Advertisement

How Daily Strain Leads to Cyber Delinquency: a Focus on the Role of Self-Esteem and Anger

  • Sangwon KimEmail author
Article
  • 27 Downloads

Abstract

Exposure to cyber delinquent behaviors leads to various far-reaching negative consequences in adolescents, which justifies exploring factors that contributes to their involvement in cyber delinquency. This study used General Strain Theory to explain cyber delinquent behavior by hypothesizing that daily strain leads to involvement in cyber delinquency through anger. Additionally, in consideration of previous findings on the relationships among self-esteem with strain, anger, and cyber delinquent behaviors; self-esteem was hypothesized to be mediated in the pathway between strain and cyber delinquent behaviors along with anger. A total of 2844 fourth grade students (46.4% female) from the Korean Youth Panel Survey (KYPS) were used to investigate the hypothesized model. This model showed an appropriate model fit, and specifically displayed that strain had a significant positive association with negative self-esteem, anger, and involvement in cyber delinquent behaviors. In the results, general strain theory in explaining cyber delinquency, was confirmed by revealing the findings that anger was significantly mediated in the pathway between strain and cyber delinquency. In addition, the sequential mediation effect of negative self-esteem and anger in the pathway between strain and cyber delinquency was verified. That is, strain could lead to an increase in negative self-esteem which continues to heighten levels of anger, eventually leading to involvement in cyber delinquency. These findings contribute to advancing our understanding of the mechanism that leads to involvement in cyber delinquency from strain. Practical implications are discussed based on these findings.

Keywords

Cyber delinquency Korean adolescent General strain theory Negative self-esteem Anger 

Notes

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Compliance with Ethical Standards

Conflict of Interest

The author declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

Ethical Approval

The research process was approved by Sungkyunkwan University Institutional Review Board (Approval number: SKKU 2019–02-001).

Informed Consent

For this type of study using the secondary data, formal consent is not required.

