Sexual Harassment and Low Self-Control: A Proposed Application of the General Theory of Crime

Author(s):  
Kevin M. Thompson ◽  
Leana Allen Bouffard
2017 ◽  
Vol 64 (5) ◽  
pp. 674-700 ◽  
Author(s):  
Helen Lianos ◽  
Andrew McGrath

Cyberbullying is an increasingly common characteristic of contemporary online communication. The current study surveyed 320 Internet-active young adults and found up to 80% reported engaging in this behavior at least once. In addition, the ability of the general theory of crime and general strain theory to explain cyberbullying perpetration was tested. Evidence for both theories was observed, with both low self-control and higher levels of strain related to cyberbullying perpetration. Furthermore, opportunity (operationalized as moderate and high number of hours online) interacted with low self-control to increase perpetration, and anger partially mediated the relationship between strain and cyberbullying. Implications of the findings are discussed.


Author(s):  
Adam M. Bossler ◽  
George W. Burruss

Though in recent years, a number of studies have been completed on hackers’ personality and communication traits by experts in the fields of psychology and criminology, a number of questions regarding this population remain. Does Gottfredson and Hirschi’s concept of low self-control predict the unauthorized access of computer systems? Do computer hackers have low levels of self-control, as has been found for other criminals in mainstream society? If low self-control can predict the commission of computer hacking, this finding would seem to support the generality argument of self-control theory and imply that computer hacking and other forms of cybercrime are substantively similar to terrestrial crime. This chapter focuses on the results of a study where we examined whether Gottfredson and Hirschi’s general theory of crime is applicable to computer hacking in a college sample.


Cyber Crime ◽  
2013 ◽  
pp. 1499-1527 ◽  
Author(s):  
Adam M. Bossler ◽  
George W. Burruss

Though in recent years, a number of studies have been completed on hackers’ personality and communication traits by experts in the fields of psychology and criminology, a number of questions regarding this population remain. Does Gottfredson and Hirschi’s concept of low self-control predict the unauthorized access of computer systems? Do computer hackers have low levels of self-control, as has been found for other criminals in mainstream society? If low self-control can predict the commission of computer hacking, this finding would seem to support the generality argument of self-control theory and imply that computer hacking and other forms of cybercrime are substantively similar to terrestrial crime. This chapter focuses on the results of a study where we examined whether Gottfredson and Hirschi’s general theory of crime is applicable to computer hacking in a college sample.


2019 ◽  
Vol 66 (6-7) ◽  
pp. 739-769
Author(s):  
Stacey Nofziger ◽  
Taylor Johnson

The general theory proposes that self-control exerts a relatively stable effect on behaviors across the life course. Most studies have examined the stability of self-control itself, rather than whether it leads to persistent patterns of offending that differ between low and high self-control groups. This article examines this alternative idea of stability by tracing patterns of offending over time. Using data from the National Longitudinal Survey of Youth—Child and Young Adult Data, we find that the level of childhood self-control predicts deviance in every age group. The patterns of offending indicate there are stable differences, with low self-control leading to involvement in a greater range of deviant behavior at every age. The theoretical and policy implications of this stability are discussed.


2004 ◽  
Vol 20 (3) ◽  
pp. 189-216 ◽  
Author(s):  
Alexander T. Vazsonyi ◽  
Janice E. Clifford Wittekind ◽  
Lara M. Belliston ◽  
Timothy D. Van Loh

1998 ◽  
Vol 19 (3) ◽  
pp. 227-255 ◽  
Author(s):  
John K. Cochran ◽  
Peter B. Wood ◽  
Christine S. Sellers ◽  
Wendy Wilkerson ◽  
Mitchell B. Chamlin

Sign in / Sign up

Export Citation Format

Share Document