Sie sind auf Seite 1von 27

526499

research-article2014
CADXXX10.1177/0011128714526499Crime & DelinquencyMiller and Morris

Article
Crime & Delinquency
2016, Vol. 62(12) 15431569
Virtual Peer Effects in The Author(s) 2014
Reprints and permissions:
Social Learning Theory sagepub.com/journalsPermissions.nav
DOI: 10.1177/0011128714526499
cad.sagepub.com

Brooke Miller1 and Robert G. Morris1

Abstract
The current study examines the differential influence of face-to-face and
virtual peers in predicting digital and traditional offending among college
students through the lens of social learning theory (SLT). SLT components
are explored to discern whether the theory holds for virtual peers, as it has
for face-to-face peers using a structural equation modeling framework, thus
making a substantial contribution to the social learning literature. Findings
provide some support for SLT for both virtual only peers and the face-to-
face peers model in relation to digital as well as traditional offending. In
addition, findings suggest that virtual peer associations may be as important
as traditional peer associations in explaining certain types of deviant behavior.

Keywords
social learning theory, virtual peers, traditional peers

In recent years, computers and the Internet have become an integral part of
daily life for many, if not most, individuals in terms of personal communica-
tion and information sharing. As a result, it is quite easy to keep in direct
contact with friends and relatives across city, state, and international borders,
whereas in the past, communication was limited to either telephone or land
correspondence. As we have progressed into the information age and have
become more dependent on computer technology as part of our everyday

1University of Texas at Dallas, Richardson, TX, USA

Corresponding Author:
Brooke Miller, Program in Criminology, University of Texas at Dallas, 800 West Campbell
Rd., GR 31, Richardson, TX 75080, USA.
Email: ben062000@utdallas.edu

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


1544 Crime & Delinquency 62(12)

routines, many individuals now communicate with friends more so in the


online world than in the terrestrial world. In fact, there are more than 2 billion
Internet users worldwide (Internet Usage Statistics, n.d.).1 These virtual rela-
tionships (i.e., virtual peers) may involve online only relationships or some
combination of online and face-to-face interaction, which are arguably quali-
tatively different than traditional in-person only relationships. While the
osmosis of digital communication has had a profound pro-social impact,
there are also many negative consequences to consider. These include vary-
ing forms of cyber crime and online deviance, the etiology of which we are
only beginning to understand.
Social learning theories (SLTs) of behavior have had much success not
only in explaining the process of learning but also in explaining how much of
an impact this process has on ones behaviorsee Warr (2002). Learning
theories specific to crime and deviance are no exception, however to date,
very few studies have explored how virtual peer relationships operate within
the learning process. More specifically, it remains unclear whether virtual
peers have an equivalent effect on both cyber and traditional forms of devi-
ance through the learning process. Understanding this dynamic relationship
is the primary goal of this study.
True virtual peers can be considered those with whom there is an estab-
lished relationship but communication transpires solely in an online environ-
ment, perhaps never having met the other person face-to-face. Warr (2002)
describes adolescent virtual peer groups as those in which individuals . . .
can identify socially and psychologically, from which they can assimilate
tastes and norms of dress, speech, and sexuality, and within which they can
develop a self (p. 87). People who participate in virtual communication may
be influenced by social interactions with their face-to-face peers as well as
with their virtual peers. The primary difference between the two forms being
ease of communication and geographical proximity. Indeed, virtual peers
may be continuously present in a persons life (e.g., via chat or video confer-
encing) and may have a sizable impact on the development of our attitudes
compared with those who are relatively close by. It is possible that the virtual
interactions experienced in this capacity influence behavior, including crimi-
nal behavior, exhibited in both on- and offline environments.
Previous research examining the social learning process has focused on
the influence of traditional peer groups while research surrounding the influ-
ence of virtual peers is limited at best and warrants further consideration in
developing a deeper understanding of information sharing and differential
peer influences as well as its role in the learning process. There is evidence to
suggest that traditional peer effects on delinquency may operate differently
for youth who spend large amounts of time participating in sedentary

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Miller and Morris 1545

behaviors (e.g., playing video games), which calls attention to how peer
effects may be evolving as technology use increases (e.g., see Morris &
Johnson, 2014). That being said, the vast majority of extant literature has
explored the influence of deviant face-to-face peers on traditional deviance
as well as on computer-related deviance (e.g., digital piracy, password guess-
ing, accessing someone elses computer files, or creating and distributing
malicious computer programmingfor example, hackingetc.). Indeed,
traditional peers warrant continued focus as an influencing factor on tradi-
tional and digital offending yet the influence of online only (i.e., virtual)
peers should also be considered (Morris & Higgins, 2010; Morris & Johnson,
2014) as their influence on online and traditionally deviant behavior has not
been determined. From a social learning perspective, virtual peers should
influence individual behavior for those who communicate in an online only
capacity in a manner that is generally similar to traditional peers effects.
Evidence from qualitative research also supports the idea that virtual peer
interactions have a substantive impact on an individuals behavior. A variety
of studies of cyber crime and technology illustrate the importance of virtual
peers on offending behavior related to computer hacking (Bachmann, 2010;
Holt, 2007, 2009; Jordan & Taylor, 1998; Meyer, 1989; Taylor, 1999), digi-
tal piracy (Cooper & Harrison, 2001; Holt & Copes, 2010) and real world
offenses like sexual assault/abuse (Holt, Blevins, & Burkert, 2010; Mitchell,
Finkelhor, & Wolak, 2007), and prostitution (Holt, Blevins, & Kuhns, 2008,
2009; Sharpe & Earle, 2003). For example, Holt et al. (2009) use posts from
web forums frequented by customers of prostitutes, or johns, finding they
openly discuss and share various methods to decrease the risk of arrest as
well as informal threats. Holt, Blevins, and Burruss (2012) use web posts in
hacker discussion forums to assess the importance of virtual peer groups in
developing hacking behaviors. Their findings support the assertion that
hacker groups are generally well connected and that individuals may partici-
pate in multiple online communities to both gather information and develop
the density of their social networks (Holt, 2009; Holt, Soles, & Leslie, 2008;
Meyer, 1989). In addition, Holt and Copes (2010) interviews with persistent
digital pirates reveal that knowledge can be transmitted through online inter-
actions even when discussants do not perceive themselves as part of a pirat-
ing subculture. These findings have repeatedly demonstrated the learning of
virtual deviant behaviors in an online capacity, and lay the foundation for
further exploration of the learning process that occurs online as well as how
it relates to both virtual and traditional offending.
The primary objective of the current study is to explore whether virtual
peer effects operate within the confines of SLT equivalently to that of tradi-
tional or face-to-face peers. Also explored is whether traditional correlates of

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


1546 Crime & Delinquency 62(12)

offending are mediated by SLT in a similar manner for virtual versus tradi-
tional peers, as posited by the theory. For example, can SLT explain the direct
and indirect influence of virtual peers as it has for traditional peers on partici-
pation in traditional deviant activities (theft and assault) as well as for digital
crimes? Relying on data culled from a sample of university students, we test
whether operational variation exists between specific constructs of Akers
(1985, 1998) SLT that are based on traditional versus online social learning
components. In other words, does SLT explain traditional and online crime
equivalently when traditional (i.e., face-to-face) peer effects are compared
with virtual (i.e., online only) peer effects?

SLT
SLT as a general theory of crime causation has been very successful in
explaining participation in a variety of deviant activities (Akers, 1998; Akers,
Krohn, Lanza-Kaduce, & Radosevich, 1979; Akers & Lee, 1996; Elliott,
Huizinga, & Menard, 1989; Hwang & Akers, 2003; Krohn, Skinner, Massey,
& Akers, 1985; Verrill, 2008; Warr, 2002). Modern day learning theories are
derived from Sutherlands (1947) differential association theory, which
describes the learning of deviant behavior and definitions favorable to crime
through differential association with deviant others. Burgess and Akers
(1966) further developed the theory to both explain the learning process and
incorporate the concept of differential reinforcement in their SLT. Over the
years, SLT has come to describe the learning process that occurs through the
interaction with deviant others in which individuals learn to define their atti-
tudes and behaviors as deviant, imitate the behavior of others, and have these
ideas reinforced through a balance between experienced or observed rewards
and punishments (Akers, 1985, 1998).
Differential association refers to individual involvement in deviant behav-
ior as the result of social interactions with deviant others. Social interactions
involve the time spent with others including friends, family, and acquain-
tances as well as the intensity of those interactions. The concept of differen-
tial association holds that the learning of deviant behavior occurs when the
number and frequency of exposure to definitions favorable to crime exceeds
definitions unfavorable to crime. The more often and more in-depth interac-
tion one has with individuals espousing favorable definitions toward crimi-
nality, the greater the exposure to and learning of criminal definitions. Akers
(1985) differential association extends Sutherlands original construct in that
it focuses not only on the definitions of close associates but also on their
behavior. Rather, the behavior of ones peers, family, and acquaintances are
as important to the learning process as the definitions described by Sutherland.

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Miller and Morris 1547

These interactions provide and/or strengthen definitions of acceptable and


unacceptable conduct. Individuals both learn and affirm their definition of
appropriate conduct through their interactions with those around them.
As introduced above, Akers (1998) describes definitions as the beliefs,
attitudes, justifications, or orientations used by an individual to designate cer-
tain behaviors as either good or bad. Individuals will either engage or not
engage in delinquent behavior based on their designation of definitions as
either deviant or non-deviant as well as other stimuli present in a given situ-
ation. Individual definitions are both learned and reinforced through the pro-
cess of differential association and can be positive, neutralizing, or negative.
Positive definitions are those that generally favor a behavior making it mor-
ally desirable or permissible; in the case of criminal behavior, positive defini-
tions are those that favor the commission of a criminal act by defining the
behavior as desirable. Neutralizing definitions tend to occur more often and
encourage criminal behavior not by directly supporting the behavior but
through creating excuses or justifications for deviance, which tends to occur
after the neutralizing attitudes are in placesee Morris and Copes (2012).
The neutralizing definitions view the act as something that is probably unde-
sirable but, given the situation, is nonetheless justified, excusable, necessary,
all right or not really bad after all (Akers, 2009, p. 79). Negative definitions
are drawn from conventional beliefs regarding criminal behavior. The greater
number of specific negative definitions an individual holds toward different
types of deviance, the less likely they are to engage in criminal behavior. For
purposes of this study, we were interested only in the negative definitions
reinforced by differential association.
Another component of SLT includes the process of learning behavior
through modeling or imitation of others actions through socialization (Akers,
1985, 1998). Peers engaging in deviant or criminal behavior may provide
examples and share knowledge, attitudes, beliefs, and techniques with the
potential to significantly influence an individuals involvement and participa-
tion in deviant conduct. Sources of imitation can include family, friends,
teachers, media, or any source from which an individual may observe and try
to model similar behavior. The learning process does not require that the
model intends to shape the behavior of the observer, and imitation may occur
when an admired model reinforces the repetition of a behavior to the observer
either intentionally or unintentionally. Also unique to the information age is
modeling via secondary peer groups such as via the media or perhaps via
information garnered online (e.g., watching YouTube videos), which has not
been tested previously as applied to SLT.
Whether individuals refrain from or initiate, continue committing, or
desist from criminal and deviant acts depends on the relative frequency,

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


1548 Crime & Delinquency 62(12)

amount, and probability of past, present, and anticipated rewards and pun-
ishments perceived to be attached to the behavior (Akers, 2009, p. 66).
Differential reinforcement/punishment involves the balance between both
the anticipated and actual consequences associated with engaging in cer-
tain types of behavior. Behavior, whether an individual engages in an act
or refrains from offending, is determined by the balance of rewards and
punishments (Akers, 1985, 1998). Akers (1998) asserts that both positive
and negative reinforcers (i.e., experiences) increase the chances of event
occurrence, whereas punishers decrease the likelihood that an act or behav-
ior will occur. Positive reinforcement may display itself in the form of
approval of certain behaviors from friends, families, and other persons
within an individuals social environment. Negative reinforcement is gen-
erally thought of as the avoidance of unpleasant experiences. Punishments
can be either positive or negative including reprimands or removal/retrac-
tion of rewards, praise, or affection, respectively (Akers & Sellers, 2004).
Since both reinforcers and punishments tend to exist simultaneously for
any act, the balance of these concepts tends to predict behavior (Akers,
1998).

Empirical Support for SLT


As a general theory of crime, SLT has received continual attention over the
past several decades with studies consistently finding differential association
to be an important predictor for involvement in a variety of deviant behaviors
(Akers, 1998; Akers & Lee, 1996; Elliott et al., 1989; Krohn et al., 1985;
Verrill, 2008; Warr, 2002) including property crime (Akers, 1998) and sub-
stance abuse (Akers et al., 1979; Hwang & Akers, 2003). Previous studies
also indicate that SLT variables will have a confounding effect on individual-
level predictors of delinquency such as gender, race, and age. For example, in
their study of adolescent smoking behaviors, Spear and Akers (1987) suggest
that social learning variables account for deviance both in males and females
with greater influence on learning in boys than girls. In addition, Akers and
Lee (1996) suggest that the relative influence of SLT variables, peer attitude
influence, will vary by age.
General computer crime (Higgins, Fell, & Wilson, 2006; Higgins &
Makin, 2004a, 2004b; Ingram and Hinduja, 2008; Morris & Blackburn, 2009;
Morris & Higgins, 2009; Rogers, 2001; Skinner & Fream, 1997) and piracy
(Higgins et al., 2006; Higgins & Makin, 2004a; Higgins & Wilson, 2006;
Hinduja & Ingram, 2008, 2009; Morris & Higgins, 2010; Skinner & Fream,
1997) have also been explored using SLT suggesting varying levels of sup-
port for theoretical predictors and outcome variables associated with SLT.