References

  1. Abdesslem, F. B., Parris, I., & Henderson, T. N. H. (2010). Mobile experience sampling: Reaching the parts of Facebook other methods cannot reach. Paper presented at the 24th BCS conference on human computer interaction (HCI2010), Dundee , United Kingdom. http://hdl.handle.net/10023/2016
  2. Agnew, R., & White, H. R. (1992). An empirical test of general strain theory. Criminology, 30(4), 475–500.  https://doi.org/10.1111/j.1745-9125.1992.tb01113.x.CrossRefGoogle Scholar
  3. Baldry, A. C., Sorrentino, A., & Farrington, D. P. (2019). Cyberbullying and cybervictimization versus parental supervision, monitoring and control of adolescents' online activities. Children and Youth Service Reveiw, 96, 302–307.  https://doi.org/10.1016/j.childyouth.2018.11.058.CrossRefGoogle Scholar
  4. Baraldi, A. N., & Enders, C. K. (2010). An introduction to modern missing data analyses. Journal of School Psychology, 48(1), 5–37.  https://doi.org/10.1016/j.jsp.2009.10.001.PubMedCrossRefGoogle Scholar
  5. Baumgartner, S. E., Valkenburg, P. M., & Peter, J. (2010). Unwanted online sexual solicitation and risky sexual online behavior across the lifespan. Journal of Applied Developmental Psychology, 31(6), 439–447.  https://doi.org/10.1016/j.appdev.2010.07.005.CrossRefGoogle Scholar
  6. Cha, J., & Lim, S. (2016). The relationship between self-esteem and aggression among adolescents: The moderating effects of narcissism and self-concept clarity. Studies on Korean Youth, 27(4), 231–258.  https://doi.org/10.14816/sky.2016.27.4.231.CrossRefGoogle Scholar
  7. Chen, A.-S., Leung, M., Chen, C.-H., & Yang, S. C. (2013). Exposure to internet pornography among Taiwanese adolescents. Social Behavior and Personality: An International Journal, 41(1), 157–164.  https://doi.org/10.2224/sbp.2013.41.1.157.CrossRefGoogle Scholar
  8. Choi, O. (2004). A qualitative study on the process of juveniles' steeping in cyber crime: Focused on internet fraud. Korean Journal of Social Welfare, 56(4), 103–122 Retrieved from http://www.riss.kr.ca.skku.edu:8080/link?id=A103217937.Google Scholar
  9. Choi, Y., & Ha, J. (2012). Impact of academic stress on self-esteem and somatization symptoms among adolescents. Journal of Cyber Education, 6(1), 75–91 Retrieved from http://www.riss.kr.ca.skku.edu:8080/link?id=A103711142.Google Scholar
  10. Donner, C. M., Jennings, W. G., & Banfield, J. (2015). The general nature of online and off-line offending among college students. Social Science Computer Review, 33(6), 663–679.  https://doi.org/10.1177/0894439314555949.CrossRefGoogle Scholar
  11. Englander, E., Donnerstein, E., Kowalski, R., Lin, C. A., & Parti, K. (2017). Defining cyberbullying. Pediatrics, 140(supplement 2), S148–S151.  https://doi.org/10.1542/peds.2016-1758U.PubMedCrossRefGoogle Scholar
  12. Fenner, Y., Garland, S. M., Moore, E. E., Jayasinghe, Y., Fletcher, A., Tabrizi, S. N., ... Wark, J. D. (2012). Web-based recruiting for health research using a social networking site: An exploratory study. Journal of Medical Internet Research, 14(1), e20.  https://doi.org/10.2196/jmir.1978.PubMedPubMedCentralCrossRefGoogle Scholar
  13. Floridi, L. (2007). A look into the future impact of ICT on our lives. The Information Society, 23(1), 59–64.  https://doi.org/10.1080/01972240601059094.CrossRefGoogle Scholar
  14. Greenfield, P. M. (2004). Inadvertent exposure to pornography on the internet: Implications of peer-to-peer file-sharing networks for child development and families. Journal of Applied Developmental Psychology, 25(6), 741–750.  https://doi.org/10.1016/j.appdev.2004.09.009.CrossRefGoogle Scholar
  15. Hay, C., & Evans, M. M. (2006). Violent victimization and involvement in delinquency: Examining predictions from general strain theory. Journal of Criminal Justice, 34(3), 261–274.  https://doi.org/10.1016/j.jcrimjus.2006.03.005.CrossRefGoogle Scholar
  16. Hay, C., Meldrum, R., & Mann, K. (2010). Traditional bullying, cyber bullying, and deviance: A general strain theory approach. Journal of Contemporary Criminal Justice, 26(2), 130–147.  https://doi.org/10.1177/1043986209359557.CrossRefGoogle Scholar
  17. Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37(3), 378–395.CrossRefGoogle Scholar
