Abstract
With the increasing access to and ownership of computer-mediated devices among children and youth nowadays, it is important to understand the determinants associated with their participation in deviant activities online. The current study extends prior research by utilizing a South Korean adolescent sample and multivariate analyses in order to explore the theoretical and demographic correlates of multiple types of cyber deviance – media and software piracy, computer hacking, and online harassment. Findings reveal that low self-control and deviant peer association are related to specific forms of cyber deviance. Additionally, this study illustrates that while time spent online engaging activities is associated with youth participation in deviant behaviors online, smartphone ownership did not have an effect on their deviance. Implications for research and policy are discussed.
Similar content being viewed by others
Notes
The socio-economic status (SES) of the districts in which schools are situated may not be reflective of the average SES in South Korea. Hence, it must be noted that the current sample may not yield a representative sample of the targeted population. Consent forms and letters describing the purpose and goals of the study were provided to participants and their parents in selected classrooms and their signatures were obtained before initiating the data collection. Prior to administering self-reported questionnaires, head teachers in each classroom were trained and educated about protecting human subjects” rights to privacy and anonymity, voluntary participation, and possibility to withdraw from the current study.
Students were informed that participation in the survey was voluntary and anonymous. If the parents or students did not consent to participate in the study, those subjects were not included. Only with their full consents, the survey was administered to the students. Of the 779 students who participated in the survey, 24% (187/779) were in fifth grade, 21% (163/779) were in sixth grade, and 55% were (429/779) in ninth grade. In terms of age distribution for youth in South Korea, students in fifth grade tend to be 12 years old. Students in sixth grade tend to be 13 years old, and those in ninth grade tend to be 16 years old. The current sample is congruent with this pattern.
In accordance with prior research on measurement of self-control (Grasmick et al. 1993; Tittle et al. 2003), it was reasonable to consider the measure of low self-control to be unidimensional given the sizeable difference in eigenvalues between the first (3.5) and second factor (1.3); hence, these items were collapsed into a single construct of low self-control.
This scale was slightly different from the scales used for other technology measures in order to capture a wide variation of time spent using the Internet for school related activities.
Prior to performing a multivariate regression analysis, multicollinearity and diagnostic tests were performed. The tolerance and variation inflation factor (VIF) diagnostics for multicollinearity were performed to examine if there are any highly intercorrelated independent variables in the regression models. Multicollinearity did not appear to bias the parameter estimates because the independent variables were not strongly correlated with each other (see Table 2). Overall, the results suggested that there is little concern regarding multicollinearity among independent variables under study.
First, the Spearman”s correlation coefficient is a non-parametric measure of correlation that is especially useful when using skewed measures because they take into account the similarity of rank ordering (Hauke and Kossowski 2011). All of the dependent measures were highly skewed with excess zeros (see Table 1). Secondly, the Spearman’s Rho does not require a normal distribution and is useful for using ordinal ranked data (Faherty 2007). Because there is no strict assumption made concerning the population from which a sample is drawn, Spearman”s correlation coefficients are applicable to non-normal, skewed distribution (Doane and Seward 2011). Thus, it provided a more adequate correlational analysis for the current data. A Pearson’s correlation matrix was also conducted, but the levels of significance as well as the actual coefficients were very similar to those for the Spearman’s correlation.
References
Akers, R. L. (1985). Deviant behavior: a social learning approach (3rd ed.). Belmont: Wadsworth.
Akers, R. L. (1998). Social learning and social structure: a general theory of crime and deviance. Boston: Northeastern University Press.
Bossler, A. M., & Burruss, G. W. (2010). The general theory of crime and computer hacking: low self-control hackers? In T. J. Holt & B. Schell (Eds.), Corporate hacking and technology- driven crime: social dynamics and implications (pp. 57–81). Hershey: IGI Global.
Bossler, A. M., & Holt, T. J. (2009). Online activities, guardianship, and malware infection: an examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400–420.
Bossler, A. M., & Holt, T. J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38(3), 227–236.
