Abstract
Seemingly harmless pranks by computer hackers have evolved into major economic crimes and acts of terrorism that appear far different than traditional forms of juvenile delinquency. Nonetheless, because they do not occupy the high status positions that facilitate white-collar crimes, serious computer crimes by juveniles have fallen between the theoretical cracks. A new hybrid category of crime that we label “white-collar delinquency” demonstrates that class does matter in the way illegal activity is conceptualized, and re-ignites debates regarding both white-collar crime and juvenile delinquency. We review conceptual issues that relate to this emergent form of computer-based deviance, and identify questions to be addressed in future theorizing and research.
Similar content being viewed by others
References
ABCNEWS.com (2000). Precocious ‘pump and dumper’? 21, September.
Agnew, R., Brezina, T., Wright, J. P., & Cullen, F. T. (2002). Strain, personality traits, and delinquency: extending general strain theory. Criminology, 40, 43–72.
Akers, R. L. (1991). Self-control as a general theory of crime. Journal of Quantitative Criminology, 7, 201–211.
Analystsexposed.blogspot.com (2005) Van T. Dinh, 14, September.
Anwar, Y. (2000). Hacker known as mischievous kid. usatoday.com. 7, June.
Associated Press (2000a). Manipulating a profit. abcnews.com, 20, October.
Associated Press (2000b). Stock manipulator’s crime did pay. usatoday.com, 20, October.
Barkan, S. (2001). Criminology: A sociological understanding (2nd ed.). Upper Saddle River, NJ: Prentice Hall.
Benson, M. L. (1985). Denying the guilty mind: accounting for involvement in a white-collar crime. Criminology, 23, 589–599.
Billingsgazette.com (2005) High school schemer hit with record fine. 12, May.
Bowker, A. L. (2000). The advent of the computer delinquent. FBI Law Enforcement Bulletin, 69, 7.
Braithwaite, J. (1985). White-collar crime. Annual Review of Sociology.
Calavita, K., & Pontell, H. N. (1993). Savings and loan fraud as organized crime: toward a conceptual typology of corporate illegality. Criminology, 31, 519–548.
CBSnews.com (2002) Cyberscamming teens. 14, February.
Clinard, M. B., & Quinney, R. (1973). Criminal behavior systems (2nd ed.). New York: Holt Rinehart and Winston.
Clinard, M. B., & Meier, R. F. (1998). Sociology of deviant behavior (11th ed.). NY: Wadsworth.
Cohen, A. K. (1955). Delinquent boys: The Culture of the Gang. NY: Free Press.
Coleman, J. W. (2002). The criminal elite: Understanding white-collar crime (5th ed.). New York: Worth.
CNN.com (2000). Teen stock tout to pay $285,000 for ‘pump and dump’ scheme. 21, September.
Eichenwald, K. (2005). Conspiracy of fools. NY: Broadway Books.
Friedrichs, D. O. (2003). Trusted criminals: White-collar crime and accountability. Belmont, CA: Wadsworth.
Geis, G. (1981). Upperworld crime. In A. Blumberg (Ed.), Current perspectives on criminal behavior. New York: Knopf.
Geis, G. (2000). On the absence of self-control as the basis for a general theory of crime. Theoretical Criminology, 4, 35–53.
Geis, G., & Goff, C. (1983). Introduction to Edwin H. Sutherland, white-collar crime: The Uncut version. New Haven: Yale University Press.
Gelsi, S. (2000). Teen defends stock-promotion actions. cbsmarketwatch.com. 19, October.
Gibbons, D. C. (1994). Talking about crime and criminals: Problems and issues in theory development in criminology. Englewood Cliffs, NJ: Prentice Hall.
GigaLaw.com Daily (2003) Teen accused of Internet fraud files civil rights suit against school. 19, May.
Goetz, B. (1997). Organization as class bias in local law enforcement: arson-for-profit as a “nonissue”. Law and Society Review, 31, 557–585.
Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Palo Alto: Stanford University Press.
Greenberg, D. F. (1999). The weak strength of control theory. Crime & Delinquency, 45, 66–81.
Hollinger, R. C. (1997). Crime, deviance and the computer. Brookfield, VT: Dartmouth.
Hollinger, R. C., & Lanza-Kaduce, L. (1988). The process of criminalization: the case of computer crime laws. Criminology, 26, 108–126.
Infoworld.com (2005) Blaster worm author gets jail time. 28, January.
Iwata, E. (2000) Digital trail, chat room boasts led to teen hacker. USA Today, 16 February, 3B.
Jesilow, P. D., Pontell, H. N., & Geis, G. (1993). Prescription for profit: How doctors defraud medicaid. Berkeley: University of California Press.
Johnson, D. T., & Leo, R. A. (1993). The yale white-collar crime project: a review and critique. Law and Social Inquiry, 18, 63–99.
Johnson, K., & Zuckerman, M. J. (2000) Teen arrested in e-commerce hacks. usatoday.com. 7, June.
Johnson, K, Zuckerman, M. J., & Solomon, D. (2000). Online boasting leaves trail. usatoday.com. 7, June.
Katz, J. (1988). Seductions of crime: Moral and sensual attractions in doing evil. New York: Basic Books.
Knox, N. (2000). Teen settles stock-manipulation case. usatoday.com, Sept. 21.
