Cybercrime and Strain Theory: An Examination of Online Crime and Gender
DOI:
https://doi.org/10.6000/1929-4409.2024.13.19Keywords:
Strain, general strain theory, gender, women, cybercrime, cyber offendingAbstract
Purpose: Historically, cybercrime has been seen as a near exclusively male activity. We were interested to learn whether the relationship between strain and crime holds for both males and females.
Methods: We utilized an online survey instrument to collect data from a national sample of individuals (n=2,121) representing the US population by age, gender, race and ethnicity. We asked offending related questions regarding various cybercrimes. In the current study, we use data from 390 individuals who reported a cybercrime activity within the past 12 months.
Results: We find strong support for prior strains correlating with both specific (e.g., illegal uploading) and general cyber-offending. We further examine whether gender interacts with strain. While general strain theory (GST) correlates with cyber-offending for both males and females, we did find a few important differences. Except for lack of trust in others and receiving unsatisfactory evaluation at school or work, there are different variables responsible for online offending for men and women. Parents’ divorcing, anonymity, and online video gaming increase cybercrime offending in women, whereas falling victim to a crime, breaking up with a significant other, and darkweb activity are correlated with cyber-offending for men.
Conclusion: Although GST functions differently by gender when it comes to engaging in cyber-offending, the theory is indeed gender-specific, as different strain variables are responsible for engaging in cyber-offending in women and men. Components of general strain responsible for cyber-offending need to be further studied concerning gender. According to our results, GST is gender-specific, and these variables need to be further studied.
References
Abubakari, Yushawu. 2024. “The Espouse of Women in the Online Romance Fraud World: Role of Sociocultural Experiences and Digital Technologies.” Deviant Behavior 45(5): 708-735. https://doi.org/10.1080/01639625.2023.2263137
Agnew, Robert. 1992. “Foundation for a General Strain Theory of Crime and Delinquency.” Criminology 30(1): 47-88. https://doi.org/10.1111/j.1745-9125.1992.tb01093.x
Agnew, Robert. 2001. “Building on the Foundation of General Strain Theory: Specifying the Types of Strain Most Likely to Lead to Crime and Delinquency.” Journal of Research in Crime & Delinquency 38(4): 319-61. Agnew, Robert. 2006. Pressured into Crime: An overview of General Strain Theory. Roxbury Publishing; Los Angeles, CA. https://doi.org/10.1177/0022427801038004001
Agnew, Robert, and Timothy Brezina. 1997. “Relational Problems with Peers: Gender and Delinquency.” Youth & Society 29(1): 84-111. https://doi.org/10.1177/0044118X97029001004
Agnew, Robert, Timothy Brezina, J. P. Wright, and Francis T. Cullen. 2002. “Strain, Personality Traits, and Delinquency: Extending General Strain Theory.” Criminology 40(1): 43-72. Akers, Ronald L., and Christine S. Sellers. 2009. Criminological Theories: Introduction, Evaluation, And Application (5th ed.) New York: Oxford University Press. https://doi.org/10.1111/j.1745-9125.2002.tb00949.x
Alper, M. 2014. “‘Can our kids hack it with computers?’ Constructing Youth Hackers in Family Computing Magazines (1983-1987).” International Journal of Communications 8(1): 673-98. https://www.hackingculture.org/sites/default/files/articles/alper--can-our-kids-hack-it-with-computers.pdf.
Barlett, Christopher, and Sarah M. Coyne. 2014. “A Meta-analysis of Sex Differences in Cyber-Bullying Behavior: The Moderating Role of Age.” Aggressive Behavior 40(5): 474-88. https://doi.org/10.1002/ab.21555
Barnett, T. Jr., S. Jain, U. Andra, and T. Khurana. 2018. “Cisco Visual Networking Index: Forecast and Trends, 2017-2022 White Paper, APJC Cisco Knowledge Network (CKN) Presentation”. https://www.cisco.com/c/dam/m/en_us/ network-intelligence/service-provider/digital-transformation/knowledge-network-webinars/pdfs/1213-business-services-ckn.pdf.
