Skip to main content

2018 | OriginalPaper | Buchkapitel

Explaining Why Cybercrime Occurs: Criminological and Psychological Theories

verfasst von : Loretta J. Stalans, Christopher M. Donner

Erschienen in: Cyber Criminology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Several criminological and psychological theories and their empirical support for explaining cybercrime are reviewed. Social learning theory, self-control theory, and subcultural theories have garnered much empirical attention and support. Lack of moral qualms, association with deviant peers and neutralizations have consistently been associated with a wide range of cyber-offending. From routine activities theory, increased visibility is associated with higher cyber-victimization and cyber-offending across many offenses. Integrating social learning and self-control concepts, research has found that effects of low self-control on cybercrime are mediated through association with deviant peers and beliefs that the behaviors are not morally wrong. Research in the tradition of subcultural theories have discovered the norms underlying memberships in deviant groups of persistent digital pirates, hackers, and regular participants in the online illicit sex trade. Limited research has examined deterrence theory, general strain theory, or differential reinforcements in social learning theory. Future research is needed to integrate the perceived characteristics of cyberspace with the formation of attitudes and beliefs supportive of perpetration of cybercrimes, and to address the dearth of knowledge about the nature of social interactions in cyberspace and how such interactions shape real world interactions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30, 47–87.CrossRef Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30, 47–87.CrossRef
Zurück zum Zitat Agnew, R. (2006). General strain theory: Current status and directions for further researches. In F. T. Cullen, J. P. Wright, & K. R. Blevins (Eds.), Taking stock: The status of criminological theory (pp. 121–123). New Brunswick: Transaction Publishers. Agnew, R. (2006). General strain theory: Current status and directions for further researches. In F. T. Cullen, J. P. Wright, & K. R. Blevins (Eds.), Taking stock: The status of criminological theory (pp. 121–123). New Brunswick: Transaction Publishers.
Zurück zum Zitat Akers, R. L. (1985). Deviant behavior: A social learning approach. Belmont: Wadsworth. Akers, R. L. (1985). Deviant behavior: A social learning approach. Belmont: Wadsworth.
Zurück zum Zitat Akers, R. L., Sellers, C. S., & Jennings, W. G. (2016). Criminological theories: Introduction, evaluation, and application. Oxford: Oxford University Press. Akers, R. L., Sellers, C. S., & Jennings, W. G. (2016). Criminological theories: Introduction, evaluation, and application. Oxford: Oxford University Press.
Zurück zum Zitat Anderson, E. (1999). Code of the street: Decency, violence and the moral life of the Inner City. New York: W. W. Norton and Company. Anderson, E. (1999). Code of the street: Decency, violence and the moral life of the Inner City. New York: W. W. Norton and Company.
Zurück zum Zitat Bachmann, M. (2007). Lesson spurned? Reactions of online music pirates to legal prosecutions by the RIAA. International Journal of Cyber Criminology, 1(2), 213–227. Bachmann, M. (2007). Lesson spurned? Reactions of online music pirates to legal prosecutions by the RIAA. International Journal of Cyber Criminology, 1(2), 213–227.
Zurück zum Zitat Bandura, A. (1973). Aggression: A social learning analysis. Englewood Cliffs: Prentice Hall. Bandura, A. (1973). Aggression: A social learning analysis. Englewood Cliffs: Prentice Hall.
Zurück zum Zitat Bandura, A. (1999). Moral disengagement in the perpetration of inhumanities. Personality and Social Psychology Review, 3(3), 193–209.CrossRef Bandura, A. (1999). Moral disengagement in the perpetration of inhumanities. Personality and Social Psychology Review, 3(3), 193–209.CrossRef
Zurück zum Zitat Barlett, C. P., & Gentile, D. A. (2012). Attacking others online: The formation of cyberbullying in late adolescence. Psychology of Popular Media Culture, 1(2), 123–135.CrossRef Barlett, C. P., & Gentile, D. A. (2012). Attacking others online: The formation of cyberbullying in late adolescence. Psychology of Popular Media Culture, 1(2), 123–135.CrossRef
Zurück zum Zitat Barlett, C. P., & Helmstetter, K. M. (2017). Longitudinal relations between early online disinhibition and anonymity perceptions on later cyberbullying perpetration: A theoretical test on youth. Psychology of Popular Media Culture, Advance online publication. https://doi.org/10.1037/ppm0000149.CrossRef Barlett, C. P., & Helmstetter, K. M. (2017). Longitudinal relations between early online disinhibition and anonymity perceptions on later cyberbullying perpetration: A theoretical test on youth. Psychology of Popular Media Culture, Advance online publication. https://​doi.​org/​10.​1037/​ppm0000149.CrossRef
Zurück zum Zitat Barlett, C. P., Chamberlin, K., & Witkower, Z. (2017). Predicting cyberbullying perpetration in emerging adults: A theoretical test of the Barlette Gentile Cyberbullying Model. Aggressive Behavior, 43, 147–154.CrossRef Barlett, C. P., Chamberlin, K., & Witkower, Z. (2017). Predicting cyberbullying perpetration in emerging adults: A theoretical test of the Barlette Gentile Cyberbullying Model. Aggressive Behavior, 43, 147–154.CrossRef
Zurück zum Zitat Bayraktar, F., Machackova, H., Dedkova, L., Cerna, A., & Sevcikova, A. (2015). Cyberbullying: The discriminant factors among cyberbullies, cybervictims, and cyberbully-victims in a Czech adolescent sample. Journal of Interpersonal Violence, 30(18), 3192–3216. https://doi.org/10.1177/088626051455006.CrossRef Bayraktar, F., Machackova, H., Dedkova, L., Cerna, A., & Sevcikova, A. (2015). Cyberbullying: The discriminant factors among cyberbullies, cybervictims, and cyberbully-victims in a Czech adolescent sample. Journal of Interpersonal Violence, 30(18), 3192–3216. https://​doi.​org/​10.​1177/​088626051455006.CrossRef
Zurück zum Zitat Beaver, K. M., & Wright, J. P. (2007). The stability of low self-control from kindergarten through first grade. Journal of Crime and Justice, 30(1), 63–86.CrossRef Beaver, K. M., & Wright, J. P. (2007). The stability of low self-control from kindergarten through first grade. Journal of Crime and Justice, 30(1), 63–86.CrossRef
Zurück zum Zitat Beccaria, C. (1764). On crimes and punishment (H. Paolucci, Trans.). Indianapolis: Bobbs-Merrill. Beccaria, C. (1764). On crimes and punishment (H. Paolucci, Trans.). Indianapolis: Bobbs-Merrill.
Zurück zum Zitat Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime (pp. 38–67). Hershey: IGI Global.CrossRef Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime (pp. 38–67). Hershey: IGI Global.CrossRef
Zurück zum Zitat Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues and outcomes. Lebanon: Northeastern University Press. Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues and outcomes. Lebanon: Northeastern University Press.
Zurück zum Zitat Chen, L., Ho, S. S., & Lwin, M. O. (2017). A meta-analysis of factors predicting cyberbullying perpetration and victimization: From the social cognitive and media effects approach. New Media & Society, 19(8), 1194–1213.CrossRef Chen, L., Ho, S. S., & Lwin, M. O. (2017). A meta-analysis of factors predicting cyberbullying perpetration and victimization: From the social cognitive and media effects approach. New Media & Society, 19(8), 1194–1213.CrossRef
Zurück zum Zitat Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308. Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308.
Zurück zum Zitat Cohen, A. K., & Felson, M. (1979). Social change and crime rates: A routine activities approach. American Sociological Review, 44, 214–241.CrossRef Cohen, A. K., & Felson, M. (1979). Social change and crime rates: A routine activities approach. American Sociological Review, 44, 214–241.CrossRef
Zurück zum Zitat Felson, M. (1998). Crime & everyday life (2nd ed.). Thousand Oaks: Pine Forge Press. Felson, M. (1998). Crime & everyday life (2nd ed.). Thousand Oaks: Pine Forge Press.
