SlideShare a Scribd company logo
1 of 13
Prof. Dr. Lieven J.R. Pauwels
t. +32 9 264 68 37
f. +32 9 264 84 94
Lieven.Pauwels @UGent.be
12-12-2019
Self-reported Delinquency Surveys and the
Study of Online Offending / Cybercrime:
Looking Back and Forward from a Total Survey
Error Approach
Lieven J.R. Pauwels (Ghent University)
research publications consultancy conferences
www.ircp.ugent.be
Lieven J.R. Pauwels
+32 9 264 68 37
Lieven.Pauwels@UGent.be
• KEY MESSAGES
• Understanding and preventing cybercrime / online offending,
victimization and reporting behavior require an analytical approach
(targeting mechanisms underlying stable predictors)
• Understanding cybercrime should be guided by USEFUL theory, well
supported by empirical evidence [‘the best available’].
• NEW FACTS AND NEW CONCEPTS steer the evolution of a field.
• Self-reported delinquency studies as an important ‘tool of the trade’ for
descriptive and explanatory purposes, ie to assess the status of theories.
However, but many measurement issues remain.
• Therefore, it is a legitimate question to what extent self-reported
delinquency methodology can be applied to online offending (and
victimization).
• Some persistent conceptual and methodological issues are discussed in
the light of self-reported online offending / cyber crime.
1. Introduction and goal of the presentation
2
research publications consultancy conferences
www.ircp.ugent.be
Lieven J.R. Pauwels
+32 9 264 68 37
Lieven.Pauwels@UGent.be
• Why do scholars use self-reported delinquency questionnaires?
• Descriptive research (prevalence, frequencies of behavioral responses)
▪ What kind of online offending cyber crime?
▪ What kind of population is vulnerable?
▪ Demographics (Often attributes like Gender, status, immigrant background)
• Exploratory research (exploring covariates)
• How strong is the overlap between covariates of ‘traditional’ self-reported offending and
online offending?
• Explanatory research (can ‘established theories’ be applied to online
offending in the broadest definition)?
• Eg: self-control theory, routine activity theory, social learning theory, social control
theory
• Caveats:
• (1) Humans are more than ‘the sum of variables’
• (2) Variables do not belong to one framework.
This also applies to the study of online offending
2. Self-reported delinquency methodology in a
nutshell
3
research publications consultancy conferences
www.ircp.ugent.be
Lieven J.R. Pauwels
+32 9 264 68 37
Lieven.Pauwels@UGent.be
• Different periods in the history of self-reported delinquency
research
• (1) Exploration and discovery of hidden crime 1940-1950s
• (2) The ‘golden years of theory testing’ 1960s
• (3) Application in nation-wide representative studies 1970s
• (4) The hyper-optimistic years: 1980-1985
• (5) The recognition of measurement problems: reliability &
validity discussions (lying, social desirability, acquiescence, recall
problems, …)
• (6) The internationalisation (eg ISRD1-2-3)
• (7) The digitalization: from PAPI survey to online surveys
(especially relevant for the study of online offending)
• Now: an established method with advantages and disadvantages.
2. Self-reported delinquency methodology in a
nutshell
4
research publications consultancy conferences
www.ircp.ugent.be
Lieven J.R. Pauwels
+32 9 264 68 37
Lieven.Pauwels@UGent.be
• A quick scan of the literature suggests that:
• (1) International awareness has increased since the 1990s
• Lamenting the inability of the criminal code to fully describe cyber-related phenomena
(but a fraud in cyberspace remains a fraud)
• Recognizing the problems of lack of data on perpetrators
• (2) Published self-reported delinquency studies of cyber crime
/digital crime go back to the 1990s and beginning of Y2K (eg
Skinner and Fream, 1997; Rogers, 2001)
• (3) Number of publications have increased significantly since the
overwhelming popularity of social media
• (4) Most self-report studies on online delinquency suffer similar
criticisms of traditional (offline) self-reported delinquency studies
2. Self-reported delinquency methodology in a
nutshell
5
research publications consultancy conferences
www.ircp.ugent.be
Lieven J.R. Pauwels
+32 9 264 68 37
Lieven.Pauwels@UGent.be
• Survey measurement error refers to error in survey response
arising from (1) the method of data collection, (2) respondent or
(3) questionnaire