Lemert, E. M. (2000). Rules, deviance, and social control theory. In C. C. Lemert, & M. F. Winter (Eds.), Crime and deviance: Essays and innovations of Edwin M. Lemert. Lanham, MD: Rowman & Littlefield.
Leonhard, W. (2000). The new Internet security threat. Smart Business (July):102–118.
Levy, P. (2005). Prosecutors ask 37-month sentence for Hopkins teen in Internet worm case. Minneapolis Star Tribune (online), 26, January.
Matsueda, R. L., & Anderson, K. (1998). The dynamics of delinquent peers and delinquent behavior. Criminology, 36, 269–308.
Matza, D. (1964). Delinquency and drift. NY: Wiley.
McCaghy, C. H., & Capron, T. A. (1994). Deviant behavior: Crime conflict and interest groups (3rd ed.). NY: Macmillan.
McCaghy, C. H., Capron, T. A., & Jamieson, J. D. (2000). Deviant behavior: Crime conflict and interest groups (5th ed.). Needham Heights, MA: Allyn & Bacon.
Minneapolis.about.com (2003) Hopkins teen charged with Blaster worm, 2, September.
News.bbc.co.uk (2003). US hacker accused of massive fraud, 10, October.
News.bbc.co.uk (2004a). Teen ‘confesses’ to sasser worm, 8, May.
News.bbc.co.uk (2004b). Sasser net worm disruption grows, 4, May.
Polk, K. (1991). Review of a general theory of crime by Michael R. Gottfredson and Travis Hirschi. Crime and Delinquency, 37, 575–581.
Pontell, H. N. (1982). System capacity and criminal justice: theoretical and substantive considerations. In H. E. Pepinsky (Ed.), Rethinking criminology. Beverly Hills: Sage.
Pontell, H. N., & Calavita, K. (1993). Organizational crime in the savings and loan industry. In M. Tonry, & A. J. Reiss Jr. (Eds.), Beyond the law: Crime in complex organizations, crime and justice. Chicago: University of Chicago Press.
Reckard, E. S. (2005). O.C. man, who as teenager ran online scam fined $1.3 million. Los Angeles Times. 11 May, C2.
Reiman, J. (1998). The rich get richer and the poor get prison: Ideology, class, and criminal justice. Boston: Allyn and Bacon.
Rosoff, S. M., Pontell, H. N., & Tillman, R. H. (1998). Profit without honor: White-collar crime and the looting of America. Upper Saddle River, NJ: Prentice Hall.
Scherer, M. Unpublished Cyber crime in the federal courts under the computer fraud and abuse act. Department of Criminology, Law and Society, University of California, Irvine.
Shapiro, S. (1990). Collaring the crime, not the criminal: liberating the concept of white-collar crime. American Sociological Review, 55, 346–365.
Smith, R. G., Grabosky, P., & Urbas, G. (2004). Cyber criminals on trial. Cambridge: Cambridge University Press.
Sophos.com (2004) The latest news on the Sasser Internet worm outbreak, 1, May.
Steffensmeier, D. (1989). On the causes of “white-collar crime”: an assessment of Hirschi and Gottfredson’s claims. Criminology, 27, 345–358.
Sutherland, E. H. (1949). White collar crime. New York: Holt Rinehart and Winston.
Technewsworld.com (2004). Jeffrey Lee Parsons pleads guilty to Blaster worm crime, 12, August.
Thornberry, T. P., Lizotte, A. J., Krohn, M. D., Farnworth, M., & Jang, S. J. (1994). Delinquent peers, beliefs, and delinquent behaviors: a longitudinal test of interactional theory. Criminology, 32, 47–83.
Tillman, R. H., & Pontell, H. N. (1995). Organizations and fraud in the savings and loan industry. Social Forces, 73, 1439–1463.
Tittle, C. (1995). Control balance: toward a general theory of deviance. Boulder, CO: Westview.
Toffler, B. L. (2003). Final accounting: Ambition, greed, and the fall of Arthur Anderson. NY: Broadway Books.
Tombs, S., & Whyte, D. (2003). Unmasking the crimes of the powerful: Scrutinizing states and corporations. NY: Peter Lang.
Turgeman Goldschmidt, O. (2005). Hackers’ accounts: hacking as a social entertainment. Social Science Computer Review, 23, 8–23.
Usatoday.com (2001). Hacker ‘Mafiaboy’ pleads guilty, 18, January.
Usdoj.gov (2004). Pennsylvania man sentenced to prison for accessing Massachusetts investor’s on-line investment account and making $46,000 in unauthorized trades (Press release), U.S. Department of Justice, United States Attorney, District of Massachusetts, 5, May.
Wheeler, S., & Rothman, M. L. (1982). The organization as weapon in white-collar crime. Michigan Law Review, 80, 1403–1426.
Wired.com (2005). Sasser worm creator avoids lockup, 9 July.
Author information
Authors and Affiliations
Corresponding author
Additional information
The authors wish to thank Gilbert Geis for his helpful comments on an earlier draft of this paper.
Rights and permissions
About this article
Cite this article
Pontell, H.N., Rosoff, S.M. White-collar delinquency. Crime Law Soc Change 51, 147–162 (2009). https://doi.org/10.1007/s10611-008-9146-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10611-008-9146-0