Cybercrime and Strain Theory: An Examination of Online Crime and Gender

Authors

  • Katalin Parti Department of Sociology (0137), Virginia Tech, 225 Stanger St, Blacksburg, 24061, Virginia, USA https://orcid.org/0000-0002-8484-3237
  • Thomas Dearden Department of Sociology (0137), Virginia Tech, 225 Stanger St, Blacksburg, 24061, Virginia, USA

DOI:

https://doi.org/10.6000/1929-4409.2024.13.19

Keywords:

Strain, general strain theory, gender, women, cybercrime, cyber offending

Abstract

Purpose: Historically, cybercrime has been seen as a near exclusively male activity. We were interested to learn whether the relationship between strain and crime holds for both males and females.

Methods: We utilized an online survey instrument to collect data from a national sample of individuals (n=2,121) representing the US population by age, gender, race and ethnicity. We asked offending related questions regarding various cybercrimes. In the current study, we use data from 390 individuals who reported a cybercrime activity within the past 12 months.

Results: We find strong support for prior strains correlating with both specific (e.g., illegal uploading) and general cyber-offending. We further examine whether gender interacts with strain. While general strain theory (GST) correlates with cyber-offending for both males and females, we did find a few important differences. Except for lack of trust in others and receiving unsatisfactory evaluation at school or work, there are different variables responsible for online offending for men and women. Parents’ divorcing, anonymity, and online video gaming increase cybercrime offending in women, whereas falling victim to a crime, breaking up with a significant other, and darkweb activity are correlated with cyber-offending for men.

Conclusion: Although GST functions differently by gender when it comes to engaging in cyber-offending, the theory is indeed gender-specific, as different strain variables are responsible for engaging in cyber-offending in women and men. Components of general strain responsible for cyber-offending need to be further studied concerning gender. According to our results, GST is gender-specific, and these variables need to be further studied.

References

Abubakari, Yushawu. 2024. “The Espouse of Women in the Online Romance Fraud World: Role of Sociocultural Experiences and Digital Technologies.” Deviant Behavior 45(5): 708-735. https://doi.org/10.1080/01639625.2023.2263137 DOI: https://doi.org/10.1080/01639625.2023.2263137

Agnew, Robert. 1992. “Foundation for a General Strain Theory of Crime and Delinquency.” Criminology 30(1): 47-88. https://doi.org/10.1111/j.1745-9125.1992.tb01093.x DOI: https://doi.org/10.1111/j.1745-9125.1992.tb01093.x

Agnew, Robert. 2001. “Building on the Foundation of General Strain Theory: Specifying the Types of Strain Most Likely to Lead to Crime and Delinquency.” Journal of Research in Crime & Delinquency 38(4): 319-61. Agnew, Robert. 2006. Pressured into Crime: An overview of General Strain Theory. Roxbury Publishing; Los Angeles, CA. https://doi.org/10.1177/0022427801038004001 DOI: https://doi.org/10.1177/0022427801038004001

Agnew, Robert, and Timothy Brezina. 1997. “Relational Problems with Peers: Gender and Delinquency.” Youth & Society 29(1): 84-111. https://doi.org/10.1177/0044118X97029001004 DOI: https://doi.org/10.1177/0044118X97029001004

Agnew, Robert, Timothy Brezina, J. P. Wright, and Francis T. Cullen. 2002. “Strain, Personality Traits, and Delinquency: Extending General Strain Theory.” Criminology 40(1): 43-72. Akers, Ronald L., and Christine S. Sellers. 2009. Criminological Theories: Introduction, Evaluation, And Application (5th ed.) New York: Oxford University Press. https://doi.org/10.1111/j.1745-9125.2002.tb00949.x DOI: https://doi.org/10.1111/j.1745-9125.2002.tb00949.x

Alper, M. 2014. “‘Can our kids hack it with computers?’ Constructing Youth Hackers in Family Computing Magazines (1983-1987).” International Journal of Communications 8(1): 673-98. https://www.hackingculture.org/sites/default/files/articles/alper--can-our-kids-hack-it-with-computers.pdf.

Barlett, Christopher, and Sarah M. Coyne. 2014. “A Meta-analysis of Sex Differences in Cyber-Bullying Behavior: The Moderating Role of Age.” Aggressive Behavior 40(5): 474-88. https://doi.org/10.1002/ab.21555 DOI: https://doi.org/10.1002/ab.21555

Barnett, T. Jr., S. Jain, U. Andra, and T. Khurana. 2018. “Cisco Visual Networking Index: Forecast and Trends, 2017-2022 White Paper, APJC Cisco Knowledge Network (CKN) Presentation”. https://www.cisco.com/c/dam/m/en_us/ network-intelligence/service-provider/digital-transformation/knowledge-network-webinars/pdfs/1213-business-services-ckn.pdf.

Baron, Stephen W. 2004. “General Strain, Street Youth and Crime: A Test of Agnew’s Revised Theory.” Criminology 42(2): 457-84. https://doi.org/10.1111/j.1745-9125.2004.tb00526.x DOI: https://doi.org/10.1111/j.1745-9125.2004.tb00526.x

Baron, Stephen. 2007. “Street Youth, Gender, Financial Strain, and Crime: Exploring Broidy and Agnew’s Extension to General Strain Theory.” Deviant Behavior 28(3): 273-302. https://doi.org/10.1080/01639620701233217 DOI: https://doi.org/10.1080/01639620701233217

Bondoc, Custodio E., and Tumibay Gilbert Malawit. 2020. “Cybersecurity for higher education institutions: adopting regulatory framework.” Global Journal of Engineering and Technology Advances 2(3): 016-021. https://doi.org/10.30574/gjeta.2020.2.3.0013 DOI: https://doi.org/10.30574/gjeta.2020.2.3.0013

Bossler, A., and T. Holt. 2009. “On-Line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory.” International Journal of Cyber Criminology 3(1): 400-20.

Bossler, A. M., and G. W. Burruss. 2011. “The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?.” In Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by T. J. Holt, and B. H. Schell: 38-67. Hershey, PA: IGI Global. https://doi.org/10.4018/978-1-61692-805-6.ch003 DOI: https://doi.org/10.4018/978-1-61692-805-6.ch003

Broidy, L., and Robert Agnew. 1997. “Gender and Crime: A General Strain Theory Perspective.” Journal of Research in Crime & Delinquency 34(3): 275-306. https://doi.org/10.1177/0022427897034003001 DOI: https://doi.org/10.1177/0022427897034003001

Broidy, Lisa M. 2001. “A Test of General Strain Theory.” Criminology 39(1): 9-36. https://doi.org/10.1111/j.1745-9125.2001.tb00915.x DOI: https://doi.org/10.1111/j.1745-9125.2001.tb00915.x

Calvete, Esther, Izaskun Orue, Ana Estévez, Lourdes Villardón, and Patricia Padilla. 2010. “Cyberbullying in Adolescents: Modalities and Aggressors’ Profile.” Computers in Human Behavior 26(5): 1128-35. Cole, Rhiannon, Shadman Latif and Md. Minhaz Chowdhury. 2021. “Darkweb: A Facilitator of Crime.” 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Mauritius, 2021, pp. 1-6. https://doi.org/10.1109/ICECCME52200.2021.9591011 DOI: https://doi.org/10.1016/j.chb.2010.03.017

Craig, Benjamin M., Ron D. Hays, A. Simon Pickard, David Cella, Dennis A. Revicki, and Bryce B. Reeve. 2013. “Comparison Of US Panel Vendors To Online Surveys.” Journal of Medical Internet Research, 15(11): e260. https://doi.org/10.2196/jmir.2903 DOI: https://doi.org/10.2196/jmir.2903

Craig, Jessica M., Stephanie M. Cardwell, and Alex R. Piquero. 2017. “The Effects of Criminal Propensity and Strain on Later Offending.” Crime & Delinquency 63(13): 1655-81. https://doi.org/10.1177/0011128716665334 DOI: https://doi.org/10.1177/0011128716665334

Dancey, C., and J. Reidy. 2004. Statistics Without Math for Psy-chology: Using SPSS for Windows. London: Prentice Hall.

