Abstract
Cybercrime scholars have used a wide range of criminological theories to understand crime and deviance within digital contexts. Among the most frequently cited theoretical frameworks used in this space has been the techniques of neutralization, first proposed by Gresham Sykes and David Matza. This body of work has demonstrated the myriad ways that individual cyber-delinquents have applied the techniques of neutralization as a justification for their deviance. A thorough review of this research reveals decidedly mixed support for neutralization theory. This chapter provides an in-depth review of these studies and seeks to account for this mixed result. This is done by chronicling the methodological underpinnings of this work, and in doing so highlights the challenges facing this literature with respect to the conceptualization and measurement of Sykes and Matza’s theory in the cyber realm. This is accomplished in two parts. First, we review the body of literature that analyzes the techniques of neutralization as a single combined construct (i.e., items are combined to produce a single measure of neutralization), and flag some of the advantages, but also pitfalls of this approach. Second, we review the treatment of individual techniques of neutralization as distinct constructs within the literature (i.e., a technique is measured and analyzed separate to others) and detail some of the common methodological hurdles encountered by researchers. The chapter concludes by elaborating on persistent gaps or challenges posed in making such assessments and proposes a path forward for future cybercrime research incorporating this framework.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Akers, R. L. (2009). The social learning theory of criminal and deviant behavior. In Social learning and social structure: A general theory of crime and deviance. New Brunswick: Transaction Publishers.
Brewer, R., Cale, J., Goldsmith, A., & Holt, T. (2018). Young people, the internet, and emerging pathways into criminality: A study of Australian adolescents. International Journal of Cyber Criminology, 12(1), 115–132.
Brown, S. C. (2016). Where do beliefs about music piracy come from and how are they shared? International Journal of Cyber Criminology, 10(1), 21–39.
Brunton-Smith, I., & McCarthy, D. J. (2016). Explaining young people’s involvement in online piracy: An empirical assessment using the offending crime and justice survey in England and Wales. Victims & Offenders, 11(4), 509–533.
Bryan, A. (2014). Digital piracy: Neutralising piracy on the digital waves. Plymouth Law and Criminal Justice Review, 6(1), 214–235.
Burruss, G. W., Bossler, A. M., & Holt, T. J. (2012). Assessing the mediation of a fuller social learning model on low self control’s influence on software piracy. Crime & Delinquency, 59(8), 1157–1184.
Chua, Y. T., & Holt, T. J. (2016). A cross-national examination of the techniques of neutralization to account for hacking behaviors. Victims & Offenders, 11(4), 534–555.
Coleman, J. W. (1985). The criminal elite: The sociology of white collar crime. New York: St. Martin’s Press.
Copes, H. (2003). Societal attachments, offending frequency, and techniques of neutralization. Deviant Behavior, 24(2), 101–127.
Cromwell, P., & Thurman, Q. (2003). The devil made me do it: Use of neutralizations by shoplifters. Deviant Behavior, 24(6), 535–550.
D’Ovidio, R., Mitman, T., El-Burkia, I. J., & Shumar, W. (2009). Adult-child sex advocacy websites as social learning environments: A content analysis. International Journal of Cyber Criminology, 3(1), 421–440.
Durkin, K. F., & Bryant, C. D. (1999). Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles. Deviant Behavior, 20(2), 103–127.
Goldsmith, A., & Brewer, R. (2015). Digital drift and the criminal interaction order. Theoretical Criminology, 19(1), 112–130.
Goode, S., & Cruise, S. (2006). What motivates software crackers? Journal of Business Ethics, 65(2), 173–201.
Harrington, S. J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20(3), 257–278.
Harris, L. C., & Dumas, A. (2009). Online consumer misbehaviour: An application of neutralization theory. Marketing Theory, 9(4), 379–402.
Henry, S. (1990). Degrees of deviance: Student accounts of their deviant behaviour. Salem: Sheffield Publishing.
Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Music piracy and neutralization: A preliminary trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, 2(2), 324–336.
Hinduja, S. (2007). Neutralization theory and online software piracy. Ethics and Information Technology, 9(1), 187–204.
Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates. Deviant Behavior, 31(7), 625–654.
Holt, T. J., & Morris, R. G. (2009). An exploration of the relationship between MP3 player ownership and digital piracy. Criminal Justice Studies, 22(4), 381–392.
Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyber-deviance: Examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33(2), 31–61.
Holt, T. J., Brewer, R., & Goldsmith, A. (2019). Digital drift and the “sense of injustice”: Counter-productive policing of youth cybercrime. Deviant Behavior, 40(9), 1144–1156.
Hutchings, A. (2013). Hacking and fraud: Qualitative analysis of online offending and victimization. In Global criminology: Crime and victimization in a globalized era (pp. 93–114). Boca Raton: CRC Press.
Hutchings, A., & Clayton, R. (2016). Exploring the provision of online Booter services. Deviant Behavior, 37(10), 1163–1178.