Zurück zum Zitat Gibbs, J. P. (1975). Crime, Punishment, and Deterrence. New York: Elsevier. Gibbs, J. P. (1975). Crime, Punishment, and Deterrence. New York: Elsevier.
Zurück zum Zitat Giordano, P. C., Johnson, W. L., Manning, W. D., Longmore, M. A., & Minter, M. D. (2015). Intimate partner violence in young adulthood: Narratives of persistence and desistance. Criminology, 53(3), 330–365.CrossRef Giordano, P. C., Johnson, W. L., Manning, W. D., Longmore, M. A., & Minter, M. D. (2015). Intimate partner violence in young adulthood: Narratives of persistence and desistance. Criminology, 53(3), 330–365.CrossRef
Zurück zum Zitat Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford: Stanford University Press. Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford: Stanford University Press.
Zurück zum Zitat Grabosky, P. N., & Smith, R. G. (2001). Digital crime in the twenty-first century. Journal of Information Ethics, 10(1), 8–26. Grabosky, P. N., & Smith, R. G. (2001). Digital crime in the twenty-first century. Journal of Information Ethics, 10(1), 8–26.
Zurück zum Zitat Gunter, W. D. (2008). Piracy on the high speeds: A test of social learning theory on digital piracy among college students. International Journal of Criminal Justice Sciences, 3(1), 54–68. Gunter, W. D. (2008). Piracy on the high speeds: A test of social learning theory on digital piracy among college students. International Journal of Criminal Justice Sciences, 3(1), 54–68.
Zurück zum Zitat Higgins, G. E. (2005). Can low self-control help understand the software piracy problem? Deviant Behavior, 26, 1–24.CrossRef Higgins, G. E. (2005). Can low self-control help understand the software piracy problem? Deviant Behavior, 26, 1–24.CrossRef
Zurück zum Zitat Higgins, G. E., & Makin, D. A. (2004). Does social learning theory condition the effects of low self-control on college students’ software piracy? Journal of Economic Crime Management, 2(2), 1–30. Higgins, G. E., & Makin, D. A. (2004). Does social learning theory condition the effects of low self-control on college students’ software piracy? Journal of Economic Crime Management, 2(2), 1–30.
Zurück zum Zitat Higgins, G. E., & Marcum, C. D. (2011). Digital piracy: An integrated theoretical approach. Raleigh: Carolina Academic Press. Higgins, G. E., & Marcum, C. D. (2011). Digital piracy: An integrated theoretical approach. Raleigh: Carolina Academic Press.
Zurück zum Zitat Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3–22.CrossRef Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3–22.CrossRef
Zurück zum Zitat Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students’ intentions to pirate movies in the United States. Social Science Computer Review, 25(3), 339–357.CrossRef Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students’ intentions to pirate movies in the United States. Social Science Computer Review, 25(3), 339–357.CrossRef
Zurück zum Zitat Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2015). Music piracy and neutralization: A preliminary trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, 2(2), 324–336. Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2015). Music piracy and neutralization: A preliminary trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, 2(2), 324–336.
Zurück zum Zitat Hinduja, S., & Ingram, J. R. (2009). Social learning theory and music piracy: The differential role of online and offline peer influences. Criminal Justice Studies, 22(4), 405–420.CrossRef Hinduja, S., & Ingram, J. R. (2009). Social learning theory and music piracy: The differential role of online and offline peer influences. Criminal Justice Studies, 22(4), 405–420.CrossRef
Zurück zum Zitat Hirschi, T. (2004). Self-control and crime. In R. Baumeister & K. Vohs (Eds.), Handbook of self-regulation: Research, theory, and applications (pp. 537–552). New York: Guilford Press. Hirschi, T. (2004). Self-control and crime. In R. Baumeister & K. Vohs (Eds.), Handbook of self-regulation: Research, theory, and applications (pp. 537–552). New York: Guilford Press.
