Search results

1 – 10 of 406
Book part
Publication date: 9 September 2020

James Hawdon and Matthew Costello

Purpose – This chapter investigates if Ronald Aker’s Social Structure Social Learning (SSSL) theory can help explain who is involved with the production of online materials…

Abstract

Purpose – This chapter investigates if Ronald Aker’s Social Structure Social Learning (SSSL) theory can help explain who is involved with the production of online materials considered hateful or extremist.

Methodology/Approach – After discussing how SSSL can account for becoming exposed to online extremism and then becoming involved in its production, the authors conduct a logistic regression on data from 1,008 American adults that predicts if they produced online hate materials with variables derived from SSSL.

Findings – Results strongly support SSSL. While structural factors such as the respondents’ differential social organization, differential social location, and differential location in the social structure predict production of online hate materials, the effect of these factors is largely mediated once social learning variables are included in the model. Specifically, the respondents’ general definitions related to violence, specific definitions related to hate speech, and differential association accounts for variation in the production of online hate materials.

Originality/Value – This research contributes to the literature in two primary ways: (1) the authors investigate a critical, yet understudied, factor involved in the radicalization process; and (2) the authors demonstrate that a leading criminological theory applies to this form of deviance. This research also suggests key variables for creating strategies for countering violent extremism.

Article
Publication date: 5 May 2023

Alain Tambe Ebot

This study aims to examine how advance fee fraud (AFF) scammers build their criminal expertise over time and why the AFF scamming deception process succeeds.

Abstract

Purpose

This study aims to examine how advance fee fraud (AFF) scammers build their criminal expertise over time and why the AFF scamming deception process succeeds.

Design/methodology/approach

This study is interpretive, based on case study interview data with two scammers operating in Africa. The interviews were done over a period of time, and the data collection and analysis processes were iterative, primarily driven by the interview data.

Findings

The authors identify four processes that explain how scammers build criminal expertise, namely, socializing with scammers, accepting scamming definitions, practicing scamming techniques and manipulating digital technologies. The fourth process (manipulating digital technologies) also explains why scammer’s tactics are successful.

Originality/value

AFF scamming is a major crime affecting individuals and organizations worldwide, yet it remains under researched as little is known about scammers, their expertise and why their deceptive techniques are successful. The first contribution identifies four processes by which individuals build scamming criminal expertise as they transition from scammers-in-the-making to full-blown active scammers. The second contribution identifies the rationalizations used by scammers-in-the-making and scammers to justify transitioning into scamming and engaging in scamming criminality. The third contribution explains how the digital environment contributes to the processes of building scamming criminal expertise and why scammer’s deceptive tactics are sometimes successful.

Details

Information & Computer Security, vol. 31 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 July 2022

Jinnan Wu, Mengmeng Song, Pablo Zoghbi-Manrique-de-Lara, Hemin Jiang, Shanshan Guo and Wenpei Zhang

This study investigated why employees' cyberloafing behavior is affected by their coworkers' cyberloafing behavior. By integrating social learning theory and deterrence theory

1046

Abstract

Purpose

This study investigated why employees' cyberloafing behavior is affected by their coworkers' cyberloafing behavior. By integrating social learning theory and deterrence theory, the authors developed a model to explain the role of employees' perceived certainty of formal and informal sanctions in understanding the effect of coworkers' cyberloafing behavior on employees' cyberloafing behavior.

Design/methodology/approach

The authors conducted a survey that involved a two-stage data collection process (including 293 respondents) to test our developed model. Mplus 7.0 was used to analyze the data.

Findings

The results revealed that employees' cyberloafing was positively affected by their coworkers' cyberloafing both directly and indirectly. The indirect effect of coworkers' cyberloafing on employees' cyberloafing was mediated by the employees' perceived certainty of formal and informal sanctions on cyberloafing. Employees' perceived certainty of formal and informal sanctions were found to mediate the relationship both separately (each type of sanctions mediates the relationship individually) and in combination (the two types of sanctions form a serial mediation effect).

Originality/value

The study reveals an important mechanism – employees’ perceived certainty of formal and informal sanctions – that underlies the relationship between coworkers' cyberloafing and employees' cyberloafing, thus, contributing to the cyberloafing literature. It also demonstrates the importance of negative reinforcement (perceived sanctions) in the social learning process, which contributes to the literature on social learning theory because previous studies have primarily focused on the role of positive reinforcement. Lastly, the study reveals a positive relationship between employees' perceived certainty of formal sanctions and informal sanctions, which has important implications for deterrence theory.

Details

Information Technology & People, vol. 36 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Abstract

Details

Sociological Theory and Criminological Research
Type: Book
ISBN: 978-0-85724-054-5

Article
Publication date: 1 May 2002

Jintae Lee and Younghwa Lee

Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in…

3618

Abstract

Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in organizations. They are based on the general deterrence theory, which posits that when an organization implements countermeasures that threaten abusers, its computer abuse problems would be deterred. However, computer abuse problems persist in many organizations despite these measures. This article proposes a new model of computer abuse that extends the traditional model with the social criminology theories. Focusing on computer abuse within organizations, the model explains the phenomenon through social lenses such as social bonds and social learning. The new model contributes to our theoretical body of knowledge on computer abuse by providing a new angle for approaching the problem. It suggests to practitioners that both technical and social solutions should be implemented to reduce the pervasive computer abuse problems.

