Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/122863
Citations
Scopus Web of Science® Altmetric
?
?
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBrewer, R.-
dc.contributor.authorFox, S.-
dc.contributor.authorMiller, C.-
dc.contributor.editorHolt, T.-
dc.contributor.editorBossler, A.-
dc.date.issued2020-
dc.identifier.citationThe Palgrave handbook of international cybercrime and cyberdeviance, 2020 / Holt, T., Bossler, A. (ed./s), pp.547-565-
dc.identifier.isbn9783319903071-
dc.identifier.urihttp://hdl.handle.net/2440/122863-
dc.description.abstractCybercrime scholars have used a wide range of criminological theories to understand crime and deviance within digital contexts. Among the most frequently cited theoretical frameworks used in this space has been the techniques of neutralization, first proposed by Gresham Sykes and David Matza. This body of work has demonstrated the myriad ways that individual cyber-delinquents have applied the techniques of neutralization as a justification for their deviance. A thorough review of this research reveals decidedly mixed support for neutralization theory. This chapter provides an in-depth review of these studies and seeks to account for this mixed result. This is done by chronicling the methodological underpinnings of this work, and in doing so highlights the challenges facing this literature with respect to the conceptualization and measurement of Sykes and Matza’s theory in the cyber realm. This is accomplished in two parts. First, we review the body of literature that analyzes the techniques of neutralization as a single combined construct (i.e., items are combined to produce a single measure of neutralization), and flag some of the advantages, but also pitfalls of this approach. Second, we review the treatment of individual techniques of neutralization as distinct constructs within the literature (i.e., a technique is measured and analyzed separate to others) and detail some of the common methodological hurdles encountered by researchers. The chapter concludes by elaborating on persistent gaps or challenges posed in making such assessments and proposes a path forward for future cybercrime research incorporating this framework.-
dc.description.statementofresponsibilityRussell Brewer, Sarah Fox, Caitlan Miller-
dc.language.isoen-
dc.publisherPalgrave-
dc.rights© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2019-
dc.source.urihttps://link.springer.com/referencework/10.1007/978-3-319-90307-1-
dc.subjectTechniques of neutralization; Sykes and Matza-
dc.titleApplying the techniques of neutralization to the study of cybercrime-
dc.typeBook chapter-
dc.identifier.doi10.1007/978-3-319-78440-3_22-
dc.publisher.placeCham, Switzerland-
dc.relation.granthttp://purl.org/au-research/grants/arc/DP170103538/-
pubs.publication-statusPublished-
dc.identifier.orcidFox, S. [0000-0001-6753-7476]-
dc.identifier.orcidMiller, C. [0000-0002-3163-6584]-
Appears in Collections:Aurora harvest 8
Gender Studies and Social Analysis publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.