Skip to main content

Deviant Instruction: The Applicability of Social Learning Theory to Understanding Cybercrime

  • Reference work entry
  • First Online:
The Palgrave Handbook of International Cybercrime and Cyberdeviance

Abstract

Although cybercrime is a new phenomenon compared to drug crime or property crime, it has existed long enough for exploration and evaluation with multiple criminological theories. This exploration and evaluation throughout the years has led to some theories gaining prominence within cybercrime research, especially applying social learning theory. The purpose of this chapter is to show the importance of social learning theory as an applicable framework for understanding the origins of cybercrime, as well as to highlight how it has affected policy and programming in the field. In order to carry out these two goals, this text consists of three sections. The first section presents the history of social learning theory. The second section presents current applications of the theory, paying special attention to its use with the investigation of predictors of cybercrime. Lastly, the third section examines the policy implications of these findings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 649.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • 18 U.S. Code § 1030. Retrieved from https://www.law.cornell.edu/uscode/text/18/1030

  • Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47–88.

    Article  Google Scholar 

  • Akers, R. L. (1977). Deviant behavior: A social learning approach. Belmont: Wadsworth.

    Google Scholar 

  • Akers, R. L. (1985). Deviant behavior: A social learning approach. Belmont: Wadsworth.

    Google Scholar 

  • Akers, R. L. (1998). Social learning and social structure: A general theory of crime and deviance. Boston: Northeastern University Press.

    Google Scholar 

  • Akers, R. L. (2008). Self-control, social learning, and positivistic theory of crime. In E. Goode (Ed.), Out of control: Assessing the general theory of crime (pp. 1–55). Stanford: Stanford University Press.

    Google Scholar 

  • Akers, R. L., & Sellers, C. S. (2009). Criminological theories: Introduction, evaluation, and application. 5th ed. Los Angeles: Roxbury Publishing.

    Google Scholar 

  • Allen, K. P. (2012). Off the radar and ubiquitous: Text messaging and its relationship to ‘drama’ and cyberbullying in an affluent, academically rigorous US high school. Journal of Youth Studies, 15(1), 99–117.

    Article  Google Scholar 

  • Alliance for Creativity and Entertainment. (2018). Alliance for creativity and entertainment: News. Retrieved from https://www.alliance4creativity.com/news/

  • Associated Press. (2014, November 4). All three Pirate Bay founders now in jail. Billboard. Retrieved from https://www.billboard.com/articles/business/6304466/pirate-bay-founders-jail-hans-fredrik-lennart-neij

  • Babchishin, K. M., Karl Hanson, R., & Hermann, C. A. (2011). The characteristics of online sex offenders: A meta-analysis. Sexual Abuse, 23(1), 92–123.

    Article  Google Scholar 

  • Bandura, A. (1964). Social learning and personality development. New York: Holt, Rinehart and Winston.

    Google Scholar 

  • Bandura, A. (1969). Principles of behavior modification. New York: Holt, Rinehart and Winston.

    Google Scholar 

  • Bandura, A. (1976). Social learning theory. Englewood Cliffs: Prentice-Hall.

    Google Scholar 

  • Burgess, R., & Akers, R. (1966). A differential association-reinforcement theory of criminal behavior. Social Problems, 14(2), 128–147.

    Article  Google Scholar 

  • Burton, D. L., Miller, D. L., & Shill, C. T. (2002). A social learning theory comparison of the sexual victimization of adolescent sexual offenders and nonsexual offending male delinquents. Child Abuse & Neglect, 26(9), 893–907.

    Article  Google Scholar 

  • Cardwell, D. (2006, October 24). Mayor vows to combat video piracy. The New York Times. Retrieved from https://www.nytimes.com/2006/10/24/nyregion/mayor-vows-to-combat-video-piracy.html

  • Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588–608.

    Article  Google Scholar 

  • Compton, L., Campbell, M. A., & Mergler, A. (2014). Teacher, parent and student perceptions of the motives of cyberbullies. Social Psychology of Education, 17(3), 383–400.

    Article  Google Scholar 

  • Coyne, I., Farley, S., Axtell, C., Sprigg, C., Best, L., & Kwok, O. (2017). Understanding the relationship between experiencing workplace cyberbullying, employee mental strain and job satisfaction: A disempowerment approach. The International Journal of Human Resource Management, 28(7), 945–972.

    Article  Google Scholar 

  • di Beccaria, C. B. (1872). An essay on crimes and punishments. By the Marquis Beccaria of Milan. With a commentary by M. de Voltaire (A New Edition Corrected). Albany: W.C. Little & Co..

    Google Scholar 

  • Electronic Frontier Foundation. (2017, February 6). It’s the end of the Copyright Alert System (as we know it). Retrieved from https://www.eff.org/deeplinks/2017/02/its-end-copyright-alert-system-we-know-it

  • Englander, E. (2012). Bullying and cyberbullying in teens: Clinical factors. The American Academy of Child and Adolescent Psychiatry. Retrieved from https://aacap.confex/com/aacap/2012/webprogram/Session8538.html

  • Englander, E., Parti, K., & McCoy, M. (2015). Evaluation of a university-based bullying and cyberbullying prevention program. Journal of Modern Education Review, 5(10), 937–950.

    Article  Google Scholar 

  • Felson, R. B., & Lane, K. J. (2009). Social learning, sexual and physical abuse, and adult crime. Aggressive Behavior: Official Journal of the International Society for Research on Aggression, 35(6), 489–501.

    Article  Google Scholar 

  • Fox, K. A., Nobles, M. R., & Fisher, B. S. (2016). A multi-theoretical framework to assess\gendered stalking victimization: The utility of self-control, social learning, and control balance theories. Justice Quarterly, 33(2), 319–347.

    Article  Google Scholar 

  • Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Palo Alto: Stanford University Press.

    Google Scholar 

  • Higgins, G. E. (2006). Gender differences in software piracy: The mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management, 4(1), 1–30.

    Google Scholar 

  • Higgins, G. E., & Makin, D. A. (2004). Does social learning theory condition the effects of low self-control on college students’ software piracy. Journal of Economic Crime Management, 2(2), 1–22.

    Google Scholar 

  • Higgins, G. E., & Marcum, C. D. (2016). Theories of crime. New York: Willan Publishing.

    Google Scholar 

  • Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students’ intentions to pirate movies in the United States. Social Science Computer Review, 25(3), 339–357.

    Article  Google Scholar 

  • Hinduja, S., & Ingram, J. R. (2008). Self-control and ethical beliefs on the social learning of intellectual property theft. Western Criminology Review, 9, 52–72.

    Google Scholar 

  • Holt, T. J. (2005). Hacks, cracks, and crime: An examination of the subculture and social organization of computer hackers. (Unpublished doctoral dissertation). St. Louis: University of Missouri. Retrieved from https://irl.umsl.edu/dissertation/61

  • Holt, T. J. (2016). Crime online: Correlates, causes, and context. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context. Durham: Carolina Academic Press.

    Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35, 20–40.

    Article  Google Scholar 

  • Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyberdeviance examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33(2), 31–61.

    Article  Google Scholar 

  • Juvonen, J., & Gross, E. F. (2008). Extending the school grounds? – Bullying experiences in cyberspace. Journal of School Health, 78(9), 496–505.

    Article  Google Scholar 

  • Kinkade, P. T., Bachmann, M., & Smith-Bachmann, B. (2016). Hacker Woodstock: Observations on an offline cyber culture at the Chaos Communication Camp 2011. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context. Durham: Carolina Academic Press.

    Google Scholar 

  • Kowalski, R. M., Morgan, C. A., Drake-Lavelle, K., & Allison, B. (2016). Cyberbullying among college students with disabilities. Computers in Human Behavior, 57, 416–427.

    Article  Google Scholar 

  • Lamphere, R. D., & Pikciunas, K. T. (2016). Sexting, sextortion, and other Internet sexual offenses. In J. N. Navarro, S. L. Clevenger, & C. D. Marcum (Eds.), The intersection between intimate partner abuse, technology, and cybercrime: Examining the virtual enemy (pp. 141–165). Durham: Carolina Academic Press.

    Google Scholar 

  • Lee, C. H., Moak, S., & Walker, J. T. (2016). Effects of self-control, social control, and social learning on sexting behavior among South Korean youths. Youth & Society, 48(2), 242–264.

    Article  Google Scholar 

  • Li, C., Holt, T. J., Bossler, A. M., & May, D. C. (2016). Examining the mediating effects of social learning on low self-control-cyberbullying relationship in a youth sample. Deviant Behavior, 37(2), 126–138.

    Article  Google Scholar 

  • Lombroso, C. (2006). Criminal man: Edition 5. In Criminal man (pp. 299–356) (Ed. & Trans. Gibson, M., & Rafter, N. H.). Durham: Duke University Press.

    Google Scholar 

  • Marcum, C. D. (2019). Cyber crime (2nd ed.). New York: Wolters Kluwer Law & Business.

    Google Scholar 

  • Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014a). Sexting behaviors among adolescents in rural North Carolina: A theoretical examination of low self-control and deviant peer association. International Journal of Cyber Criminology, 8(2), 68–78.

    Google Scholar 

  • Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014b). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35(7), 581–591.

    Article  Google Scholar 

  • Marcum, C. D., Higgins, G. E., & Poff, B. (2016). Exploratory investigation on theoretical predictors of the electronic leash. Computers in Human Behavior, 61, 213–218.

    Article  Google Scholar 

  • Merton, R. (1938). Social structure and anomie. American Sociological Review, 3(5), 672–682.

    Article  Google Scholar 

  • Miller, B., & Morris, R. G. (2014). Virtual peer effects in social learning theory. Crime and Delinquency, 62(12), 1543–1569.

    Google Scholar 

  • Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multi-theoretical exploration among college undergraduates. Criminal Justice Review, 34, 173–195.

    Article  Google Scholar 

  • Navarro, J. N., Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014). Addicted to pillaging in cyberspace: Investigating the role of internet addiction in digital piracy. Computers in Human Behavior, 37, 101–106.

    Article  Google Scholar 

  • Navarro, J. N., Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2016). Addicted to the thrill of the virtual hunt: Examining the effects of Internet addiction on the cyberstalking behaviors of juveniles. Deviant Behavior, 37(8), 893–903.

    Article  Google Scholar 

  • Nhan, J. (2016). The evolution of online piracy: Challenge and response. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context. Durham: Carolina Academic Press.

    Google Scholar 

  • No Electronic Theft Act of 1997. H.R. 2265, 105th Cong. (1997).

    Google Scholar 

  • Olweus, D. (1993). Bullying at School: What We Know and What We Can Do. Oxford, Cambridge: Blackwell.

    Google Scholar 

  • Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the school yard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4, 148–169.

    Article  Google Scholar 

  • Pavlov, I. (1927). Conditioned reflexes. Oxford: Oxford University Press.

    Google Scholar 

  • Shaw, C. R., & McKay, H. D. (1942). Juvenile delinquency and urban areas; a study of rates of delinquents in relation to differential characteristics of local communities in American cities. Chicago: University of Chicago Press.

    Google Scholar 

  • Skinner, B. F. (1953). Science and human behavior. SimonandSchuster.com.

    Google Scholar 

  • Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518.

    Article  Google Scholar 

  • Steinmetz, K. F., & Tunnell, K. D. (2013). Under the pixelated jolly roger: A study of on-line pirates. Deviant Behavior, 34(1), 53–67.

    Article  Google Scholar 

  • Sutherland, E. (1939). Principles of criminology (3rd ed.). Philadelphia: Lippincott.

    Google Scholar 

  • Sutherland, E. (1947). Principles of criminology (4th ed.). Philadelphia: Lippincott.

    Google Scholar 

  • Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277–287.

    Article  Google Scholar 

  • Wolfe, S., & Higgins, G. (2009). Explaining deviant peer associations: An examination of low self-control, ethical predispositions, definitions and digital piracy. Western Criminology Review, 10(1), 43–55.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Catherine D. Marcum .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Navarro, J.N., Marcum, C.D. (2020). Deviant Instruction: The Applicability of Social Learning Theory to Understanding Cybercrime. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_18

Download citation

Publish with us

Policies and ethics