Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Criminology and Criminal Justice Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Criminology and Criminal Justice
“Elder Scam” Risk Profiles: Individual And Situational Factors Of Younger And Older Age Groups’ Fraud Victimization, Katalin Parti
“Elder Scam” Risk Profiles: Individual And Situational Factors Of Younger And Older Age Groups’ Fraud Victimization, Katalin Parti
International Journal of Cybersecurity Intelligence & Cybercrime
In an attempt to understand how differently fraud works depending on a victim’s age, we have examined the effects of situational (lifestyle-routine activities), self-control, and sociodemographic variables on scam victimization across age groups. The analysis was carried out on a national sample of 2,558 Americans, representative by age, sex, and race, and includes additional factors such as their education, living arrangement, employment, and propensity for reporting a crime or asking for help. The results substantiate research findings of the contribution of self-control and LRAT in predicting victimization in general but could not identify major situational and individual differences between older …
On The Intersections Of Childhood Maltreatment, Self-Control, And Behavioral Outcomes Across The Life-Course, Ameleigh Bippen
On The Intersections Of Childhood Maltreatment, Self-Control, And Behavioral Outcomes Across The Life-Course, Ameleigh Bippen
Honors Theses
Childhood abuse and neglect are highly deleterious experiences that a number of children continue to encounter. The purpose of the current discussion is to examine the impact of childhood abuse and neglect on the growth and development of self-control in early childhood. In service of this goal, several methods were employed, including a review of the historical and current research on the development of self-control. In addition to this, specific scientific theories and their advancements were analyzed to provide further insight into the connection between poor impulse regulation (and decision-making) and downstream linkages with criminal offending. Perhaps not surprisingly, evidence …
The Effects Of Self-Control On The Cyber Victim-Offender Overlap, Brooke Nodeland
The Effects Of Self-Control On The Cyber Victim-Offender Overlap, Brooke Nodeland
International Journal of Cybersecurity Intelligence & Cybercrime
Increasingly, the overlap between victims and offenders has received empirical attention with regard to traditional forms of deviance. More recently, the growth of cyber offending has led to a need to examine whether traditional criminological theories can be used to explain these crimes in the same manner as traditional offenses. However, limited attention has been given to victim-offender overlap in cyber-offending. The current study uses a sample of American college students to examine the influence of self-control on cyber offending, cyber victimization, and the cyber victim-offender overlap. The results indicate that low self-control significantly predicts participation in cyber offending as …
Juvenile Hackers: An Empirical Test Of Self-Control Theory And Social Bonding Theory, Sinchul Back, Sadhika Soor, Jennifer Laprade
Juvenile Hackers: An Empirical Test Of Self-Control Theory And Social Bonding Theory, Sinchul Back, Sadhika Soor, Jennifer Laprade
International Journal of Cybersecurity Intelligence & Cybercrime
In accordance with a similar growth in information technology, computer hacking has become a pervasive issue as a form of crime worldwide in recent years. Self-control theory and social bonding theory have frequently been employed to explain various types of crimes, but rarely to explore computer hacking. Drawing from Gottfredson and Hirschi’s (1990) self-control theory and Hirschi’s (1969) social bonding theory, the purpose of this study is to empirically examine the suitability of these two theories in explaining juvenile computer hacking offenses. The self-report survey data utilized for the present study was derived from middle school and high school students …