  18. Hong, S. (2000). The criteria for selecting appropriate fit indices in structural equation modeling and their rationales. Korean Journal of Clinical Psychology, 19(1), 161–177 Retrieved from http://www.riss.kr.ca.skku.edu:8080/link?id=A103711142.Google Scholar
  19. Hooper, D., Coughlan, J., & Mullen, M. (2008). Structural equation modelling: Guidelines for determining model fit. The Electronic Journal of Business Research Methods, 6(1), 53–60.  https://doi.org/10.21427/D7CF7R.CrossRefGoogle Scholar
  20. Jang, H., Song, J., & Kim, R. (2014). Does the offline bully-victimization influence cyberbullying behavior among youths? Application of general strain theory. Computers in Human Behavior, 31, 85–93.  https://doi.org/10.1016/j.chb.2013.10.007.CrossRefGoogle Scholar
  21. Jones, L. M., Mitchell, K. J., & Finkelhor, D. (2013). Online harassment in context: Trends from three youth internet safety surveys (2000, 2005, 2010). Psychology of Violence, 3(1), 53–69.  https://doi.org/10.1037/a0030309.CrossRefGoogle Scholar
  22. Jung, H. (2009). A study of social bonding, self-control, and opportunity theories on the persistent cyber delinquency. Informatization Policy, 16(4), 97–112 Retrieved from http://www.riss.kr.ca.skku.edu:8080/link?id=A100067660.Google Scholar
  23. KCC., & NIA. (2019). 2018 national survey on cyber violence. Retrieved from Seoul, Republic of Korea: http://www.korea.kr/news/pressReleaseView.do?newsId=156318833&call_from=rsslink
  24. KIHSA. (2019). 2018 Comprehensive child study. Retrieved from mohw.go.kr/react/gm/sgm0601vw.Jsp?PAR_MENU_ID=13&MENU_ID=1304020703&CONT_SEQ=293112&page=1.Google Scholar
  25. Kong, J., & Lim, J. (2012). The longitudinal influence of parent–child relationships and depression on cyber delinquency in south Korean adolescents: A latent growth curve model. Children and Youth Services Review, 34(5), 908–913.  https://doi.org/10.1016/j.childyouth.2012.01.020.CrossRefGoogle Scholar
  26. Kowalski, R. M., & Limber, S. P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41(6), S22–S30.  https://doi.org/10.1016/j.jadohealth.2007.08.017.PubMedCrossRefGoogle Scholar
  27. Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073.  https://doi.org/10.1037/a0035618.PubMedCrossRefGoogle Scholar
  28. Lau, R. S., & Cheung, G. W. (2012). Estimating and comparing specific mediation effects in complex latent variable models. Organizational Research Methods, 15(1), 3–16.  https://doi.org/10.1177/1094428110391673.CrossRefGoogle Scholar
  29. Lee, S. (2005). An empirical study on causes of juvenile delinquency in cyberspace. Research on Criminal Justice Policy, 16, 145–174 Retrieved from http://www.riss.kr.ca.skku.edu:8080/link?id=A82525890.Google Scholar
  30. Lee, S. (2006). Testing the effect of the core explanatory variables on youth offline and online violence. Korean Journal of Youth Studies, 13, 179–200 Retrieved from http://www.riss.kr.ca.skku.edu:8080/link?id=A102950784.Google Scholar
  31. Lee, S. (2010). The longitudinal relationships between internet deviant behaviors and negative self-concept among pre adolescents. Studies on Korean Youth, 21(3), 165–187 Retrieved from http://www.riss.kr.ca.skku.edu:8080/link?id=A82393391.Google Scholar
  32. Lee, Y., & Kim, S. (2017). The role of anger and depressive mood in transformation process from victimization to perpetration. Child Abuse & Neglect, 63, 131–140.  https://doi.org/10.1016/j.chiabu.2016.11.014.CrossRefGoogle Scholar
  33. Lester, L., Cross, D., & Shaw, T. (2012). Problem behaviours, traditional bullying and cyberbullying among adolescents: Longitudinal analyses. Emotional and Behavioural Difficulties, 17(3–4), 435–447.  https://doi.org/10.1080/13632752.2012.704313.CrossRefGoogle Scholar
  34. Lim, S., Kim, E., & You, S. (2017). The effects of internet use on school adjustment and delinquency. Current Psychology, 1–7.  https://doi.org/10.1007/s12144-017-9668-7.CrossRefGoogle Scholar
  35. Lin, W. H. (2012). General strain theory in Taiwan: A latent growth curve modeling approach. Asian Journal of Criminology, 7(1), 37–54.  https://doi.org/10.1007/s11417-010-9101-8.CrossRefGoogle Scholar
  36. Lomax, R. G., & Schumacker, R. E. (2004). A beginner's guide to structural equation modeling (2nd ed.). Mahwah: Lawrence Erlbaum Associates Publishers.Google Scholar
