Skip to main content

Applying the Techniques of Neutralization to the Study of Cybercrime

  • Reference work entry
  • First Online:

Abstract

Cybercrime scholars have used a wide range of criminological theories to understand crime and deviance within digital contexts. Among the most frequently cited theoretical frameworks used in this space has been the techniques of neutralization, first proposed by Gresham Sykes and David Matza. This body of work has demonstrated the myriad ways that individual cyber-delinquents have applied the techniques of neutralization as a justification for their deviance. A thorough review of this research reveals decidedly mixed support for neutralization theory. This chapter provides an in-depth review of these studies and seeks to account for this mixed result. This is done by chronicling the methodological underpinnings of this work, and in doing so highlights the challenges facing this literature with respect to the conceptualization and measurement of Sykes and Matza’s theory in the cyber realm. This is accomplished in two parts. First, we review the body of literature that analyzes the techniques of neutralization as a single combined construct (i.e., items are combined to produce a single measure of neutralization), and flag some of the advantages, but also pitfalls of this approach. Second, we review the treatment of individual techniques of neutralization as distinct constructs within the literature (i.e., a technique is measured and analyzed separate to others) and detail some of the common methodological hurdles encountered by researchers. The chapter concludes by elaborating on persistent gaps or challenges posed in making such assessments and proposes a path forward for future cybercrime research incorporating this framework.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   649.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Akers, R. L. (2009). The social learning theory of criminal and deviant behavior. In Social learning and social structure: A general theory of crime and deviance. New Brunswick: Transaction Publishers.

    Google Scholar 

  • Brewer, R., Cale, J., Goldsmith, A., & Holt, T. (2018). Young people, the internet, and emerging pathways into criminality: A study of Australian adolescents. International Journal of Cyber Criminology, 12(1), 115–132.

    Google Scholar 

  • Brown, S. C. (2016). Where do beliefs about music piracy come from and how are they shared? International Journal of Cyber Criminology, 10(1), 21–39.

    Google Scholar 

  • Brunton-Smith, I., & McCarthy, D. J. (2016). Explaining young people’s involvement in online piracy: An empirical assessment using the offending crime and justice survey in England and Wales. Victims & Offenders, 11(4), 509–533.

    Article  Google Scholar 

  • Bryan, A. (2014). Digital piracy: Neutralising piracy on the digital waves. Plymouth Law and Criminal Justice Review, 6(1), 214–235.

    Google Scholar 

  • Burruss, G. W., Bossler, A. M., & Holt, T. J. (2012). Assessing the mediation of a fuller social learning model on low self control’s influence on software piracy. Crime & Delinquency, 59(8), 1157–1184.

    Article  Google Scholar 

  • Chua, Y. T., & Holt, T. J. (2016). A cross-national examination of the techniques of neutralization to account for hacking behaviors. Victims & Offenders, 11(4), 534–555.

    Article  Google Scholar 

  • Coleman, J. W. (1985). The criminal elite: The sociology of white collar crime. New York: St. Martin’s Press.

    Google Scholar 

  • Copes, H. (2003). Societal attachments, offending frequency, and techniques of neutralization. Deviant Behavior, 24(2), 101–127.

    Article  Google Scholar 

  • Cromwell, P., & Thurman, Q. (2003). The devil made me do it: Use of neutralizations by shoplifters. Deviant Behavior, 24(6), 535–550.

    Article  Google Scholar 

  • D’Ovidio, R., Mitman, T., El-Burkia, I. J., & Shumar, W. (2009). Adult-child sex advocacy websites as social learning environments: A content analysis. International Journal of Cyber Criminology, 3(1), 421–440.

    Google Scholar 

  • Durkin, K. F., & Bryant, C. D. (1999). Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles. Deviant Behavior, 20(2), 103–127.

    Article  Google Scholar 

  • Goldsmith, A., & Brewer, R. (2015). Digital drift and the criminal interaction order. Theoretical Criminology, 19(1), 112–130.

