Skip to main content
Log in

Explaining Cyber Deviance among School-Aged Youth

  • Published:
Child Indicators Research Aims and scope Submit manuscript

Abstract

With the increasing access to and ownership of computer-mediated devices among children and youth nowadays, it is important to understand the determinants associated with their participation in deviant activities online. The current study extends prior research by utilizing a South Korean adolescent sample and multivariate analyses in order to explore the theoretical and demographic correlates of multiple types of cyber deviance – media and software piracy, computer hacking, and online harassment. Findings reveal that low self-control and deviant peer association are related to specific forms of cyber deviance. Additionally, this study illustrates that while time spent online engaging activities is associated with youth participation in deviant behaviors online, smartphone ownership did not have an effect on their deviance. Implications for research and policy are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. The socio-economic status (SES) of the districts in which schools are situated may not be reflective of the average SES in South Korea. Hence, it must be noted that the current sample may not yield a representative sample of the targeted population. Consent forms and letters describing the purpose and goals of the study were provided to participants and their parents in selected classrooms and their signatures were obtained before initiating the data collection. Prior to administering self-reported questionnaires, head teachers in each classroom were trained and educated about protecting human subjects” rights to privacy and anonymity, voluntary participation, and possibility to withdraw from the current study.

  2. Students were informed that participation in the survey was voluntary and anonymous. If the parents or students did not consent to participate in the study, those subjects were not included. Only with their full consents, the survey was administered to the students. Of the 779 students who participated in the survey, 24% (187/779) were in fifth grade, 21% (163/779) were in sixth grade, and 55% were (429/779) in ninth grade. In terms of age distribution for youth in South Korea, students in fifth grade tend to be 12 years old. Students in sixth grade tend to be 13 years old, and those in ninth grade tend to be 16 years old. The current sample is congruent with this pattern.

  3. In accordance with prior research on measurement of self-control (Grasmick et al. 1993; Tittle et al. 2003), it was reasonable to consider the measure of low self-control to be unidimensional given the sizeable difference in eigenvalues between the first (3.5) and second factor (1.3); hence, these items were collapsed into a single construct of low self-control.

  4. This scale was slightly different from the scales used for other technology measures in order to capture a wide variation of time spent using the Internet for school related activities.

  5. Prior to performing a multivariate regression analysis, multicollinearity and diagnostic tests were performed. The tolerance and variation inflation factor (VIF) diagnostics for multicollinearity were performed to examine if there are any highly intercorrelated independent variables in the regression models. Multicollinearity did not appear to bias the parameter estimates because the independent variables were not strongly correlated with each other (see Table 2). Overall, the results suggested that there is little concern regarding multicollinearity among independent variables under study.

  6. First, the Spearman”s correlation coefficient is a non-parametric measure of correlation that is especially useful when using skewed measures because they take into account the similarity of rank ordering (Hauke and Kossowski 2011). All of the dependent measures were highly skewed with excess zeros (see Table 1). Secondly, the Spearman’s Rho does not require a normal distribution and is useful for using ordinal ranked data (Faherty 2007). Because there is no strict assumption made concerning the population from which a sample is drawn, Spearman”s correlation coefficients are applicable to non-normal, skewed distribution (Doane and Seward 2011). Thus, it provided a more adequate correlational analysis for the current data. A Pearson’s correlation matrix was also conducted, but the levels of significance as well as the actual coefficients were very similar to those for the Spearman’s correlation.

References

  • Akers, R. L. (1985). Deviant behavior: a social learning approach (3rd ed.). Belmont: Wadsworth.

    Google Scholar 

  • Akers, R. L. (1998). Social learning and social structure: a general theory of crime and deviance. Boston: Northeastern University Press.

    Google Scholar 

  • Bossler, A. M., & Burruss, G. W. (2010). The general theory of crime and computer hacking: low self-control hackers? In T. J. Holt & B. Schell (Eds.), Corporate hacking and technology- driven crime: social dynamics and implications (pp. 57–81). Hershey: IGI Global.

    Google Scholar 

  • Bossler, A. M., & Holt, T. J. (2009). Online activities, guardianship, and malware infection: an examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400–420.

    Google Scholar 

  • Bossler, A. M., & Holt, T. J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38(3), 227–236.

    Article  Google Scholar 

  • Bossler, A. M., Holt, T. J., & May, D. C. (2012). Predicting online harassment victimization among a juvenile population. Youth & Society, 44(4), 500–523.