3. Cybercrime /online offending from a ‘Total
Survey Error Approach’
6
Conceptual issues:
Definitions
Operationalisation
Behaviour
victims, offenders
In the general
population
research publications consultancy conferences
www.ircp.ugent.be
Lieven J.R. Pauwels
+32 9 264 68 37
Lieven.Pauwels@UGent.be
• Conceptualization and measurement (from ‘trying to steal a password’
and ‘deleting files from one’s computer’ to ‘online threatening using
social media’).
• Like early traditional self-reported delinquency surveys, ‘triviality’ is a
threat.
• Self-reported delinquency scales (from published studies):
• Usually: hacking, digital piracy (illegal downloading / uploading), cyber bullying and
harassment, cyber fraud (phishing and malware)
• Reliabilities (measures of internal consistency: ‘moderate’ but it is hardly questioned
whether measures to evaluate reliabilities of attitudinal scales should be applied to
behavior)
• Challenges: violent extremism and hate crime, sexting, child pornography, exposure
• Beyond self-reported delinquency scales: randomized scenario studies?
• Has been successfully applied to the study of victimization and reporting
behavior (Vandeweijer et al 2019), applications to digital piracy (Van
Rooij et al 2016)
3. Cybercrime /online offending from a ‘Total
Survey Error Approach’
7
research publications consultancy conferences
www.ircp.ugent.be
Lieven J.R. Pauwels
+32 9 264 68 37
Lieven.Pauwels@UGent.be
• Digital crime studies require adequate measures of digital exposure
• Measuring exposure to digital criminogenic settings
• Often restricted to internet use (frequency of use is not enough)
• Better measures necessary that capture the ‘criminogeneity’ of the setting
[3W-model: what are people doing online, with whom are people spending
time online, what kind of websites, social network sites, chat rooms, instant
messaging fora are people using] + level of online monitoring – norm
enforcement online. This is hardly done.
• Less frequently studied: measures of exposure to explicit content (e.g. hate
crime online, violent extremism online). This can be done succesfully (Pauwels
& Hardyns, 2018), but remains controversial topic (‘cause or spurious
relationship’)
• Active & passive exposure, cumulative exposure
• Target populations?
• Too much WEIRD-people, undergraduate and graduate student populations
• New panel data: is it really just a matter of time (and resources)?
3. Cybercrime /online offending from a ‘Total
Survey Error Approach’
8
research publications consultancy conferences
www.ircp.ugent.be
Lieven J.R. Pauwels
+32 9 264 68 37
Lieven.Pauwels@UGent.be
• Definitional issues need to be clarified.
• Much more descriptive research is necessary, before adequate
testing can take place.
• 1) First adequate descriptions of involvement (online + offline)
• 2) Development of adequate measures of exposure
(circumstances) and relevent personal characteristics (traits and
experiences).
• 3) Can sources be merged? Avoid bias stemming from the same
measurement instrument. Eg: combination with Game Theory
• 3) Discuss plausible and realistic mechanisms: improve theory
development, testing and application (it ‘s better for prevention).
• 4) Avoid the ‘endless testing of seemingly competing theories’.
Integration: 1+1=3
4. Conclusion /discussion/avenues for future
research
9
Thanks for your attention!
10
research publications consultancy conferences
www.ircp.ugent.be
Lieven J.R. Pauwels
+32 9 264 68 37
Lieven.Pauwels@UGent.be
• De Kimpe, L., Ponnet, K., Walrave, M., Snaphaan, T., Pauwels, L., & Hardyns, W. (2020). Help, I need
somebody : examining the antecedents of social support seeking among cybercrime victims. COMPUTERS
IN HUMAN BEHAVIOR, 108.
• De Kimpe, L., Ponnet, K., Walrave, M., Snaphaan, T., Pauwels, L., & Hardyns, W. (2020). Research note: An
investigation of reporting behavior among cybercrime victims. European Journal of Crime, Criminal Law
and Criminal Justice. Accepted for publication.
• Diamond, B., & Bachmann, M. (2015). Out of the beta phase: Obstacles, challenges, and promising paths
in the study of cybercriminology. International Journal of Cyber Criminology, 9(1), 24–34.
• Enzmann, D., Kivivuori, J., Marshall, I. H., Steketee, M., Hough, M., & Killias, M. (2018). A Global
Perspective on Young People as Offenders and Victims (First Results from the ISRD3 Study). Cham,
