Young People, the Internet, and Emerging Pathways into Criminality: A Study of Australian Adolescents
- 1. Flinders University, Australia
- 2. University of New South Wales, Australia
- 3. Michigan State University, United States of America
Description
This article explores the ways in which young people experience the Internet as a potentially criminogenic medium. To date, little research has explored the possible links between the mundane, ubiquitous use of digital communication technologies by young people and involvement in delinquency in online contexts. The current empirical study seeks to address this gap, by investigating how a young person’s digital pursuits (i.e. relative access, technical competencies, and exposure to pertinent technologies, Internet sites and services), as well as various developmental considerations, are linked to delinquent online encounters – be they tentative engagements of a naïve or non-criminal kind or deliberate, more serious forms of technologically-mediated criminality. Drawing on data collected from a cohort of adolescents enrolled at a secondary school in a large Australian city, the results establish significant relationships between many of these concepts, but also flag that online delinquent encounters amongst young adolescents are unlikely to correspond with serious criminal involvements, with such activities being episodic and for the most part trifling. The results further highlight the need for a better understanding of the role of digital communication technologies on pathways into cybercrime.
Files
BreweretalVol12Issue1IJCC2018.pdf
Files
(822.0 kB)
Name | Size | Download all |
---|---|---|
md5:d0bb18b2db982c7ba0cd6f4cc6d52381
|
822.0 kB | Preview Download |
Additional details
Related works
- Is identical to
- http://cybercrimejournal.com/BreweretalVol12Issue1IJCC2018.pdf (URL)
References
- Australian Bureau of Statistics. (2011). Census of population and housing: Socio-economic indexes for areas (SEIFA), Australia, 2011, (Catalogue No. 2033.0.55.001). Retrieved from http://www.abs.gov.au/ausstats/abs@.nsf/mf/2033.0.55.001. Becker, H. (1960). Notes on the concept of commitment. The American Journal of Sociology, 66(1), 32-40. Bennett, S., & Maton, K. (2010). Beyond the digital nativesdebate: Towards a more nuanced understanding of students' technology experiences. Journal of Computer-Assisted Learning, 26(5), 321-331. Bossewitch, J., & Sinnreich, A. (2012). The end of forgetting: Strategic agency beyond the panopticon. New Media & Society, 15(2), 224-242. Boyd, D. (2014). It's complicated: The social lives of networked teens. New Haven: Yale University Press. Burnay, J., Billieux, J., Blairy, S., & Larøi, F. (2015). Which psychological factors influence Internetaddiction? Computers in Human Behavior, 43(2), 28-34. Cisco. (2015). The zettabyte era: Trends and analysis. San Jose: Cisco Systems. Cloward, R. & Ohlin, L.E. (1960). Delinquency and opportunity: A theory of delinquent gangs. New York: Free Press of Glencoe. Costello, M., Hawdon, J., Ratliff, T., & Grantham, T. (2016). Who views online extremism? Individual attributes leading to exposure. Computers in Human Behavior, 63, 311-320. Diamond, B., & Bachmann, M. (2015). Out of the beta phase: Obstacles, challenges, and promising paths in the study of cyber criminology. International Journal of Cyber Criminology, 9(1), 24-34. Erikson, E. (1968). Identity: Youth and crisis. New York: W W Norton & Company. Felson, M. (2006). Crime and nature. Los Angeles: Sage. Furman, W., & Shaffer, L. (2003). The role of romantic relationships in adolescent development. In P. Florsheim (Ed.), Adolescent romantic relations and sexual behavior: Theory, research, and practical implications (pp. 3-22). Mahwah: Lawrence Erlbaum Associates Publishers. Garland, D. (2001). The culture of control: Crime and social order in contemporary society. Chicago: University of Chicago Press. Goldsmith, A., & Brewer, R. (2015). Digital drift and the criminal interaction order. Theoretical Criminology, 19(1), 112-130. Green, L., Brady, D., Ólafsson, K., Hartley, J., & Lumby, C. (2011). Risks and safety for Australian children on the Internet. Brisbane: ARC Centre of Excellence for Creative Industries and Innovation. Havighurst, R. (1972). Developmental tasks and education. New York: Appleton & Company. Hawdon, J. (2012). Applying differential association theory to online hate groups: A theoretical statement. Research on Finnish Society, 5, 39–47. Holt, T., & Bossler, A. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20-40. Holt, T., & Bossler, A. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. New York: Routledge. Holt, T., Bossler, A., & May, D. (2011). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37(3), 378-395. Holt, T., Burruss, G., & Bossler, A. (2010). Social learning and cyber-deviance: Examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33(2), 31-61. Holt, T., & Kilger, M. (2012). Examining willingness to attack critical infrastructure online and offline. Crime & Delinquency, 58(5), 798-822. Inhelder, B., & Piaget, J. (1999). The growth of logical thinking from childhood to adolescence. London: Routledge. Kroger, J. (2003). Identity development during adolescence. In G. R. Adams & M. D. Berzonsky (Eds.), Blackwell handbook of adolescence (pp. 205-226). Malden: Blackwell. Lanier, J. (2010). You are not a gadget: A manifesto. New York: Knopf (Random House). Lenhart, A. (2015). Teens, social media &technology overview 2015. Washington: Pew Research Center. Li, C., Holt, T., Bossler, A., & May, D. (2015). Examining the mediating effects of social learning on the low self-control—cyberbullying relationship in a youth sample. Deviant Behavior, 37(2), 126-138. Marcum, C. D., Higgins, G. E., & Ricketts, M. L., (2014). Sexting behaviors among adolescents in rural North Carolina: A theoretical examination of low self-control and deviant peer association. International Journal of Cyber Criminology 8(2), 68-78. Matza, D. (1964). Delinquency and drift. New York: Wiley. McEwan, R., & Wellman, B. (2013). Relationships, community, and networked individuals. In R. Teiglund & D. Power (Eds.), The immersive Internet: Reflections on the entangling of the virtual with society, politics and the economy (pp. 168-179). Basingstoke: Palgrave MacMillan. Meyrowitz, J. (1997). Shifting worlds of strangers: Medium theory and changes in 'them' versus 'us'. Sociological Inquiry, 67(1), 59-71. Pariser, E. (2011). The filter bubble: What the Internet is hiding from you 2011. New York: Penguin Press. Passini, S. (2013). A binge-consuming culture: The effect of consumerism on social interactions in Western societies. Culture & Psychology, 19(3), 369-390. Pombeni, M., Kirchler, E., & Palmonari, A. (1990). Identification with peers as a strategy to muddle through the troubles of adolescent years. Journal of Adolescence, 13(4), 351-369. Prensky, M. (2001). Digital natives, digital immigrants part 1. On the Horizon, 9(5), 1-6. Reyns, B., Henson, B., & Fisher, B.(2011). Being pursued online: Applying cyberlifestyle -routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38(11), 1149-1169. Sheller, M. (2004). Mobile publics: Beyond the network perspective. Environment and Planning: Society and Space, 22(1), 39-52. Steinberg, L. (2008). Adolescence. New York: McGraw-Hill. Stickel, L. H. (2017). Digital natives and digital immigrants: Exploring online harassment victimization by generational age. International Journal of Cyber Criminology, 11(1), 39-62. Subrahmanyam, K., & Šmahel, D. (2011). Digital youth: The role of media in development. New York: Springer. Tanner, J. (1978). Growth at adolescence. Oxford: Blackwell. Tapscott, D. (1998). Growing up digital: The rise of the Net generation. New York: McGraw Hill. Tucker, P. (2014). The naked future: What happens in a world that anticipates your every move? New York: Current (Penguin Group). Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science Technology & Society, 28(1), 20-36. Udris, R. (2016). Cyber deviance among adolescents and the role of family, school, and neighborhood: A cross-national study. International Journal of Cyber Criminology, 10(2), 127-146. Vaidhyanathan, S. (2011). The Googlization of everything (and why we should worry). Berkeley, CA: University of California Press. van der Hof, S., & Koops, B. (2011). Adolescents and cybercrime: Navigating between freedom and control. Policy & Internet, 3(2), 1-28. Weinstein, E., & Rosen, E. (1991). The development of adolescent sexual intimacy: Implications for counseling. Adolescence, 26(102), 331-339. Wellman, B., Quan-Haase, A., Boase, J., Chen, W., Hampton, K., Diaz, I., & Kakuko, M. (2003). The social affordances of the Internet for networked individualism. Journal of Computer-Mediated Communication, 8(3). doi: 10.1111/j.1083-6101.2003.tb00216.x. Wingrove, T., Korpas, A., & Weisz, V. (2011). Why were millions of people not obeying the Law? Motivational influences on non-compliance with the Law in the case of musical piracy. Psychology, Crime, and the Law, 17(3), 261-276. Yar, M. (2005). The novelty of 'cybercrime': An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407-427.