Search results
1 – 10 of 406James Hawdon and Matthew Costello
Purpose – This chapter investigates if Ronald Aker’s Social Structure Social Learning (SSSL) theory can help explain who is involved with the production of online materials…
Abstract
Purpose – This chapter investigates if Ronald Aker’s Social Structure Social Learning (SSSL) theory can help explain who is involved with the production of online materials considered hateful or extremist.
Methodology/Approach – After discussing how SSSL can account for becoming exposed to online extremism and then becoming involved in its production, the authors conduct a logistic regression on data from 1,008 American adults that predicts if they produced online hate materials with variables derived from SSSL.
Findings – Results strongly support SSSL. While structural factors such as the respondents’ differential social organization, differential social location, and differential location in the social structure predict production of online hate materials, the effect of these factors is largely mediated once social learning variables are included in the model. Specifically, the respondents’ general definitions related to violence, specific definitions related to hate speech, and differential association accounts for variation in the production of online hate materials.
Originality/Value – This research contributes to the literature in two primary ways: (1) the authors investigate a critical, yet understudied, factor involved in the radicalization process; and (2) the authors demonstrate that a leading criminological theory applies to this form of deviance. This research also suggests key variables for creating strategies for countering violent extremism.
Details
Keywords
This study aims to examine how advance fee fraud (AFF) scammers build their criminal expertise over time and why the AFF scamming deception process succeeds.
Abstract
Purpose
This study aims to examine how advance fee fraud (AFF) scammers build their criminal expertise over time and why the AFF scamming deception process succeeds.
Design/methodology/approach
This study is interpretive, based on case study interview data with two scammers operating in Africa. The interviews were done over a period of time, and the data collection and analysis processes were iterative, primarily driven by the interview data.
Findings
The authors identify four processes that explain how scammers build criminal expertise, namely, socializing with scammers, accepting scamming definitions, practicing scamming techniques and manipulating digital technologies. The fourth process (manipulating digital technologies) also explains why scammer’s tactics are successful.
Originality/value
AFF scamming is a major crime affecting individuals and organizations worldwide, yet it remains under researched as little is known about scammers, their expertise and why their deceptive techniques are successful. The first contribution identifies four processes by which individuals build scamming criminal expertise as they transition from scammers-in-the-making to full-blown active scammers. The second contribution identifies the rationalizations used by scammers-in-the-making and scammers to justify transitioning into scamming and engaging in scamming criminality. The third contribution explains how the digital environment contributes to the processes of building scamming criminal expertise and why scammer’s deceptive tactics are sometimes successful.
Details
Keywords
Jinnan Wu, Mengmeng Song, Pablo Zoghbi-Manrique-de-Lara, Hemin Jiang, Shanshan Guo and Wenpei Zhang
This study investigated why employees' cyberloafing behavior is affected by their coworkers' cyberloafing behavior. By integrating social learning theory and deterrence theory…
Abstract
Purpose
This study investigated why employees' cyberloafing behavior is affected by their coworkers' cyberloafing behavior. By integrating social learning theory and deterrence theory, the authors developed a model to explain the role of employees' perceived certainty of formal and informal sanctions in understanding the effect of coworkers' cyberloafing behavior on employees' cyberloafing behavior.
Design/methodology/approach
The authors conducted a survey that involved a two-stage data collection process (including 293 respondents) to test our developed model. Mplus 7.0 was used to analyze the data.
Findings
The results revealed that employees' cyberloafing was positively affected by their coworkers' cyberloafing both directly and indirectly. The indirect effect of coworkers' cyberloafing on employees' cyberloafing was mediated by the employees' perceived certainty of formal and informal sanctions on cyberloafing. Employees' perceived certainty of formal and informal sanctions were found to mediate the relationship both separately (each type of sanctions mediates the relationship individually) and in combination (the two types of sanctions form a serial mediation effect).
Originality/value
The study reveals an important mechanism – employees’ perceived certainty of formal and informal sanctions – that underlies the relationship between coworkers' cyberloafing and employees' cyberloafing, thus, contributing to the cyberloafing literature. It also demonstrates the importance of negative reinforcement (perceived sanctions) in the social learning process, which contributes to the literature on social learning theory because previous studies have primarily focused on the role of positive reinforcement. Lastly, the study reveals a positive relationship between employees' perceived certainty of formal sanctions and informal sanctions, which has important implications for deterrence theory.
Details
Keywords
Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in…
Abstract
Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in organizations. They are based on the general deterrence theory, which posits that when an organization implements countermeasures that threaten abusers, its computer abuse problems would be deterred. However, computer abuse problems persist in many organizations despite these measures. This article proposes a new model of computer abuse that extends the traditional model with the social criminology theories. Focusing on computer abuse within organizations, the model explains the phenomenon through social lenses such as social bonds and social learning. The new model contributes to our theoretical body of knowledge on computer abuse by providing a new angle for approaching the problem. It suggests to practitioners that both technical and social solutions should be implemented to reduce the pervasive computer abuse problems.