Dearden, Thomas E., and Katalin Parti. 2021. “Cybercrime, Differential Association, and Self-Control: Knowledge Transmission Through Online Social Learning.” American Journal of Criminal Justice 46: 935-955. https://doi.org/10.1007/s12103-021-09655-4 DOI: https://doi.org/10.1007/s12103-021-09655-4

De Coster, Stacy, and Rena Cornell Zito. 2010. “Gender and general strain theory: The gendering of emotional experiences and expressions.” Journal of Contemporary Criminal Justice 26(2): 224-245. https://doi.org/10.1177/1043986209359853 DOI: https://doi.org/10.1177/1043986209359853

Denner, J. 2011. “What Predicts Middle School Girls’ Interest in Computing?” International Journal of Gender. Science & Technology 3(1): 53-69. http://genderandset.open.ac.uk/ index.php/genderandset/article/view/106/245.

D’Hondt, K. 2016. “Women in Cybersecurity.” Harvard Kennedy School of Government. https://wappp.hks.harvard.edu/files/ wappp/files/dhondt_pae.pdf.

Dilmaç, B. 2009. “Psychological Needs as a Predictor of Cyber Bullying: A Preliminary Report on College Students.” Kuram ve Uygulamada Egitim Bilimleri 9, no. 3: 1307-25. https://eric.ed.gov/?id=EJ858926.

Donner, Christopher M., Catherine D. Marcum, Wesley G. Jennings, George E. Higgins, and Jerry Banfield. 2014. “Low Self-Control and Cybercrime: Exploring the Utility of the General Theory of Crime Beyond Digital Piracy.” Computers in Human Behavior 34: 165-72. Eitle, David. 2010. “General Strain Theory, Persistence, And Desistance Among Young Adult Males.” Journal of Criminal Justice 38(6): 1113-1121. https://doi.org/10.1016/j.jcrimjus.2010.08.003 DOI: https://doi.org/10.1016/j.chb.2014.01.040

Evans, Joel R., and Anil Mathur. 2005. “The Value of Online Surveys.” Internet Research 15(2): 195-219.Gainey, Randy R., Jay S. Albanese, Tancy Vandecar-Burdin, James Hawdon, Thomas E. Dearden, and Katalin Parti. 2023. “Routine citizen Internet practices and cyber victimization: a state-wide study in Virginia.” Criminal Justice Studies, 36(3), 228-250. https://doi.org/10.1080/1478601X.2023.2254094 DOI: https://doi.org/10.1080/1478601X.2023.2254094

Hawdon, James, Colin Bernatzky, and Matthew Costello. 2019. “Cyber-Routines, Political Attitudes, and Exposure to Violence-Advocating Online Extremism.” Social Forces 98(1): 329-54. https://doi.org/10.1093/sf/soy115 DOI: https://doi.org/10.1093/sf/soy115

Hawdon, James, Katalin Parti and Thomas Dearden. 2022. “Changes in Online Illegal Drug Buying during COVID-19: Assessing Effects due to a Changing Market or Changes in Strain using a Longitudinal Sample Design.” American Journal of Criminal Justice 47: 712-734. https://doi.org/10.1007/s12103-022-09698-1 DOI: https://doi.org/10.1007/s12103-022-09698-1

Hawdon, James, Katalin Parti, and Thomas Dearden. 2020. “Cybercrime in America amid COVID. The initial results of a natural experiment.” American Journal of Criminal Justice 45(4): 546-562. https://doi.org/10.1007/s12103-020-09534-4 DOI: https://doi.org/10.1007/s12103-020-09534-4

Hay, Carter. 2003. “Family Strain, Gender, and Delinquency.” Sociological Perspectives 46(1): 107-35. https://doi.org/10.1525/sop.2003.46.1.107 DOI: https://doi.org/10.1525/sop.2003.46.1.107

Hay, Carter, Ryan Meldrum, and Karen Mann. 2010. “Traditional bullying, cyber bullying, and deviance: A general strain theory approach.” Journal of Contemporary Criminal Justice 26(2): 130-147. https://doi.org/10.1177/1043986209359557 DOI: https://doi.org/10.1177/1043986209359557