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Miller and Morris 1549

More specifically, a variety of studies have examined the role of traditional


peer relationships on digital piracy (Higgins et al., 2006; Higgins & Makin,
2004; Higgins & Wilson, 2006; Hinduja & Ingram, 2008, 2009; Morris &
Higgins, 2010; Skinner & Fream, 1997). Hollinger (1993) was among the
first to find a strong correlation between traditional peer influence and com-
puter-related deviance; however, no specific measures of social learning were
used. His findings suggested that individuals are more likely to engage in
computer crimes as the number of friends they have who also participate in
this type of activity increases. Other studies have specifically examined the
influence of traditional peers on digital piracy from a social learning perspec-
tive. For example, Skinner and Fream (1997) explored the influence of SLT
on cyber-related deviance. Their findings suggested that association with
deviant peers significantly predicted cyber-related deviance across all cate-
gories of cyber crime types. Holt and Morris (2009) found that peer involve-
ment in piracy behaviors are significant predictors for piracy regardless of
MP3 ownership. In addition, Hinduja and Ingram (2009) were among the
first to address the differential impact of online (virtual) and offline peers on
music piracy from a social learning perspective. Their findings indicate that
both online and offline peers significantly predict participation in music
piracy; however, the study was limited to a single indicator of virtual and
offline peer influences.

The Current Study


To date, what literature does mention virtual peer effects provides little to no
discussion on how virtual peer groups may operate through the SLT frame-
work. Here, we expand on previous studies using data collected specifically
to measure the direct and indirect effects of virtual and traditional peers on
digital piracy as well as traditional deviance. Research has generally sup-
ported the influence of peers on individual participation in traditional devi-
ance and has found varying levels of support for peer influence on individual
engagement in digital piracy. No study to date has been designed to explicitly
measure the differential impact of traditional and virtual peers on deviance,
cyber or traditional. In response, the research questions used in the current
analysis include the following:

Research Question 1: Do virtual peers matter to the social learning pro-


cess of engaging in online and offline deviance, specifically, digital piracy
and traditional deviance?
Research Question 2: Does SLT operate according to the theory when
virtual, rather than traditional, peers are modeled?

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


1550 Crime & Delinquency 62(12)

Method
Data
Data for the current study were obtained through self-administered surveys
completed by undergraduate students during the spring 2010 semester at a
midsize southern university.2 Email correspondence was sent to undergradu-
ate instructors of both required and elective courses for all university students.
Efforts were made to reach students in a variety of majors; however, respon-
dents were only obtained from classes with instructor agreement. Eleven
undergraduate classes were surveyed, of which 51.5% of students reported
non-technical majors (i.e., liberal arts, social science, fine arts, etc.) with the
rest being technical majors (e.g., engineering, math, hard sciences, etc.). Prior
to completing the survey, students were advised that their participation was
voluntary and their responses would be confidential.3 The result was a purpo-
sive sample of 454 undergraduate students. Descriptive statistics and bivariate
correlations are displayed in Table 1 and indicate moderate correlations
between reinforcement from online peers and differential association from
online peers as well as with reinforcement from traditional peers. Differential
association with traditional peers also appears to be moderately correlated
with learned definitions. Individual-level predictors suggest relatively low
correlations with SLT correlates and each of the outcome variables.

Measures
Digital piracy. Digital piracy was measured by asking respondents to report
the number of times they had participated in digital piracy during the past 12
months (i.e., how many times did you illegally download full-version com-
mercial software, videos, or music instead of buying it). The respondents
were then asked to report the likelihood they would illegally download full-
version commercial software, videos, or music instead of buying it over the
next 12 months. The outcome measure for the model, participation in digital
piracy, is a weighted measure of self-reported counts of involvement in
piracy by anticipated future involvement in digital piracy. This approach
tapped into not only contemporaneous participation in the outcome behavior
but also into anticipated future behavior.

Traditional deviance. Measures of traditional deviance were derived from the


National Youth Survey4 and included asking respondents to report the num-
ber of times they engaged in a variety of activities during the previous 12
months. These activities included knowingly buying, selling, or holding sto-
len goods, using checks or a credit card to illegally pay for something, and

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Table 1. Bivariate Correlations for Individual-Level Covariates, Deviant Outcomes, and Social Learning (n = 454).

Variable 1 2 3 4 5 6 7 8 9 10 11 12
1 Gender (female) 1
2 Race (White) .11 1
3 Computer knowledge .39 .11 1
4 Age .05 .01 .03 1
5 Piracy .13 .06 .11 .09 1
6 Traditional deviance .04 .04 .08 .01 .00 1
7 Differential association with online peers .15 .06 .17 .07 .07 .02 1
8 Definitions .20 .01 .23 .11 .23 .03 .32 1
9 Imitation .07 .11 .20 .16 .07 .05 .29 .07 1
10 Reinforcement online peers .10 .04 .20 .03 .26 .04 .60 .27 .19 1
11 Differential association with traditional peers .11 .02 .12 .22 .07 .02 .48 .49 .29 .31 1
12 Reinforcement traditional peers .04 .05 .16 .11 .26 .02 .48 .30 .16 .86 .36 1

M .42 .54 3.21 21.80 4.33 .16 .00 .00 .00 .00 .00 .00
SD .49 .49 1.00 4.76 2.22 .47 1.00 1.00 1.00 1.00 1.00 1.00

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Note. All correlations greater than .10 are statistically significant at p < .05.

1551
1552 Crime & Delinquency 62(12)

purposely assaulting another individual. Measures of traditional deviance


were limited to theft and assault as virtual offenses and peer relationships
were the focus at the time of data collection. Respondents were then asked to
report the likelihood that they would engage in each of these activities during
the next 12 months. The resulting outcome measure for traditional deviance
model is a weighted measure of self-reported counts of involvement in tradi-
tional offenses by anticipated future involvement in traditional deviance.
Similar to the digital piracy measure, this approach considers both previous
and future behavior.

Social learning measures. To measure the influence of differential association


with traditional and virtual peers, students were asked to respond to a set of
questions about their peers behavior during the previous 12 months, contex-
tualized to either face-to-face peers or fully online peers.5 Items were worded
equivalently between each context and were derived from previous studies of
SLT and online deviance (e.g., Morris & Higgins, 2010). Respondents were
informed that traditional peers could be considered those with whom an indi-
vidual has a face-to-face relationship and virtual peers are those with whom
an individual communicates with solely online never having met them in
person, resulting in a 10-item scale ( traditional peers = .86; virtual peers
= .89).6 Responses to each indicator were recorded on a 1 to 5 scale with 1 =
none and 5 = all friends.
Definitions favorable to illegal behavior were measured by asking stu-
dents to report how wrong they felt a variety of behaviors were including
both computer-related and traditional deviance (e.g., theft, assault, etc.).
Possible responses were based on a 1 to 5 scale with 1 = not wrong at all and
5 = very wrong. Measures of definitions were reverse coded to simplify inter-
pretation during analysis. This resulted in the use of a nine-item scale ( =
.85) to measure the influence of definitions as a component of SLT.
Imitation7 was measured by asking students to rate how much they have
learned about any, or all, of the computer-related activities included in the sur-
vey from their family, friends, Internet searches, and Internet message boards/
chat rooms. Responses were based on a 1 to 10 scale where 1 = nothing and 10
= everything and were derived from Skinner and Fream (1997).8 The four-item
scale ( = .66) was used to represent imitation in the SLT construct.
Differential reinforcement/punishment was measured by assessing the
respondents perception of their traditional versus virtual peer approval of a
variety of computer-related activities and traditional deviant behaviors. This
resulted in a six-item scale measuring differential reinforcement for tradi-
tional peers and a five-item scale for virtual peers ( traditional peers = .93;
virtual peers = .95).

