2,206
Views
35
CrossRef citations to date
0
Altmetric
Original Articles

CRACKING THE CODE: AN EMPIRICAL EXPLORATION OF SOCIAL LEARNING THEORY AND COMPUTER CRIME

&
Pages 1-34 | Published online: 10 Jan 2012

REFERENCES

  • Agnew , R. 1991 . “The Interactive Effect of Peer Variables on Delinquency.” . Criminology , 29 : 47 – 72 .
  • Akers , R. L. 1985 . Deviant Behavior: A Social Learning Approach, , Third Edition , Belmont , CA : Wadsworth .
  • Akers , R. L. 1998 . Social Learning and Social Structure: A General Theory of Crime and Deviance. , Boston : Northeastern University Press .
  • Akers , R. L. , Krohn , M. D. , Lanza-Kaduce , L. and Radosevich , M. 1979 . “Social Learning and Deviant Behavior: A Specific Test of a General Theory.” . American Sociological Review , 44 : 636 – 655 .
  • Akers , R. L. and Lee , G. 1996 . “A Longitudinal Test of Social Learning Theory: Adolescent Smoking.” . Journal of Drug Issues , 26 : 317 – 343 .
  • Akers , R. L. and Sellers , C. 2005 . Criminological Theories: Introduction, Evaluation, and Application., , 4th ed. , Los Angeles : Roxbury .
  • Ball , L. D. 1985 . “Computer Crime.” . In The Information Technology Revolution. , Edited by: Forester , T. Cambridge , MA : MIT Press .
  • Bandura , A. and Walters , R. 1963 . Social Learning and Personality Development. , New York : Holt, Rinehart and Winston .
  • Bankston , C. L. and Caldas , S. J. 1996 . “Adolescents and Deviance in a Vietnamese American Community.” . Deviant Behavior , 17 : 159 – 182 .
  • Battin , S. R. , Hill , K. G. , Abbott , R. D. , Catalano , R. F. and Hawkins , D. 1998 . “The Contribution of Gang Membership to Delinquency Beyond Delinquent Friends.” . Criminology , 36 : 93 – 115 .
  • Berry , W D. and Feldman , S. 1985 . Multiple Regression in Practice. , Thousand Oaks , CA : Sage Publications .
  • Brezina , T. and Piquero , A. R. 2003 . “Exploring the Relationship Between Social and Non-Social Reinforcement in the Context of Social Learning Theory.” . In Social Learning Theory and the Explanation of Crime: A Guide for a New Century. Advances in Criminological Theory , Edited by: Akers , R. L. and Jensen , G. F. vol. 11 , New Bruswick , NJ : Transaction Publishers .
  • Broidy , L. 2001 . “A Test of General Strain Theory.” . Criminology , 39 : 9 – 33 .
  • Burgess , R. L. and Akers , R. L. 1966 . “A Differential Association-Reinforcement Theory of Criminal Behavior.” . Social Problems , 14 : 128 – 147 .
  • Business Software Alliance . 2005 . 2005 Piracy Study. Retrieved April 16, 2006, from Business Software Alliance Web Site: http://www.bsa.org/globalstudy/upload/2005-Global-Study-English.pdf
  • Chandler , A. 1996 . “The Changing Definition and Image of Hackers in Popular Discourse.” . International Journal of the Sociology of Law , 24 : 229 – 251 .
  • Clough , B. and Mungo , P. 1992 . Approaching Zero: Data Crime and the Computer Underworld. , London : Faber and Faber .
  • Conger , R. 1976 . “Social Control and Social Learning Models of Delinquency: A Synthesis.” . Criminology , 14 : 17 – 40 .
  • Dowland , P. , Furnell , S. , Illingworth , H. and Reynolds , P. L. 1999 . “Computer Crime and Abuse: A Survey of Public Attitudes and Awareness.” . Computers and Security , 18 : 715 – 26 .
  • Duff , L. and Gardiner , S. 1996 . “Computer Crime in the Global Village: Strategies for Control and Regulation—in Defense of the Hacker.” . International Journal of the Sociology of Law , 24 : 211 – 228 .
  • Elliott , D. S. , Huizinga , D. and Ageton , S. S. 1982 . Explaining Delinquency and Drug Use. , Beverly Hills , CA : Sage .
  • Elliott , D. S. and Menard , S. 1996 . “Delinquent Friends and Delinquent Behavior: Temporal and Developmental Patterns.” . In Delinquency and Crime: Current Theories. , Edited by: Hawkins , D. New York : Cambridge University Press .