Hay, C., and K. Ray. 2020. “General Strain Theory and Cybercrime.” In The Palgrave Handbook of International Cybercrime and Cyberdeviance: 583-600. https://doi.org/10.1007/978-3-319-78440-3_21 DOI: https://doi.org/10.1007/978-3-319-78440-3_21

Hay, Carter, and Michelle M. Evans. 2006. “Violent Victimization and Involvement in Delinquency: Examining Predictions from General Strain Theory.” Journal of Criminal Justice 34(3): 261-74. https://doi.org/10.1016/j.jcrimjus.2006.03.005 DOI: https://doi.org/10.1016/j.jcrimjus.2006.03.005

Hinduja, Sameer. 2007. “Neutralization Theory and Online Software Piracy: An Empirical Analysis.” Ethics & Information Technology 9(3): 187-204. https://doi.org/10.1007/s10676-007-9143-5 DOI: https://doi.org/10.1007/s10676-007-9143-5

Hinduja, Sameer, and Justin W. Patchin. 2007. “Offline Consequences of Online Victimization: School Violence and Delinquency.” Journal of School Violence 6(3): 89-112.Hoffman, John P., and Alan S. Miller. 1998. A latent variable analysis of strain theory. Journal of Quantitative Criminology 14:83-110. https://doi.org/10.1300/J202v06n03_06 DOI: https://doi.org/10.1300/J202v06n03_06

Hoffman, John P., and Felicia Grey Cerbone. 1999. “Stressful Life Events And Delinquency Escalation In Early Adolescence.” Criminology 37(2): 343-374. https://doi.org/10.1111/j.1745-9125.1999.tb00489.x DOI: https://doi.org/10.1111/j.1745-9125.1999.tb00489.x

Holt, Thomas J., and Adam M. Bossler. 2008. “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization.” Deviant Behavior 30(1): 1-25. https://doi.org/10.1080/01639620701876577 DOI: https://doi.org/10.1080/01639620701876577

Holt, Thomas J., and Adam M. Bossler. 2014. “An Assessment of the Current State of Cybercrime Scholarship.” Deviant Behavior 35(1): 20-40. https://doi.org/10.1080/01639625.2013.822209 DOI: https://doi.org/10.1080/01639625.2013.822209

Holt, Thomas J., Adam M. Bossler, Rebecca Malinski, and David C. May. 2016. “Identifying predictors of unwanted online sexual conversations among youth using a low self-control and routine activity framework.” Journal of Contemporary Criminal Justice 32(2), 108-128. https://doi.org/10.1177/1043986215621376 DOI: https://doi.org/10.1177/1043986215621376

Holt, Thomas J., George W. Burruss, and Adam M. Bossler. 2010. “Social Learning and Cyber-Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World.” Journal of Crime & Justice 33(2): 31-61. https://doi.org/10.1080/0735648X.2010.9721287 DOI: https://doi.org/10.1080/0735648X.2010.9721287

Holt, Thomas J., and Robert G. Morris. 2009. “An Exploration of the Relationship Between MP3 Player Ownership and Digital Piracy.” Criminal Justice Studies 22(4): 381-92. https://doi.org/10.1080/14786010903358109 DOI: https://doi.org/10.1080/14786010903358109

Isom Scott, Deena A., and Toniqua Mikell. 2019. “‘Gender’ and General Strain Theory: Investigating the Impact of Gender Socialization on Young Women’s Criminal Outcomes.” Journal of Crime & Justice 42(4): 393-413. https://doi.org/10.1080/0735648X.2018.1559754 DOI: https://doi.org/10.1080/0735648X.2018.1559754

Jagayat, Arvin and Becky L. Choma 2021. “Cyber-Aggression Towards Women: Measurement And Psychological Predictors In Gaming Communities.” Computers in Human Behavior 120: 106753. https://doi.org/10.1016/j.chb.2021.106753 DOI: https://doi.org/10.1016/j.chb.2021.106753

Joon Jang, Sung J. 2007. “Gender Differences in Strain, Negative Emotions, and Coping Behaviors: A General Strain Theory Approach.” Justice Quarterly 24(3): 523-53. https://doi.org/10.1080/07418820701485486 DOI: https://doi.org/10.1080/07418820701485486