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Miller and Morris 1553

Individual-level covariates.The individual measures used in this study were


gender (0 = male, 1 = female), race (0 = non-White, 1 = White), respondent
age, and respondent computer skill level. Respondents were asked to self-
report their skill level with computers given the following options: 1 = I am
comfortable using computers, 2 = I can surf the net, use common software,
but cannot fix my computer problems, 3 = I can use a variety of software and
fix some of my computer problems, 4 = I can use a variety of operating sys-
tems and fix most computer problems I have, or 5 = I am comfortable manip-
ulating or writing computer programming ( = .89)

Analytical Procedure
Structural equation modeling (SEM) was used to examine the influence of
traditional, compared with virtual, peers on recent and anticipated future dig-
ital piracy. This was done by estimating models based on the virtual peer
indicators for the SLT component separately from models relying upon tradi-
tional peer indicators. We then compare the results across the two outcome
measures (traditional and online deviance). SEM was preferred as it accounts
for measurement error in each of the observed variables that make up the
latent variables included in the model. In addition, it allows for an explora-
tion of the direct and indirect relationships between variables and latent con-
structs, and it also provides the ability to test an entire theoretical model. The
current analysis uses a second-order latent SLT construct including defini-
tions, modeling (imitation), peer associations, and reinforcement in separate
SEMs examining virtual versus traditional peers on both outcome measures,
respectively (piracy and traditional offending).
There are several indicators of model fit to consider in SEM with the most
common measure of model fit represented by the chi-square test statistic, a direct
test of whether the hypothesized model differs from that generated by the data.
For SEM, evidence that no difference exists between the hypothesized model and
the model generated by the data is indicated by a non-statistically significant chi-
square value. In previous studies using SEM, the chi-square statistic rarely pro-
vides the desired outcome due to its sensitivity to sample size (Hu & Bentler,
1999). As a result, Raykov and Marcoulides (2006) argued the importance of
additional fit statistics to exploring and determining model fit. Several other fit
statistics for SEM are provided for the current models. The comparative fit index
(CFI) is used as an indicator of model fit; Hu and Bentler (1999) suggest that
values greater than .90 may indicate reasonably good model fit. The root mean
square error approximation (RMSEA) is another common fit measure for SEM;
RMSEA values of .06 or lower generally indicate good model fit when combined
with standardized root mean of the residual (SRMR) values of .08 and below.

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


1554 Crime & Delinquency 62(12)

Figure 1. Structural model.

The current study involved the presentation of four SEMs designed to test
study research questions surrounding both traditional and virtual peers. We
first examined the direct effects between each of the predictor variables as
well as the social learning construct in relation to digital piracy. In addition,
direct effects between each of the predictor variables on traditional deviance
as well as SLT are presented. Each SEM included, (a) four exogenous
observed predictor variables (age, gender, race, and computer knowledge),
(b) four exogenous latent components of social learning, (c) an endogenous
latent social learning construct as a potential mediator of the structural factors
(differential association for both traditional and virtual peers, definitions,
modeling, and reinforcement for both traditional and virtual peers), and (d)
an observed outcome (either digital piracy or traditional deviance). This
framework is considered a second-order SEM where measurement error is
captured from each component of SLT, as well as in the SLT factor itself. The
same fit statistics were used for both models to determine how well the tradi-
tional and virtual peer models fit the data. The path diagrams in Figure 1
depict the final structural model used for each analysis where items in the
ovals represent latent constructs and boxed items represent observed con-
structs. The first model (Table 2) examined peer effects on participation in
digital piracy and the second model (Table 3) examined the effects on

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Table 2. SEM Results for Traditional and Online Peer Models on Digital Piracy.

Base model Traditional peers SLT model Online peers SLT model

Coefficient (SE) Coefficient (SE) Coefficient (SE)


Direct effects
Gender piracy 0.28 (0.06)*** 0.065 (0.056) 0.022 (0.059)
Race piracy 0.07 (0.05) 0.102 (0.056) 0.092 (0.056)
Age piracy 0.37 (0.09)*** 0.054 (0.070) 0.084 (0.061)
Computer knowledge piracy 0.09 (0.06) 0238 (0.096)* 0.104 (0.080)
Social learning piracy 0.907 (0.106)*** 0.708 (0.100)***
Gender social learning 0.039 (0.065) 0.172 (0.069)*
Race social learning 0.161 (0.059)** 0.192 (0.063)**
Age social learning 0.341 (0.058)*** 0.243 (0.064)***
Computer knowledge social learning 0.496 (0.067)*** 0.446 (0.067)***
Indirect effects
Gender SLT piracy 0.120 (0.201) 0.122 (0.053)*
Race SLT piracy 0.489 (0.199)* 0.136 (0.051)**
Age SLT piracy 0.109 (0.025)*** 0.172 (0.056)**
Computer knowledge SLT piracy 0.743 (0.162)*** 0.316 (0.076)***
Fit statistics
CFI 0.9 0.92

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


RMSEA 0.058 0.054
SRMR 0.066 0.064

Note. SEM = structural equation modeling; SLT = social learning theory; CFI = comparative fit index; RMSEA = root mean square error
approximation; SRMR = standardized root mean of the residual.

1555
*p < .05. **p < .01. ***p < .001.
Table 3. SEM Results for Traditional and Virtual Peer Models on Traditional Offending.

1556
Base model Traditional peers SLT model Virtual peers SLT model

Coefficient (SE) Coefficient (SE) Coefficient (SE)


Direct effects
Gender traditional offenses 0.752 (0.093)*** 0.616 (0.090)*** 0.613 (0.090)***
Race traditional offenses 0.150 (0.092) 0.196 (0.090)* 0.205 (0.090)*
Age traditional offenses 0.011 (0.009) 0.007 (0.010) 0.003 (0.009)
Computer knowledge traditional offenses 0.106 (0.095) 0.022 (0.096) 0.008 (0.094)
Social learning traditional offenses 0.293 (0.063)*** 0.288 (0.059)***
Gender social learning 0.421 (0.114)*** 0.439 (0.119)***
Race social learning 0.166 (0.113) 0.201 (0.118)
Age social learning 0.061 (0.011)*** 0.027 (0.012)*
Computer knowledge social learning 0.429 (0.114)*** 0.332 (0.121)**
Indirect effects
Gender SLT traditional offenses 0.123 (0.044)** 0.127 (0.044)**
Race SLT traditional offenses 0.049 (0.035) 0.058 (0.037)
Age SLT traditional offenses 0.018 (0.005)*** 0.008 (0.004)*
Computer knowledge SLT traditional 0.126 (0.043)** 0.096 (0.041)*
offenses
Fit statistics
CFI 0.90 0.926

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


RMSEA 0.057 0.055
SRMR 0.067 0.063

Note. SEM = structural equation modeling; SLT = social learning theory; CFI = comparative fit index; RMSEA = root mean square error
approximation; SRMR = standardized root mean of the residual.
*p < .05. **p < .01. ***p < .001.
Miller and Morris 1557

traditional offending. Note that construct indicators and outcomes were


changed to assess differences in the traditional versus virtual peer effect on
each outcome, respectively.