Details
Keywords
Messner and Rosenfeld have proposed an institutional anomie theory of crime, incorporating the proposition that societal investments in programs to buffer citizens from capricious…
Abstract
Messner and Rosenfeld have proposed an institutional anomie theory of crime, incorporating the proposition that societal investments in programs to buffer citizens from capricious market forces (decommodification) are inversely related to rates of lethal violence among societies. They support this argument through an analysis of variations in homicide rates among nations. However, the research relevant to their theory is quite limited with numerous claims and arguments yet to be examined. This paper outlines several limitations of the theory and brings data from the World Values Surveys and other sources to bear on their characterization of American culture in comparison to other nations, their arguments about the impact of economic dominance on other institutions, and alternative explanations of the link between decommodification and homicide. Finally, the relevance of the theory to serious property crime is considered and shown to generate serious problems for institutional anomie theory when evaluated as a general theory of crime.
Details
Keywords
Iman Ragaei Kamel, Samir Abd El Wahab and Iman Karam I.M. Ashmawy
The aim of the study is to examine the effect of public attitude on petty corruption.
Abstract
Purpose
The aim of the study is to examine the effect of public attitude on petty corruption.
Design/methodology/approach
This is a survey study on customers of a licenses providing authority (N = 390) in Cairo, Egypt. The authors use Akers social learning theory of crime and deviance and take into consideration criticisms of it. The authors control for individual and organizational level determinants that are identified by scholars as influencing people's attitudes toward corruption and which could be known through the authority customers' experiences. Because the dependent variable is binary, whether a person paid a bribe during last transaction with this authority or not, the authors use binary logistic regression.
Findings
The findings indicate that people are more likely to engage in petty corruption when they see it as acceptable, have previous petty corruption experience and when they use a mediator. Also, of those who dealt with that civil service authority during and directly after the 25th of January Revolution (N = 161) 31% reported that they did not engage in petty corruption in comparison to previous years. They referred this to a change in attitude at the time.
Originality/value
The policy implications of the research are important. Social science theories could generate cultural and policy relevant solutions for petty corruption; however, they have not been taken full advantage of. Also, experience-based country-specific corruption survey studies are important input for an effective anti-corruption policy.
Details
Keywords
Ronald L. Akers, Jodi Lane and Lonn Lanza-Kaduce
This chapter focuses on restorative/rehabilitative faith-based programs, in particular, a youth mentoring program conducted by the Florida Department of Juvenile Justice. We begin…
Abstract
This chapter focuses on restorative/rehabilitative faith-based programs, in particular, a youth mentoring program conducted by the Florida Department of Juvenile Justice. We begin with a brief description of a faith- and community-based juvenile mentoring program of the Florida Department of Juvenile Justice (which we are in the process of evaluating) intended to provide community reintegration and restoration of adjudicated delinquents released from state juvenile correctional facilities. Then we move to the overlapping theoretical, philosophical, and empirical backgrounds of restorative justice, faith-based rehabilitative/restorative, and mentoring programs. We conclude with a review of programmatic and empirical issues in faith-based mentoring programs.
Christopher M. Donner, Jon Maskály, Wesley G. Jennings and Cynthia Guzman
The purpose of this paper is to review the extant published literature using traditional criminological theories in an effort to explain police misconduct.
Abstract
Purpose
The purpose of this paper is to review the extant published literature using traditional criminological theories in an effort to explain police misconduct.
Design/methodology/approach
This paper reflects a narrative meta-review of through a search of several academic databases (e.g. Criminal Justice Abstracts, Criminology: A SAGE Full Text Collection, EBSCO Host and PsychInfo). Twenty-nine studies, across six theoretical perspectives, were identified and reviewed.
Findings
The extant research generally suggests that traditional criminological theory is useful in explaining misconduct.
Practical implications
The findings call on agencies to continually strengthen their recruiting and hiring processes to select recruits with suitable characteristics, and to improve their early warning systems to detect officers with patterns of problematic behavior. Also, the findings call for multiple avenues of future scholarship, namely, in theory development/integration and in refining the measurement of police misconduct.
Originality/value
This paper will be useful for researchers who wish to further explore the etiology of misconduct, and for police administrators who wish to reduce the prevalence of such behavior.
Details
Keywords
Catherine D. Marcum, George E Higgins, Melissa L. Ricketts and Scott E Wolfe
The purpose of the paper is to contribute to the gap in the literature by investigating the identity theft behaviors of adolescents under the age of 18 and the predictors of these…
Abstract
Purpose
The purpose of the paper is to contribute to the gap in the literature by investigating the identity theft behaviors of adolescents under the age of 18 and the predictors of these behaviors. To better understand the predictors of hacking behaviors in young people, two criminological theories, general theory of crime and social learning theory, are utilized.
Design/methodology/approach
A rural county in western North Carolina was chosen to participate in the study. Principals of four high schools in this county agreed to participate. All 9th through 12th graders were recruited for the study. Those who were given parental permission to participate and gave their own assent were given a survey.
Findings
Results indicated that low self-control and deviant peer association were in fact associated with identity theft behaviors of juveniles.
Originality/value
The literature is scant, if even existent, on research that investigates the identity theft offending behaviors of juveniles.
Details