Publication Cover
Victims & Offenders
An International Journal of Evidence-based Research, Policy, and Practice
Volume 11, 2016 - Issue 4: How the Internet Facilitates Deviance
1,765
Views
26
CrossRef citations to date
0
Altmetric
Original Articles

The Gender Gap and Cybercrime: An Examination of College Students’ Online Offending

References

  • Archer, J. (2004). Sex differences in aggression in real-world settings: A meta-analytic review. Review of General Psychology, 8(4), 291–322. doi:10.1037/1089-2680.8.4.291
  • Barlett, C., & Coyne, S. M. (2014). A meta‐analysis of sex differences in cyber‐bullying behavior: The moderating role of age. Aggressive Behavior, 40(5), 474–488. doi:10.1002/ab.v40.5
  • Bayraktar, F., Machackova, H., Dedkova, L., Cerna, A., & Sevcíkova, A. (2015). Cyberbullying: The discriminant factors among cyberbullies, cybervictims, and cyberbully-victims in a Czech adolescent sample. Journal of Interpersonal Violence, 30(18), 3192–3216. doi:10.1177/0886260514555006
  • Bimber, B. (2000). Measuring the gender gap on the Internet. Social Science Quarterly, 81(3), 868–876.
  • Bossler, A. M., & Burrus, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers? In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications ( pp. 38–67). Hershey, PA: IGI Global.
  • Card, N. A., Stucky, B. D., Sawalani, G. M., & Little, T. D. (2008). Direct and indirect aggression during childhood and adolescence: A meta‐analytic review of gender differences, intercorrelations, and relations to maladjustment. Child Development, 79(5), 1185–1229. doi:10.1111/cdev.2008.79.issue-5
  • Daigle, L. E., Cullen, F. T., & Wright, J. P. (2007). Gender differences in the predictors of juvenile delinquency: Assessing the generality-specificity debate. Youth Violence and Juvenile Justice, 5(3), 254–286. doi:10.1177/1541204007301289
  • Donner, C. M., Marcum, C. D., Jennings, W. G., Higgins, G. E., & Banfield, J. (2014). Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy. Computers in Human Behavior, 34, 165–172. doi:10.1016/j.chb.2014.01.040
  • Esbensen, F. A., & Winfree, L. T. (1998). Race and gender differences between gang and nongang youths: Results from a multisite survey. Justice Quarterly, 15(3), 505–526. doi:10.1080/07418829800093861
  • Gilligan, C. (1982). In a different voice. Cambridge, MA: Harvard University Press.
  • Gottfredson, M., & Hirschi, T. (1990). A general theory of crime. Stanford, CA: Stanford University Press.
  • Granovetter, M. (1985). Economic action and social structure: The problem of embeddedness. American Journal of Sociology, 91(3), 481–510. doi:10.1086/228311
  • Grasmick, H. G., Tittle, C. R., Bursik, R. J., & Arneklev, B. J. (1993). Testing the core empirical implications of Gottfredson and Hirschi’s general theory of crime. Journal of Research in Crime & Delinquency, 30(1), 5–29. doi:10.1177/0022427893030001002
  • Gunter, W. D. (2008). Piracy on the high speeds: A test of social learning theory on digital piracy among college students. International Journal of Criminal Justice Sciences, 3(1), 54–68.
  • Higgins, G. E. (2006). Gender differences in software piracy: The mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management, 4(1), 1–30.
  • Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students’ intentions to pirate movies in the United States. Social Science Computer Review, 25(3), 339–357. doi:10.1177/0894439307299934
  • Higgins, G. E., & Marcum, C. D. (2011). Digital piracy: An integrated theoretical approach. Durham, NC: Carolina Academic Press.
  • Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Digital piracy: An examination of three measurements of self-control. Deviant Behavior, 29(5), 440–460. doi:10.1080/01639620701598023
  • Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187–204. doi:10.1007/s10676-007-9143-5
  • Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129–156. doi:10.1080/01639620701457816
  • Hirschi, T. (2004). Self-control and crime. In R. Baumeister & K. Vohs (Eds.), Handbook of self-regulation: Research, theory, and applications (pp. 537–552). New York, NY: Guilford Press.