  • Gilbora , N. 1996 . “Elites, Lamers, Narcs and Whores: Exploring the Computer Underground.” . In Wired Women: Gender and New Realities in Cyberspace. , Edited by: Cherny , L. , Elizabeth , R. and Weise , R. Seattle , WA : Seal Press .
  • Gordon , L. A. , Loeb , M. , Lucyshyn , W. and Richardson , P. 2004 . Ninth Annual CSI/FBI Computer Crime and Security Survey. Retrieved November 13, 2007 from http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdf
  • Hafner , K. and Markoff , J. 1993 . Cyberpunk: Outlaws and Hackers on the Computer Frontier. , London : Corgi Books .
  • Halbert , D. 1997 . “Discourses of Danger and the Computer Hacker.” . The Information Society , 13 : 361 – 374 .
  • Hannemyr , G. 1999 . “Technology and Pleasure: Considering Hacking Constructive.” . Firstmonday, Peer-Reviewed Journal on the Internet , 4 n.p-n.p.
  • Harrington , S. J. 1989 . “Why People Copy Software and Create Computer Viruses: Individual Characteristics Of Situational Factors?” . Information Resources Management Journal , 2 : 28 – 37 .
  • Higgins , G. E. 2005a . “Can Low Self-Control Help with the Understanding of Software Piracy Problem?” . Deviant Behavior , 26 : 1 – 24 .
  • Higgins , G. E. 2005b . “Statistical Significance Testing: The Bootstrap Method and an Application to Self-Control Theory.” . Southwest Journal of Criminal Justice , 2 : 54 – 76 .
  • Higgins , G. E. , Fell , B. D. and Wilson , A. 2006 . “Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling.” . Criminal Justice Studies , 19 : 3 – 22 .
  • Higgins , G. E. and Makin , D. A. 2004a . “Does Social Learning Theory Condition the Effects of Low Self-Control on College Students’ Software Piracy?” . Journal of Economic Crime Management , 2 : 1 – 22 .
  • Higgins , G. E. and Makin , D. A. 2004b . “Self-control, Deviant Peers, and Software Piracy.” . Psychological Reports , 95 : 921 – 931 .
  • Hinduja , S. 2001 . “Correlates of Internet Software Piracy.” . Journal of Contemporary Criminal Justice , 17 : 369 – 382 .
  • Hinduja , S. 2006 . Music Piracy and Crime Theory. , New York : LBF Scholarly .
  • Hinduja , S. 2007 . “Neutralization Theory and Online Software Piracy: An Empirical Analysis.” . Ethics and Information Technology , 9 : 187 – 204 .
  • Hollinger , R. C. 1993 . “Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access.” . Security Journal , 4 : 2 – 12 .
  • Hollinger , R. C. and Lanza-Kaduce , L. 1988 . “The Process of Criminalization: The Case of Computer Crime Laws.” . Criminology , 26 : 101 – 126 .
  • Hughes , L. A. and DeLone , G. J. 2007 . “Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?” . Social Science Computer Review , 25 : 79 – 98 .
  • Ingram , J. and Hinduja , S. 2008 . “Neutralizing Music Piracy: An Empirical Examination.” . Deviant Behavior , 29 : 334 – 366 .
  • International Federation of Phonographic Industries. 2005 . Commercial Piracy Report Key Figures Summary. Retrieved November 12, 2007 from http://www.ifpi.org/site-content/press/20050623a.html
  • Jeffery , C. R. 1965 . “Criminal Behavior and Learning Theory.” . Journal of Criminal Law, Criminology, and Police Science , 56 : 294 – 300 .
  • Jordan , T. and Taylor , P. 1998 . “A Sociology of Hackers.” . Sociological Review , 46 : 757 – 780 .
  • Leeson , P. T. and Coyne , C. J. 2006 . “The Economics of Computer Hacking.” . Journal of Law, Economics and Policy , 1 : 511 – 532 .
  • Levy , S. 1984 . Hackers: Heroes of the Computer Revolution. , Harmondsworth , UK : Penguin .
  • Long , J. S. and Freese , J. 2006 . Regression Models for Categorical Dependent Variables Using Stata, , Second Edition , College Station , TX : Stata Press .
  • Matsueda , R. L. and Anderson , K. 1998 . “The Dynamics of Delinquent Peers and Delinquent Behavior.” . Criminology , 36 : 269 – 308 .
  • Meyer , G. and Thomas , J. 1990 . “The Baudy World of the Byte Bandit: A Postmodernist Interpretation of the Computer Underground.” . In Computers in Criminal Justice. , Edited by: Schmalleger , F. Bristol , IN : Wyndham Hall .