Switzerland.
• Flores, W. R., Holm, H., Svensson, G., & Ericsson, G. (2014). Using phishing experiments and scenario-
based surveys to understand security behaviours in practice. Information Management & Computer
Security.
• Groves, R. M., & Lyberg, L. (2010). Total survey error: Past, present, and future. Public opinion
quarterly, 74(5), 849-879.
• Hawdon, J., Bernatzky, C., & Costello, M. (2019). Cyber-routines, political attitudes, and exposure to
violence-advocating online extremism. Social Forces, 98(1), 329-354.
• Hardy, W., Krawczyk, M., & Tyrowicz, J. (2013). Why is online piracy ethically different from theft? A
vignette experiment. Université de Varsovie, faculté des sciences économiques, Working Paper, (2013), 24.
• Gunter, W. D. (2008). Piracy on the high speeds: A test of social learning theory on digital piracy among
college students. International Journal of Criminal Justice Sciences, 3(1), 54.
• Hawdon, J., Bernatzky, C., & Costello, M. (2019). Cyber-routines, political attitudes, and exposure to
violence-advocating online extremism. Social Forces, 98(1), 329-354.
• Higgins, G. E. (2007). Digital piracy, self-control theory, and rational choice: An examination of the role of
value. International Journal of Cyber Criminology, 1(1), 33-55.
Some references
11
research publications consultancy conferences
www.ircp.ugent.be
Lieven J.R. Pauwels
+32 9 264 68 37
Lieven.Pauwels@UGent.be
• Holt, T. J. (2010). Crime on-line: Correlates, causes, and context. Raleigh, NC: Carolina Academic Press.
• Kivivuori, J. (2015). Discovery of hidden crime: Self-report delinquency surveys in criminal policy context. Oxford University
Press.
• Lee, J., Onifade, E., Ryu, J., Rasul, A., & Maynard, Q. R. (2014). Online activity, alcohol use, and internet delinquency among
Korean youth: A multilevel approach. Journal of Ethnicity in Criminal Justice, 12(4), 247-263.
• Louderback, E. R., & Antonaccio, O. (2020). New Applications of Self-Control Theory to Computer-Focused Cyber Deviance
and Victimization: A Comparison of Cognitive and Behavioral Measures of Self-Control and Test of Peer Cyber Deviance and
Gender as Moderators. Crime & Delinquency, 0011128720906116.
• Marshall, I. H., & Steketee, M. (2019). What May Be Learned about Crime in Europe (and Beyond) from International Surveys
of Youth: Results from the International Self-Report Delinquency Study (ISRD3). European Journal on Criminal Policy and
Research, 25(3), 219-223.
• Morris, R. G., & Higgins, G. E. (2010). Criminological theory in the digital age: The case of social learning theory and digital
piracy. Journal of Criminal Justice, 38(4), 470-480.
• Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration
among college undergraduates. Criminal Justice Review, 34(2), 173-195.
• Pauwels, L., & Schils, N. (2016). Differential online exposure to extremist content and political violence: Testing the relative
strength of social learning and competing perspectives. Terrorism and Political Violence, 28(1), 1-29.
• Pauwels, L. J., & Hardyns, W. (2018). Endorsement for extremism, exposure to extremism via social media and self-reported
political/religious aggression. International journal of developmental science, 12(1-2), 51-69.
• Rokven, J. J., Weijters, G., Beerthuizen, M. G., & van der Laan, A. M. (2018). Juvenile delinquency in the virtual world:
Similarities and differences between cyber-enabled, cyber-dependent and offline delinquents in the Netherlands.
International journal of cyber criminology, 12(1), 27-46.
• Rogers, M. K. (2001). A social learning theory and moral disengagement analysis of criminal computer behavior: An
exploratory study.
• Smallridge, J. L., & Roberts, J. R. (2013). Crime Specific Neutralizations: An Empirical Examination of Four Types of Digital
Piracy. International Journal of Cyber Criminology, 7(2).
• Staksrud, E. (2009). Problematic conduct: Juvenile delinquency on the Internet. Kids online: Opportunities and risks for
children, 147-159.
• van de Weijer, S., Leukfeldt, R., & Van der Zee, S. (2020). Reporting cybercrime victimization: determinants, motives, and
previous experiences. Policing: An International Journal.
Some references
12
https://ircp.ugent.be/
Contact
Lieven J.R. Pauwels
T. +32 9 264 68 37
Lieven.Pauwels@UGent.be
IRCP
Ghent University
Universiteitstraat 4
B – 9000 Ghent

