Hacking in High School: Cybercrime Perpetration by Juveniles

The purpose of the present study is to contribute to the gap in the literature by investigating the hacking behaviors of adolescents under the age of 18 and the predictors of these behaviors. In order to better understand the predictors of hacking behaviors in young people, we will be utilizing two criminological theories: General Theory of Crime and Social Learning Theory. Using data collected from high school students in a rural county in western North Carolina, results indicated that low self-control and deviant peer association were in fact associated with hacking behaviors of juveniles.

[1]  John J. Gibbs,et al.  A Test of Gottfredson and Hirschi's General Theory Using Structural Equation Modeling , 2003 .

[2]  Robert G. Morris,et al.  Computer Hacking and the Techniques of Neutralization: An Empirical Assessment , 2011 .

[3]  Tamara D. Madensen,et al.  The Empirical Status of Social Learning Theory: A Meta‐Analysis , 2010 .

[4]  W. F. Skinner,et al.  A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .

[5]  Michael R. Gottfredson,et al.  A general theory of crime. , 1992 .

[6]  Christopher J. Schreck Criminal victimization and low self-control: An extension and test of a general theory of crime , 1999 .

[7]  Marc Rogers,et al.  Self-reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis , 2006 .

[8]  Gordon R Meyer,et al.  The Social Organization of the Computer Underground , 1989 .

[9]  T. Holt,et al.  Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .

[10]  Michael S. Lewis-Beck,et al.  Maintaining Economic Competition: The Causes and Consequences of Antitrust , 1979, The Journal of Politics.

[11]  Patrick Webb,et al.  Book Review: Digital piracy: An integrated theoretical approach , 2014 .

[12]  S. Hinduja,et al.  Neutralizing Music Piracy: An Empirical Examination , 2008 .

[13]  John D. McCluskey,et al.  A general theory of crime and computer crime: An empirical test , 2010 .

[14]  Constance L. Chapple,et al.  Self‐control, peer relations, and delinquency , 2005 .

[15]  Henry W. Altland,et al.  Regression Analysis: Statistical Modeling of a Response Variable , 1998, Technometrics.

[16]  R. Akers,et al.  Social Learning and Social Structure: A General Theory of Crime and Deviance. , 2000 .

[17]  John J. Gibbs,et al.  Parental Management and Self-Control: An Empirical Test of Gottfredson and Hirschi's General Theory , 1998 .

[18]  Matthew R. Lee,et al.  The Influence of a Serial Killer on Changes in Fear of Crime and the Use of Protective Measures: A Survey-Based Case Study of Baton Rouge , 2007 .

[19]  Orly Turgeman-Goldschmidt Meanings that Hackers Assign to their Being a Hacker , 2008 .

[20]  T. Holt,et al.  Predicting Online Harassment Victimization Among a Juvenile Population , 2012 .

[21]  Sameer Hinduja,et al.  Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft* , 2008 .

[22]  George E. Higgins,et al.  Low Self-Control and Social Learning in Understanding Students' Intentions to Pirate Movies in the United States , 2007 .

[23]  M. Krohn Social Learning Theory: , 1999 .

[24]  George W. Burruss,et al.  SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD , 2010 .

[25]  T. Holt,et al.  Techcrafters and Makecrafters: A Comparison of Two Populations of Hackers , 2008, 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing.

[26]  T. Holt subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures , 2007 .

[27]  Douglas Thomas Hacker Culture , 2002 .

[28]  Adam M. Bossler,et al.  The General Theory of Crime and Computer Hacking: Low Self-control Hackers? , 2011 .

[29]  M. DeLisi,et al.  Designed to fail: Self-control and involvement in the criminal justice system , 2001 .

[30]  Yvonne Neudorf,et al.  A General Theory Of Crime , 2016 .

[31]  Kristin L. Sainani,et al.  Logistic Regression , 2014, PM & R : the journal of injury, function, and rehabilitation.

[32]  T. Pratt,et al.  THE EMPIRICAL STATUS OF GOTTFREDSON AND HIRSCHI'S GENERAL THEORY OF CRIME: A META‐ANALYSIS , 2000 .

[33]  T. Jordan,et al.  A Sociology of Hackers , 1998 .

[34]  George E. Higgins,et al.  Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software , 2006 .

[35]  Catherine D. Marcum,et al.  Digital Piracy: An Examination of Three Measurements of Self-Control , 2008 .

[36]  George E. Higgins,et al.  Explaining Deviant Peer Associations: An Examination of Low Self-Control, Ethical Predispositions, Definitions, and Digital Piracy , 2009 .

[37]  Paul A. Taylor,et al.  Hackers: Crime in the Digital Sublime , 1999 .

[38]  Eunice Chang,et al.  Self-Control and Social Bonds: A Combined Control Perspective on Deviance , 2004 .

[39]  George E. Higgins,et al.  Criminological theory in the digital age: The case of social learning theory and digital piracy☆ , 2010 .