Results
Table 2 presents the standardized SEM results from the traditional peer and
virtual peer digital piracy models. While chi-square test statistics were sig-
nificant for each of the models, the alternative fit statistics were within
acceptable ranges indicating the models fit the data. For the traditional peers
model, the other fit statistics (CFI = .90, RMSEA = .058, SRMR = .066)
indicate reasonably good fit for this model given the current data set. The
other fit statistics for the virtual peers model also indicate good model fit
(CFI = .92, RMSEA = .054, SRMR = .64).9
The first column of Table 2 displays the results of the base model using
ordinary least squares (OLS) regression.10 The results of this model suggest
that both gender and age significantly predict involvement in digital piracy
prior to the introduction of the social learning constructs. When the SLT con-
struct is introduced into the model, in columns 2 and 3 (i.e., the SEM mod-
els), the strength of the base model is weakened in accordance with Akers
theory. For example, the impact of age remains significant in both the tradi-
tional and virtual peers models as indicated by a reduction in the age coeffi-
cient in both models. In addition, race and level of computer knowledge have
a significant indirect effect on digital piracy through the SLT construct indi-
cating that the SLT construct weakens the predictive power of the base model.
Looking at the direct effects of the individual predictors on digital piracy for
traditional peers, a lower level of computer knowledge is the only significant
predictor of digital piracy. None of the individual-level predictors were sig-
nificant predictors for the virtual peers model. However, the direct effects of
SLT predicting piracy were significant for both the traditional and virtual
peer models. The direct effects of each of the individual predictors, for the
traditional peers model, on SLT were significant with the exception of gen-
der. Non-Whites, younger individuals, and those with higher levels of com-
puter knowledge appear to have a significant influence on the social learning
process. All individual demographics for virtual peers display a significant
direct relationship with social learning.
For traditional peers, SLT significantly mediates the relationship between
age and digital piracy. The finding that gender is not a significant predictor of
digital piracy through SLT is contrary to previous studies and Akers asser-
tion that gender should have an indirect effect on offending through SLT. In
addition, while significant indirect effects appear to mediate the relationship

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


1558 Crime & Delinquency 62(12)

between race and computer knowledge through SLT, a lack of reduction in


these values when compared with the base model runs contrary to Akers
theory. Findings suggest SLT mediates the indirect effect of age on digital
piracy for the traditional peer model.
The results from the virtual peer model were similar to those associated
with the traditional peer model. Rather, the direction of the relationship
between each individual predictor and SLT was the same in both the tradi-
tional and virtual peer models in regard to the direct and indirect effects on
digital piracy. Results from the virtual peer model suggest that SLT signifi-
cantly mediates the relationship between gender and age on digital piracy. As
suggested by the theory, being younger and male significantly predicts digital
piracy for the virtual peers model through SLT. The indirect effect of race
through social learning on digital piracy is significant; however, it does not
appear to explain participation in digital piracy any more than the base model.
In addition, the indirect effects of level of computer knowledge appear to
have a significant influence on participation in digital piracy through SLT.
Table 3 presents the standardized SEM results for the traditional offending
outcome. Similar to the piracy model, chi-square test statistics were signifi-
cant for each of the models, and the other fit statistics were within acceptable
ranges as well. The data indicate reasonably good fit for the traditional peers
model (CFI = .90, RMSEA = .057, SRMR = .067) as well as the virtual peers
model (CFI = .92, RMSEA = .055, SRMR = .63).
The first column of Table 3 displays the results of the base model using
OLS regression with the traditional offending outcome. The results of this
model indicate that gender significantly predicts involvement in traditional
deviant behaviors prior to the introduction of the social learning constructs.
Similar to the piracy models, when the SLT construct is introduced into the
model, in columns 2 and 3 (i.e., the SEM models), the strength of the base
model is weakened in accordance with Akers theory. Specifically, gender
remains significant in both the traditional and virtual peers models indicating
that social learning has a stronger influence in the results of the SEM. In addi-
tion, age and level of computer knowledge have a significant indirect effect
on traditional deviance through social learning.
Columns 2 and 3 of Table 3 also outline the direct effects of each demo-
graphic variable on traditional deviance and social learning. The direct effects
of individual predictors on traditional deviance for traditional as well as vir-
tual peers indicate both gender and race were significant predictors of tradi-
tional deviance. Similarly, the direct effect of SLT in predicting traditional
deviance for both the traditional and virtual peer models was significant. The
direct effects of each of the individual predictors on social learning for both
the traditional and virtual peer model were significant with the exception of

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Miller and Morris 1559

race. The social learning process appears to play a significant role for males,
younger individuals, and those with higher levels of computer knowledge.
Similar to the online offense models, the direction of the relationship
between each individual predictor and SLT was the same in both the tradi-
tional and virtual peer models in regard to the direct and indirect effects on
traditional offending. SLT significantly mediates the relationship between
gender and traditional deviance for both traditional and virtual peers in accor-
dance with Akers theory. Race remains non-significant for both models.
However, both the indirect effects of age and level of computer knowledge
through SLT on digital piracy are stronger in both the traditional and virtual
peer models suggesting that the operation of SLT is robust to context specific
influences on the learning process relative to the qualitative nature of the
outcome.

Discussion
The current study sought to examine the direct and indirect differences in the
social learning process through both traditional and virtual peers in relation
to both online and traditional offending. SEM was used to examine each
component of the SLT construct in relation to both traditional and virtual peer
relationships. The primary objective was to explore whether virtual peers
have the same predictive power as traditional peers for involvement in digital
piracy and traditional deviance consistent with SLT. Individual variables
were examined to determine their influence when interacting with traditional
and virtual peers on each of these types of offending.
Regarding the first research question (Do virtual peers matter to the social
learning process of engaging in digital piracy and traditional deviance?), it is
clear that virtual peers influence the SLT process regarding participation in
digital piracy as we might expect for traditional peers. However, the learning
process appears to operate somewhat differently when virtual, rather than
traditional peers are modeled in the social learning process of digital piracy.
For example, gender and age each appear to have a stronger impact on the
virtual version of the SLT construct in explaining participation in digital
piracy as well as traditional deviance, rather the effects on SLT are stronger
in these models. In addition, the direct effects in the virtual peer model of
gender and age on digital piracy indicate that correlates of crime will be
mediated by the learning process as suggested by SLT.
Regarding the second research question (Does SLT operate according to
the theory when virtual, rather than traditional, peers are modeled?), several
differences between the traditional and virtual peer models emerged, in terms
of the indirect effects of individual characteristics through SLT on digital