  • Hollinger, R. C. (1993). Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal, 4(1), 2–12.
  • Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37(3), 1–18. doi:10.1007/s12103-011-9117-3
  • Holt, T. J., & Morris, R. G. (2009). An exploration of the relationship between MP3 player ownership and digital piracy. Criminal Justice Studies, 22(4), 381–392. doi:10.1080/14786010903358109
  • Huang, Y. Y., & Chou, C. (2010). An analysis of multiple factors of cyberbullying among junior high school students in Taiwan. Computers in Human Behavior, 26(6), 1581–1590. doi:10.1016/j.chb.2010.06.005
  • Hurwitz, J., & Smithey, S. (1998). Gender differences on crime and punishment. Political Research Quarterly, 51(1), 89–115. doi:10.1177/106591299805100104
  • Kokkinos, C. M., Antoniadou, N., & Markos, A. (2014). Cyber-bullying: An investigation of the psychological profile of university student participants. Journal of Applied Developmental Psychology, 35(3), 204–214. doi:10.1016/j.appdev.2014.04.001
  • Kowalski, R. M., & Giumetti, G. W. (2014). Wall posts and tweets, and blogs, oh my! A look at cyberbullying via social media. In C. D. Marcum & G. E. Higgins (Eds.), Social networking as a criminal enterprise (pp. 91–110). Boca Raton, FL: CRC Press.
  • Kowalski, R. M., & Limber, S. P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41(6), S22–S30. doi:10.1016/j.jadohealth.2007.08.017
  • LaGrange, T. C., & Silverman, R. A. (1999). Low self-control and opportunity: Testing the general theory of crime as an explanation for gender differences in delinquency. Criminology, 37(1), 41–72. doi:10.1111/crim.1999.37.issue-1
  • Li, C. K., Holt, T. J., Bossler, A. M., & May, D. C. (2016). Examining the mediating effects of social learning on the low self-control cyberbullying relationship in a youth sample. Deviant Behavior, 37(2), 1–13. doi:10.1080/01639625.2014.1004023
  • Li, Q. (2006). Cyberbullying in schools: A research of gender differences. School Psychology International, 27(2), 157–170. doi:10.1177/0143034306064547
  • MacDonald, J. M., & Lattimore, P. K. (2010). Count models in criminology. In A. Piquero & D. Weisburd (Eds.), Handbook of quantitative criminology. New York, NY: Springer.
  • Marcum, C. D., Higgins, G. E., Freiburger, T. L., & Ricketts, M. L. (2012). Battle of the sexes: An examination of male and female cyber bullying. International Journal of Cyber Criminology, 6(1), 904–911.
  • McCarthy, B., & Hagan, J. (1995). Getting into street crime: The structure and process of criminal embeddedness. Social Science Research, 24(1), 63–95. doi:10.1006/ssre.1995.1003
  • Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767–772. doi:10.1016/j.jcrimjus.2010.05.003
  • Moon, B., McCluskey, J. D., McCluskey, C. P., & Lee, S. (2013). Gender, general theory of crime and computer crime: An empirical test. International Journal of Offender Therapy and Comparative Criminology, 57(4), 460–478. doi:10.1177/0306624X11433784
  • Moretti, M. M., Holland, R., & McKay, S. (2001). Self–other representations and relational and overt aggression in adolescent girls and boys. Behavioral Sciences & the Law, 19(1), 109–126. doi:10.1002/(ISSN)1099-0798
  • Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 1–17). Hershey, PA: IGI Global.