  37. Manasse, M. E., & Ganem, N. M. (2009). Victimization as a cause of delinquency: The role of depression and gender. Journal of Criminal Justice, 37(4), 371–378.  https://doi.org/10.1016/j.jcrimjus.2009.06.004.CrossRefGoogle Scholar
  38. Marsh, H. W. (1996). Positive and negative global self-esteem: A substantively meaningful distinction or artifactors? Journal of Personality and Social Psychology, 70(4), 810–819.PubMedCrossRefGoogle Scholar
  39. Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767–772.  https://doi.org/10.1016/j.jcrimjus.2010.05.003.CrossRefGoogle Scholar
  40. Morris, R. G., & Higgins, G. E. (2010). Criminological theory in the digital age: The case of social learning theory and digital piracy. Journal of Criminal Justice, 38(4), 470–480.  https://doi.org/10.1016/j.jcrimjus.2010.04.016.CrossRefGoogle Scholar
  41. Nam, Y., & Lee, S. (2002). Relationship among adolescents' cyber-sex addiction, exposure to cyber obscenities and cyber sexual activities. Korean Journal of Youth Studies, 9(3), 185–212 Retrieved from http://www.riss.kr.ca.skku.edu:8080/link?id=A102951507.Google Scholar
  42. Neff, K. D. (2003). The development and validation of a scale to measure self-compassion. Self and Identity, 2(3), 223–250.  https://doi.org/10.1080/15298860309027.CrossRefGoogle Scholar
  43. Patchin, J. W., & Hinduja, S. (2011). Traditional and nontraditional bullying among youth: A test of general strain theory. Youth & Society, 43(2), 727–751.  https://doi.org/10.1177/0044118X10366951.CrossRefGoogle Scholar
  44. Petersen, A. C., & Hamburg, B. A. (1986). Adolescence: A developmental approach to problems and psychopathology. Behavior Therapy, 17(5), 480–499.  https://doi.org/10.1016/S0005-7894(86)80090-9.CrossRefGoogle Scholar
  45. Rosenberg, M., Schooler, C., & Schoenbach, C. (1989). Self-esteem and adolescent problems: Modeling reciprocal effects. American Sociological Review, 1004–1018.  https://doi.org/10.2307/2095720.CrossRefGoogle Scholar
  46. Schneider, S. K., O'donnell, L., Stueve, A., & Coulter, R. W. (2012). Cyberbullying, school bullying, and psychological distress: A regional census of high school students. American Journal of Public Health, 102(1), 171–177.  https://doi.org/10.1016/j.chb.2013.10.007.PubMedPubMedCentralCrossRefGoogle Scholar
  47. Wall, D. (2006). Crime and the internet. In London, New York: London. New York: Routledge.Google Scholar
  48. Waschull, S. B., & Kernis, M. H. (1996). Level and stability of self-esteem as predictors of children's intrinsic motivation and reasons for anger. Personality and Social Psychology Bulletin, 22(1), 4–13.  https://doi.org/10.1177/0146167296221001.CrossRefGoogle Scholar
  49. Wolak, J., Mitchell, K. J., & Finkelhor, D. (2006). Online victimization of youth: Five years later. Alexandria: Crimes against Children Research Center.Google Scholar
  50. Woo, S., Kim, S., Lim, S., Baek, I., Nam, D., & Yang, E. (2012). Multivariate latent growth model of self-efficacy, peer attachment, and juvenile delinquency of adolescents: Utilizing self-enhancement model. Korean Journal of Psychology: General, 31(4), 1093–1113 Retrieved from http://www.riss.kr.ca.skku.edu:8080/link?id=A100631685.Google Scholar
  51. Wright, M. F. (2015). Cyber victimization and perceived stress: Linkages to late adolescents’ cyber aggression and psychological functioning. Youth & Society, 47(6), 789–810.  https://doi.org/10.1177/0044118X14537088.CrossRefGoogle Scholar
  52. Ybarra, M. L., & Mitchell, K. J. (2005). Exposure to internet pornography among children and adolescents: A national survey. Cyberpsychology & Behavior Therapy, 8(5), 473–486.  https://doi.org/10.1089/cpb.2005.8.473.CrossRefGoogle Scholar
  53. Ybarra, M. L., Espelage, D. L., & Mitchell, K. J. (2007). The co-occurrence of internet harassment and unwanted sexual solicitation victimization and perpetration: Associations with psychosocial indicators. Journal of Adolescent Health, 41(6), S31–S41.  https://doi.org/10.1016/j.jadohealth.2007.09.010.PubMedCrossRefGoogle Scholar
  54. Youngs, G. A., Rathge, R., Mullis, R., & Mullis, A. (1990). Adolescent stress and self-esteem. Adolescence, 25(98), 333–341 Retrieved from https://search.proquest.com/docview/195919932?accountid=17077.PubMedGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Child Psychology and EducationSungkyunkwan UniversitySeoulRepublic of Korea

Personalised recommendations