Abstract
Although cybercrime is a new phenomenon compared to drug crime or property crime, it has existed long enough for exploration and evaluation with multiple criminological theories. This exploration and evaluation throughout the years has led to some theories gaining prominence within cybercrime research, especially applying social learning theory. The purpose of this chapter is to show the importance of social learning theory as an applicable framework for understanding the origins of cybercrime, as well as to highlight how it has affected policy and programming in the field. In order to carry out these two goals, this text consists of three sections. The first section presents the history of social learning theory. The second section presents current applications of the theory, paying special attention to its use with the investigation of predictors of cybercrime. Lastly, the third section examines the policy implications of these findings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
18 U.S. Code § 1030. Retrieved from https://www.law.cornell.edu/uscode/text/18/1030
Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47–88.
Akers, R. L. (1977). Deviant behavior: A social learning approach. Belmont: Wadsworth.
Akers, R. L. (1985). Deviant behavior: A social learning approach. Belmont: Wadsworth.
Akers, R. L. (1998). Social learning and social structure: A general theory of crime and deviance. Boston: Northeastern University Press.
Akers, R. L. (2008). Self-control, social learning, and positivistic theory of crime. In E. Goode (Ed.), Out of control: Assessing the general theory of crime (pp. 1–55). Stanford: Stanford University Press.
Akers, R. L., & Sellers, C. S. (2009). Criminological theories: Introduction, evaluation, and application. 5th ed. Los Angeles: Roxbury Publishing.
Allen, K. P. (2012). Off the radar and ubiquitous: Text messaging and its relationship to ‘drama’ and cyberbullying in an affluent, academically rigorous US high school. Journal of Youth Studies, 15(1), 99–117.
Alliance for Creativity and Entertainment. (2018). Alliance for creativity and entertainment: News. Retrieved from https://www.alliance4creativity.com/news/
Associated Press. (2014, November 4). All three Pirate Bay founders now in jail. Billboard. Retrieved from https://www.billboard.com/articles/business/6304466/pirate-bay-founders-jail-hans-fredrik-lennart-neij
Babchishin, K. M., Karl Hanson, R., & Hermann, C. A. (2011). The characteristics of online sex offenders: A meta-analysis. Sexual Abuse, 23(1), 92–123.
Bandura, A. (1964). Social learning and personality development. New York: Holt, Rinehart and Winston.
Bandura, A. (1969). Principles of behavior modification. New York: Holt, Rinehart and Winston.
Bandura, A. (1976). Social learning theory. Englewood Cliffs: Prentice-Hall.
Burgess, R., & Akers, R. (1966). A differential association-reinforcement theory of criminal behavior. Social Problems, 14(2), 128–147.
Burton, D. L., Miller, D. L., & Shill, C. T. (2002). A social learning theory comparison of the sexual victimization of adolescent sexual offenders and nonsexual offending male delinquents. Child Abuse & Neglect, 26(9), 893–907.
Cardwell, D. (2006, October 24). Mayor vows to combat video piracy. The New York Times. Retrieved from https://www.nytimes.com/2006/10/24/nyregion/mayor-vows-to-combat-video-piracy.html
Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588–608.
Compton, L., Campbell, M. A., & Mergler, A. (2014). Teacher, parent and student perceptions of the motives of cyberbullies. Social Psychology of Education, 17(3), 383–400.
Coyne, I., Farley, S., Axtell, C., Sprigg, C., Best, L., & Kwok, O. (2017). Understanding the relationship between experiencing workplace cyberbullying, employee mental strain and job satisfaction: A disempowerment approach. The International Journal of Human Resource Management, 28(7), 945–972.
di Beccaria, C. B. (1872). An essay on crimes and punishments. By the Marquis Beccaria of Milan. With a commentary by M. de Voltaire (A New Edition Corrected). Albany: W.C. Little & Co..
Electronic Frontier Foundation. (2017, February 6). It’s the end of the Copyright Alert System (as we know it). Retrieved from https://www.eff.org/deeplinks/2017/02/its-end-copyright-alert-system-we-know-it
Englander, E. (2012). Bullying and cyberbullying in teens: Clinical factors. The American Academy of Child and Adolescent Psychiatry. Retrieved from https://aacap.confex/com/aacap/2012/webprogram/Session8538.html
Englander, E., Parti, K., & McCoy, M. (2015). Evaluation of a university-based bullying and cyberbullying prevention program. Journal of Modern Education Review, 5(10), 937–950.
Felson, R. B., & Lane, K. J. (2009). Social learning, sexual and physical abuse, and adult crime. Aggressive Behavior: Official Journal of the International Society for Research on Aggression, 35(6), 489–501.
Fox, K. A., Nobles, M. R., & Fisher, B. S. (2016). A multi-theoretical framework to assess\gendered stalking victimization: The utility of self-control, social learning, and control balance theories. Justice Quarterly, 33(2), 319–347.
Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Palo Alto: Stanford University Press.
Higgins, G. E. (2006). Gender differences in software piracy: The mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management, 4(1), 1–30.
Higgins, G. E., & Makin, D. A. (2004). Does social learning theory condition the effects of low self-control on college students’ software piracy. Journal of Economic Crime Management, 2(2), 1–22.
Higgins, G. E., & Marcum, C. D. (2016). Theories of crime. New York: Willan Publishing.
Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students’ intentions to pirate movies in the United States. Social Science Computer Review, 25(3), 339–357.
Hinduja, S., & Ingram, J. R. (2008). Self-control and ethical beliefs on the social learning of intellectual property theft. Western Criminology Review, 9, 52–72.
Holt, T. J. (2005). Hacks, cracks, and crime: An examination of the subculture and social organization of computer hackers. (Unpublished doctoral dissertation). St. Louis: University of Missouri. Retrieved from https://irl.umsl.edu/dissertation/61
Holt, T. J. (2016). Crime online: Correlates, causes, and context. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context. Durham: Carolina Academic Press.
Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35, 20–40.
Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyberdeviance examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33(2), 31–61.
Juvonen, J., & Gross, E. F. (2008). Extending the school grounds? – Bullying experiences in cyberspace. Journal of School Health, 78(9), 496–505.
Kinkade, P. T., Bachmann, M., & Smith-Bachmann, B. (2016). Hacker Woodstock: Observations on an offline cyber culture at the Chaos Communication Camp 2011. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context. Durham: Carolina Academic Press.
Kowalski, R. M., Morgan, C. A., Drake-Lavelle, K., & Allison, B. (2016). Cyberbullying among college students with disabilities. Computers in Human Behavior, 57, 416–427.
Lamphere, R. D., & Pikciunas, K. T. (2016). Sexting, sextortion, and other Internet sexual offenses. In J. N. Navarro, S. L. Clevenger, & C. D. Marcum (Eds.), The intersection between intimate partner abuse, technology, and cybercrime: Examining the virtual enemy (pp. 141–165). Durham: Carolina Academic Press.
Lee, C. H., Moak, S., & Walker, J. T. (2016). Effects of self-control, social control, and social learning on sexting behavior among South Korean youths. Youth & Society, 48(2), 242–264.
Li, C., Holt, T. J., Bossler, A. M., & May, D. C. (2016). Examining the mediating effects of social learning on low self-control-cyberbullying relationship in a youth sample. Deviant Behavior, 37(2), 126–138.
Lombroso, C. (2006). Criminal man: Edition 5. In Criminal man (pp. 299–356) (Ed. & Trans. Gibson, M., & Rafter, N. H.). Durham: Duke University Press.
Marcum, C. D. (2019). Cyber crime (2nd ed.). New York: Wolters Kluwer Law & Business.
Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014a). Sexting behaviors among adolescents in rural North Carolina: A theoretical examination of low self-control and deviant peer association. International Journal of Cyber Criminology, 8(2), 68–78.
Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014b). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35(7), 581–591.
Marcum, C. D., Higgins, G. E., & Poff, B. (2016). Exploratory investigation on theoretical predictors of the electronic leash. Computers in Human Behavior, 61, 213–218.
Merton, R. (1938). Social structure and anomie. American Sociological Review, 3(5), 672–682.
Miller, B., & Morris, R. G. (2014). Virtual peer effects in social learning theory. Crime and Delinquency, 62(12), 1543–1569.
Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multi-theoretical exploration among college undergraduates. Criminal Justice Review, 34, 173–195.
Navarro, J. N., Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014). Addicted to pillaging in cyberspace: Investigating the role of internet addiction in digital piracy. Computers in Human Behavior, 37, 101–106.
Navarro, J. N., Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2016). Addicted to the thrill of the virtual hunt: Examining the effects of Internet addiction on the cyberstalking behaviors of juveniles. Deviant Behavior, 37(8), 893–903.
Nhan, J. (2016). The evolution of online piracy: Challenge and response. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context. Durham: Carolina Academic Press.
No Electronic Theft Act of 1997. H.R. 2265, 105th Cong. (1997).
Olweus, D. (1993). Bullying at School: What We Know and What We Can Do. Oxford, Cambridge: Blackwell.
Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the school yard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4, 148–169.
Pavlov, I. (1927). Conditioned reflexes. Oxford: Oxford University Press.
Shaw, C. R., & McKay, H. D. (1942). Juvenile delinquency and urban areas; a study of rates of delinquents in relation to differential characteristics of local communities in American cities. Chicago: University of Chicago Press.
Skinner, B. F. (1953). Science and human behavior. SimonandSchuster.com.
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518.
Steinmetz, K. F., & Tunnell, K. D. (2013). Under the pixelated jolly roger: A study of on-line pirates. Deviant Behavior, 34(1), 53–67.
Sutherland, E. (1939). Principles of criminology (3rd ed.). Philadelphia: Lippincott.
Sutherland, E. (1947). Principles of criminology (4th ed.). Philadelphia: Lippincott.
Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277–287.
Wolfe, S., & Higgins, G. (2009). Explaining deviant peer associations: An examination of low self-control, ethical predispositions, definitions and digital piracy. Western Criminology Review, 10(1), 43–55.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this entry
Cite this entry
Navarro, J.N., Marcum, C.D. (2020). Deviant Instruction: The Applicability of Social Learning Theory to Understanding Cybercrime. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-78440-3_18
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-78439-7
Online ISBN: 978-3-319-78440-3
eBook Packages: Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences