Skip to main content

Advertisement

Log in

White-collar delinquency

  • Published:
Crime, Law and Social Change Aims and scope Submit manuscript

Abstract

Seemingly harmless pranks by computer hackers have evolved into major economic crimes and acts of terrorism that appear far different than traditional forms of juvenile delinquency. Nonetheless, because they do not occupy the high status positions that facilitate white-collar crimes, serious computer crimes by juveniles have fallen between the theoretical cracks. A new hybrid category of crime that we label “white-collar delinquency” demonstrates that class does matter in the way illegal activity is conceptualized, and re-ignites debates regarding both white-collar crime and juvenile delinquency. We review conceptual issues that relate to this emergent form of computer-based deviance, and identify questions to be addressed in future theorizing and research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. ABCNEWS.com (2000). Precocious ‘pump and dumper’? 21, September.

  2. Agnew, R., Brezina, T., Wright, J. P., & Cullen, F. T. (2002). Strain, personality traits, and delinquency: extending general strain theory. Criminology, 40, 43–72.

    Article  Google Scholar 

  3. Akers, R. L. (1991). Self-control as a general theory of crime. Journal of Quantitative Criminology, 7, 201–211.

    Article  Google Scholar 

  4. Analystsexposed.blogspot.com (2005) Van T. Dinh, 14, September.

  5. Anwar, Y. (2000). Hacker known as mischievous kid. usatoday.com. 7, June.

  6. Associated Press (2000a). Manipulating a profit. abcnews.com, 20, October.

  7. Associated Press (2000b). Stock manipulator’s crime did pay. usatoday.com, 20, October.

  8. Barkan, S. (2001). Criminology: A sociological understanding (2nd ed.). Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  9. Benson, M. L. (1985). Denying the guilty mind: accounting for involvement in a white-collar crime. Criminology, 23, 589–599.

    Article  Google Scholar 

  10. Billingsgazette.com (2005) High school schemer hit with record fine. 12, May.

  11. Bowker, A. L. (2000). The advent of the computer delinquent. FBI Law Enforcement Bulletin, 69, 7.

    Google Scholar 

  12. Braithwaite, J. (1985). White-collar crime. Annual Review of Sociology.

  13. Calavita, K., & Pontell, H. N. (1993). Savings and loan fraud as organized crime: toward a conceptual typology of corporate illegality. Criminology, 31, 519–548.

    Article  Google Scholar 

  14. CBSnews.com (2002) Cyberscamming teens. 14, February.

  15. Clinard, M. B., & Quinney, R. (1973). Criminal behavior systems (2nd ed.). New York: Holt Rinehart and Winston.

    Google Scholar 

  16. Clinard, M. B., & Meier, R. F. (1998). Sociology of deviant behavior (11th ed.). NY: Wadsworth.

    Google Scholar 

  17. Cohen, A. K. (1955). Delinquent boys: The Culture of the Gang. NY: Free Press.

    Google Scholar 

  18. Coleman, J. W. (2002). The criminal elite: Understanding white-collar crime (5th ed.). New York: Worth.

    Google Scholar 

  19. CNN.com (2000). Teen stock tout to pay $285,000 for ‘pump and dump’ scheme. 21, September.

  20. Eichenwald, K. (2005). Conspiracy of fools. NY: Broadway Books.

    Google Scholar 

  21. Friedrichs, D. O. (2003). Trusted criminals: White-collar crime and accountability. Belmont, CA: Wadsworth.

    Google Scholar 

  22. Geis, G. (1981). Upperworld crime. In A. Blumberg (Ed.), Current perspectives on criminal behavior. New York: Knopf.

    Google Scholar 

  23. Geis, G. (2000). On the absence of self-control as the basis for a general theory of crime. Theoretical Criminology, 4, 35–53.

    Article  Google Scholar 

  24. Geis, G., & Goff, C. (1983). Introduction to Edwin H. Sutherland, white-collar crime: The Uncut version. New Haven: Yale University Press.