  • Morris, R. G., & Blackburn, A. G. (2009). Cracking the code: An empirical exploration of social learning theory and computer crime. Journal of Crime and Justice, 32(1), 1–34. doi:10.1080/0735648X.2009.9721260
  • Morris, R. G., Johnson, M. C., & Higgins, G. E. (2009). The role of gender in predicting the willingness to engage in digital piracy among college students. Criminal Justice Studies, 22(4), 393–404. doi:10.1080/14786010903358117
  • Nansel, T. R., Overpeck, M., Pilla, R. S., Ruan, W. J., Simons Morton, B., & Scheidt, P. (2001). Bullying behaviors among US youth: Prevalence and association with psychological adjustment. Journal of the American Medical Association, 285(16), 2094–2100. doi:10.1001/jama.285.16.2094
  • Ono, H., & Zavodny, M. (2003). Gender and the Internet. Social Science Quarterly, 84(1), 111–121. doi:10.1111/ssqu.2003.84.issue-1
  • Owens, L., Shute, R., & Slee, P. (2000). “Guess what I just heard!”: Indirect aggression among teenage girls in Australia. Aggressive Behavior, 26(1), 67–83. doi:10.1002/(SICI)1098-2337(2000)26:1<67::AID-AB6>3.0.CO;2-C
  • Piquero, A. (2000). Frequency, specialization, and violence in offending careers. Journal of Research in Crime & Delinquency, 37(4), 392–418.
  • Piquero, N. L., Gover, A. R., MacDonald, J. M., & Piquero, A. R. (2005). The influence of delinquent peers on delinquency: Does gender matter? Youth & Society, 36(3), 251–275. doi:10.1177/0044118X04265652
  • Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38(3), 931–964. doi:10.1111/crim.2000.38.issue-3
  • Richie, M., & Freiburger, T. L. (2014). Creating identity on social network sites. In C. D. Marcum & G. E. Higgins (Eds.), Social networking as a criminal enterprise (pp. 9–26). Boca Raton, FL: CRC Press.
  • Schaefer, B. P. (2014). Social networks and crime: Applying criminological theories. In C. D. Marcum & G. E. Higgins (Eds.), Social networking as a criminal enterprise (pp. 27–48). Boca Raton, FL: CRC Press.
  • Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518. doi:10.1177/0022427897034004005
  • Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49(2), 147–154. doi:10.1111/j.1467-9450.2007.00611.x
  • Steffensmeier, D., & Allan, E. (1996). Gender and crime: Toward a gendered theory of female offending. Annual Review of Sociology, 22, 459–487. doi:10.1146/annurev.soc.22.1.459
  • Taylor, P. (1999). Hackers: Crime in the digital sublime. London, UK: Routledge.
  • U.S. Census Bureau. (2014). Computer and Internet use in the United States: 2013. Retrieved from http://www.census.gov/content/dam/Census/library/publications/2014/acs/acs-28.pdf.
  • Vazsonyi, A. T., Machackova, H., Sevcikova, A., Smahel, D., & Cerna, A. (2012). Cyberbullying in context: Direct and indirect effects by low self-control across 25 European countries. European Journal of Developmental Psychology, 9(2), 210–227. doi:10.1080/17405629.2011.644919
  • Wall, D. A. (2010). The Internet as a conduit for criminal activity. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 77–98). Thousand Oaks, CA: Sage.
  • Wasserman, I. M., & Richmond‐Abbott, M. (2005). Gender and the Internet: Causes of variation in access, level, and scope of use. Social Science Quarterly, 86(1), 252–270. doi:10.1111/ssqu.2005.86.issue-1
  • Weiser, E. B. (2000). Gender differences in internet use patterns and internet application preferences: A two-sample comparison. CyberPsychology & Behavior, 3(2), 167–178.
  • Wingate, V. S., Minney, J. A., & Guadagno, R. E. (2013). Sticks and stones may break your bones, but words will always hurt you: A review of cyberbullying. Social Influence, 8(2–3), 87–106. doi:10.1080/15534510.2012.730491
  • Wolfe, S. E., & Higgins, G. E. (2009). Explaining deviant peer associations: An examination of low self-control, ethical predispositions, definitions, and digital piracy. Western Criminology Review, 10(1), 43–55.
  • Wolfe, S. E., Higgins, G. E., & Marcum, C. D. (2008). Deterrence and digital piracy: A preliminary examination of the role of viruses. Social Science Computer Review, 26(3), 317–333. doi:10.1177/0894439307309465
  • Yar, M. (2005). Computer hacking: Just another case of juvenile delinquency? The Howard Journal of Criminal Justice, 44(4), 387–399. doi:10.1111/hojo.2005.44.issue-4

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.