    Article  Google Scholar 

  • Business Software Alliance. (2012). Shadow market: 2011 BSA global software piracy study. .Retrieved from http://portal.bsa.org/globalpiracy2011/downloads/study_pdf/2011_BSA_Piracy_Study-Standard.pdf

  • Buzzell, B., Foss, D., & Middleton, Z. (2006). Explaining use of online pornography: a test of self- control theory and opportunities for deviance. Journal of Criminal Justice and Popular. Culture, 13, 96–116.

    Google Scholar 

  • Central Intelligence Agency. (2012). The world fact book: Korea. Washington, DC: Central Intelligence Agency Retrieved from https://www.cia.gov/library/publications/the-world-factbook/geos/ks.html.

    Google Scholar 

  • Chang, F. C., Chiu, C. H., Miao, N. F., Chen, P. H., Lee, C. M., & Chiang, J. T. (2014). Predictors of unwanted exposure to online pornography and online sexual solicitation of youth. Journal of Health Psychology, 1–12.

  • Cooper, J., & Harrison, D. M. (2001). The social organization of audio piracy on the internet. Media, Culture, & Society, 23, 71–89.

    Article  Google Scholar 

  • Doane, D. P., & Seward, L. E. (2011). Measuring skewness: a forgotten statistic. Journal of Statistics Education, 19(2), 1–18.

    Article  Google Scholar 

  • Donner, C. M., Marcum, C. D., Jennings, W. G., Higgins, G. E., & Banfield, J. (2014). Low self- control and cybercrime: exploring the utility of the general theory of crime beyond digital piracy. Computers in Human Behavior, 34, 165–172.

    Article  Google Scholar 

  • Dowell, E. B., Burgess, A. W., & Cavanaugh, D. J. (2009). Clustering of internet risk behaviors in a middle school student population. Journal of School Health, 79(11), 547–553.

    Article  Google Scholar 

  • Faherty, V. E. (2007). Compassionate statistics: applied quantitative analysis for social services. Thousand Oaks: Sage.

    Google Scholar 

  • Fleming, M. J., Greentree, S., Cocotti-Muller, D., Elias, K. A., & Morrison, S. (2006). Safety in cyberspace adolescents' safety and exposure online. Youth & Society, 38(2), 135–154.

    Article  Google Scholar 

  • Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Palo Alto: Stanford University Press.

    Google Scholar 

  • Grasmick, H. G., Tittle, C. R., Bursik, R. J., & Arneklev, B. J. (1993). Testing the core implications of Gottfredson and Hirschi’s general theory of crime. Journal of Research in Crime and Delinquency, 30, 5–29.

    Article  Google Scholar 

  • Hauke, J., & Kossowski, T. (2011). Comparison of values of Pearson's and Spearman's correlation coefficients on the same sets of data. Quaestiones geographicae, 30(2), 87–93.

    Article  Google Scholar 

  • Higgins, G. E. (2004). Can low self-control help with the understanding of the software piracy problem? Deviant Behavior, 26(1), 1–24.

    Article  Google Scholar 

  • Higgins, G. E. (2005). Can self-control theory help understand the software piracy problem. Deviant Behavior, 26, 1–24.

    Article  Google Scholar 

  • Higgins, G. E. (2006). Gender differences in software piracy: the mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management, 4(1), 1–30.

    Google Scholar 

  • Higgins, G. E. (2007). Digital piracy: an examination of low self-control and motivation using short- term longitudinal data. Cyberpsychology & Behavior, 10(4), 523–529.

    Article  Google Scholar 

  • Higgins, G. E., & Marcum, C. D. (2011). Digital piracy: an integrated theoretical approach. Carolina Academic Press.

  • Higgins, G. E., & Wilson, A. L. (2006). Low self-control, moral beliefs, and social learning theory in university students' intentions to pirate software. Security Journal, 19(2), 75–92.

    Article  Google Scholar 

  • Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies: A Critical Journal of Crime, Law, and Society, 19, 3–22.

    Article  Google Scholar 

  • Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students’ intentions to pirate movies in the United States. Social Science Computer Review, 25, 339–357.

    Article  Google Scholar 

  • Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Digital piracy: an examination of three measurements of self-control. Deviant Behavior, 29(5), 440–460.

    Article  Google Scholar 

  • Hinduja, S. (2001). Correlates of internet software piracy. Journal of Contemporary Criminal Justice, 17(4), 369–382.

    Article  Google Scholar 

  • Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5(1), 49–61.

    Article  Google Scholar 

  • Hinduja, S. (2007). Neutralization theory and online software piracy: an empirical analysis. Ethics and Information Technology, 9, 187–204.

    Article  Google Scholar 

  • Hinduja, S., & Ingram, J. (2008). Self-control and ethical beliefs on the social learning of intellectual property theft. Western Criminology Review, 9(2), 52–72.

    Google Scholar 

  • Hinduja, S., & Ingram, J. (2009). Social learning theory and music piracy: the differential role of online and offline peer influences. Criminal Justice Studies, 22(4), 405–420.

    Article  Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: an exploratory analysis of factors related to offending and victimization. Deviant behavior, 29(2), 129–156.

    Article  Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2009). Bullying beyond the schoolyard: preventing and responding to cyberbullying. Thousand Oaks: Sage Publications.

    Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2013). Social influences on cyberbullying behaviors among middle and high school students. Journal of Youth and Adolescence, 42(5), 711–722.

    Article  Google Scholar 

  • Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.

    Article  Google Scholar 

  • Holt, T. J. (2012). Exploring the intersections of technology, crime, and terror. Terrorism and Political Violence, 24(2), 337–354.

    Article  Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1–25.

    Article  Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40.

    Article  Google Scholar 

  • Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37(3), 378–395.

    Article  Google Scholar 

  • Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyber deviance: examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33(2), 31–61.

    Article  Google Scholar 

  • Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: practices and beliefs of persistent digital pirates. Deviant Behavior, 31(7), 625–654.

    Article  Google Scholar 

  • Holt, T. J., Fitzgerald, S., Bossler, A. M., Chee, G., & Ng, E. (2014). Assessing the risk factors of cyber and mobile phone bullying victimization in a nationally representative sample of Singapore youth. International Journal of Offender Therapy and Comparative Criminology, 60(5), 598–615.

    Article  Google Scholar 

  • Holt, T. J., & Morris, R. G. (2009). An exploration of the relationship between MP3 player ownership and digital piracy. Criminal Justice Studies, 22(4), 381–392.

    Article  Google Scholar 

  • Hur, M. H. (2006). Demographic, habitual, and socioeconomic determinants of internet addiction disorder: an empirical study of Korean teenagers. Cyberpsychology & Behavior, 9(5), 514–525.

    Article  Google Scholar 

  • Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: an empirical examination. Deviant Behavior, 29(4), 334–366.

    Article  Google Scholar 

  • Ito, M., Baumer, S., Bittanti, M., Boyd, D., Cody, R., Herr-Stephenson, B., Horst, H. A., Lange, P. G., Mahendran, D., Martinez, K. Z., Pascoe, C. J., Perkel, D., Robinson, L., Sims, C., & Tripp, L. (2009). Hanging out, messing around, and geeking out: kids living and learning with new media. Cambridge: MIT Press.

    Google Scholar 

  • Jaishankar, K. (2008). Space transition theory of cyber crimes. In Schmallager, F., &. Pittaro, M. (Eds.), Crimes of the internet. (pp. 283–301). Upper Saddle River: Prentice Hall.

  • Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46(4), 757–780.

    Article  Google Scholar 

  • Kim, K. H., & Yun, H. (2007). Cying for me, Cying for us: relational dialectics in a Korean social network site. Journal of Computer-Mediated Communication, 13(1), 298–318.

    Article  Google Scholar 

  • Kim, J. E., & Kim, J. (2015). Software piracy among Korean adolescents: lessons from panel data. Deviant Behavior, 36(9), 705–724.

    Article  Google Scholar 

  • Kraska, P., & Neuman, W. L. (2011). Criminal justice and criminology research methods. Boston: Prentice Hall.

    Google Scholar 

  • Lau, W. W., & Yuen, A. H. (2013). Adolescents’ risky online behaviors: the influence of gender, religion, and parenting style. Computers in Human Behavior, 29(6), 2690–2696.

    Article  Google Scholar 

  • Lee, J., & Lee, H. (2010). The computer-mediated communication network: exploring the linkage between the online community and social capital. New Media & Society, 12, 711–727.

    Article  Google Scholar 

  • Lenhart, A., Kahne, J., Middaugh, E., Macgill, A. R., Evans, C., & Vitak, J. (2008). Teens, video games, and civics: teens' gaming experiences are diverse and include significant social interaction and civic engagement. Washington, DC: Pew Internet & American Life Project.

    Google Scholar 

  • Livingstone, S., & Helsper, E. (2009). Balancing opportunities and risks in teenagers’ use of the internet: the role of online skills and internet self-efficacy. New Media & Society, 12(2), 309–329.

    Article  Google Scholar 

  • Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., & Beaton, M. (2013). Teens, social media, and privacy. In Pew Internet & American Life Project .Retrieved from www.pewinternet.org/2013/05/21/teens-social-media-and-privacy

    Google Scholar 

  • Malin, J., & Fowers, B. J. (2009). Adolescent self-control and music and movie piracy. Computers in Human Behavior, 25(3), 718–722.