    Google Scholar 

  25. Gelsi, S. (2000). Teen defends stock-promotion actions. cbsmarketwatch.com. 19, October.

  26. Gibbons, D. C. (1994). Talking about crime and criminals: Problems and issues in theory development in criminology. Englewood Cliffs, NJ: Prentice Hall.

    Google Scholar 

  27. GigaLaw.com Daily (2003) Teen accused of Internet fraud files civil rights suit against school. 19, May.

  28. Goetz, B. (1997). Organization as class bias in local law enforcement: arson-for-profit as a “nonissue”. Law and Society Review, 31, 557–585.

    Article  Google Scholar 

  29. Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Palo Alto: Stanford University Press.

    Google Scholar 

  30. Greenberg, D. F. (1999). The weak strength of control theory. Crime & Delinquency, 45, 66–81.

    Article  Google Scholar 

  31. Hollinger, R. C. (1997). Crime, deviance and the computer. Brookfield, VT: Dartmouth.

    Google Scholar 

  32. Hollinger, R. C., & Lanza-Kaduce, L. (1988). The process of criminalization: the case of computer crime laws. Criminology, 26, 108–126.

    Article  Google Scholar 

  33. Infoworld.com (2005) Blaster worm author gets jail time. 28, January.

  34. Iwata, E. (2000) Digital trail, chat room boasts led to teen hacker. USA Today, 16 February, 3B.

  35. Jesilow, P. D., Pontell, H. N., & Geis, G. (1993). Prescription for profit: How doctors defraud medicaid. Berkeley: University of California Press.

    Google Scholar 

  36. Johnson, D. T., & Leo, R. A. (1993). The yale white-collar crime project: a review and critique. Law and Social Inquiry, 18, 63–99.

    Article  Google Scholar 

  37. Johnson, K., & Zuckerman, M. J. (2000) Teen arrested in e-commerce hacks. usatoday.com. 7, June.

  38. Johnson, K, Zuckerman, M. J., & Solomon, D. (2000). Online boasting leaves trail. usatoday.com. 7, June.

  39. Katz, J. (1988). Seductions of crime: Moral and sensual attractions in doing evil. New York: Basic Books.

    Google Scholar 

  40. Knox, N. (2000). Teen settles stock-manipulation case. usatoday.com, Sept. 21.

  41. Lemert, E. M. (2000). Rules, deviance, and social control theory. In C. C. Lemert, & M. F. Winter (Eds.), Crime and deviance: Essays and innovations of Edwin M. Lemert. Lanham, MD: Rowman & Littlefield.

    Google Scholar 

  42. Leonhard, W. (2000). The new Internet security threat. Smart Business (July):102–118.

  43. Levy, P. (2005). Prosecutors ask 37-month sentence for Hopkins teen in Internet worm case. Minneapolis Star Tribune (online), 26, January.

  44. Matsueda, R. L., & Anderson, K. (1998). The dynamics of delinquent peers and delinquent behavior. Criminology, 36, 269–308.

    Article  Google Scholar 

  45. Matza, D. (1964). Delinquency and drift. NY: Wiley.

    Google Scholar 

  46. McCaghy, C. H., & Capron, T. A. (1994). Deviant behavior: Crime conflict and interest groups (3rd ed.). NY: Macmillan.

    Google Scholar 

  47. McCaghy, C. H., Capron, T. A., & Jamieson, J. D. (2000). Deviant behavior: Crime conflict and interest groups (5th ed.). Needham Heights, MA: Allyn & Bacon.

    Google Scholar 

  48. Minneapolis.about.com (2003) Hopkins teen charged with Blaster worm, 2, September.

  49. News.bbc.co.uk (2003). US hacker accused of massive fraud, 10, October.

  50. News.bbc.co.uk (2004a). Teen ‘confesses’ to sasser worm, 8, May.

  51. News.bbc.co.uk (2004b). Sasser net worm disruption grows, 4, May.

  52. Polk, K. (1991). Review of a general theory of crime by Michael R. Gottfredson and Travis Hirschi. Crime and Delinquency, 37, 575–581.

