The Governance of Cyberspace.” Pp. 533–52 in Regulatory Theory: Foundations and Applications, edited by P. Drahos. Canberra: ANU Press.
  • Cooper, Jon and Daniel Harrison. 2001. “The Social Organization of Audio Piracy on the Internet.” Media, Culture, and Society 23(1):71–89. doi:10.1177/016344301023001004.
  • Durkin, Keith and Clifton Bryant. 1999. “Propagandizing Pederasty: A Thematic Analysis of the Online Exculpatory Accounts of Unrepentant Pedophiles.” Deviant Behavior 20(2):103–27. doi:10.1080/016396299266524.
  • Furnell, Steven. 2002. Cybercrime: Vandalizing the Information Society. London: Addison-Wesley.
  • Gill, Martin. 2017. “Learning from Offenders: Some Iatrogenic Effect of Crime Prevention Measures.” Pp. 35–45 in Crime Prevention in the 21st Century, edited by B. Leclerc and E. Savona. Switzerland: Springer.
  • Goldberg, Carey. 1998. “Federal Charges for Juvenile in a Case of Computer Crime.” New York Times, March 19. Retrieved November 15, 2017 (http://www.nytimes.com/1998/03/19/us/federal-charges-for-juvenile-in-a-case-of-computer-crime.html).
  • Goldsmith, Andrew and Russell Brewer. 2015. “Digital Drift and the Criminal Interaction Order.” Theoretical Criminology 19(1):112–30. doi:10.1177/1362480614538645.
  • Gordon, Sarah and Ma Qingxiong. 2003. Convergence of Virus Writers and Hackers: Fact or Fantasy? Cupertine, CA: Symantec Security White paper.
  • Gottfredson, Michael and Travis Hirschi. 1990. A General Theory of Crime. Stanford, CA: Stanford University Press.
  • Grabosky, Peter. 2001. “Virtual Criminality: Old Wine in New Bottles?” Social and Legal Studies 10(2):243–49. doi:10.1177/a017405.
  • Graham, Jefferson. 2003. “RIAA Lawsuits Bring Consternation, Chaos.” USA Today Online, September 10. Retrieved November 18, 2017 (http://www.usatoday.com/tech/news/tech-policy/2003-09-10-riaa-suit-reaxx.htm).
  • Greenfield, Rebecca. 2013. “Hacker ‘Weev’ Gets Three Years in Jail, Just for Being an Internet Troll.” The Atlantic, 18 March. Retrieved November 28, 2017 (https://www.theatlantic.com/technology/archive/2013/03/hacker-weev-jail-time/317251/).
  • Hersher, Rebecca. 2015. “Meet Mafiaboy, the ‘Bratty Kid’ Who Took down the Internet.” NPR All Tech Considered, February 7. Retrieved October 18, 2017 (http://www.npr.org/sections/alltechconsidered/2015/02/07/384567322/meet-mafiaboy-).
  • Higgins, George and Catherin Marcum. 2011. Digital Piracy: An Integrated Theoretical Approach. Raleigh, NC: Carolina Academic Press.
  • Higgins, George, Scott Wolfe, and Catherine Marcum. 2008. “Digital Piracy: An Examination of Three Measurements of Self-Control.” Deviant Behaviour 29(5):440–60. doi:10.1080/01639620701598023.
  • Hinduja, Sameer. 2007. “Neutralization Theory and Online Software Piracy: An Empirical Analysis.” Ethics and Information Technology 9(3):187–204. doi:10.1007/s10676-007-9143-5.
  • Hinduja, Sameer. 2008. “Deindividuation and Internet Software Piracy.” Cyberpsychology and Behavior 11(4):391–98. doi:10.1089/cpb.2007.0048.
  • Hinduja, Sameer and Justin Patchin. 2013. “Social Influences on Cyberbullying Behaviors among Middle and High School Students.” Journal of Youth and Adolescence 42(5):711–22. doi:10.1007/s10964-012-9902-4.
  • Hollinger, Richard and Lonn Lanza-Kaduce. 1988. “The Process of Criminalization: The Case of Computer Crime Laws.” Criminology 26(1):101–26. doi:10.1111/j.1745-9125.1988.tb00834.x.
  • Holt, Thomas. 2007. “Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures.” Deviant Behavior 28(2):171–98. doi:10.1080/01639620601131065.
  • Holt, Thomas J., & Morris, Robert G. 2009. “An exploration of the relationship between MP3 player ownership and digital piracy.” Criminal Justice Studies 22(4):381–392.
  • Holt, Thomas. 2010. “Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-Line Data.” Journal of Criminal Justice Education 21(4):300–21. doi:10.1080/10511253.2010.516565.
  • Holt, Thomas J. 2013. “Examining the forces shaping cybercrime markets.” Social Science Computer Review 31(1):165–177.
  • Holt, Thomas and Adam Bossler. 2016. Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses. London: Routledge.
  • Holt, Thomas, George Burruss, and Adam Bossler. 2015. Policing Cybercrime and Cyberterror. Raleigh, NC: Carolina Academic Press.
  • Holt, Thomas and Heith Copes. 2010. “Transferring Subcultural Knowledge On-Line: Practices and Beliefs of Persistent Digital Pirates.” Deviant Behavior 31(7):625–54. doi:10.1080/01639620903231548.
  • Hutchings, Alice and Richard Clayton. 2016. “Exploring the Provision of Online Booter Services.” Deviant Behaviour 37(10):1163–78. doi:10.1080/01639625.2016.1169829.
  • Ingram, Jason and Sameer Hinduja. 2008. “Neutralizing Music Piracy: An Empirical Examination.” Deviant Behavior 29(4):334–65. doi:10.1080/01639620701588131.
  • Jenkins, Phillip. 2001. Beyond Tolerance: Child Pornography on the Internet. New York: New York University Press.
  • Johnston, C. 2003. “Music Industry Settles Copyright Lawsuit Against 12-Year-Old Girl. USA Today Online.
  • Jones, Ashby. 2009. “Copy-Wrong! Unpacking the $1.92M Downloading Verdict.” The Wall Street Journal June 27. Retrieved October 20, 2017 https://blogs.wsj.com/law/2009/06/27/copy-wrong-unpacking-the-192m-downloading-verdict/.
  • Jones, Lisa, Kimberly Mitchell, and David Finkelhor. 2012. “Trends in Youth Internet Victimization: Findings from Three Youth Internet Safety Surveys 2000-2010.” Journal of Adolescent Health 50(2):179–86. doi:10.1016/j.jadohealth.2011.09.015.
  • Jordan, Tim and Paul Taylor. 1998. “A Sociology of Hackers.” The Sociological Review 46(4):757–80. doi:10.1111/1467-954X.00139.
  • Levy, Steven. 1984. Hackers: Heroes of the Computer Evolution. USA: O’Reilly Media Inc.
  • Loper, D.K. 2000. The Criminology of Computer Hackers: A Qualitative and Quantitative Analysis. PhD Thesis, Michigan State University, USA.
  • Matza, David. 1964. Delinquency and Drift. Hoboken: John Wiley & Sons.
  • Matza, David. 1969. Becoming Deviant. Englewood Cliffs: Prentice Hall.
  • Mazerolle, Lorraine, Emma Antrobus, and Sarah Bennett. 2013. “Shaping Citizen Perceptions of Police Legitimacy: A Randomized Field Trial of Procedural Justice.” Criminology 51(1):33–64. doi:10.1111/j.1745-9125.2012.00289.x.
  • Meyer, Gordon. 1989. The Social Organization of the Computer Underground. Masters Thesis, Northern Illinois University, USA.
  • Moore, Robert and Elizabeth C McMullan. 2009. “Neutralizations and Rationalizations of Digital Piracy: A Qualitative Analysis of University Students.” International Journal of Cyber Criminology 3:441–55.
  • Morris, Robert. 2011. “Computer Hacking and the Techniques of Neutralization: An Empirical Assessment.” Pp. 1–17 in Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by T.J. Holt and B.H Schell. Hershey: IGI Global.
  • Morris, Robert G. and George E Higgins. 2009. “Neutralizing Potential and Self-Reported Digital Piracy: A Multitheoretical Exploration among College Undergraduates.” Criminal Justice Review 34:173–95. doi:10.1177/0734016808325034.
  • Murphy, Sheigla, Dan Waldorf, and Craig Reinarman. 1990. “Drifting into Dealing: Becoming a Cocaine Seller.” Qualitative Sociology 13(4):321–43. doi:10.1007/BF00989408.
  • National Crime Agency. 2017. “Pathways into Cybercrime. National Cyber Crime Unit/Prevent Team.” Retrieved November 18, 2017 (http://www.nationalcrimeagency.gov.uk/publications/791-pathways-into-cyber-crime/file).