Baron, Stephen W. 2004. “General Strain, Street Youth and Crime: A Test of Agnew’s Revised Theory.” Criminology 42(2): 457-84. https://doi.org/10.1111/j.1745-9125.2004.tb00526.x
Baron, Stephen. 2007. “Street Youth, Gender, Financial Strain, and Crime: Exploring Broidy and Agnew’s Extension to General Strain Theory.” Deviant Behavior 28(3): 273-302. https://doi.org/10.1080/01639620701233217
Bondoc, Custodio E., and Tumibay Gilbert Malawit. 2020. “Cybersecurity for higher education institutions: adopting regulatory framework.” Global Journal of Engineering and Technology Advances 2(3): 016-021. https://doi.org/10.30574/gjeta.2020.2.3.0013
Bossler, A., and T. Holt. 2009. “On-Line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory.” International Journal of Cyber Criminology 3(1): 400-20.
Bossler, A. M., and G. W. Burruss. 2011. “The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?.” In Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by T. J. Holt, and B. H. Schell: 38-67. Hershey, PA: IGI Global. https://doi.org/10.4018/978-1-61692-805-6.ch003
Broidy, L., and Robert Agnew. 1997. “Gender and Crime: A General Strain Theory Perspective.” Journal of Research in Crime & Delinquency 34(3): 275-306. https://doi.org/10.1177/0022427897034003001
Broidy, Lisa M. 2001. “A Test of General Strain Theory.” Criminology 39(1): 9-36. https://doi.org/10.1111/j.1745-9125.2001.tb00915.x
Calvete, Esther, Izaskun Orue, Ana Estévez, Lourdes Villardón, and Patricia Padilla. 2010. “Cyberbullying in Adolescents: Modalities and Aggressors’ Profile.” Computers in Human Behavior 26(5): 1128-35. Cole, Rhiannon, Shadman Latif and Md. Minhaz Chowdhury. 2021. “Darkweb: A Facilitator of Crime.” 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Mauritius, 2021, pp. 1-6. https://doi.org/10.1109/ICECCME52200.2021.9591011
Craig, Benjamin M., Ron D. Hays, A. Simon Pickard, David Cella, Dennis A. Revicki, and Bryce B. Reeve. 2013. “Comparison Of US Panel Vendors To Online Surveys.” Journal of Medical Internet Research, 15(11): e260. https://doi.org/10.2196/jmir.2903
Craig, Jessica M., Stephanie M. Cardwell, and Alex R. Piquero. 2017. “The Effects of Criminal Propensity and Strain on Later Offending.” Crime & Delinquency 63(13): 1655-81. https://doi.org/10.1177/0011128716665334
Dancey, C., and J. Reidy. 2004. Statistics Without Math for Psy-chology: Using SPSS for Windows. London: Prentice Hall.
Dearden, Thomas E., and Katalin Parti. 2021. “Cybercrime, Differential Association, and Self-Control: Knowledge Transmission Through Online Social Learning.” American Journal of Criminal Justice 46: 935-955. https://doi.org/10.1007/s12103-021-09655-4
De Coster, Stacy, and Rena Cornell Zito. 2010. “Gender and general strain theory: The gendering of emotional experiences and expressions.” Journal of Contemporary Criminal Justice 26(2): 224-245. https://doi.org/10.1177/1043986209359853
Denner, J. 2011. “What Predicts Middle School Girls’ Interest in Computing?” International Journal of Gender. Science & Technology 3(1): 53-69. http://genderandset.open.ac.uk/ index.php/genderandset/article/view/106/245.
D’Hondt, K. 2016. “Women in Cybersecurity.” Harvard Kennedy School of Government. https://wappp.hks.harvard.edu/files/ wappp/files/dhondt_pae.pdf.
Dilmaç, B. 2009. “Psychological Needs as a Predictor of Cyber Bullying: A Preliminary Report on College Students.” Kuram ve Uygulamada Egitim Bilimleri 9, no. 3: 1307-25. https://eric.ed.gov/?id=EJ858926.
Donner, Christopher M., Catherine D. Marcum, Wesley G. Jennings, George E. Higgins, and Jerry Banfield. 2014. “Low Self-Control and Cybercrime: Exploring the Utility of the General Theory of Crime Beyond Digital Piracy.” Computers in Human Behavior 34: 165-72. Eitle, David. 2010. “General Strain Theory, Persistence, And Desistance Among Young Adult Males.” Journal of Criminal Justice 38(6): 1113-1121. https://doi.org/10.1016/j.jcrimjus.2010.08.003
Evans, Joel R., and Anil Mathur. 2005. “The Value of Online Surveys.” Internet Research 15(2): 195-219.Gainey, Randy R., Jay S. Albanese, Tancy Vandecar-Burdin, James Hawdon, Thomas E. Dearden, and Katalin Parti. 2023. “Routine citizen Internet practices and cyber victimization: a state-wide study in Virginia.” Criminal Justice Studies, 36(3), 228-250. https://doi.org/10.1080/1478601X.2023.2254094
Hawdon, James, Colin Bernatzky, and Matthew Costello. 2019. “Cyber-Routines, Political Attitudes, and Exposure to Violence-Advocating Online Extremism.” Social Forces 98(1): 329-54. https://doi.org/10.1093/sf/soy115
Hawdon, James, Katalin Parti and Thomas Dearden. 2022. “Changes in Online Illegal Drug Buying during COVID-19: Assessing Effects due to a Changing Market or Changes in Strain using a Longitudinal Sample Design.” American Journal of Criminal Justice 47: 712-734. https://doi.org/10.1007/s12103-022-09698-1
Hawdon, James, Katalin Parti, and Thomas Dearden. 2020. “Cybercrime in America amid COVID. The initial results of a natural experiment.” American Journal of Criminal Justice 45(4): 546-562. https://doi.org/10.1007/s12103-020-09534-4
Hay, Carter. 2003. “Family Strain, Gender, and Delinquency.” Sociological Perspectives 46(1): 107-35. https://doi.org/10.1525/sop.2003.46.1.107
Hay, Carter, Ryan Meldrum, and Karen Mann. 2010. “Traditional bullying, cyber bullying, and deviance: A general strain theory approach.” Journal of Contemporary Criminal Justice 26(2): 130-147. https://doi.org/10.1177/1043986209359557
Hay, C., and K. Ray. 2020. “General Strain Theory and Cybercrime.” In The Palgrave Handbook of International Cybercrime and Cyberdeviance: 583-600. https://doi.org/10.1007/978-3-319-78440-3_21
Hay, Carter, and Michelle M. Evans. 2006. “Violent Victimization and Involvement in Delinquency: Examining Predictions from General Strain Theory.” Journal of Criminal Justice 34(3): 261-74. https://doi.org/10.1016/j.jcrimjus.2006.03.005
Hinduja, Sameer. 2007. “Neutralization Theory and Online Software Piracy: An Empirical Analysis.” Ethics & Information Technology 9(3): 187-204. https://doi.org/10.1007/s10676-007-9143-5
Hinduja, Sameer, and Justin W. Patchin. 2007. “Offline Consequences of Online Victimization: School Violence and Delinquency.” Journal of School Violence 6(3): 89-112.Hoffman, John P., and Alan S. Miller. 1998. A latent variable analysis of strain theory. Journal of Quantitative Criminology 14:83-110. https://doi.org/10.1300/J202v06n03_06
Hoffman, John P., and Felicia Grey Cerbone. 1999. “Stressful Life Events And Delinquency Escalation In Early Adolescence.” Criminology 37(2): 343-374. https://doi.org/10.1111/j.1745-9125.1999.tb00489.x
Holt, Thomas J., and Adam M. Bossler. 2008. “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization.” Deviant Behavior 30(1): 1-25. https://doi.org/10.1080/01639620701876577
Holt, Thomas J., and Adam M. Bossler. 2014. “An Assessment of the Current State of Cybercrime Scholarship.” Deviant Behavior 35(1): 20-40. https://doi.org/10.1080/01639625.2013.822209
Holt, Thomas J., Adam M. Bossler, Rebecca Malinski, and David C. May. 2016. “Identifying predictors of unwanted online sexual conversations among youth using a low self-control and routine activity framework.” Journal of Contemporary Criminal Justice 32(2), 108-128. https://doi.org/10.1177/1043986215621376