    Article  Google Scholar 

  53. Pontell, H. N. (1982). System capacity and criminal justice: theoretical and substantive considerations. In H. E. Pepinsky (Ed.), Rethinking criminology. Beverly Hills: Sage.

    Google Scholar 

  54. Pontell, H. N., & Calavita, K. (1993). Organizational crime in the savings and loan industry. In M. Tonry, & A. J. Reiss Jr. (Eds.), Beyond the law: Crime in complex organizations, crime and justice. Chicago: University of Chicago Press.

    Google Scholar 

  55. Reckard, E. S. (2005). O.C. man, who as teenager ran online scam fined $1.3 million. Los Angeles Times. 11 May, C2.

  56. Reiman, J. (1998). The rich get richer and the poor get prison: Ideology, class, and criminal justice. Boston: Allyn and Bacon.

    Google Scholar 

  57. Rosoff, S. M., Pontell, H. N., & Tillman, R. H. (1998). Profit without honor: White-collar crime and the looting of America. Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  58. Scherer, M. Unpublished Cyber crime in the federal courts under the computer fraud and abuse act. Department of Criminology, Law and Society, University of California, Irvine.

  59. Shapiro, S. (1990). Collaring the crime, not the criminal: liberating the concept of white-collar crime. American Sociological Review, 55, 346–365.

    Article  Google Scholar 

  60. Smith, R. G., Grabosky, P., & Urbas, G. (2004). Cyber criminals on trial. Cambridge: Cambridge University Press.

    Google Scholar 

  61. Sophos.com (2004) The latest news on the Sasser Internet worm outbreak, 1, May.

  62. Steffensmeier, D. (1989). On the causes of “white-collar crime”: an assessment of Hirschi and Gottfredson’s claims. Criminology, 27, 345–358.

    Article  Google Scholar 

  63. Sutherland, E. H. (1949). White collar crime. New York: Holt Rinehart and Winston.

    Google Scholar 

  64. Technewsworld.com (2004). Jeffrey Lee Parsons pleads guilty to Blaster worm crime, 12, August.

  65. Thornberry, T. P., Lizotte, A. J., Krohn, M. D., Farnworth, M., & Jang, S. J. (1994). Delinquent peers, beliefs, and delinquent behaviors: a longitudinal test of interactional theory. Criminology, 32, 47–83.

    Article  Google Scholar 

  66. Tillman, R. H., & Pontell, H. N. (1995). Organizations and fraud in the savings and loan industry. Social Forces, 73, 1439–1463.

    Article  Google Scholar 

  67. Tittle, C. (1995). Control balance: toward a general theory of deviance. Boulder, CO: Westview.

    Google Scholar 

  68. Toffler, B. L. (2003). Final accounting: Ambition, greed, and the fall of Arthur Anderson. NY: Broadway Books.

    Google Scholar 

  69. Tombs, S., & Whyte, D. (2003). Unmasking the crimes of the powerful: Scrutinizing states and corporations. NY: Peter Lang.

    Google Scholar 

  70. Turgeman Goldschmidt, O. (2005). Hackers’ accounts: hacking as a social entertainment. Social Science Computer Review, 23, 8–23.

    Article  Google Scholar 

  71. Usatoday.com (2001). Hacker ‘Mafiaboy’ pleads guilty, 18, January.

  72. Usdoj.gov (2004). Pennsylvania man sentenced to prison for accessing Massachusetts investor’s on-line investment account and making $46,000 in unauthorized trades (Press release), U.S. Department of Justice, United States Attorney, District of Massachusetts, 5, May.

  73. Wheeler, S., & Rothman, M. L. (1982). The organization as weapon in white-collar crime. Michigan Law Review, 80, 1403–1426.

    Article  Google Scholar 

  74. Wired.com (2005). Sasser worm creator avoids lockup, 9 July.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Henry N. Pontell.

Additional information

The authors wish to thank Gilbert Geis for his helpful comments on an earlier draft of this paper.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Pontell, H.N., Rosoff, S.M. White-collar delinquency. Crime Law Soc Change 51, 147–162 (2009). https://doi.org/10.1007/s10611-008-9146-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10611-008-9146-0

Keywords

Navigation