5,495
Views
98
CrossRef citations to date
0
Altmetric
Original Articles

SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD

, &
Pages 31-61 | Published online: 10 Jan 2012

REFERENCES

  • Akers , R. L. 1973 . Deviant Behavior: A Social Learning Approach. , Wadsworth : Belmont .
  • Akers , R. L. 1998 . Social Learning and Social Structure: A General Theory of Crime and Deviance. , Boston : Northeastern University Press .
  • Akers , R. L. and Jensen , G. F. 2006 . “The Empirical Status of Social Learning Theory of Crime and Deviance: The Past, Present, and Future.” . In Taking Stock: The Status of Criminological Theory. , Edited by: Cullen , F. T. , Wright , J. P. and Blevins , K. R. New Brunswick , NJ : Transaction Publishers .
  • Akers , R. L. and Lee , G. 1996 . “A Longitudinal Test of Social Learning Theory: Adolescent Smoking.” . Journal of Drug Issues , 26 ( 2 ) : 317 – 343 .
  • Boeringer , S. , Shehan , C. L. and Akers , R. L. 1991 . “Social Contexts and Sexual Learning in Sexual Coercion and Aggression: Assessing the Contribution of Fraternity Membership.” . Family Relations , 40 : 558 – 564 .
  • Bollen , K. A. 1989 . Structural Equations with Latent Variables. , New York : John Wiley and Sons .
  • Brown , E. C. , Catalano , R. F. , Fleming , C. B. , Haggerty , K. P. , Abbott , R. D. , Cortes , R. R. and Park , J. 2005 . “Mediator Effects in the Social Development Model: An Examination of Constituent Theories.” . Criminal Behaviour and Mental Health , 15 : 221 – 235 .
  • Chappell , A. T. and Piquero , A. R. 2004 . “Applying Social Learning Theory to Police Misconduct.” . Deviant Behavior , 25 : 89 – 108 .
  • Computer Security Institute . 2007 . Computer crime and security survey. Retrieved November 21, 2008 from http://www.cybercrime.gov/FBI2006.pdf
  • Cooper , J and Harrison , D. M. 2001 . “The Social Organization of Audio Piracy on the Internet.” . Media, Culture, and Society , 23 : 71 – 89 .
  • Cronan , T. P. , Foltz , C. B. and Jones , T. W. 2006 . “Piracy, Computer Crime, and IS Misuse at the University.” . Communications of the ACM , 49 : 85 – 90 .
  • Durkin , K. F. , Wolfe , T. W. and Clark , G. A. 2005 . “College Students and Binge Drinking: An Evaluation of Social Learning Theory.” . Sociological Spectrum , 25 : 255 – 272 .
  • Finney , S. J. and DiStefano , C. 2006 . “Nonnormal and Categorical Data.” . In Structural equation modeling: A second course. , Edited by: Hancock , G. R. and Mueller , R. O. Greenwhich , CT : Information Age Publishing .
  • Furnell , S. 2002 . Cybercrime: Vandalizing the Information Society. , Boston MA : Addison Wesley .
  • Gottfredson , M. R. and Hirschi , T. 1990 . A General Theory of Crime. , Stanford , CA : Stanford University Press .
  • Hagan , J. and Kay , F. 1990 . “Gender and Delinquency in White-collar Families: A Power Control Perspective.” . Crime and Delinquency , 36 : 391 – 407 .
  • Higgins , G. E. 2006 . “Gender Differences in Software Piracy: The Mediating Roles of Self-control Theory and Social Learning Theory.” . Journal of Economic Crime Management , 4 : 1 – 30 .
  • Higgins , G. E. , Fell , B. D. and Wilson , A. L. 2006 . “Digital Piracy: Assessing the Contributions of an Integrated Self-control Theory and Social Learning Theory Using Structural Equation Modeling.” . Criminal Justice Studies , 19 : 3 – 22 .
  • Higgins , G. E. , Fell , B. D. and Wilson , A. L. 2007 . “Low Self-control and Social Learning in Understanding Students’ Intentions to Pirate Movies in the United States.” . Social Science Computer Review , 25 : 339 – 357 .
  • Higgins , G. E. and Makin , D. A. 2004a . “Self-control, Deviant peers, and Software Piracy.” . Psychological Reports , 95 : 921 – 931 .