More Related Content

Similar to Pauwels Council_Europe2020 Cybercrime.pdf

Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 
Pauwels Schepers Eifler Choosing crime as alternative? Presentation ESC Confe...
Pauwels Schepers Eifler Choosing crime as alternative? Presentation ESC Confe...Pauwels Schepers Eifler Choosing crime as alternative? Presentation ESC Confe...
Pauwels Schepers Eifler Choosing crime as alternative? Presentation ESC Confe...Lieven J.R. Pauwels
 
Why aren't Evaluators using Digital Media Analytics?
Why aren't Evaluators using Digital Media Analytics?Why aren't Evaluators using Digital Media Analytics?
Why aren't Evaluators using Digital Media Analytics?CesToronto
 
Combating Harassment in Higher Education: Policy Innovations
Combating Harassment in Higher Education: Policy InnovationsCombating Harassment in Higher Education: Policy Innovations
Combating Harassment in Higher Education: Policy InnovationsSUPERA project
 
WSDM 2018 Tutorial on Influence Maximization in Online Social Networks
WSDM 2018 Tutorial on Influence Maximization in Online Social NetworksWSDM 2018 Tutorial on Influence Maximization in Online Social Networks
WSDM 2018 Tutorial on Influence Maximization in Online Social NetworksCigdem Aslay
 
10-1108_17505931211282418.pdf
10-1108_17505931211282418.pdf10-1108_17505931211282418.pdf
10-1108_17505931211282418.pdfMaroofHamid1
 
Ass a koene_ca_sma
Ass a koene_ca_smaAss a koene_ca_sma
Ass a koene_ca_smaAnsgar Koene
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
Establishing Global Rules for the Ethical Use of Artificial Intelligence in H...
Establishing Global Rules for the Ethical Use of Artificial Intelligence in H...Establishing Global Rules for the Ethical Use of Artificial Intelligence in H...
Establishing Global Rules for the Ethical Use of Artificial Intelligence in H...tinokreutzer
 
IAFMH Workshop Barcelona, June 2011
IAFMH Workshop Barcelona, June 2011IAFMH Workshop Barcelona, June 2011
IAFMH Workshop Barcelona, June 2011basov1
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationStephen Cobb
 
Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
 
Caroline pauwels digital society
Caroline pauwels   digital societyCaroline pauwels   digital society
Caroline pauwels digital societyimec.archive
 
Caroline pauwels digital society
Caroline pauwels   digital societyCaroline pauwels   digital society
Caroline pauwels digital societyimec.archive
 
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harms
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harmsInternet and Society 2018 Digital Divide, Exclusion, Policy, and new harms
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harmsJames Stewart
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialKa_Kinder
 
Does the Internet harm children's health? A critical review of the evidence
Does the Internet harm children's health? A critical review of the evidenceDoes the Internet harm children's health? A critical review of the evidence
Does the Internet harm children's health? A critical review of the evidenceMonica Bulger
 

Similar to Pauwels Council_Europe2020 Cybercrime.pdf (20)

Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
Pauwels Schepers Eifler Choosing crime as alternative? Presentation ESC Confe...
Pauwels Schepers Eifler Choosing crime as alternative? Presentation ESC Confe...Pauwels Schepers Eifler Choosing crime as alternative? Presentation ESC Confe...
Pauwels Schepers Eifler Choosing crime as alternative? Presentation ESC Confe...
 