Kaufman, Joanne M. 2009. “Gendered Responses to Serious Strain: The Argument for a General Strain Theory of Deviance.” Justice Quarterly 26(3): 410-444. https://doi.org/10.1080/07418820802427866 DOI: https://doi.org/10.1080/07418820802427866

Kowalski, R. M., G. W. Giumetti, A. W. Schroeder, and H. H. Reese. 2012. “Cyber Bullying Among College Students: Evidence Domains of College Life.” In Misbehavior Online in Higher Education, edited by C. Wankel, and L. Wankel: 293-321. Bingley, UK: Emerald Publishing Group. https://doi.org/10.1108/S2044-9968(2012)0000005016 DOI: https://doi.org/10.1108/S2044-9968(2012)0000005016

Kowalski, Robin M., and Susan P. Limber. 2007. “Electronic Bullying Among Middle School Students.” Journal of Adolescent Health 41(6) Suppl. 1: S22-S30. https://doi.org/10.1016/j.jadohealth.2007.08.017 DOI: https://doi.org/10.1016/j.jadohealth.2007.08.017

LeClair, J., L. Shih, and S. Abraham. 2014. “Women in STEM and Cyber Security Fields.” In Proceedings of the 2014 Conference for the Industry and Education Collaboration. Savannah, (GA): American Society for Engineering Education.

Leukfeldt, Eric Rutger, & Majid Yar. 2016. “Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis.” Deviant Behavior, 37(3): 263-280. https://doi.org/10.1080/01639625.2015.1012409 DOI: https://doi.org/10.1080/01639625.2015.1012409

Lianos, Helen, and Andrew McGrath. 2018. “Can the general theory of crime and general strain theory explain cyberbullying perpetration?” Crime & Delinquency 64(5): 674-700. https://doi.org/10.1177/0011128717714204 DOI: https://doi.org/10.1177/0011128717714204

MacInnis, B., Jon A. Krosnick, Annabell S. Ho, and Mu-Jung Cho. 2018. “The Accuracy of Measurements with Probability and Nonprobability Survey Samples: Replication and Extension.” Public Opinion Quarterly 82(4): 707-44. https://doi.org/10.1093/poq/nfy038 DOI: https://doi.org/10.1093/poq/nfy038

Mann, H. B., and D. R. Whitney. 1947. “On a Test of Whether One of Two Random Variables Is Stochastically Larger than the Other.” Annals of Mathematical Statistics 18(1): 50-60. https://doi.org/10.1214/aoms/1177730491 DOI: https://doi.org/10.1214/aoms/1177730491

Marcum, C. D., G. E. Higgins, T. L. Freiburger, and M. L. Ricketts. 2012. “An Examination of Male and Female Cyber Bullying” Battle of the Sexes. International Journal of Cyber Criminology 6(1): 904-11. https://libres.uncg.edu/ir/asu/f/ Marcum_CD_2012_Battle_of_the_Sexes.pdf.Mazerolle, Paul, and Alex Piquero. 1998. “Linking exposure to strain with anger: An investigation of deviant adaptations.” Journal of Criminal Justice 26(3): 195-211. https://doi.org/10.1016/S0047-2352(97)00085-8 DOI: https://doi.org/10.1016/S0047-2352(97)00085-8

Mears, Tarnia (2021) “Female Power Fantasy: Women And Resistance In Games And Gamer Culture.” Doctoral thesis. University of East Anglia: United Kingdom.

Merton, Robert K. 1938. “Social Structure and Anomie.” American Sociological Review 3(5): 672-82. https://doi.org/10.2307/2084686 DOI: https://doi.org/10.2307/2084686

Moon, Byongook, and Sung J. Jang. 2014. “A General Strain Approach to Psychological and Physical Bullying: A Study of Interpersonal Aggression at School.” Journal of Interpersonal Violence 29(12): 2147-71. https://doi.org/10.1177/0886260513516863 DOI: https://doi.org/10.1177/0886260513516863

Moon, Byongook, and Merry Morash. 2017. “Gender and General Strain Theory: A Comparison of Strains, Mediating, and Moderating Effects Explaining Three Types of Delinquency.” Youth & Society 49(4): 484-504. https://doi.org/10.1177/0044118X14541877 DOI: https://doi.org/10.1177/0044118X14541877

Neter, J., M. H. Kutner, C. J. Nachtsheim, and W. Wasserman. 1996. Applied Linear Regression Models. 3rd ed. Chicago: Irwin Publishing.