Zurück zum Zitat Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.CrossRef Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.CrossRef
Zurück zum Zitat Holt, T. J., & Turner, M. G. (2012). Examining risks and protective factors of on line identity theft. Deviant Behavior, 33, 308–323.CrossRef Holt, T. J., & Turner, M. G. (2012). Examining risks and protective factors of on line identity theft. Deviant Behavior, 33, 308–323.CrossRef
Zurück zum Zitat Kigerl, A. C. (2009). CAN SPAM act: An empirical analysis. International Journal of Cyber Criminology, 3(2), 566–589. Kigerl, A. C. (2009). CAN SPAM act: An empirical analysis. International Journal of Cyber Criminology, 3(2), 566–589.
Zurück zum Zitat Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073–1137.CrossRef Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073–1137.CrossRef
Zurück zum Zitat Kranenbarg, M. W., Holt, T. J., & van Gelder, J. (2017). Offending and victimization in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only, and the victimization-offending overlap. Deviant Behavior, 1–16. https://doi.org/10.1080/01639625.2017.1411030. Kranenbarg, M. W., Holt, T. J., & van Gelder, J. (2017). Offending and victimization in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only, and the victimization-offending overlap. Deviant Behavior, 1–16. https://​doi.​org/​10.​1080/​01639625.​2017.​1411030.
Zurück zum Zitat Lowry, P. B., Zhang, J., Wang, C., & Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online distribution and deindividuation effects with the social structure and social learning model. Information Systems Research, 27(4), 962–986.CrossRef Lowry, P. B., Zhang, J., Wang, C., & Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online distribution and deindividuation effects with the social structure and social learning model. Information Systems Research, 27(4), 962–986.CrossRef
Zurück zum Zitat McQuade, S. C. (2006). Understanding and managing cybercrime. Upper Saddle River: Pearson Education. McQuade, S. C. (2006). Understanding and managing cybercrime. Upper Saddle River: Pearson Education.
Zurück zum Zitat Moore, R., & McMullan, E. C. (2009). Neutralizations and rationalizations of digital piracy: A qualitative analysis of university students. International Journal of Cyber Criminology, 3(1), 441–451 Retrieved from https://www.researchgate.net/publication/229020027_Neutralizations_and_rationalizations_of_digital_piracy_A_qualitative_analysis_ of_university_students. Moore, R., & McMullan, E. C. (2009). Neutralizations and rationalizations of digital piracy: A qualitative analysis of university students. International Journal of Cyber Criminology, 3(1), 441–451 Retrieved from https://​www.​researchgate.​net/​publication/​229020027_​Neutralizations_​and_​rationalizations​_​of_​digital_​piracy_​A_​qualitative_​analysis_​ of_university_students.
Zurück zum Zitat Morris, R. G. (2010). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt & B. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 1–17). New York: Information Science Reference. Morris, R. G. (2010). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt & B. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 1–17). New York: Information Science Reference.
Zurück zum Zitat Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773–793. Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773–793.
Zurück zum Zitat O’Neill, M. E. (2000). Old crimes in new bottles: Sanctioning cybercrime. George Mason Law Review, 9, 237. O’Neill, M. E. (2000). Old crimes in new bottles: Sanctioning cybercrime. George Mason Law Review, 9, 237.