  • Motion Picture Association of America . 2005 . 2005 U.S. Piracy Fact Sheet. Retrieved January 13, 2008 from http://www.mpaa.org/USPiracyFactSheet.pdf
  • Motion Picture Association of America . 2008 . MPAA Statement on Motion Picture Industry Losses Due to Piracy Among College Students. Retrieved January 13, 2008, from http://www.mpaa.org/press_releases/lek%20college%20student%20data_f.pdf
  • Pavlov , I. 1906 . Lectures on Conditioned Reflexes: Twenty-five Years of Objective Study of the Higher Nervous Activity (Behavior) of Animals. , New York : Independent . [1967]
  • Raymond , E. S. 2003 . The Jargon File (Version 4.4.7) Retrieved November 13, 2007, from http://catb.org/jargon/html/
  • Roush , W. 1995 . Hackers: Taking a Byte Out of Computer Crime . Technology Review , 98 : 32 – 40 .
  • Schell , B. H. and Dodge , J. L. 2002 . The Hacking of America: Who's Doing It, Why, and How. , Westport , CT : Quorum Books .
  • Sellers , C. S. , Cochran , J. and Winfree , L. T. 2003 . “Social Learning Theory and Courtship Violence: An Empirical Test.” . In Social Learning Theory and the Explanation of Crime: A Guide for a New Century. Advances in Criminological Theory , Edited by: Akers , R. L. and Jensen , G. F. vol. 11 , New Bruswick , NJ : Transaction Publishers .
  • Skibell , R. 2002 . “The Myth of the Computer Hacker.” . Information, Communication and Society , 5 : 336 – 356 .
  • Skinner , B. F. 1953 . Science and Human Behavior. , New York : Macmillan .
  • Skinner , W. F. and Fream , A. M. 1997 . “A Social Learning Theory Analysis of Computer Crime Among College Students.” . Journal of Research in Crime and Delinquency , 34 : 495 – 518 .
  • Stallman , R. 2002 . Free Software, Free Society: Selected Essays of Richard M. Stallman. , Boston : Free Software Foundation .
  • Sterling , B. 1993 . The Hacker Crackdown: Law and Disorder on the Electronic Frontier. , London : Viking .
  • Sutherland , E. H. 1947 . Principles of Criminology., , 4th ed. , Philadelphia : J.B. Lippincott .
  • Tarde , G. 1903 . The Laws of Imitation. , New York : Henry, Holt and Co .
  • Taylor , P. 1999 . Hackers: Crime in the Digital Sublime. , London : Routledge .
  • Taylor , R. W. , Caeti , T. J. , Loper , K. , Fritsch , E. J. and Liederback , J. 2005 . Digital Crime and Digital Terrorism. , Saddle River , NJ : Prentice Hall .
  • Thornberry , T. P. , Lizotte , A. J. , Krohn , M. D. , Farnworth , M. and Jang , S. J. 1994 . “Delinquent Peers, Beliefs, and Delinquent Behavior: A Longitudinal Test of Interactional Theory.” . Criminology , 32 : 47 – 84 .
  • Turgeman-Goldschmidt , O. 2005 . “Hackers’ Accounts: Hacking as a Social Entertainment.” . Social Science Computer Review , 23 : 8 – 23 .
  • Turkle , S. 1984 . The Second Self: Computers and the Human Spirit. , New York : Simon and Schuster .
  • Voiskounsky , A. E. , Babaeva , J. D. and Smyslova , O. V. 2000 . “Attitudes Towards Computer Hacking In Russia.” . In Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. , Edited by: Thomas , D. and Loader , B. D. London : Routledge .
  • Warr , M. 1993 . “Age, Peers, and Delinquency.” . Criminology , 31 : 17 – 40 .
  • Warr , M. 2002 . Companions in Crime: The Social Aspects of Criminal Conduct. , Cambridge : Cambridge University Press .
  • Warr , M. and Stafford , M. 1991 . “The Influence of Delinquent Peers: What They Think or What They Do?” . Criminology , 29 : 851 – 866 .
  • Winfree , L. T. , Backstrom , T. V. and Mays , G. L. 1994 . “Social Learning Theory, Self-Reported Delinquency, and Young Gangs: A New Twist on a General Theory of Crime and Delinquency.” . Youth and Society , 26 : 147 – 177 .
  • Yar , M. 2005 . “Computer Hacking: Just another Case of Juvenile Delinquency?” . The Howard Journal of Criminal Justice , 44 : 387 – 399 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.