Holt, Thomas J., George W. Burruss, and Adam M. Bossler. 2010. “Social Learning and Cyber-Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World.” Journal of Crime & Justice 33(2): 31-61. https://doi.org/10.1080/0735648X.2010.9721287
Holt, Thomas J., and Robert G. Morris. 2009. “An Exploration of the Relationship Between MP3 Player Ownership and Digital Piracy.” Criminal Justice Studies 22(4): 381-92. https://doi.org/10.1080/14786010903358109
Isom Scott, Deena A., and Toniqua Mikell. 2019. “‘Gender’ and General Strain Theory: Investigating the Impact of Gender Socialization on Young Women’s Criminal Outcomes.” Journal of Crime & Justice 42(4): 393-413. https://doi.org/10.1080/0735648X.2018.1559754
Jagayat, Arvin and Becky L. Choma 2021. “Cyber-Aggression Towards Women: Measurement And Psychological Predictors In Gaming Communities.” Computers in Human Behavior 120: 106753. https://doi.org/10.1016/j.chb.2021.106753
Joon Jang, Sung J. 2007. “Gender Differences in Strain, Negative Emotions, and Coping Behaviors: A General Strain Theory Approach.” Justice Quarterly 24(3): 523-53. https://doi.org/10.1080/07418820701485486
Kaufman, Joanne M. 2009. “Gendered Responses to Serious Strain: The Argument for a General Strain Theory of Deviance.” Justice Quarterly 26(3): 410-444. https://doi.org/10.1080/07418820802427866
Kowalski, R. M., G. W. Giumetti, A. W. Schroeder, and H. H. Reese. 2012. “Cyber Bullying Among College Students: Evidence Domains of College Life.” In Misbehavior Online in Higher Education, edited by C. Wankel, and L. Wankel: 293-321. Bingley, UK: Emerald Publishing Group. https://doi.org/10.1108/S2044-9968(2012)0000005016
Kowalski, Robin M., and Susan P. Limber. 2007. “Electronic Bullying Among Middle School Students.” Journal of Adolescent Health 41(6) Suppl. 1: S22-S30. https://doi.org/10.1016/j.jadohealth.2007.08.017
LeClair, J., L. Shih, and S. Abraham. 2014. “Women in STEM and Cyber Security Fields.” In Proceedings of the 2014 Conference for the Industry and Education Collaboration. Savannah, (GA): American Society for Engineering Education.
Leukfeldt, Eric Rutger, & Majid Yar. 2016. “Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis.” Deviant Behavior, 37(3): 263-280. https://doi.org/10.1080/01639625.2015.1012409
Lianos, Helen, and Andrew McGrath. 2018. “Can the general theory of crime and general strain theory explain cyberbullying perpetration?” Crime & Delinquency 64(5): 674-700. https://doi.org/10.1177/0011128717714204
MacInnis, B., Jon A. Krosnick, Annabell S. Ho, and Mu-Jung Cho. 2018. “The Accuracy of Measurements with Probability and Nonprobability Survey Samples: Replication and Extension.” Public Opinion Quarterly 82(4): 707-44. https://doi.org/10.1093/poq/nfy038
Mann, H. B., and D. R. Whitney. 1947. “On a Test of Whether One of Two Random Variables Is Stochastically Larger than the Other.” Annals of Mathematical Statistics 18(1): 50-60. https://doi.org/10.1214/aoms/1177730491
Marcum, C. D., G. E. Higgins, T. L. Freiburger, and M. L. Ricketts. 2012. “An Examination of Male and Female Cyber Bullying” Battle of the Sexes. International Journal of Cyber Criminology 6(1): 904-11. https://libres.uncg.edu/ir/asu/f/ Marcum_CD_2012_Battle_of_the_Sexes.pdf.Mazerolle, Paul, and Alex Piquero. 1998. “Linking exposure to strain with anger: An investigation of deviant adaptations.” Journal of Criminal Justice 26(3): 195-211. https://doi.org/10.1016/S0047-2352(97)00085-8
Mears, Tarnia (2021) “Female Power Fantasy: Women And Resistance In Games And Gamer Culture.” Doctoral thesis. University of East Anglia: United Kingdom.