Zurück zum Zitat Patchin, J. W., & Hinduja, S. (2011). Traditional and nontraditional bullying among youth: A test of general strain theory. Youth Society, 43, 727–751.CrossRef Patchin, J. W., & Hinduja, S. (2011). Traditional and nontraditional bullying among youth: A test of general strain theory. Youth Society, 43, 727–751.CrossRef
Zurück zum Zitat Pratt, T. C., Cullen, F. T., Blevins, K. R., Daigle, L. E., & Madensen, T. D. (2008). The empirical status of deterrence theory: A meta-analysis. In F. T. Cullen, J. P. Wright, & K. R. Blevins (Eds.), Taking stock: The status of criminological theory (pp. 367–396). New York: Taylor & Francis. Pratt, T. C., Cullen, F. T., Blevins, K. R., Daigle, L. E., & Madensen, T. D. (2008). The empirical status of deterrence theory: A meta-analysis. In F. T. Cullen, J. P. Wright, & K. R. Blevins (Eds.), Taking stock: The status of criminological theory (pp. 367–396). New York: Taylor & Francis.
Zurück zum Zitat Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296.CrossRef Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296.CrossRef
Zurück zum Zitat Roberts, J. V., & Stalans, L. J. (1997). Public opinion, crime, and criminal justice. Boulder: Westview Press. Roberts, J. V., & Stalans, L. J. (1997). Public opinion, crime, and criminal justice. Boulder: Westview Press.
Zurück zum Zitat Seto, M. C. (2013). Internet sex offenders. Washington, DC: American Psychological Association.CrossRef Seto, M. C. (2013). Internet sex offenders. Washington, DC: American Psychological Association.CrossRef
Zurück zum Zitat Skinner, B. F. (1938). The behavior of organisms: An experimental analysis. Oxford: Appleton-Century. Skinner, B. F. (1938). The behavior of organisms: An experimental analysis. Oxford: Appleton-Century.
Zurück zum Zitat Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518.CrossRef Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518.CrossRef
Zurück zum Zitat Stalans, L. J., & Finn, M. A. (2016c). Introduction to special issue: How the internet facilitates deviance. Victims and Offenders, 11(4), 578–599.CrossRef Stalans, L. J., & Finn, M. A. (2016c). Introduction to special issue: How the internet facilitates deviance. Victims and Offenders, 11(4), 578–599.CrossRef
Zurück zum Zitat Stewart, E. A., & Simons, R. L. (2010). Race, code of the street, and violent delinquency: A multilevel investigation of neighborhood street culture and individual norms of violence. Criminology, 48(2), 569–605.CrossRef Stewart, E. A., & Simons, R. L. (2010). Race, code of the street, and violent delinquency: A multilevel investigation of neighborhood street culture and individual norms of violence. Criminology, 48(2), 569–605.CrossRef
Zurück zum Zitat Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664–670.CrossRef Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664–670.CrossRef
Zurück zum Zitat Wall, D. S. (1998). Catching cybercriminals: Policing the Internet. International Review of Law, Computers & Technology, 12(2), 201–218.CrossRef Wall, D. S. (1998). Catching cybercriminals: Policing the Internet. International Review of Law, Computers & Technology, 12(2), 201–218.CrossRef
Zurück zum Zitat Wilson, T., Maimon, D., Sobesto, B., & Cukier, M. (2015). The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace. The Journal of Research in Crime and Delinquency, 52(6), 829–855. https://doi.org/10.1177/0022427815587761.CrossRef Wilson, T., Maimon, D., Sobesto, B., & Cukier, M. (2015). The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace. The Journal of Research in Crime and Delinquency, 52(6), 829–855. https://​doi.​org/​10.​1177/​0022427815587761​.CrossRef
Zurück zum Zitat Wong-Lo, M., & Bullock, L. M. (2014). Digital metamorphosis: Examination of the bystander culture in cyberbullying. Aggression and Violent Behavior, 19, 418–422.CrossRef Wong-Lo, M., & Bullock, L. M. (2014). Digital metamorphosis: Examination of the bystander culture in cyberbullying. Aggression and Violent Behavior, 19, 418–422.CrossRef
Zurück zum Zitat Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427.CrossRef Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427.CrossRef
Metadaten
Titel
Explaining Why Cybercrime Occurs: Criminological and Psychological Theories
verfasst von
Loretta J. Stalans
Christopher M. Donner
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-97181-0_2