    Article  Google Scholar 

  • Goode, S., & Cruise, S. (2006). What motivates software crackers? Journal of Business Ethics, 65(2), 173–201.

    Article  Google Scholar 

  • Harrington, S. J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20(3), 257–278.

    Article  Google Scholar 

  • Harris, L. C., & Dumas, A. (2009). Online consumer misbehaviour: An application of neutralization theory. Marketing Theory, 9(4), 379–402.

    Article  Google Scholar 

  • Henry, S. (1990). Degrees of deviance: Student accounts of their deviant behaviour. Salem: Sheffield Publishing.

    Google Scholar 

  • Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Music piracy and neutralization: A preliminary trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, 2(2), 324–336.

    Google Scholar 

  • Hinduja, S. (2007). Neutralization theory and online software piracy. Ethics and Information Technology, 9(1), 187–204.

    Article  Google Scholar 

  • Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates. Deviant Behavior, 31(7), 625–654.

    Article  Google Scholar 

  • Holt, T. J., & Morris, R. G. (2009). An exploration of the relationship between MP3 player ownership and digital piracy. Criminal Justice Studies, 22(4), 381–392.

    Article  Google Scholar 

  • Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyber-deviance: Examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33(2), 31–61.

    Article  Google Scholar 

  • Holt, T. J., Brewer, R., & Goldsmith, A. (2019). Digital drift and the “sense of injustice”: Counter-productive policing of youth cybercrime. Deviant Behavior, 40(9), 1144–1156.

    Google Scholar 

  • Hutchings, A. (2013). Hacking and fraud: Qualitative analysis of online offending and victimization. In Global criminology: Crime and victimization in a globalized era (pp. 93–114). Boca Raton: CRC Press.

    Chapter  Google Scholar 

  • Hutchings, A., & Clayton, R. (2016). Exploring the provision of online Booter services. Deviant Behavior, 37(10), 1163–1178.

    Article  Google Scholar 

  • Hwang, J., Lee, H., Kim, K., Zo, H., & Ciganek, A. P. (2016). Cyber neutralisation and flaming. Behaviour & Information Technology, 35(3), 210–224.

    Article  Google Scholar 

  • Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, 29(4), 334–366.

    Article  Google Scholar 

  • Kettleborough, D. G., & Merdian, H. L. (2017). Gateway to offending behaviour: Permission-giving thoughts of online users of child sexual exploitation material. Journal of Sexual Aggression, 23(1), 19–32.

    Article  Google Scholar 

  • Klockars, C. B. (1974). The professional fence. New York: Free Press.

    Google Scholar 

  • Kos Koklic, M., Kukar-Kinney, M., & Vida, I. (2016). Three-level mechanism of consumer digital piracy: Development and cross-cultural validation. Journal of Business Ethics, 134(1), 15–27.

    Article  Google Scholar 

  • Lowry, P. B., Zhang, J., Wang, C., & Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model. Information Systems Research, 27(4), 962–986.

    Article  Google Scholar 

  • MacNeill, K. (2017). Torrenting game of thrones: So wrong and yet so right. Convergence, 23(5), 545–562.

    Article  Google Scholar 

  • Maratea, R. J. (2011). Screwing the pooch: Legitimizing accounts in a zoophilia on-line community. Deviant Behavior, 32(10), 918–943.

    Article  Google Scholar 

  • Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the intersection of self-control, peer association and neutralization in explaining digital piracy. Western Criminology Review, 12(3), 60–74.

    Google Scholar 

  • Maruna, S. (2001). Making good: How ex-convicts reform and rebuild their lives. Retrieved from https://www.apa.org/pubs/books/431645A

  • Maruna, S. (2004). Desistance from crime and explanatory style: A new direction in the psychology of reform. Journal of Contemporary Criminal Justice, 20(2), 184–200.