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


1560 Crime & Delinquency 62(12)

piracy. The findings suggest that differences in peer effects lie more with how
individual-level variables operate within SLT, rather than with the direct
effects of SLT.11
Specifically, gender operates via SLT in the virtual peer model, but not in
the traditional peer model. The effects of being male on digital piracy were
significantly mediated through SLT for virtual peers but not for traditional
peers. While there were no significant indirect effects of gender for tradi-
tional peers, the effect of being male on digital piracy in the virtual peer
model is in line with previous findings; being male is more predictive of
engagement in digital piracy than being female (Hinduja & Ingram, 2009;
Morris & Higgins, 2009, 2010; Skinner & Fream, 1997). This suggests that
males may be more likely to be influenced by their virtual peers than females.
In addition, gender predicted reported involvement in both online and tradi-
tional deviant behavior through the SLT construct for both traditional and
virtual peers.
A more noticeable difference is represented by the differential impact of
race between the two models. The effect of race via SLT on digital piracy was
much stronger for the virtual peers model. Race was not a significant predic-
tor of traditional deviance for either model. However, the finding that non-
Whites are significantly more likely to engage in digital piracy through the
social learning construct in the virtual peer model is consistent with previous
findings regarding the influence of race (Morris & Higgins, 2010) and may
be explained by the prospect that online social interaction is immune to many
of the cultural and racial distinctions found in traditional social settings.
Since the virtual environment lends itself toward individual anonymity, it
may be that race does not play the same role in the learning process of indi-
viduals participating in online activities as users may be less aware or uncon-
cerned with racial differences.
Results also indicated an increased likelihood for younger individuals to
report on- and offline deviant behaviors through the SLT construct. However,
the effect of age on digital piracy, through SLT differs between models with
the effect being stronger in the traditional peers model. Younger students may
be expected to spend more time online than older students, though it may also
be that younger students also spend more time with their traditional peers, as
they are generally earlier in their college years. The findings from the tradi-
tional deviance model support this conclusion; the effect of age with SLT was
found stronger in the traditional peer model.
It remains unclear whether the differential use of the Internet among indi-
viduals reaching college age is affecting this relationship. While current
undergraduate populations are blended with those who are computer savvy
having spent the majority of their lives online with those who are slightly

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Miller and Morris 1561

older but still comfortable using the computer, we might expect that future
undergraduate students will view their interactions online in an entirely dif-
ferent manner. As this population spends more time online developing differ-
ent types of relationships, future analyses may find that the additional hours
of online activity result in higher levels of digital piracy as a result of their
online relationships or levels may even out as online activity increases.
The results from the current study differ from the only previous study to
have examined the differential impact of traditional and virtual peers (Hinduja
& Ingram, 2009). Such findings suggest that traditional peers are the most
important predictor of involvement in digital piracy, followed by virtual
sources (peers and other media sources). The results from the current study
suggest that the social learning construct operates in a similar manner for
both traditional and virtual peers for both digital piracy and traditionally
deviant behaviors. In tandem, these findings suggest that virtual peers should
be examined further in relation to their influence on the learning process as
their influence operates in a similar manner as traditional peers.
In sum, the findings offer modest support for SLT via virtual peers; how-
ever, limitations within this study offer ample opportunity for future
research.12 The current data were based on a sample of undergraduate stu-
dents from a single university, future studies should consider extending the
sample to a diverse set of universities. Similarly, future studies should exam-
ine the differential influence of traditional and virtual peers on a more diverse
age group. College students comprise a unique social stratum that may differ
in peer influences from individuals of the same group in a non-university set-
ting. Rather, peer influences may operate differently between college stu-
dents and non-college students of similar ages. In addition, exploration of the
differential learning process at different age points, such as high school stu-
dents, may provide additional clarification of the mediating impact of SLT on
digital piracy.
Results from the current analysis should also be considered in terms of the
implications for SLT. While findings indicate modest support for SLT for the
influence of virtual peers on digital piracy and traditional deviance, the cur-
rent models do not allow for any conclusions regarding the influence of indi-
vidual characteristics through SLT on other cyber-related deviance (such as
computer hacking) or other acts of traditional deviance (such as drug use).
Further exploration of the influence of various individual predictors both on
and through social learning constructs including relationships with both tra-
ditional and virtual peers will further define the importance of peer relation-
ships in offending. Further exploration of the influence of these two types of
peers could define the importance of each of the constructs of SLT. The cur-
rent study is an important first step in an attempt to explore whether there is

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


1562 Crime & Delinquency 62(12)

a differential impact of traditional and virtual peers on digital piracy. In the


end, SLT as a general theory of crime may need to be expanded to account for
differing learning processes resulting from virtual peer interaction. The
potential for this was driven by our finding that virtual peers was found to
have a stronger mediating effect on digital piracy than those with traditional
peers, suggesting that the learning process operates differently for different
types of crimes. However, considering the finding that the virtual peer SLT
construct predicted traditional offending in a statistically indistinguishable
manner to that of traditional peers, it is apparent that virtual peers also play
an important part of the learning of traditional deviance.
In closing, our findings support SLT in explaining digital piracy as well as
traditional deviance. Results suggest that virtual peers matter in a manner
similar to that of traditional peers, and their influence should be further exam-
ined in relation to both traditional and digital deviance. Future research
should examine the influence of individual characteristics as well as each of
the components of SLT as relationships with virtual peers may operate differ-
ently in certain constructs when compared with traditional peer driven mod-
els. In addition, future studies should consider the relative influence of virtual
peers on other types of crime to determine the extent to which they affect
learning of deviant activities, both digital and traditional. Understanding the
role of virtual peers in the learning process and its subsequent effect on
behavior may provide useful information in developing policy aimed at
reducing propensities toward criminal behavior.

Appendix
Social Learning Measures
Differential association with traditional peers (10 items).To the best of your
knowledge, about how many of your FACE-TO-FACE friends have engaged
in the following activities within the last year? (none) 1----2----3----4----5 (all)

1. suggested that you do something that was against the law?


2. suggested you pirate music or software online?
3. done something serious that was against the law (i.e., something that
might be punishable by jail time)?
4. tried to guess someone elses password?
5. used the Internet to retaliate against someone who they felt did them
some wrong?
6. accessed anothers computer files without authorization?
7. used marijuana?

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Miller and Morris 1563

8. used illicit drugs other than marijuana? (e.g., cocaine, LSD, Ecstasy,
etc.)
9. used prescription drugs that were not prescribed to them?
10. stolen someone elses property?

Differential association with virtual peers (10 items). Think of all of your friends
with whom you only have an ONLINE relationship. To the best of your
knowledge, how many of them have done the following in the past year or so:
(none) 1----2----3----4----5 (all)

1. suggested you do something that was against the law?