    Article  Google Scholar 

  • Marcum, C. D., Higgins, E. H., & Ricketts, M. L. (2014a). Juveniles and cyber stalking in the United States: an analysis of theoretical predictors of patterns of online perpetration. International Journal of Cyber Criminology, 8(1), 47.

    Google Scholar 

  • Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014b). Hacking in high school: cybercrime perpetration by juveniles. Deviant Behavior, 35(7), 581–591.

    Article  Google Scholar 

  • Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2015). Becoming someone new: identity theft behaviors by high school students. Journal of Financial Crime, 22(3), 318–328.

    Article  Google Scholar 

  • Meldrum, R. C., & Clark, J. (2013). Adolescent virtual time spent socializing with peers, substance use, and delinquency. Crime & Delinquency, 61(8), 1104–1126.

    Article  Google Scholar 

  • Menard, S. (2002). Applied logistic regression analysis. Sage Publications: Thousand Oaks.

    Book  Google Scholar 

  • Mesch, G. S. (2009). Social bonds and internet pornographic exposure among adolescents. Journal of Adolescence, 32(3), 601–618.

    Article  Google Scholar 

  • Ministry of Gender Equality and Family Gender Equality and Family (2013). Report on prevalence and use of media among adolescents. Retrieved from http://www.mogef.go.kr/korea/view/news/ news03_01.jsp?func = view&currentPage = 2&key_type = &key = &search_start_date = &search_ end_date = &class_id = 0&idx = 693894

  • Mitchell, K. J., Finkelhor, D., Wolak, J., Ybarra, M. L., & Turner, H. (2011). Youth internet victimization in a broader victimization context. Journal of Adolescent Health, 48(2), 128–134.

    Article  Google Scholar 

  • Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: an empirical test. Journal of Criminal Justice, 38(4), 767–772.

    Article  Google Scholar 

  • Moon, B., McCluskey, J. D., McCluskey, C. P., & Lee, S. (2013). Gender, general theory of crime and computer crime: an empirical test. International Journal of Offender Therapy and Comparative Criminology, 57(4), 460–478.

    Article  Google Scholar 

  • Morris, R. G., & Blackburn, A. G. (2009). Cracking the code: an empirical exploration of social learning theory and computer crime. Journal of Crime and Justice, 32(1), 1–34.

    Article  Google Scholar 

  • Morris, R. G., & Higgins, G. E. (2008). Neutralizing potential and self-reported digital piracy: a multi-theoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173–195.

    Article  Google Scholar 

  • Morris, R. G., & Higgins, G. E. (2010). Criminological theory in the digital age: the case of social learning theory and digital piracy. Journal of Criminal Justice, 38(4), 470–480.

    Article  Google Scholar 

  • National Information Society Agency. (2011). A survey on Internet addiction in, 2010 .Retrieved from http://www.iapc.or.kr/cnt/cnt-301_V.asp?BoardCate=3&BoardType=1&idx=1499

  • National Internet Development Agency of Korea. (2008). Survey on the computer and internet usage. Seoul: Ministry of Information and Communication.

    Google Scholar 

  • Postmes, T., & Brunsting, S. (2002). Collective action in the age of the internet mass communication and online mobilization. Social Science Computer Review, 20(3), 290–301.

    Article  Google Scholar 

  • Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi's general theory of crime: a meta-analysis. Criminology, 38(3), 931–964.

    Article  Google Scholar 

  • Pyrooz, D. C., Decker, S. H., & Moule, R. K. (2015). Criminal and routine activities in online settings: gangs, offenders, and the internet. Justice Quarterly, 32(3), 471–499.

    Article  Google Scholar 

  • Reyns, B. W. (2013). Online routines and identity theft victimization further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238.

    Article  Google Scholar 

  • Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1–25.

    Article  Google Scholar 

  • Rhee, K., & Kim, W. (2004). The adoption and use of the internet in South Korea. Journal of Computer-Mediated Communication, 9, 1–21.

    Google Scholar 

  • Ricketts, M. L., Maloney, C., Marcum, C. D., & Higgins, G. E. (2015). The effect of internet related problems on the sexting behaviors of juveniles. American Journal of Criminal Justice, 40(2), 270–284.

    Article  Google Scholar 

  • Rogers, M. (2001). A social learning theory and moral disengagement analysis of criminal computer behavior: an exploratory study. University of Manitoba, Winnipeg, Manitoba, Canada: Unpublished doctoral dissertation.

    Google Scholar 

  • Rogers, M., Smoak, N., & Liu, J. (2006). Self-reported deviant computer behavior: a big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior, 27, 245–268.