Details

Information Management & Computer Security, vol. 10 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 August 2002

Gary Jensen

Messner and Rosenfeld have proposed an institutional anomie theory of crime, incorporating the proposition that societal investments in programs to buffer citizens from capricious…

1515

Abstract

Messner and Rosenfeld have proposed an institutional anomie theory of crime, incorporating the proposition that societal investments in programs to buffer citizens from capricious market forces (decommodification) are inversely related to rates of lethal violence among societies. They support this argument through an analysis of variations in homicide rates among nations. However, the research relevant to their theory is quite limited with numerous claims and arguments yet to be examined. This paper outlines several limitations of the theory and brings data from the World Values Surveys and other sources to bear on their characterization of American culture in comparison to other nations, their arguments about the impact of economic dominance on other institutions, and alternative explanations of the link between decommodification and homicide. Finally, the relevance of the theory to serious property crime is considered and shown to generate serious problems for institutional anomie theory when evaluated as a general theory of crime.

Details

International Journal of Sociology and Social Policy, vol. 22 no. 7/8
Type: Research Article
ISSN: 0144-333X

Keywords

Open Access
Article
Publication date: 21 October 2021

Iman Ragaei Kamel, Samir Abd El Wahab and Iman Karam I.M. Ashmawy

The aim of the study is to examine the effect of public attitude on petty corruption.

1354

Abstract

Purpose

The aim of the study is to examine the effect of public attitude on petty corruption.

Design/methodology/approach

This is a survey study on customers of a licenses providing authority (N = 390) in Cairo, Egypt. The authors use Akers social learning theory of crime and deviance and take into consideration criticisms of it. The authors control for individual and organizational level determinants that are identified by scholars as influencing people's attitudes toward corruption and which could be known through the authority customers' experiences. Because the dependent variable is binary, whether a person paid a bribe during last transaction with this authority or not, the authors use binary logistic regression.

Findings

The findings indicate that people are more likely to engage in petty corruption when they see it as acceptable, have previous petty corruption experience and when they use a mediator. Also, of those who dealt with that civil service authority during and directly after the 25th of January Revolution (N = 161) 31% reported that they did not engage in petty corruption in comparison to previous years. They referred this to a change in attitude at the time.

Originality/value

The policy implications of the research are important. Social science theories could generate cultural and policy relevant solutions for petty corruption; however, they have not been taken full advantage of. Also, experience-based country-specific corruption survey studies are important input for an effective anti-corruption policy.

Details

Journal of Humanities and Applied Social Sciences, vol. 4 no. 5
Type: Research Article
ISSN: 2632-279X

Keywords

Book part
Publication date: 19 May 2008

Ronald L. Akers, Jodi Lane and Lonn Lanza-Kaduce

This chapter focuses on restorative/rehabilitative faith-based programs, in particular, a youth mentoring program conducted by the Florida Department of Juvenile Justice. We begin…

Abstract

This chapter focuses on restorative/rehabilitative faith-based programs, in particular, a youth mentoring program conducted by the Florida Department of Juvenile Justice. We begin with a brief description of a faith- and community-based juvenile mentoring program of the Florida Department of Juvenile Justice (which we are in the process of evaluating) intended to provide community reintegration and restoration of adjudicated delinquents released from state juvenile correctional facilities. Then we move to the overlapping theoretical, philosophical, and empirical backgrounds of restorative justice, faith-based rehabilitative/restorative, and mentoring programs. We conclude with a review of programmatic and empirical issues in faith-based mentoring programs.

Details

Restorative Justice: from Theory to Practice
Type: Book
ISBN: 978-0-7623-1455-3

Article
Publication date: 19 March 2021

Christopher M. Donner, Jon Maskály, Wesley G. Jennings and Cynthia Guzman

The purpose of this paper is to review the extant published literature using traditional criminological theories in an effort to explain police misconduct.

1468

Abstract

Purpose

The purpose of this paper is to review the extant published literature using traditional criminological theories in an effort to explain police misconduct.

Design/methodology/approach

This paper reflects a narrative meta-review of through a search of several academic databases (e.g. Criminal Justice Abstracts, Criminology: A SAGE Full Text Collection, EBSCO Host and PsychInfo). Twenty-nine studies, across six theoretical perspectives, were identified and reviewed.

Findings

The extant research generally suggests that traditional criminological theory is useful in explaining misconduct.

Practical implications

The findings call on agencies to continually strengthen their recruiting and hiring processes to select recruits with suitable characteristics, and to improve their early warning systems to detect officers with patterns of problematic behavior. Also, the findings call for multiple avenues of future scholarship, namely, in theory development/integration and in refining the measurement of police misconduct.

Originality/value

This paper will be useful for researchers who wish to further explore the etiology of misconduct, and for police administrators who wish to reduce the prevalence of such behavior.

Details

Policing: An International Journal, vol. 44 no. 5
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 6 July 2015

Catherine D. Marcum, George E Higgins, Melissa L. Ricketts and Scott E Wolfe

The purpose of the paper is to contribute to the gap in the literature by investigating the identity theft behaviors of adolescents under the age of 18 and the predictors of these…

1433

Abstract

Purpose

The purpose of the paper is to contribute to the gap in the literature by investigating the identity theft behaviors of adolescents under the age of 18 and the predictors of these behaviors. To better understand the predictors of hacking behaviors in young people, two criminological theories, general theory of crime and social learning theory, are utilized.

Design/methodology/approach

A rural county in western North Carolina was chosen to participate in the study. Principals of four high schools in this county agreed to participate. All 9th through 12th graders were recruited for the study. Those who were given parental permission to participate and gave their own assent were given a survey.

Findings

Results indicated that low self-control and deviant peer association were in fact associated with identity theft behaviors of juveniles.

Originality/value

The literature is scant, if even existent, on research that investigates the identity theft offending behaviors of juveniles.

Details

Journal of Financial Crime, vol. 22 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of 406