Theoretical Explanations of the Development of Youth Hacking
Hacking, particularly among youth, is a relatively new form of deviance and its etiology is not well understood. Moreover, there is a lack of developmental approaches to understanding youth hacking, and the majority of studies on predictors of hacking have been cross-sectional. In light of this, we...
Main Author: | |
---|---|
Contributors: | ; |
Format: | Electronic Article |
Language: | English |
Published: |
2024
|
In: |
Crime & delinquency
Year: 2024, Volume: 70, Issue: 8, Pages: 1971-1992 |
Online Access: |
Volltext (lizenzpflichtig) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000caa a22000002 4500 | ||
---|---|---|---|
001 | 1891320912 | ||
003 | DE-627 | ||
005 | 20240616025552.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240615s2024 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1177/00111287221115639 |2 doi | |
035 | |a (DE-627)1891320912 | ||
035 | |a (DE-599)KXP1891320912 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Kim, Jihoon |e VerfasserIn |4 aut | |
109 | |a Kim, Jihoon | ||
245 | 1 | 0 | |a Theoretical Explanations of the Development of Youth Hacking |
264 | 1 | |c 2024 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Hacking, particularly among youth, is a relatively new form of deviance and its etiology is not well understood. Moreover, there is a lack of developmental approaches to understanding youth hacking, and the majority of studies on predictors of hacking have been cross-sectional. In light of this, we draw on prospective longitudinal data on a sample of Korean youth to explore theoretical predictors of youth hacking through a developmental lens. Cross-lagged dynamic panel models are employed to examine time-variant and time-invariant theoretical predictors of hacking. Results show that well-known criminological predictors are significantly associated with youth hacking, which implies the applicability of traditional criminological theories in online deviance. Limitations, suggestions for future research, and implications for practice are discussed. | ||
650 | 4 | |a a developmental life-course perspective | |
650 | 4 | |a social bond theory | |
650 | 4 | |a Social learning theory | |
650 | 4 | |a Self-control theory | |
650 | 4 | |a Hacking | |
700 | 1 | |a Leban, Lindsay |e VerfasserIn |0 (DE-588)1244417378 |0 (DE-627)1775675238 |4 aut | |
700 | 1 | |a Lee, Yeungjeom |e VerfasserIn |0 (DE-588)1314327925 |0 (DE-627)1876791624 |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Crime & delinquency |d Thousand Oaks, Calif. [u.a.] : Sage Publications, 1960 |g 70(2024), 8, Seite 1971-1992 |h Online-Ressource |w (DE-627)306655128 |w (DE-600)1499997-3 |w (DE-576)081985045 |x 1552-387X |7 nnns |
773 | 1 | 8 | |g volume:70 |g year:2024 |g number:8 |g pages:1971-1992 |
856 | 4 | 0 | |u https://doi.org/10.1177/00111287221115639 |x Resolving-System |z lizenzpflichtig |3 Volltext |
912 | |a NOMM | ||
935 | |a mkri | ||
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 453919139X | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1891320912 | ||
LOK | |0 005 20240615043604 | ||
LOK | |0 008 240615||||||||||||||||ger||||||| | ||
LOK | |0 035 |a (DE-2619)KrimDok#2024-06-14#9B5F0381237A517859FB0246027D7234093AF5A4 | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a zota |a tiep | ||
ORI | |a SA-MARC-krimdoka001.raw |