    Article  Google Scholar 

  • Schell, B. H., Dodge, J. L., & Moutsatsos, S. S. (2002). The hacking of America: Who’s doing it, why, and how. Westport: Quorum Books.

    Google Scholar 

  • Sela-Shayovitz, R. (2012). Gangs and the web: gang members’ online behavior. Journal of Contemporary Criminal Justice, 28, 389–405.

    Article  Google Scholar 

  • Sims, R. R., Cheng, H. K., & Teegen, H. (1996). Toward a profile of student software piraters. Journal of Business Ethics, 15(8), 839–849.

    Article  Google Scholar 

  • Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518.

    Article  Google Scholar 

  • Subrahmanyam, K., & Smahel, D. (2010). Digital youth: the role of media in development. New York: Springer.

    Google Scholar 

  • Sullivan, C. J. (2006). Early adolescent delinquency assessing the role of childhood problems, family environment, and peer pressure. Youth Violence and Juvenile Justice, 4(4), 291–313.

    Article  Google Scholar 

  • Sykes, G., & Matza, D. (1957). Techniques of neutralization: a theory of delinquency. American Sociological Review, 22, 664–670.

    Article  Google Scholar 

  • Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2010). Digital crime and digital terrorism (2nd ed.). Upper Saddle River: Prentice Hall.

    Google Scholar 

  • Tittle, C. R., Ward, D. A., & Grasmick, H. G. (2003). Self-control and crime/deviance: cognitive vs. behavioral measures. Journal of Quantitative Criminology, 19(4), 333–365.

    Article  Google Scholar 

  • Tokunaga, R. S. (2010). Following you home from school: a critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277–287.

    Article  Google Scholar 

  • Tynes, B. M. (2007). Internet safety gone wild? Sacrificing the educational and psychosocial benefits of online social environments. Journal of Adolescent Research, 22(6), 575–584.

    Article  Google Scholar 

  • Van Wilsem, J. (2013). Hacking and harassment—do they have something in common? Comparing risk factors for online victimization. Journal of Contemporary Criminal Justice, 29(4), 437–453.

    Article  Google Scholar 

  • Vazsonyi, A. T., Machackova, H., Sevcikova, A., Smahel, D., & Cerna, A. (2012). Cyberbullying in context: direct and indirect effects by low self-control across 25 European countries. European Journal of Developmental Psychology, 9(2), 210–227.

    Article  Google Scholar 

  • Wall, D. S. (2007). Cybercrime: the transformation of crime in the information age. Cambridge: Polity Press.

    Google Scholar 

  • Wang, J., Iannotti, R. J., & Nansel, T. R. (2009). School bullying among adolescents in the United States: physical, verbal, relational, and cyber. Journal of Adolescent Health, 45(4), 368–375.

    Article  Google Scholar 

  • Warr, M. (2002). Companions in crime: the social aspects of criminal conduct. Cambridge University Press.

  • Weerman, F. M., Bernasco, W., Bruinsma, G. J., & Pauwels, L. J. (2013). When is spending time with peers related to delinquency? The importance of where, what, and with whom. Crime & Delinquency, 61(10), 1386–1413.

    Article  Google Scholar 

  • Whang, L. S. M., Lee, S., & Chang, G. (2003). Internet over-users' psychological profiles: a behavior sampling analysis on internet addiction. Cyberpsychology & Behavior, 6(2), 143–150.

    Article  Google Scholar 

  • Wolak, J., Mitchell, K. J., & Finkelhor, D. (2006). Online victimization of youth: five years later. Durham: National Center for Missing & Exploited Children.

    Google Scholar 

  • Wolak, J., Mitchell, K. J., & Finkelhor, D. (2007). Unwanted and wanted exposure to online pornography in a national sample of youth internet users. Pediatrics, 119(2), 247–257.

    Article  Google Scholar 

  • Yar, M. (2005). The novelty of ‘cybercrime’ an assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427.

    Article  Google Scholar 

  • Yar, M. (2013). Cybercrime and society (2nd ed.). London: Sage.

    Google Scholar 

  • Yen, J. Y., Ko, C. H., Yen, C. F., Wu, H. Y., & Yang, M. J. (2007). The comorbid psychiatric symptoms of internet addiction: attention deficit and hyperactivity disorder (ADHD), depression, social phobia, and hostility. Journal of Adolescent Health, 41(1), 93–98.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Byung H. Lee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, B.H. Explaining Cyber Deviance among School-Aged Youth. Child Ind Res 11, 563–584 (2018). https://doi.org/10.1007/s12187-017-9450-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12187-017-9450-2

Keywords

Navigation