Priya sehjal
Priya sehjalPriya sehjal
Priya sehjal
 
Why aren't Evaluators using Digital Media Analytics?
Why aren't Evaluators using Digital Media Analytics?Why aren't Evaluators using Digital Media Analytics?
Why aren't Evaluators using Digital Media Analytics?
 
Combating Harassment in Higher Education: Policy Innovations
Combating Harassment in Higher Education: Policy InnovationsCombating Harassment in Higher Education: Policy Innovations
Combating Harassment in Higher Education: Policy Innovations
 
WSDM 2018 Tutorial on Influence Maximization in Online Social Networks
WSDM 2018 Tutorial on Influence Maximization in Online Social NetworksWSDM 2018 Tutorial on Influence Maximization in Online Social Networks
WSDM 2018 Tutorial on Influence Maximization in Online Social Networks
 
10-1108_17505931211282418.pdf
10-1108_17505931211282418.pdf10-1108_17505931211282418.pdf
10-1108_17505931211282418.pdf
 
Ass a koene_ca_sma
Ass a koene_ca_smaAss a koene_ca_sma
Ass a koene_ca_sma
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Chris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptxChris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptx
 
Establishing Global Rules for the Ethical Use of Artificial Intelligence in H...
Establishing Global Rules for the Ethical Use of Artificial Intelligence in H...Establishing Global Rules for the Ethical Use of Artificial Intelligence in H...
Establishing Global Rules for the Ethical Use of Artificial Intelligence in H...
 
IAFMH Workshop Barcelona, June 2011
IAFMH Workshop Barcelona, June 2011IAFMH Workshop Barcelona, June 2011
IAFMH Workshop Barcelona, June 2011
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...
 
Caroline pauwels digital society
Caroline pauwels   digital societyCaroline pauwels   digital society
Caroline pauwels digital society
 
Caroline pauwels digital society
Caroline pauwels   digital societyCaroline pauwels   digital society
Caroline pauwels digital society
 
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harms
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harmsInternet and Society 2018 Digital Divide, Exclusion, Policy, and new harms
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harms
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 Tutorial
 
Does the Internet harm children's health? A critical review of the evidence
Does the Internet harm children's health? A critical review of the evidenceDoes the Internet harm children's health? A critical review of the evidence
Does the Internet harm children's health? A critical review of the evidence
 

More from Lieven J.R. Pauwels

Ghent_University_DPT_2021_MAW_Radicalization.pdf
Ghent_University_DPT_2021_MAW_Radicalization.pdfGhent_University_DPT_2021_MAW_Radicalization.pdf
Ghent_University_DPT_2021_MAW_Radicalization.pdfLieven J.R. Pauwels
 
2022_06_07 Studiedag PLP - Figures.pptx
2022_06_07 Studiedag PLP - Figures.pptx2022_06_07 Studiedag PLP - Figures.pptx
2022_06_07 Studiedag PLP - Figures.pptxLieven J.R. Pauwels
 
ESC2018 shoplifting SAT on ISRD3-B.pdf
ESC2018 shoplifting SAT on ISRD3-B.pdfESC2018 shoplifting SAT on ISRD3-B.pdf
ESC2018 shoplifting SAT on ISRD3-B.pdfLieven J.R. Pauwels
 
DeBuck and Pauwels CBEN 2021 MFT.pptx
DeBuck and Pauwels CBEN 2021 MFT.pptxDeBuck and Pauwels CBEN 2021 MFT.pptx
DeBuck and Pauwels CBEN 2021 MFT.pptxLieven J.R. Pauwels
 
Choosing to shoplift? A test of key propositions of SAT. A study based on ISR...
Choosing to shoplift? A test of key propositions of SAT. A study based on ISR...Choosing to shoplift? A test of key propositions of SAT. A study based on ISR...
Choosing to shoplift? A test of key propositions of SAT. A study based on ISR...Lieven J.R. Pauwels
 
Pauwels Cambridge workshop 2018 Testing SAT
Pauwels Cambridge workshop 2018 Testing SATPauwels Cambridge workshop 2018 Testing SAT
Pauwels Cambridge workshop 2018 Testing SATLieven J.R. Pauwels
 
Shoplifting as situated choice irsd3 meeting Amersfoort 2017
Shoplifting as situated choice irsd3 meeting Amersfoort 2017Shoplifting as situated choice irsd3 meeting Amersfoort 2017
Shoplifting as situated choice irsd3 meeting Amersfoort 2017Lieven J.R. Pauwels
 
Isrd3 amersfoort2017 final. for pub
Isrd3 amersfoort2017 final. for pubIsrd3 amersfoort2017 final. for pub
Isrd3 amersfoort2017 final. for pubLieven J.R. Pauwels
 
Bruinsma farewell symposium 2017 short version for pub
Bruinsma farewell symposium 2017 short version for pubBruinsma farewell symposium 2017 short version for pub
Bruinsma farewell symposium 2017 short version for pubLieven J.R. Pauwels
 
Pauwels -Wikström Sat test flemish society of criminology (2011)
Pauwels -Wikström Sat test flemish society of criminology (2011)Pauwels -Wikström Sat test flemish society of criminology (2011)
Pauwels -Wikström Sat test flemish society of criminology (2011)Lieven J.R. Pauwels
 
Stockholm symposium pauwels 2008
Stockholm symposium pauwels 2008Stockholm symposium pauwels 2008
Stockholm symposium pauwels 2008Lieven J.R. Pauwels
 
Stockholm symposium violent youth groups pauwels 2007
Stockholm symposium violent youth groups pauwels 2007Stockholm symposium violent youth groups pauwels 2007
Stockholm symposium violent youth groups pauwels 2007Lieven J.R. Pauwels
 
Institutional trust in flanders (Van de Velde & Pauwels)
Institutional trust in flanders (Van de Velde & Pauwels)Institutional trust in flanders (Van de Velde & Pauwels)
Institutional trust in flanders (Van de Velde & Pauwels)Lieven J.R. Pauwels
 
Explaining deterrence Lieven Pauwels Presentatie VVC
Explaining deterrence Lieven Pauwels Presentatie VVCExplaining deterrence Lieven Pauwels Presentatie VVC
Explaining deterrence Lieven Pauwels Presentatie VVCLieven J.R. Pauwels
 
Problematic Youth Group Involvement as Situated Choice
Problematic Youth Group Involvement as Situated ChoiceProblematic Youth Group Involvement as Situated Choice
Problematic Youth Group Involvement as Situated ChoiceLieven J.R. Pauwels
 
Karl popperlezing lvsv 24 02 2010
Karl popperlezing lvsv 24 02 2010Karl popperlezing lvsv 24 02 2010
Karl popperlezing lvsv 24 02 2010Lieven J.R. Pauwels
 
Esc 2012 pauwels nhoods and schools
Esc 2012 pauwels nhoods and schools Esc 2012 pauwels nhoods and schools
Esc 2012 pauwels nhoods and schools Lieven J.R. Pauwels
 
Multilevel stable communities esc1
Multilevel stable communities esc1Multilevel stable communities esc1
Multilevel stable communities esc1Lieven J.R. Pauwels
 

More from Lieven J.R. Pauwels (20)

Ghent_University_DPT_2021_MAW_Radicalization.pdf
Ghent_University_DPT_2021_MAW_Radicalization.pdfGhent_University_DPT_2021_MAW_Radicalization.pdf
Ghent_University_DPT_2021_MAW_Radicalization.pdf
 
2022_06_07 Studiedag PLP - Figures.pptx
2022_06_07 Studiedag PLP - Figures.pptx2022_06_07 Studiedag PLP - Figures.pptx
2022_06_07 Studiedag PLP - Figures.pptx
 