2. suggested you pirate music or software online?
3. done something serious that was against the law (i.e., something that
might be punishable by jail time)?
4. tried to guess someone elses password?
5. used the Internet to retaliate against someone who they felt did them
some wrong?
6. accessed anothers computer files without authorization?
7. used marijuana?
8. used illicit drugs other than marijuana? (e.g., cocaine, LSD, Ecstasy,
etc.)
9. used prescription drugs that were not prescribed to them?
10. admitted to stealing someone elses property?

Imitation (four items). Please rate how much you have learned about any or all
of the above listed computer activities from the following people: (nothing)
1----2----3----4----5----6----7----8----9----10 (everything)

1. Family
2. Friends
3. Internet searches
4. Internet message boards/chat rooms

Negative definitions (nine items)

1. How wrong is it for you, or anyone else, to try to guess someone


elses password on:
a. A social networking website (such as Myspace or Facebook)
b. A school website
c. A banking website
d. An Internet email account

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


1564 Crime & Delinquency 62(12)

2. How wrong is it for you, or anyone else, to use a social networking


site (such as Myspace, Facebook, or Twitter) to retaliate against
someone you felt did you some wrong?
3. How wrong is it for you, or anyone else, to access anothers computer
files without authorization?
4. How wrong is it for you, or anyone else, to add, delete, change, or
print another persons computer file information without them know-
ing it?
5. How wrong is it for you, or anyone else, to download commercial
software, videos, or music instead of buying it (i.e., using a peer-to-
peer file sharing network, or torrent site)?
6. How wrong is it for you, or anyone else, to knowingly buy, sell, or
hold stolen goods or try to do any of these things?
7. How wrong is it for you, or anyone else, to use checks or credit cards
illegally to pay for something (including intentional overdrafts)?
8. How wrong is it for you, or anyone else, to use marijuana?
9. How wrong is it for you, or anyone else, to use illicit drugs other than
marijuana (e.g., cocaine, LSD, ecstasy, etc.)?
(not wrong at all) 1----2----3----4----5 (very wrong)

Differential reinforcement/punishment traditional peers (five items).To what


extent would you expect that your face-to-face friends would approve or dis-
approve of you participating in each of the below computer-related activi-
ties? (strongly disapprove) 1----2----3----4----5 (strongly approve)

1. Guessing someone elses password


2. Using a social networking site (Such as Myspace, Facebook, or
Twitter) to retaliate against someone you felt did you some wrong?
3. Accessing computer files without authorization?
4. Adding, deleting, changing, or printing another persons computer
file information without them knowing it?
5. Downloading music or software for free, instead of buying it?

Differential reinforcement/punishment virtual peers (six items). To what extent


would you expect that your online friends would approve or disapprove of
YOU participating in each of the below computer-related activities? (strongly
disapprove) 1----2----3----4----5 (strongly approve)

1. Guessing anothers password.


2. Using a social networking site (such as Myspace, Facebook, or
Twitter) to retaliate against someone you felt did you some wrong?

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Miller and Morris 1565

3. Altering someone elses personal information on a public webpage


without that persons permission?
4. Accessing computer files without authorization?
5. Adding, deleting, changing, or printing another persons computer
file information without them knowing it.
6. Downloading music, video, or software files without paying a fee.

Declaration of Conflicting Interests


The author(s) declared no potential conflicts of interest with respect to the research,
authorship, and/or publication of this article.

Funding
The author(s) received no financial support for the research, authorship, and/or publi-
cation of this article.

Notes
1. http://www.internetworldstats.com/stats.htm
2. See Higgins, Fell, and Wilson (2006) for complete discussion of the appropriate-
ness of a sample of college students for studies of computer-related deviance and
Wiecko (2010) for discussion of the appropriateness of using college students for
studies in criminology and criminal justice.
3. Students were asked to refrain from completing the survey if they had already
taken it in another class. Also, six cases included missing data and were excluded
from analysis. The final sample was 454.
4. Traditional offending measures were adapted from National Youth Survey mea-
sures of deviance and anti-social behavior (see Elliott, Huizinga, & Menard,
1989). The current study did not specifically measure alternative types of tra-
ditional deviance; however, future studies should consider alternative measures
that may be more appropriate for college samples.
5. Survey questions and response categories used to measure each construct can be
found in the appendix.
6. A limitation to the measurement of peer influence is that the current data does not
allow for comparison of the proportion of an individuals traditional to virtual
peers.
7. Survey questions addressed imitation of online deviance and did not include
measures of traditional deviance.
8. A limitation to the imitation measurement is that it deviates from Akers, Krohn,
Lanza-Kaduce, and Radosevich (1979) intended measures. However, the scale
derived from Skinner and Freams (1997) study allow for the inclusion of addi-
tional online modeling sources in addition to traditional models.
9. Modification indices were used to correlate specified error terms improving the
fit of each model; however, overall results were not changed.

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


1566 Crime & Delinquency 62(12)

10. In the base model in Table 2, the digital piracy outcome is log transformed to
adjust for positive skew.
11. Differential association with traditional and virtual peers was tested for both the
digital piracy and traditional offending model using the Z test for equality of
coefficients (Paternoster, Brame, Mazerolle, & Piquero, 1998) and reflected no
significant difference in the social learning process with either peer type.
12. We also ran models for each outcome that incorporated both the traditional and
virtual social learning theory (SLT) indicators simultaneously as part of SLT
measurement. As expected, the explanatory power of the SLT construct increased
using this approach.

References
Akers, R. L. (1985). Deviant behavior: A social learning approach (3rd ed.). Belmont,
CA: Wadsworth.
Akers, R. L. (1998). Social learning theory and social structure: A general theory of
crime and deviance. Boston, MA: Northeastern University Press.
Akers, R. L. (2009). Social learning and social structure: A general theory of crime
and deviance. Transaction Publishers.
Akers, R. L., Krohn, M., Lanza-Kaduce, L., & Radosevich, M. (1979). Social learning
and deviant behavior: A specific test of a general theory. American Sociological
Review, 44, 636-655.
Akers, R. L., & Lee, G. (1996). A longitudinal test of social learning theory:
Adolescent smoking. Journal of Drug Issues, 26, 317-343.
Akers, R. L., & Sellers, C. (2004). Criminological theories: Introduction, evaluation,
and application (4th ed.). Los Angeles, CA: Roxbury.
Bachmann, M. (2010). The risk propensity and rationality of computer hackers.
International Journal of Cyber Criminology, 4, 643-656.
Burgess, R. L., & Akers, R. L. (1966). A differential association-reinforcement theory
of criminal behavior. Social Problems, 14, 128-147.
Cooper, J., & Harrison, D. M. (2001). The social organization of audio piracy on the
Internet. Media, Culture & Society, 23, 71-89.
Elliott, D. S., Huizinga, D., & Menard, S. (1989). Multiple problem youth. New York,
NY: Springer-Verlag.
Higgins, G. E., Fell, B. D., & Wilson, A. (2006). Digital piracy: Assessing the con-
tributions of an integrated self-control theory and social learning theory using
structural equation modeling. Criminal Justice Studies, 19, 3-22.
Higgins, G. E., & Makin, D. A. (2004a). Does social learning theory condition the
effects of low self-control on college students software piracy? Journal of
Economic Crime Management, 2, 1-22.
Higgins, G. E., & Makin, D. A. (2004b). Self-control, deviant peers, and software
piracy. Psychological Reports, 95, 921-931.
Higgins, G. E., & Wilson, A. L. (2006). Low self-control, moral beliefs, and social
learning theory in university students intentions to pirate software. Security
Journal, 19, 75-92.