Bossler, A. M., Holt, T. J., & May, D. C. (2012). Predicting online harassment victimization among a juvenile population. Youth & Society, 44(4), 500–523.
Business Software Alliance. (2012). Shadow market: 2011 BSA global software piracy study. .Retrieved from http://portal.bsa.org/globalpiracy2011/downloads/study_pdf/2011_BSA_Piracy_Study-Standard.pdf
Buzzell, B., Foss, D., & Middleton, Z. (2006). Explaining use of online pornography: a test of self- control theory and opportunities for deviance. Journal of Criminal Justice and Popular. Culture, 13, 96–116.
Central Intelligence Agency. (2012). The world fact book: Korea. Washington, DC: Central Intelligence Agency Retrieved from https://www.cia.gov/library/publications/the-world-factbook/geos/ks.html.
Chang, F. C., Chiu, C. H., Miao, N. F., Chen, P. H., Lee, C. M., & Chiang, J. T. (2014). Predictors of unwanted exposure to online pornography and online sexual solicitation of youth. Journal of Health Psychology, 1–12.
Cooper, J., & Harrison, D. M. (2001). The social organization of audio piracy on the internet. Media, Culture, & Society, 23, 71–89.
Doane, D. P., & Seward, L. E. (2011). Measuring skewness: a forgotten statistic. Journal of Statistics Education, 19(2), 1–18.
Donner, C. M., Marcum, C. D., Jennings, W. G., Higgins, G. E., & Banfield, J. (2014). Low self- control and cybercrime: exploring the utility of the general theory of crime beyond digital piracy. Computers in Human Behavior, 34, 165–172.
Dowell, E. B., Burgess, A. W., & Cavanaugh, D. J. (2009). Clustering of internet risk behaviors in a middle school student population. Journal of School Health, 79(11), 547–553.
Faherty, V. E. (2007). Compassionate statistics: applied quantitative analysis for social services. Thousand Oaks: Sage.
Fleming, M. J., Greentree, S., Cocotti-Muller, D., Elias, K. A., & Morrison, S. (2006). Safety in cyberspace adolescents' safety and exposure online. Youth & Society, 38(2), 135–154.
Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Palo Alto: Stanford University Press.
Grasmick, H. G., Tittle, C. R., Bursik, R. J., & Arneklev, B. J. (1993). Testing the core implications of Gottfredson and Hirschi’s general theory of crime. Journal of Research in Crime and Delinquency, 30, 5–29.
Hauke, J., & Kossowski, T. (2011). Comparison of values of Pearson's and Spearman's correlation coefficients on the same sets of data. Quaestiones geographicae, 30(2), 87–93.
Higgins, G. E. (2004). Can low self-control help with the understanding of the software piracy problem? Deviant Behavior, 26(1), 1–24.
Higgins, G. E. (2005). Can self-control theory help understand the software piracy problem. Deviant Behavior, 26, 1–24.
Higgins, G. E. (2006). Gender differences in software piracy: the mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management, 4(1), 1–30.
Higgins, G. E. (2007). Digital piracy: an examination of low self-control and motivation using short- term longitudinal data. Cyberpsychology & Behavior, 10(4), 523–529.
Higgins, G. E., & Marcum, C. D. (2011). Digital piracy: an integrated theoretical approach. Carolina Academic Press.
Higgins, G. E., & Wilson, A. L. (2006). Low self-control, moral beliefs, and social learning theory in university students' intentions to pirate software. Security Journal, 19(2), 75–92.
Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies: A Critical Journal of Crime, Law, and Society, 19, 3–22.
Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students’ intentions to pirate movies in the United States. Social Science Computer Review, 25, 339–357.
Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Digital piracy: an examination of three measurements of self-control. Deviant Behavior, 29(5), 440–460.
Hinduja, S. (2001). Correlates of internet software piracy. Journal of Contemporary Criminal Justice, 17(4), 369–382.
Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5(1), 49–61.