DE BUCK ESC2019.pptx
DE BUCK  ESC2019.pptxDE BUCK  ESC2019.pptx
DE BUCK ESC2019.pptx
 
ESC2018 shoplifting SAT on ISRD3-B.pdf
ESC2018 shoplifting SAT on ISRD3-B.pdfESC2018 shoplifting SAT on ISRD3-B.pdf
ESC2018 shoplifting SAT on ISRD3-B.pdf
 
DeBuck and Pauwels CBEN 2021 MFT.pptx
DeBuck and Pauwels CBEN 2021 MFT.pptxDeBuck and Pauwels CBEN 2021 MFT.pptx
DeBuck and Pauwels CBEN 2021 MFT.pptx
 
Choosing to shoplift? A test of key propositions of SAT. A study based on ISR...
Choosing to shoplift? A test of key propositions of SAT. A study based on ISR...Choosing to shoplift? A test of key propositions of SAT. A study based on ISR...
Choosing to shoplift? A test of key propositions of SAT. A study based on ISR...
 
Pauwels Cambridge workshop 2018 Testing SAT
Pauwels Cambridge workshop 2018 Testing SATPauwels Cambridge workshop 2018 Testing SAT
Pauwels Cambridge workshop 2018 Testing SAT
 
Shoplifting as situated choice irsd3 meeting Amersfoort 2017
Shoplifting as situated choice irsd3 meeting Amersfoort 2017Shoplifting as situated choice irsd3 meeting Amersfoort 2017
Shoplifting as situated choice irsd3 meeting Amersfoort 2017
 
Isrd3 amersfoort2017 final. for pub
Isrd3 amersfoort2017 final. for pubIsrd3 amersfoort2017 final. for pub
Isrd3 amersfoort2017 final. for pub
 
Bruinsma farewell symposium 2017 short version for pub
Bruinsma farewell symposium 2017 short version for pubBruinsma farewell symposium 2017 short version for pub
Bruinsma farewell symposium 2017 short version for pub
 
Pauwels -Wikström Sat test flemish society of criminology (2011)
Pauwels -Wikström Sat test flemish society of criminology (2011)Pauwels -Wikström Sat test flemish society of criminology (2011)
Pauwels -Wikström Sat test flemish society of criminology (2011)
 
Stockholm symposium pauwels 2008
Stockholm symposium pauwels 2008Stockholm symposium pauwels 2008
Stockholm symposium pauwels 2008
 
Stockholm symposium violent youth groups pauwels 2007
Stockholm symposium violent youth groups pauwels 2007Stockholm symposium violent youth groups pauwels 2007
Stockholm symposium violent youth groups pauwels 2007
 
Institutional trust in flanders (Van de Velde & Pauwels)
Institutional trust in flanders (Van de Velde & Pauwels)Institutional trust in flanders (Van de Velde & Pauwels)
Institutional trust in flanders (Van de Velde & Pauwels)
 
Explaining deterrence Lieven Pauwels Presentatie VVC
Explaining deterrence Lieven Pauwels Presentatie VVCExplaining deterrence Lieven Pauwels Presentatie VVC
Explaining deterrence Lieven Pauwels Presentatie VVC
 
ESC pauwels van damme 2012
ESC  pauwels van damme 2012ESC  pauwels van damme 2012
ESC pauwels van damme 2012
 
Problematic Youth Group Involvement as Situated Choice
Problematic Youth Group Involvement as Situated ChoiceProblematic Youth Group Involvement as Situated Choice
Problematic Youth Group Involvement as Situated Choice
 
Karl popperlezing lvsv 24 02 2010
Karl popperlezing lvsv 24 02 2010Karl popperlezing lvsv 24 02 2010
Karl popperlezing lvsv 24 02 2010
 
Esc 2012 pauwels nhoods and schools
Esc 2012 pauwels nhoods and schools Esc 2012 pauwels nhoods and schools
Esc 2012 pauwels nhoods and schools
 
Multilevel stable communities esc1
Multilevel stable communities esc1Multilevel stable communities esc1
Multilevel stable communities esc1
 