Merton, Robert K. 1938. “Social Structure and Anomie.” American Sociological Review 3(5): 672-82. https://doi.org/10.2307/2084686
Moon, Byongook, and Sung J. Jang. 2014. “A General Strain Approach to Psychological and Physical Bullying: A Study of Interpersonal Aggression at School.” Journal of Interpersonal Violence 29(12): 2147-71. https://doi.org/10.1177/0886260513516863
Moon, Byongook, and Merry Morash. 2017. “Gender and General Strain Theory: A Comparison of Strains, Mediating, and Moderating Effects Explaining Three Types of Delinquency.” Youth & Society 49(4): 484-504. https://doi.org/10.1177/0044118X14541877
Neter, J., M. H. Kutner, C. J. Nachtsheim, and W. Wasserman. 1996. Applied Linear Regression Models. 3rd ed. Chicago: Irwin Publishing.
Ngo, Fawn T., and Karuppannan Jaishankar. 2017. “Commemorating a Decade in Existence of the International Journal of Cyber Criminology: A Research Agenda to Advance the Scholarship on Cybercrime.” International Journal of Cyber Criminology 11(1): 1-9. Ngo, Fawn T. and Raymond Paternoster 2011. “Cybercrime victimization: An examination of individuals and situational level factors.” International Journal of Cyber Criminology 5(1): 773-793.
Parti, Katalin, Thomas Dearden, and James Hawdon. 2024. “Perspectives of Paid Panel Survey Research in Cybercrime Victimization and Offending Validity of global online market research sampling and data collection.” In Graham, R.S., Humer, S.G., Lee, C.S., & Nagy, V. (Eds.). The Routledge International Handbook of Online Deviance (1st ed.). pp. 114-131. Routledge. https://doi.org/10.4324/9781003277675
Patchin, Justin W., and Sameer Hinduja. 2011. “Traditional and Nontraditional Bullying Among Youth: A Test of General Strain Theory.” Youth & Society 43(2): 727-51. Paternoster, Raymond, and Paul Mazerolle. 1994. “General Strain Theory And Delinquency: A Replication And Extension.” Journal of Research in Crime and Delinquency 31: 235-263. https://doi.org/10.1177/0022427894031003001
Peacock, D., and A. Irons. 2017. “Gender Inequalities in Cybersecurity: Exploring the Gender Gap in Opportunities and Progression”. International Journal of Gender. Science & Technology 9(1): 25-44.
Rebellon, Cesar J., Michelle E. Manasse, Karen T. Van Gundy, and Ellen S. Cohn. 2012. “Perceived Injustice and Delinquency: A Test of General Strain Theory.” Journal of Criminal Justice 40(3): 230-7. https://doi.org/10.1016/j.jcrimjus.2012.02.001
Reed, J., Y. Zhong, L. Terwoerds, and J. Brocaglia. 2017. Global Information Security Workforce Study: Women in Cybersecurity. Vol. 2017. Center for Cyber Safety and Education and Executive Women’s Forum on Information Security, Risk Management and Privacy. https://tinyurl.com/ yyms5td6.