Hinduja, S. (2007). Neutralization theory and online software piracy: an empirical analysis. Ethics and Information Technology, 9, 187–204.
Hinduja, S., & Ingram, J. (2008). Self-control and ethical beliefs on the social learning of intellectual property theft. Western Criminology Review, 9(2), 52–72.
Hinduja, S., & Ingram, J. (2009). Social learning theory and music piracy: the differential role of online and offline peer influences. Criminal Justice Studies, 22(4), 405–420.
Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: an exploratory analysis of factors related to offending and victimization. Deviant behavior, 29(2), 129–156.
Hinduja, S., & Patchin, J. W. (2009). Bullying beyond the schoolyard: preventing and responding to cyberbullying. Thousand Oaks: Sage Publications.
Hinduja, S., & Patchin, J. W. (2013). Social influences on cyberbullying behaviors among middle and high school students. Journal of Youth and Adolescence, 42(5), 711–722.
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.
Holt, T. J. (2012). Exploring the intersections of technology, crime, and terror. Terrorism and Political Violence, 24(2), 337–354.
Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1–25.
Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40.
Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37(3), 378–395.
Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyber deviance: examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33(2), 31–61.
Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: practices and beliefs of persistent digital pirates. Deviant Behavior, 31(7), 625–654.
Holt, T. J., Fitzgerald, S., Bossler, A. M., Chee, G., & Ng, E. (2014). Assessing the risk factors of cyber and mobile phone bullying victimization in a nationally representative sample of Singapore youth. International Journal of Offender Therapy and Comparative Criminology, 60(5), 598–615.
Holt, T. J., & Morris, R. G. (2009). An exploration of the relationship between MP3 player ownership and digital piracy. Criminal Justice Studies, 22(4), 381–392.
Hur, M. H. (2006). Demographic, habitual, and socioeconomic determinants of internet addiction disorder: an empirical study of Korean teenagers. Cyberpsychology & Behavior, 9(5), 514–525.
Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: an empirical examination. Deviant Behavior, 29(4), 334–366.
Ito, M., Baumer, S., Bittanti, M., Boyd, D., Cody, R., Herr-Stephenson, B., Horst, H. A., Lange, P. G., Mahendran, D., Martinez, K. Z., Pascoe, C. J., Perkel, D., Robinson, L., Sims, C., & Tripp, L. (2009). Hanging out, messing around, and geeking out: kids living and learning with new media. Cambridge: MIT Press.
Jaishankar, K. (2008). Space transition theory of cyber crimes. In Schmallager, F., &. Pittaro, M. (Eds.), Crimes of the internet. (pp. 283–301). Upper Saddle River: Prentice Hall.
Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46(4), 757–780.
Kim, K. H., & Yun, H. (2007). Cying for me, Cying for us: relational dialectics in a Korean social network site. Journal of Computer-Mediated Communication, 13(1), 298–318.
Kim, J. E., & Kim, J. (2015). Software piracy among Korean adolescents: lessons from panel data. Deviant Behavior, 36(9), 705–724.
Kraska, P., & Neuman, W. L. (2011). Criminal justice and criminology research methods. Boston: Prentice Hall.
Lau, W. W., & Yuen, A. H. (2013). Adolescents’ risky online behaviors: the influence of gender, religion, and parenting style. Computers in Human Behavior, 29(6), 2690–2696.
Lee, J., & Lee, H. (2010). The computer-mediated communication network: exploring the linkage between the online community and social capital. New Media & Society, 12, 711–727.
Lenhart, A., Kahne, J., Middaugh, E., Macgill, A. R., Evans, C., & Vitak, J. (2008). Teens, video games, and civics: teens' gaming experiences are diverse and include significant social interaction and civic engagement. Washington, DC: Pew Internet & American Life Project.
Livingstone, S., & Helsper, E. (2009). Balancing opportunities and risks in teenagers’ use of the internet: the role of online skills and internet self-efficacy. New Media & Society, 12(2), 309–329.
Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., & Beaton, M. (2013). Teens, social media, and privacy. In Pew Internet & American Life Project .Retrieved from www.pewinternet.org/2013/05/21/teens-social-media-and-privacy
Malin, J., & Fowers, B. J. (2009). Adolescent self-control and music and movie piracy. Computers in Human Behavior, 25(3), 718–722.
Marcum, C. D., Higgins, E. H., & Ricketts, M. L. (2014a). Juveniles and cyber stalking in the United States: an analysis of theoretical predictors of patterns of online perpetration. International Journal of Cyber Criminology, 8(1), 47.
Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014b). Hacking in high school: cybercrime perpetration by juveniles. Deviant Behavior, 35(7), 581–591.
Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2015). Becoming someone new: identity theft behaviors by high school students. Journal of Financial Crime, 22(3), 318–328.
Meldrum, R. C., & Clark, J. (2013). Adolescent virtual time spent socializing with peers, substance use, and delinquency. Crime & Delinquency, 61(8), 1104–1126.
Menard, S. (2002). Applied logistic regression analysis. Sage Publications: Thousand Oaks.
Mesch, G. S. (2009). Social bonds and internet pornographic exposure among adolescents. Journal of Adolescence, 32(3), 601–618.
Ministry of Gender Equality and Family Gender Equality and Family (2013). Report on prevalence and use of media among adolescents. Retrieved from http://www.mogef.go.kr/korea/view/news/ news03_01.jsp?func = view¤tPage = 2&key_type = &key = &search_start_date = &search_ end_date = &class_id = 0&idx = 693894
Mitchell, K. J., Finkelhor, D., Wolak, J., Ybarra, M. L., & Turner, H. (2011). Youth internet victimization in a broader victimization context. Journal of Adolescent Health, 48(2), 128–134.
Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: an empirical test. Journal of Criminal Justice, 38(4), 767–772.
Moon, B., McCluskey, J. D., McCluskey, C. P., & Lee, S. (2013). Gender, general theory of crime and computer crime: an empirical test. International Journal of Offender Therapy and Comparative Criminology, 57(4), 460–478.
Morris, R. G., & Blackburn, A. G. (2009). Cracking the code: an empirical exploration of social learning theory and computer crime. Journal of Crime and Justice, 32(1), 1–34.
Morris, R. G., & Higgins, G. E. (2008). Neutralizing potential and self-reported digital piracy: a multi-theoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173–195.
Morris, R. G., & Higgins, G. E. (2010). Criminological theory in the digital age: the case of social learning theory and digital piracy. Journal of Criminal Justice, 38(4), 470–480.
National Information Society Agency. (2011). A survey on Internet addiction in, 2010 .Retrieved from http://www.iapc.or.kr/cnt/cnt-301_V.asp?BoardCate=3&BoardType=1&idx=1499
National Internet Development Agency of Korea. (2008). Survey on the computer and internet usage. Seoul: Ministry of Information and Communication.
Postmes, T., & Brunsting, S. (2002). Collective action in the age of the internet mass communication and online mobilization. Social Science Computer Review, 20(3), 290–301.
Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi's general theory of crime: a meta-analysis. Criminology, 38(3), 931–964.
Pyrooz, D. C., Decker, S. H., & Moule, R. K. (2015). Criminal and routine activities in online settings: gangs, offenders, and the internet. Justice Quarterly, 32(3), 471–499.
Reyns, B. W. (2013). Online routines and identity theft victimization further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238.
Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1–25.
Rhee, K., & Kim, W. (2004). The adoption and use of the internet in South Korea. Journal of Computer-Mediated Communication, 9, 1–21.
Ricketts, M. L., Maloney, C., Marcum, C. D., & Higgins, G. E. (2015). The effect of internet related problems on the sexting behaviors of juveniles. American Journal of Criminal Justice, 40(2), 270–284.
Rogers, M. (2001). A social learning theory and moral disengagement analysis of criminal computer behavior: an exploratory study. University of Manitoba, Winnipeg, Manitoba, Canada: Unpublished doctoral dissertation.