  • News, NBC. 2003. “I’m Not the One They Need to Get: Transcript of ‘Today’ Show Exclusive Interview with Worm Suspect.” Today Show, September 2. Retrieved October 20, 2017 (http://www.nbcnews.com/id/3078580/ns/technology_and_science-security/t/im-not-one-they-need-get/).
  • Nhan, Johnny. 2013. “The Evolution of Online Piracy: Challenge and Response.” Pp. 61–80 in Crime On-Line: Causes, Correlates, and Context, edited by T.J. Holt. Raleigh, NC: Carolina Academic Press.
  • O’Halloran, Elaine and Ethel Quayle. 2010. “A Content Analysis of a “Boy Love” Support Forum: Revisiting Durkin and Bryant.” Journal of Sexual Aggression 16(1):71–85. doi:10.1080/13552600903395319.
  • Poulsen, Kevin. 2009. “Former Teen Hacker’s Suicide Linked to TJX Probe.” Wired, July 9. Retrieved November 18, 2017 (https://www.wired.com/2009/07/hacker-3/).
  • Pratt, Travis, Francis Cullen, Christine Sellers, Thomas Winfree, Tamara Madensen, Leah Daigle, Noelle Fearn, and Jacinta Gau. 2010. “The Empirical Status of Social Learning Theory: A Meta-Analysis.” Justice Quarterly 27(6):765–802. doi:10.1080/07418820903379610.
  • Quinn, James and Craig Forsyth. 2013. “Red Light Districts on Blue Screens: A Typology for Understanding the Evolution of Deviant Communities on the Internet.” Deviant Behavior 34(7):579–85. doi:10.1080/01639625.2012.748629.
  • Russell., Brewer, Jesse Cale, Andrew Goldsmith, and Thomas Holt. Forthcoming. “Young People, the Internet, and Emerging Pathways into Criminality.” International Journal of Cyber Criminology.
  • Sangha, Soni and Phyllis Furman. 2003. “Sued for a Song.” New York Daily News, September 9. Retrieved November 18, 2017 (http://www.nydailynews.com/archives/news/sued-song-n-y-12-yr-old-261-cited-sharers-article-1.513729).
  • Schell, Bernadette and John Dodge. 2002. The Hacking of America: Who’s Doing It, Why and How. USA: Greenwood Publishing Group.
  • Simi, Pete and Robert Futrell. 2010. American Swastika: Inside the White Power Movement’s Hidden Spaces of Hate. New York. Rowman and Littlefield Publishers, Inc.
  • Smallridge, Joshua L. and Jennifer R Roberts. 2013. “Crime Specific Neutralizations: An Empirical Examination of Four Types of Digital Piracy.” International Journal of Cyber Criminology 7:125–40.
  • Smith, Russell, Peter Grabosky, and Gregor Urbas. 2004. Cyber Criminals on Trial. Port Melbourne: Cambridge.
  • Steinmetz, Kevin. 2015. “Craft(Y)Ness: An Ethnographic Study of Hacking.” British Journal of Criminology 55(1):125–45. doi:10.1093/bjc/azu061.
  • Stout, David. 2000. “Youth Sentenced in Government Hacking Case.” New York Times, September 23. Retrieved November 15, 2017 (http://www.nytimes.com/2000/09/23/us/youth-sentenced-in-government-hacking-case.html).
  • Sykes, Gresham and David Matza. 1957. “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22(6):664–70. doi:10.2307/2089195.
  • Taylor, Paul. 1999. Hackers: Crime in the Digital Sublime. London: Routledge.
  • Torkington, N. 2005. “A Web 2.0 Investment Thesis.” Retrieved November 20, 2017 (http://www.oreillynet.com/pub/a/orielly/tim/news/2005/09/30/what-is-web-20.html?page=4).
  • Vandiver, Donna M., Scott Bowman, and Armando Vega. 2012. “Music Piracy among College Students: An Examination of Low Self-Control, Techniques of Neutralization and Rational Choice.” Southwest Journal of Criminal Justice 8:92–112.
  • Velarde, Albert. 1978. “Do Delinquents Really Drift?” The British Journal of Criminology 18(1):23–39. doi:10.1093/oxfordjournals.bjc.a046861.
  • Wall, David. 2001. “Cybercrimes and the Internet.” Pp. 1–17 in Crime and the Internet, edited by D.S. Wall. New York: Routledge.
  • Wall, David. 2007. Cybercrime: The Transformation of Crime in the Information Age. Cambridge: Polity Press.
  • Yar, Majid. 2013. Cybercrime and Society. London: SAGE Publications.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.