Reyns, Bradford W. 2017. “Routine Activity Theory and Cybercrime. A Theoretical Appraisal and Literature Review” In K. Steinmetz and M.R. Nobles (ed.) Technocrime and Criminological Theory. (pp. 35-55) London: Routledge. https://doi.org/10.4324/9781315117249-3
Reyns, Bradford W. 2013. “Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory Beyond Direct-Contact Offenses.” Journal of Research in Crime & Delinquency 50(2): 216-38. https://doi.org/10.1177/0022427811425539
Reyns, Bradford W., Bonnie S. Fisher, Adam M. Bossler, and Thomas J. Holt. 2019. “Opportunity and Self-Control: Do They Predict Multiple Forms of Online Victimization?.” American Journal of Criminal Justice 44(1): 63-82. https://doi.org/10.1007/s12103-018-9447-5
Robbers, Monica L. P. 2004. “Revisiting the Moderating Effect of Social Support on Strain: A Gendered Test.” Sociological Inquiry 74(4): 546-69. https://doi.org/10.1111/j.1475-682X.2004.00104.x
Sanders, J. 2005. “Gender and Technology in Education: A Research Review”. http://www.josanders.com/pdf/ gendertech0705.pdf.
Schmitz, Kelsey Catherine. 2018. “Shut Up and Play, or Get Out: A Pedagogy of Gendered Digital Identities in Video Gaming.” Doctoral Thesis. University of Ottawa, Canada.
Shaw, Adrienne. 2014. Gaming at The Edge. Sexuality and Gender at The Margins of The Gamer Culture. Minneapolis, MN: University of Minnesota Press. https://doi.org/10.5749/minnesota/9780816693153.001.0001
Simmons, Alicia D., and Lawrence D. Bobo. 2015. “Can Non-full-Probability Internet Surveys Yield Useful Data? A Comparison with Full-Probability Face-to-Face Surveys in the Domain of Race and Social Inequality Attitudes.” Sociological Methodology 45(1): 357-87. https://doi.org/10.1177/0081175015570096
Sobieraj, Sarah. 2020. Credible Threat. Attacks Against Women Online and The Future Of Democracy. New York: NY, Oxford University Press. https://doi.org/10.1093/oso/9780190089283.001.0001
Sourander, Andre, Anat B. Brunstein Klomek, Maria Ikonen, Jarna Lindroos, Terhi Luntamo, Merja Koskelainen, Terja Ristkari, and Hans Helenius. 2010. “Psychosocial Risk Factors Associated with Cyberbullying Among Adolescents: A Population-Based Study.” Archives of General Psychiatry 67(7): 720-8. https://doi.org/10.1001/archgenpsychiatry.2010.79
Thomas, D. 2002. Hacker Culture. MN: University of Minnesota Press.
Toupin, S. 2014. “Feminist Hackerspaces: The Synthesis of Feminist and Hacker Cultures.” Journal of Peer Production 5: 1-11. https://tinyurl.com/y4nk79oh.
Vandebosch, Heidi, and Katrien Van Cleemput. 2009. “Cyberbullying Among Youngsters: Profiles of Bullies and Victims.” New Media & Society 11(8): 1349-71. https://doi.org/10.1177/1461444809341263
Wall, D. S. 2010. “The Internet as a Conduit for Criminal Activity.” In Information Technology and the Criminal Justice System, edited by A. Pattavina: 77-98. Thousand Oaks, CA: SAGE. https://doi.org/10.4135/9781452225708.n4
Wansink, B. 2001 [Editorial]. “The Power of Panels.” Journal of Database Marketing & Customer Strategy Management 8(3): 190-4. https://doi.org/10.1057/palgrave.jdm.3240034
Weinberg, Jill D., Jeremy Freese, and David McElhattan. 2014. “Comparing Data Characteristics and Results of an Online Factorial Survey Between a Population-Based and a Crowdsource-Recruited Sample.” Sociological Science 1: 292-310. https://doi.org/10.15195/v1.a19
Whitty, Monica T., and Tom Buchanan. 2012. “The Online Romance Scam: A Serious Cybercrime.” Cyberpsychology, Behavior & Social Networking 15(3): 181-3. https://doi.org/10.1089/cyber.2011.0352
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Katalin Parti, Thomas Dearden
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Policy for Journals/Articles with Open Access
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are permitted and encouraged to post links to their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
Policy for Journals / Manuscript with Paid Access
Authors who publish with this journal agree to the following terms:
- Publisher retain copyright .
- Authors are permitted and encouraged to post links to their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work .