Ngo, Fawn T., and Karuppannan Jaishankar. 2017. “Commemorating a Decade in Existence of the International Journal of Cyber Criminology: A Research Agenda to Advance the Scholarship on Cybercrime.” International Journal of Cyber Criminology 11(1): 1-9. Ngo, Fawn T. and Raymond Paternoster 2011. “Cybercrime victimization: An examination of individuals and situational level factors.” International Journal of Cyber Criminology 5(1): 773-793.

Parti, Katalin, Thomas Dearden, and James Hawdon. 2024. “Perspectives of Paid Panel Survey Research in Cybercrime Victimization and Offending Validity of global online market research sampling and data collection.” In Graham, R.S., Humer, S.G., Lee, C.S., & Nagy, V. (Eds.). The Routledge International Handbook of Online Deviance (1st ed.). pp. 114-131. Routledge. https://doi.org/10.4324/9781003277675 DOI: https://doi.org/10.4324/9781003277675-8

Patchin, Justin W., and Sameer Hinduja. 2011. “Traditional and Nontraditional Bullying Among Youth: A Test of General Strain Theory.” Youth & Society 43(2): 727-51. Paternoster, Raymond, and Paul Mazerolle. 1994. “General Strain Theory And Delinquency: A Replication And Extension.” Journal of Research in Crime and Delinquency 31: 235-263. https://doi.org/10.1177/0022427894031003001 DOI: https://doi.org/10.1177/0044118X10366951

Peacock, D., and A. Irons. 2017. “Gender Inequalities in Cybersecurity: Exploring the Gender Gap in Opportunities and Progression”. International Journal of Gender. Science & Technology 9(1): 25-44.

Rebellon, Cesar J., Michelle E. Manasse, Karen T. Van Gundy, and Ellen S. Cohn. 2012. “Perceived Injustice and Delinquency: A Test of General Strain Theory.” Journal of Criminal Justice 40(3): 230-7. https://doi.org/10.1016/j.jcrimjus.2012.02.001 DOI: https://doi.org/10.1016/j.jcrimjus.2012.02.001

Reed, J., Y. Zhong, L. Terwoerds, and J. Brocaglia. 2017. Global Information Security Workforce Study: Women in Cybersecurity. Vol. 2017. Center for Cyber Safety and Education and Executive Women’s Forum on Information Security, Risk Management and Privacy. https://tinyurl.com/ yyms5td6.

Reyns, Bradford W. 2017. “Routine Activity Theory and Cybercrime. A Theoretical Appraisal and Literature Review” In K. Steinmetz and M.R. Nobles (ed.) Technocrime and Criminological Theory. (pp. 35-55) London: Routledge. https://doi.org/10.4324/9781315117249-3 DOI: https://doi.org/10.4324/9781315117249-3

Reyns, Bradford W. 2013. “Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory Beyond Direct-Contact Offenses.” Journal of Research in Crime & Delinquency 50(2): 216-38. https://doi.org/10.1177/0022427811425539 DOI: https://doi.org/10.1177/0022427811425539

Reyns, Bradford W., Bonnie S. Fisher, Adam M. Bossler, and Thomas J. Holt. 2019. “Opportunity and Self-Control: Do They Predict Multiple Forms of Online Victimization?.” American Journal of Criminal Justice 44(1): 63-82. https://doi.org/10.1007/s12103-018-9447-5 DOI: https://doi.org/10.1007/s12103-018-9447-5

Robbers, Monica L. P. 2004. “Revisiting the Moderating Effect of Social Support on Strain: A Gendered Test.” Sociological Inquiry 74(4): 546-69. https://doi.org/10.1111/j.1475-682X.2004.00104.x DOI: https://doi.org/10.1111/j.1475-682X.2004.00104.x

Sanders, J. 2005. “Gender and Technology in Education: A Research Review”. http://www.josanders.com/pdf/ gendertech0705.pdf.