Rogers, M., Smoak, N., & Liu, J. (2006). Self-reported deviant computer behavior: a big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior, 27, 245–268.
Schell, B. H., Dodge, J. L., & Moutsatsos, S. S. (2002). The hacking of America: Who’s doing it, why, and how. Westport: Quorum Books.
Sela-Shayovitz, R. (2012). Gangs and the web: gang members’ online behavior. Journal of Contemporary Criminal Justice, 28, 389–405.
Sims, R. R., Cheng, H. K., & Teegen, H. (1996). Toward a profile of student software piraters. Journal of Business Ethics, 15(8), 839–849.
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518.
Subrahmanyam, K., & Smahel, D. (2010). Digital youth: the role of media in development. New York: Springer.
Sullivan, C. J. (2006). Early adolescent delinquency assessing the role of childhood problems, family environment, and peer pressure. Youth Violence and Juvenile Justice, 4(4), 291–313.
Sykes, G., & Matza, D. (1957). Techniques of neutralization: a theory of delinquency. American Sociological Review, 22, 664–670.
Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2010). Digital crime and digital terrorism (2nd ed.). Upper Saddle River: Prentice Hall.
Tittle, C. R., Ward, D. A., & Grasmick, H. G. (2003). Self-control and crime/deviance: cognitive vs. behavioral measures. Journal of Quantitative Criminology, 19(4), 333–365.
Tokunaga, R. S. (2010). Following you home from school: a critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277–287.
Tynes, B. M. (2007). Internet safety gone wild? Sacrificing the educational and psychosocial benefits of online social environments. Journal of Adolescent Research, 22(6), 575–584.
Van Wilsem, J. (2013). Hacking and harassment—do they have something in common? Comparing risk factors for online victimization. Journal of Contemporary Criminal Justice, 29(4), 437–453.
Vazsonyi, A. T., Machackova, H., Sevcikova, A., Smahel, D., & Cerna, A. (2012). Cyberbullying in context: direct and indirect effects by low self-control across 25 European countries. European Journal of Developmental Psychology, 9(2), 210–227.
Wall, D. S. (2007). Cybercrime: the transformation of crime in the information age. Cambridge: Polity Press.
Wang, J., Iannotti, R. J., & Nansel, T. R. (2009). School bullying among adolescents in the United States: physical, verbal, relational, and cyber. Journal of Adolescent Health, 45(4), 368–375.
Warr, M. (2002). Companions in crime: the social aspects of criminal conduct. Cambridge University Press.
Weerman, F. M., Bernasco, W., Bruinsma, G. J., & Pauwels, L. J. (2013). When is spending time with peers related to delinquency? The importance of where, what, and with whom. Crime & Delinquency, 61(10), 1386–1413.
Whang, L. S. M., Lee, S., & Chang, G. (2003). Internet over-users' psychological profiles: a behavior sampling analysis on internet addiction. Cyberpsychology & Behavior, 6(2), 143–150.
Wolak, J., Mitchell, K. J., & Finkelhor, D. (2006). Online victimization of youth: five years later. Durham: National Center for Missing & Exploited Children.
Wolak, J., Mitchell, K. J., & Finkelhor, D. (2007). Unwanted and wanted exposure to online pornography in a national sample of youth internet users. Pediatrics, 119(2), 247–257.
Yar, M. (2005). The novelty of ‘cybercrime’ an assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427.
Yar, M. (2013). Cybercrime and society (2nd ed.). London: Sage.
Yen, J. Y., Ko, C. H., Yen, C. F., Wu, H. Y., & Yang, M. J. (2007). The comorbid psychiatric symptoms of internet addiction: attention deficit and hyperactivity disorder (ADHD), depression, social phobia, and hostility. Journal of Adolescent Health, 41(1), 93–98.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, B.H. Explaining Cyber Deviance among School-Aged Youth. Child Ind Res 11, 563–584 (2018). https://doi.org/10.1007/s12187-017-9450-2
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12187-017-9450-2