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Miller and Morris 1567

Hinduja, S., & Ingram, J. R. (2008). Self-control and ethical beliefs on the social
learning of intellectual property theft. Western Criminological Review, 9, 52-72.
Hinduja, S., & Ingram, J. R. (2009). Social learning theory and music piracy: The
differential role on online and offline peer influences. Criminal Justice Studies,
22, 405-420.
Hollinger, R. C. (1993). Crime by computer: Correlates of software piracy and unau-
thorized account access. Security Journal, 4, 2-12.
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line
experiences on deviant subcultures. Deviant Behavior, 28, 171-198.
Holt, T. J. (2009). Lone hacks or group cracks: Examining the social organization of
computer hackers. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet
(pp. 336-355). Upper Saddle River, NJ: Pearson.
Holt, T. J., Blevins, K. R., & Burkert, N. (2010). Considering the pedophile subcul-
ture Online. Sexual Abuse, 22, 3-24.
Holt, T. J., Blevins, K. R., & Burruss, G. W. (2012). Examining the stress, satis-
faction, and experiences of computer crime examiners. Journal of Crime and
Justice, 35, 35-52.
Holt, T. J., Blevins, K. R., & Kuhns, J. B. (2008). Examining the displacement prac-
tices of johns with on-line data. Journal of Criminal Justice, 36, 533-528.
Holt, T. J., Blevins, K. R., & Kuhns, J. B. (2014). Examining diffusion and arrest
avoidance practices among Johns. Crime & Delinquency, 60, 261-283.
Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: Practices
and beliefs of persistent digital pirates. Deviant Behavior, 31, 625-654.
Holt, T. J., & Morris, R. G. (2009). An exploration of the relationship between MP3
player ownership and digital piracy. Criminal Justice Studies, 22, 381-392.
Holt, T. J., Soles, J., & Leslie, L. (2008, April 24-25). Characterizing malware
writers and computer attackers in their own words. Paper presented at the 3rd
International Conference on Information Warfare and Security, Omaha, NE.
Hu, L. T., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance struc-
ture analysis: Conventional criteria versus new alternatives. Structural Equation
Modeling, 6, 1-55.
Hwang, S., & Akers, R. L. (2003). Adolescent substance use in South Korea: A cross-
cultural test of three theories. In R. L. Akers & G. F. Jensen (Eds.), Social learn-
ing theory and the explanation of crime: A guide for the new century (pp. 39-64).
New Brunswick, NJ: Transaction Publishers.
Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical exami-
nation. Deviant Behavior, 29, 334-366.
Internet Usage Statistics. (n.d.). Retrieved from http://www.internetworldstats.com/
am/us.htm
Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review,
46, 757-780.
Krohn, M. D., Skinner, W. F., Massey, J. L., & Akers, R. L. (1985). Social learning
theory and adolescent cigarette smoking: A longitudinal study. Social Problems,
32, 455-473.

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


1568 Crime & Delinquency 62(12)

Meyer, G. R. (1989). The social organization of the computer underground (Masters


thesis). Northern Illinois University, DeKalb.
Mitchell, K. J., Finkelhor, D., & Wolak, J. (2007). Risk factors for and impact of
online sexual solicitation of youth. Journal of the American Medical Association,
285, 5011-5014.
Morris, R. G., & Blackburn, A. G. (2009). Cracking the code: An empirical explora-
tion of social learning theory and computer crime. Journal of Crime and Justice,
32, 2-32.
Morris, R. G., & Copes, H. (2012). Exploring the temporal dynamics of the neutral-
ization/delinquency relationship. Criminal Justice Review, 37, 442-460.
Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital
piracy: A multitheoretical exploration among college undergraduates. Criminal
Justice Review, 34, 173-195.
Morris, R. G., & Higgins, G. E. (2010). Criminological theory in the digital age: The
case of social learning theory and digital piracy. Journal of Criminal Justice, 38,
470-480.
Morris, R. G., & Johnson, M. C. (2014). Sedentary activities, peer behavior, and
delinquency among American youth. Crime & Delinquency, 60, 939-968.
Paternoster, R., Brame, R., Mazerolle, P., & Piquero, A. (1998). Using the correct sta-
tistical test for the equality of regression coefficients. Criminology, 36, 859-866.
Raykov, T., & Marcoulides, G. A. (2006). A first course in structural equation model-
ing. New York, NY: Taylor & Francis.
Rogers, M. K. (2001). A social learning theory and moral disengagement analysis
of criminal computer behavior: An exploratory study (Unpublished doctoral dis-
sertation). University of Manitoba, Winnipeg, Canada.
Sharpe, K., & Earle, S. (2003). Cyberpunters and cyberwhores: Prostitution on the
Internet. In Y. Jewkes (Ed.), Dot.cons: Crime, deviance and identity on the
Internet (pp. 36-52). Portland, OR: Willan.
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer
crime among college student. Journal of Research in Crime & Delinquency, 34,
495-518.
Spear, S. F., & Akers, R. L. (1987). Social learning variables and the risk of habit-
ual smoking among adolescents: the Muscatine study. American Journal of
Preventive Medicine, 4(6), 336-342.
Sutherland, E. H. (1947). Principles of criminology (4th ed.). Philadelphia, PA: J. B.
Lippincott.
Taylor, P. (1999). Hackers: Crime in the digital sublime. London, England: Routledge.
Verrill, S. W. (2008). Social structure, social learning, and criminal behavior: Cross-
level moderator effects. New York, NY: LFB Scholarly.
Warr, M. (2002). Companions in crime: The social aspects of criminal conduct. New
York, NY: Cambridge University Press.
Wiecko, F. M. (2010). Research note: Assessing the validity of college samples: Are
students really that different? Journal of Criminal Justice, 38, 1186-1190.

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016


Miller and Morris 1569

Author Biographies
Brooke Miller is a doctoral student in the Criminology Program at The University of
Texas at Dallas. Her research interests include criminological theory testing, cyber-
related offending, and violent offending.
Robert G. Morris is an associate professor of criminology and director of the Center
for Crime and Justice Studies at the University of Texas at Dallas. His research sur-
rounds contemporary issues in criminology and criminal justice and quantitative
methods and has been published in journals such as Justice Quarterly, Crime &
Delinquency, Journal of Quantitative Criminology, Intelligence, among others.

Downloaded from cad.sagepub.com at UNIVERSIDAD DE CONCEPCION on December 3, 2016

Das könnte Ihnen auch gefallen