  • Higgins , G. E. and Makin , D. A. 2004b . “Does Social Learning Theory Condition the Effects of Low Self-control on College Students’ Software Piracy?” . Journal of Economic Crime Management , 2 : 1 – 22 .
  • Higgins , G. E. and Wilson , A. L. 2006 . “Low Self-control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software.” . Security Journal , 19 : 75 – 92 .
  • Hinduja , S. 2001 . “Correlates of Internet Software Piracy.” . Journal of Contemporary Criminal Justice , 17 : 369 – 382 .
  • Hinduja , S. 2003 . “Trends and Patterns among Online Software Pirates.” . Ethics and Information Technology , 5 : 49 – 61 .
  • Hollinger , R. C. 1992 . “Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access.” . Security Journal , 2 : 2 – 12 .
  • Holt , T. J. 2007 . “Subcultural Evolution? Examining the Influence of On- and Off-line Experiences on Deviant Subcultures.” . Deviant Behavior , 28 : 171 – 198 .
  • Holt , T. J. 2008 . “Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers.” . In Crimes of the Internet. , Edited by: Schmalleger , F. and Pittaro , M . Upper Saddle River , NJ : Pearson Prentice Hall .
  • Holt , T. J. and Bossier , A. M. 2009 . “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization.” . Deviant Behavior , 30 : 1 – 25 .
  • Hu , L. A. and Bentler , P. M. 1999 . “Cutoff Criteria for Fixed Indexes in Covariance Structure Analysis: Conventional Criteria Versus New Alternatives.” . Structural Equation Modeling , 6 : 1 – 55 .
  • Jordan , T. and Taylo , P. 1998 . “A Sociology of Hackers.” . American Sociological Review , 46 : 757 – 780 .
  • Kline , R. B. 2005 . Principles and Practice of Structural Equation Modeling. , New York : The Guilford Press .
  • Lee , G. , Akers , R. L. and Bor , M. J. 2004 . “Social Learning and Structural Factors in Adolescent Substance Use.” . Western Criminology Review , 5 : 17 – 34 .
  • MacKinnon , D. P. , Fairchild , A. J. and Fritz , M. S. 2007 . “Mediation Analysis.” . Annual Review of Psychology , 58 : 593 – 614 .
  • Meyer , G. R. 1989 . “The Social Organization of the Computer Underground Unpublished Masters Thesis, Retrieved December 29, 2003 from http://csrc.nist.gov/secpubs/hacker.txt
  • Muthén , L. K. and Muthé , B. O. 2007 . Mplus User's Guide Fourth Edition. , Los Angeles , CA : Muthén and Muthén .
  • Payne , B. K. and Chappell , A. 2008 . “Using Student Samples in Criminological Research.” . Journal of Criminal Justice Education , 19 : 175 – 192 .
  • Rebellon , C. J. 2006 . “Do Adolescents Engage in Delinquency to Attract the Social Attention of Peers: An Extension and Longitudinal Test of the Social Reinforcement Hypothesis.” . Journal of Research in Crime and Delinquency , 43 : 387 – 411 .
  • Rogers , M. K. 2001 . A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. , PhD Dissertation Canada : Manitoba University .
  • Sellers , C. S. , Cochran , J. K. and Branch , K. A. 2005 . “Social Learning Theory and Partner Violence: A Research Note.” . Deviant Behavior , 26 : 379 – 395 .
  • Sims , R. R. , Cheng , H. K. and Teegan , H. 1996 . “Toward a Profile of Student Software Pirates.” . Journal of Business Ethics , 15 : 839 – 849 .
  • Skinner , W. F. and Fream , A. M. 1997 . “A Social Learning Theory Analysis of Computer Crime among College Students.” . Journal of Research in Crime and Delinquency , 34 : 495 – 518 .
  • Spear , S. and Akers , R. L. 1988 . “Social Learning Variables and the Risk of Habitual Smoking among Adolescents: The Muscatine Study.” . American Journal of Preventative Medicine , 4 : 336 – 348 .
  • Sutherland , E. 1947 . Principles of Criminology, , 4th ed. , Chicago , IL : Lippincott .
  • Taylor , P. 1999 . Hackers: Crime in the Digital Sublime. , London : Routledge .
  • Wall , D. S. 2001 . “Cybercrimes and the Internet.” . In Crime and the Internet. , Edited by: Wall , D. S. New York : Routledge .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.