    Article  Google Scholar 

  • Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research? Crime and Justice, 32, 221–320.

    Article  Google Scholar 

  • Matza, D. (1964). Delinquency and drift. New York: Wiley.

    Google Scholar 

  • Minor, W. W. (1981). Techniques of neutralization: A reconceptualization and empirical examination. Journal of Research in Crime and Delinquency, 18(2), 295–318.

    Article  Google Scholar 

  • Moore, R., & McMullan, E. C. (2009). Neutralizations and rationalizations of digital piracy: A qualitative analysis of university students. International Journal of Cyber Criminology, 3(1), 441–451.

    Google Scholar 

  • Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 1–17). Hershey: Information Science Reference.

    Google Scholar 

  • Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173–195.

    Article  Google Scholar 

  • O’Halloran, E., & Quayle, E. (2010). A content analysis of a “boy love” support forum: Revisiting Durkin and Bryant. Journal of Sexual Aggression, 16(1), 71–85.

    Article  Google Scholar 

  • Renfrow, D. G., & Rollo, E. A. (2014). Sexting on campus: Minimizing perceived risks and neutralizing behaviors. Deviant Behavior, 35(11), 903–920.

    Article  Google Scholar 

  • Siponen, M., Vance, A., & Willison, R. (2012). New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management, 49(7), 334–341.

    Article  Google Scholar 

  • Smallridge, J. L., & Roberts, J. R. (2013). Crime specific neutralizations: An empirical examination of four types of digital piracy. International Journal of Cyber Criminology, 7(2), 125–140.

    Google Scholar 

  • Steinmetz, K. F., & Tunnell, K. D. (2013). Under the pixelated Jolly Roger: A study of on-line pirates. Deviant Behavior, 34(1), 53–67.

    Article  Google Scholar 

  • Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670.

    Article  Google Scholar 

  • Thongmak, M. (2017). Ethics, neutralization and digital piracy. International Journal of Electronic Commerce Studies, 8(1), 1–24.

    Google Scholar 

  • Ulsperger, J. S., Hodges, S. H., & Paul, J. (2010). Pirates on the plank: Neutralization theory and the criminal downloading of music among generation Y in the era of late modernity. Journal of Criminal Justice and Popular Culture, 17(1), 124–151.

    Google Scholar 

  • Vandiver, D. M., Bowman, S., & Vega, A. (2012). Music piracy among college students: An examination of low self-control, techniques of neutralization, and rational choice. The Southwest Journal of Criminal Justice, 8(2), 76–95.

    Google Scholar 

  • Vida, I., Kos Koklič, M., Kukar-Kinney, M., & Penz, E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences. Journal of Research in Interactive Marketing, 6(4), 298–313.

    Article  Google Scholar 

  • Vysotsky, S., & McCarthy, A. L. (2017). Normalizing cyberracism: A neutralization theory analysis. Journal of Crime and Justice, 40(4), 446–461.

    Article  Google Scholar 

  • Yu, S. (2012). College students’ justification for digital piracy: A mixed methods study. Journal of Mixed Methods Research, 6(4), 364–378.

    Article  Google Scholar 

  • Yu, S. (2013). Digital piracy justification: Asian students versus American students. International Criminal Justice Review, 23(2), 185–196.

    Article  Google Scholar 

  • Zhang, S., & Leidner, D. (2018). From improper to acceptable: How perpetrators neutralize workplace bullying behaviors in the cyber world. Information & Management, 55(7), 850–865.

    Article  Google Scholar 

  • Zhang, S., Yu, L., Wakefield, R. L., & Leidner, D. (2016). Friend or foe: Cyberbullying in social network sites. The Database for Advances in Information Systems, 47(1), 51–71.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Russell Brewer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Brewer, R., Fox, S., Miller, C. (2020). Applying the Techniques of Neutralization to the Study of Cybercrime. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_22

Download citation

Publish with us

Policies and ethics