Hwang, J., Lee, H., Kim, K., Zo, H., & Ciganek, A. P. (2016). Cyber neutralisation and flaming. Behaviour & Information Technology, 35(3), 210–224.
Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, 29(4), 334–366.
Kettleborough, D. G., & Merdian, H. L. (2017). Gateway to offending behaviour: Permission-giving thoughts of online users of child sexual exploitation material. Journal of Sexual Aggression, 23(1), 19–32.
Klockars, C. B. (1974). The professional fence. New York: Free Press.
Kos Koklic, M., Kukar-Kinney, M., & Vida, I. (2016). Three-level mechanism of consumer digital piracy: Development and cross-cultural validation. Journal of Business Ethics, 134(1), 15–27.
Lowry, P. B., Zhang, J., Wang, C., & Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model. Information Systems Research, 27(4), 962–986.
MacNeill, K. (2017). Torrenting game of thrones: So wrong and yet so right. Convergence, 23(5), 545–562.
Maratea, R. J. (2011). Screwing the pooch: Legitimizing accounts in a zoophilia on-line community. Deviant Behavior, 32(10), 918–943.
Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the intersection of self-control, peer association and neutralization in explaining digital piracy. Western Criminology Review, 12(3), 60–74.
Maruna, S. (2001). Making good: How ex-convicts reform and rebuild their lives. Retrieved from https://www.apa.org/pubs/books/431645A
Maruna, S. (2004). Desistance from crime and explanatory style: A new direction in the psychology of reform. Journal of Contemporary Criminal Justice, 20(2), 184–200.
Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research? Crime and Justice, 32, 221–320.
Matza, D. (1964). Delinquency and drift. New York: Wiley.
Minor, W. W. (1981). Techniques of neutralization: A reconceptualization and empirical examination. Journal of Research in Crime and Delinquency, 18(2), 295–318.
Moore, R., & McMullan, E. C. (2009). Neutralizations and rationalizations of digital piracy: A qualitative analysis of university students. International Journal of Cyber Criminology, 3(1), 441–451.
Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 1–17). Hershey: Information Science Reference.
Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173–195.
O’Halloran, E., & Quayle, E. (2010). A content analysis of a “boy love” support forum: Revisiting Durkin and Bryant. Journal of Sexual Aggression, 16(1), 71–85.
Renfrow, D. G., & Rollo, E. A. (2014). Sexting on campus: Minimizing perceived risks and neutralizing behaviors. Deviant Behavior, 35(11), 903–920.
Siponen, M., Vance, A., & Willison, R. (2012). New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management, 49(7), 334–341.
Smallridge, J. L., & Roberts, J. R. (2013). Crime specific neutralizations: An empirical examination of four types of digital piracy. International Journal of Cyber Criminology, 7(2), 125–140.
Steinmetz, K. F., & Tunnell, K. D. (2013). Under the pixelated Jolly Roger: A study of on-line pirates. Deviant Behavior, 34(1), 53–67.
Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670.
Thongmak, M. (2017). Ethics, neutralization and digital piracy. International Journal of Electronic Commerce Studies, 8(1), 1–24.
Ulsperger, J. S., Hodges, S. H., & Paul, J. (2010). Pirates on the plank: Neutralization theory and the criminal downloading of music among generation Y in the era of late modernity. Journal of Criminal Justice and Popular Culture, 17(1), 124–151.
Vandiver, D. M., Bowman, S., & Vega, A. (2012). Music piracy among college students: An examination of low self-control, techniques of neutralization, and rational choice. The Southwest Journal of Criminal Justice, 8(2), 76–95.
Vida, I., Kos Koklič, M., Kukar-Kinney, M., & Penz, E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences. Journal of Research in Interactive Marketing, 6(4), 298–313.
Vysotsky, S., & McCarthy, A. L. (2017). Normalizing cyberracism: A neutralization theory analysis. Journal of Crime and Justice, 40(4), 446–461.
Yu, S. (2012). College students’ justification for digital piracy: A mixed methods study. Journal of Mixed Methods Research, 6(4), 364–378.
Yu, S. (2013). Digital piracy justification: Asian students versus American students. International Criminal Justice Review, 23(2), 185–196.
Zhang, S., & Leidner, D. (2018). From improper to acceptable: How perpetrators neutralize workplace bullying behaviors in the cyber world. Information & Management, 55(7), 850–865.
Zhang, S., Yu, L., Wakefield, R. L., & Leidner, D. (2016). Friend or foe: Cyberbullying in social network sites. The Database for Advances in Information Systems, 47(1), 51–71.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this entry
Cite this entry
Brewer, R., Fox, S., Miller, C. (2020). Applying the Techniques of Neutralization to the Study of Cybercrime. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-78440-3_22
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-78439-7
Online ISBN: 978-3-319-78440-3
eBook Packages: Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences