References
- Archer, J. (2004). Sex differences in aggression in real-world settings: A meta-analytic review. Review of General Psychology, 8(4), 291–322. doi:10.1037/1089-2680.8.4.291
- Barlett, C., & Coyne, S. M. (2014). A meta‐analysis of sex differences in cyber‐bullying behavior: The moderating role of age. Aggressive Behavior, 40(5), 474–488. doi:10.1002/ab.v40.5
- Bayraktar, F., Machackova, H., Dedkova, L., Cerna, A., & Sevcíkova, A. (2015). Cyberbullying: The discriminant factors among cyberbullies, cybervictims, and cyberbully-victims in a Czech adolescent sample. Journal of Interpersonal Violence, 30(18), 3192–3216. doi:10.1177/0886260514555006
- Bimber, B. (2000). Measuring the gender gap on the Internet. Social Science Quarterly, 81(3), 868–876.
- Bossler, A. M., & Burrus, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers? In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications ( pp. 38–67). Hershey, PA: IGI Global.
- Card, N. A., Stucky, B. D., Sawalani, G. M., & Little, T. D. (2008). Direct and indirect aggression during childhood and adolescence: A meta‐analytic review of gender differences, intercorrelations, and relations to maladjustment. Child Development, 79(5), 1185–1229. doi:10.1111/cdev.2008.79.issue-5
- Daigle, L. E., Cullen, F. T., & Wright, J. P. (2007). Gender differences in the predictors of juvenile delinquency: Assessing the generality-specificity debate. Youth Violence and Juvenile Justice, 5(3), 254–286. doi:10.1177/1541204007301289
- Donner, C. M., Marcum, C. D., Jennings, W. G., Higgins, G. E., & Banfield, J. (2014). Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy. Computers in Human Behavior, 34, 165–172. doi:10.1016/j.chb.2014.01.040
- Esbensen, F. A., & Winfree, L. T. (1998). Race and gender differences between gang and nongang youths: Results from a multisite survey. Justice Quarterly, 15(3), 505–526. doi:10.1080/07418829800093861
- Gilligan, C. (1982). In a different voice. Cambridge, MA: Harvard University Press.
- Gottfredson, M., & Hirschi, T. (1990). A general theory of crime. Stanford, CA: Stanford University Press.
- Granovetter, M. (1985). Economic action and social structure: The problem of embeddedness. American Journal of Sociology, 91(3), 481–510. doi:10.1086/228311
- Grasmick, H. G., Tittle, C. R., Bursik, R. J., & Arneklev, B. J. (1993). Testing the core empirical implications of Gottfredson and Hirschi’s general theory of crime. Journal of Research in Crime & Delinquency, 30(1), 5–29. doi:10.1177/0022427893030001002
- Gunter, W. D. (2008). Piracy on the high speeds: A test of social learning theory on digital piracy among college students. International Journal of Criminal Justice Sciences, 3(1), 54–68.
- Higgins, G. E. (2006). Gender differences in software piracy: The mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management, 4(1), 1–30.
- Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students’ intentions to pirate movies in the United States. Social Science Computer Review, 25(3), 339–357. doi:10.1177/0894439307299934
- Higgins, G. E., & Marcum, C. D. (2011). Digital piracy: An integrated theoretical approach. Durham, NC: Carolina Academic Press.
- Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Digital piracy: An examination of three measurements of self-control. Deviant Behavior, 29(5), 440–460. doi:10.1080/01639620701598023
- Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187–204. doi:10.1007/s10676-007-9143-5
- Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129–156. doi:10.1080/01639620701457816
- Hirschi, T. (2004). Self-control and crime. In R. Baumeister & K. Vohs (Eds.), Handbook of self-regulation: Research, theory, and applications (pp. 537–552). New York, NY: Guilford Press.
- Hollinger, R. C. (1993). Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal, 4(1), 2–12.
- Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37(3), 1–18. doi:10.1007/s12103-011-9117-3
- Holt, T. J., & Morris, R. G. (2009). An exploration of the relationship between MP3 player ownership and digital piracy. Criminal Justice Studies, 22(4), 381–392. doi:10.1080/14786010903358109
- Huang, Y. Y., & Chou, C. (2010). An analysis of multiple factors of cyberbullying among junior high school students in Taiwan. Computers in Human Behavior, 26(6), 1581–1590. doi:10.1016/j.chb.2010.06.005
- Hurwitz, J., & Smithey, S. (1998). Gender differences on crime and punishment. Political Research Quarterly, 51(1), 89–115. doi:10.1177/106591299805100104
- Kokkinos, C. M., Antoniadou, N., & Markos, A. (2014). Cyber-bullying: An investigation of the psychological profile of university student participants. Journal of Applied Developmental Psychology, 35(3), 204–214. doi:10.1016/j.appdev.2014.04.001
- Kowalski, R. M., & Giumetti, G. W. (2014). Wall posts and tweets, and blogs, oh my! A look at cyberbullying via social media. In C. D. Marcum & G. E. Higgins (Eds.), Social networking as a criminal enterprise (pp. 91–110). Boca Raton, FL: CRC Press.
- Kowalski, R. M., & Limber, S. P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41(6), S22–S30. doi:10.1016/j.jadohealth.2007.08.017
- LaGrange, T. C., & Silverman, R. A. (1999). Low self-control and opportunity: Testing the general theory of crime as an explanation for gender differences in delinquency. Criminology, 37(1), 41–72. doi:10.1111/crim.1999.37.issue-1
- Li, C. K., Holt, T. J., Bossler, A. M., & May, D. C. (2016). Examining the mediating effects of social learning on the low self-control cyberbullying relationship in a youth sample. Deviant Behavior, 37(2), 1–13. doi:10.1080/01639625.2014.1004023
- Li, Q. (2006). Cyberbullying in schools: A research of gender differences. School Psychology International, 27(2), 157–170. doi:10.1177/0143034306064547
- MacDonald, J. M., & Lattimore, P. K. (2010). Count models in criminology. In A. Piquero & D. Weisburd (Eds.), Handbook of quantitative criminology. New York, NY: Springer.
- Marcum, C. D., Higgins, G. E., Freiburger, T. L., & Ricketts, M. L. (2012). Battle of the sexes: An examination of male and female cyber bullying. International Journal of Cyber Criminology, 6(1), 904–911.
- McCarthy, B., & Hagan, J. (1995). Getting into street crime: The structure and process of criminal embeddedness. Social Science Research, 24(1), 63–95. doi:10.1006/ssre.1995.1003
- Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767–772. doi:10.1016/j.jcrimjus.2010.05.003
- Moon, B., McCluskey, J. D., McCluskey, C. P., & Lee, S. (2013). Gender, general theory of crime and computer crime: An empirical test. International Journal of Offender Therapy and Comparative Criminology, 57(4), 460–478. doi:10.1177/0306624X11433784
- Moretti, M. M., Holland, R., & McKay, S. (2001). Self–other representations and relational and overt aggression in adolescent girls and boys. Behavioral Sciences & the Law, 19(1), 109–126. doi:10.1002/(ISSN)1099-0798
- Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 1–17). Hershey, PA: IGI Global.
- Morris, R. G., & Blackburn, A. G. (2009). Cracking the code: An empirical exploration of social learning theory and computer crime. Journal of Crime and Justice, 32(1), 1–34. doi:10.1080/0735648X.2009.9721260
- Morris, R. G., Johnson, M. C., & Higgins, G. E. (2009). The role of gender in predicting the willingness to engage in digital piracy among college students. Criminal Justice Studies, 22(4), 393–404. doi:10.1080/14786010903358117
- Nansel, T. R., Overpeck, M., Pilla, R. S., Ruan, W. J., Simons Morton, B., & Scheidt, P. (2001). Bullying behaviors among US youth: Prevalence and association with psychological adjustment. Journal of the American Medical Association, 285(16), 2094–2100. doi:10.1001/jama.285.16.2094
- Ono, H., & Zavodny, M. (2003). Gender and the Internet. Social Science Quarterly, 84(1), 111–121. doi:10.1111/ssqu.2003.84.issue-1
- Owens, L., Shute, R., & Slee, P. (2000). “Guess what I just heard!”: Indirect aggression among teenage girls in Australia. Aggressive Behavior, 26(1), 67–83. doi:10.1002/(SICI)1098-2337(2000)26:1<67::AID-AB6>3.0.CO;2-C
- Piquero, A. (2000). Frequency, specialization, and violence in offending careers. Journal of Research in Crime & Delinquency, 37(4), 392–418.
- Piquero, N. L., Gover, A. R., MacDonald, J. M., & Piquero, A. R. (2005). The influence of delinquent peers on delinquency: Does gender matter? Youth & Society, 36(3), 251–275. doi:10.1177/0044118X04265652
- Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38(3), 931–964. doi:10.1111/crim.2000.38.issue-3
- Richie, M., & Freiburger, T. L. (2014). Creating identity on social network sites. In C. D. Marcum & G. E. Higgins (Eds.), Social networking as a criminal enterprise (pp. 9–26). Boca Raton, FL: CRC Press.
- Schaefer, B. P. (2014). Social networks and crime: Applying criminological theories. In C. D. Marcum & G. E. Higgins (Eds.), Social networking as a criminal enterprise (pp. 27–48). Boca Raton, FL: CRC Press.
- Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518. doi:10.1177/0022427897034004005
- Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49(2), 147–154. doi:10.1111/j.1467-9450.2007.00611.x
- Steffensmeier, D., & Allan, E. (1996). Gender and crime: Toward a gendered theory of female offending. Annual Review of Sociology, 22, 459–487. doi:10.1146/annurev.soc.22.1.459
- Taylor, P. (1999). Hackers: Crime in the digital sublime. London, UK: Routledge.
- U.S. Census Bureau. (2014). Computer and Internet use in the United States: 2013. Retrieved from http://www.census.gov/content/dam/Census/library/publications/2014/acs/acs-28.pdf.
- Vazsonyi, A. T., Machackova, H., Sevcikova, A., Smahel, D., & Cerna, A. (2012). Cyberbullying in context: Direct and indirect effects by low self-control across 25 European countries. European Journal of Developmental Psychology, 9(2), 210–227. doi:10.1080/17405629.2011.644919
- Wall, D. A. (2010). The Internet as a conduit for criminal activity. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 77–98). Thousand Oaks, CA: Sage.
- Wasserman, I. M., & Richmond‐Abbott, M. (2005). Gender and the Internet: Causes of variation in access, level, and scope of use. Social Science Quarterly, 86(1), 252–270. doi:10.1111/ssqu.2005.86.issue-1
- Weiser, E. B. (2000). Gender differences in internet use patterns and internet application preferences: A two-sample comparison. CyberPsychology & Behavior, 3(2), 167–178.
- Wingate, V. S., Minney, J. A., & Guadagno, R. E. (2013). Sticks and stones may break your bones, but words will always hurt you: A review of cyberbullying. Social Influence, 8(2–3), 87–106. doi:10.1080/15534510.2012.730491
- Wolfe, S. E., & Higgins, G. E. (2009). Explaining deviant peer associations: An examination of low self-control, ethical predispositions, definitions, and digital piracy. Western Criminology Review, 10(1), 43–55.
- Wolfe, S. E., Higgins, G. E., & Marcum, C. D. (2008). Deterrence and digital piracy: A preliminary examination of the role of viruses. Social Science Computer Review, 26(3), 317–333. doi:10.1177/0894439307309465
- Yar, M. (2005). Computer hacking: Just another case of juvenile delinquency? The Howard Journal of Criminal Justice, 44(4), 387–399. doi:10.1111/hojo.2005.44.issue-4