Schmitz, Kelsey Catherine. 2018. “Shut Up and Play, or Get Out: A Pedagogy of Gendered Digital Identities in Video Gaming.” Doctoral Thesis. University of Ottawa, Canada.

Shaw, Adrienne. 2014. Gaming at The Edge. Sexuality and Gender at The Margins of The Gamer Culture. Minneapolis, MN: University of Minnesota Press. https://doi.org/10.5749/minnesota/9780816693153.001.0001 DOI: https://doi.org/10.5749/minnesota/9780816693153.001.0001

Simmons, Alicia D., and Lawrence D. Bobo. 2015. “Can Non-full-Probability Internet Surveys Yield Useful Data? A Comparison with Full-Probability Face-to-Face Surveys in the Domain of Race and Social Inequality Attitudes.” Sociological Methodology 45(1): 357-87. https://doi.org/10.1177/0081175015570096 DOI: https://doi.org/10.1177/0081175015570096

Sobieraj, Sarah. 2020. Credible Threat. Attacks Against Women Online and The Future Of Democracy. New York: NY, Oxford University Press. https://doi.org/10.1093/oso/9780190089283.001.0001 DOI: https://doi.org/10.1093/oso/9780190089283.001.0001

Sourander, Andre, Anat B. Brunstein Klomek, Maria Ikonen, Jarna Lindroos, Terhi Luntamo, Merja Koskelainen, Terja Ristkari, and Hans Helenius. 2010. “Psychosocial Risk Factors Associated with Cyberbullying Among Adolescents: A Population-Based Study.” Archives of General Psychiatry 67(7): 720-8. https://doi.org/10.1001/archgenpsychiatry.2010.79 DOI: https://doi.org/10.1001/archgenpsychiatry.2010.79

Thomas, D. 2002. Hacker Culture. MN: University of Minnesota Press.

Toupin, S. 2014. “Feminist Hackerspaces: The Synthesis of Feminist and Hacker Cultures.” Journal of Peer Production 5: 1-11. https://tinyurl.com/y4nk79oh.

Vandebosch, Heidi, and Katrien Van Cleemput. 2009. “Cyberbullying Among Youngsters: Profiles of Bullies and Victims.” New Media & Society 11(8): 1349-71. https://doi.org/10.1177/1461444809341263 DOI: https://doi.org/10.1177/1461444809341263

Wall, D. S. 2010. “The Internet as a Conduit for Criminal Activity.” In Information Technology and the Criminal Justice System, edited by A. Pattavina: 77-98. Thousand Oaks, CA: SAGE. https://doi.org/10.4135/9781452225708.n4 DOI: https://doi.org/10.4135/9781452225708.n4

Wansink, B. 2001 [Editorial]. “The Power of Panels.” Journal of Database Marketing & Customer Strategy Management 8(3): 190-4. https://doi.org/10.1057/palgrave.jdm.3240034 DOI: https://doi.org/10.1057/palgrave.jdm.3240034

Weinberg, Jill D., Jeremy Freese, and David McElhattan. 2014. “Comparing Data Characteristics and Results of an Online Factorial Survey Between a Population-Based and a Crowdsource-Recruited Sample.” Sociological Science 1: 292-310. https://doi.org/10.15195/v1.a19 DOI: https://doi.org/10.15195/v1.a19

Whitty, Monica T., and Tom Buchanan. 2012. “The Online Romance Scam: A Serious Cybercrime.” Cyberpsychology, Behavior & Social Networking 15(3): 181-3. https://doi.org/10.1089/cyber.2011.0352 DOI: https://doi.org/10.1089/cyber.2011.0352

Downloads

Published

2024-09-11

How to Cite

Parti, K. ., & Dearden, T. . (2024). Cybercrime and Strain Theory: An Examination of Online Crime and Gender. International Journal of Criminology and Sociology, 13, 211–226. https://doi.org/10.6000/1929-4409.2024.13.19

Issue

Section

Articles