Recently uploaded

All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Ahmedabad Call Girls Service 9537192988 can satisfy every one of your dreams
Ahmedabad Call Girls Service 9537192988 can satisfy every one of your dreamsAhmedabad Call Girls Service 9537192988 can satisfy every one of your dreams
Ahmedabad Call Girls Service 9537192988 can satisfy every one of your dreamsoolala9823
 
Recombination DNA Technology (Microinjection)
Recombination DNA Technology (Microinjection)Recombination DNA Technology (Microinjection)
Recombination DNA Technology (Microinjection)Jshifa
 

Recently uploaded (20)

All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Ahmedabad Call Girls Service 9537192988 can satisfy every one of your dreams
Ahmedabad Call Girls Service 9537192988 can satisfy every one of your dreamsAhmedabad Call Girls Service 9537192988 can satisfy every one of your dreams
Ahmedabad Call Girls Service 9537192988 can satisfy every one of your dreams
 
Recombination DNA Technology (Microinjection)
Recombination DNA Technology (Microinjection)Recombination DNA Technology (Microinjection)
Recombination DNA Technology (Microinjection)
 

Pauwels Council_Europe2020 Cybercrime.pdf

  • 1. Prof. Dr. Lieven J.R. Pauwels t. +32 9 264 68 37 f. +32 9 264 84 94 Lieven.Pauwels @UGent.be 12-12-2019 Self-reported Delinquency Surveys and the Study of Online Offending / Cybercrime: Looking Back and Forward from a Total Survey Error Approach Lieven J.R. Pauwels (Ghent University)
  • 2. research publications consultancy conferences www.ircp.ugent.be Lieven J.R. Pauwels +32 9 264 68 37 Lieven.Pauwels@UGent.be • KEY MESSAGES • Understanding and preventing cybercrime / online offending, victimization and reporting behavior require an analytical approach (targeting mechanisms underlying stable predictors) • Understanding cybercrime should be guided by USEFUL theory, well supported by empirical evidence [‘the best available’]. • NEW FACTS AND NEW CONCEPTS steer the evolution of a field. • Self-reported delinquency studies as an important ‘tool of the trade’ for descriptive and explanatory purposes, ie to assess the status of theories. However, but many measurement issues remain. • Therefore, it is a legitimate question to what extent self-reported delinquency methodology can be applied to online offending (and victimization). • Some persistent conceptual and methodological issues are discussed in the light of self-reported online offending / cyber crime. 1. Introduction and goal of the presentation 2
  • 3. research publications consultancy conferences www.ircp.ugent.be Lieven J.R. Pauwels +32 9 264 68 37 Lieven.Pauwels@UGent.be • Why do scholars use self-reported delinquency questionnaires? • Descriptive research (prevalence, frequencies of behavioral responses) ▪ What kind of online offending cyber crime? ▪ What kind of population is vulnerable? ▪ Demographics (Often attributes like Gender, status, immigrant background) • Exploratory research (exploring covariates) • How strong is the overlap between covariates of ‘traditional’ self-reported offending and online offending? • Explanatory research (can ‘established theories’ be applied to online offending in the broadest definition)? • Eg: self-control theory, routine activity theory, social learning theory, social control theory • Caveats: • (1) Humans are more than ‘the sum of variables’ • (2) Variables do not belong to one framework. This also applies to the study of online offending 2. Self-reported delinquency methodology in a nutshell 3
  • 4. research publications consultancy conferences www.ircp.ugent.be Lieven J.R. Pauwels +32 9 264 68 37 Lieven.Pauwels@UGent.be • Different periods in the history of self-reported delinquency research • (1) Exploration and discovery of hidden crime 1940-1950s • (2) The ‘golden years of theory testing’ 1960s • (3) Application in nation-wide representative studies 1970s • (4) The hyper-optimistic years: 1980-1985 • (5) The recognition of measurement problems: reliability & validity discussions (lying, social desirability, acquiescence, recall problems, …) • (6) The internationalisation (eg ISRD1-2-3) • (7) The digitalization: from PAPI survey to online surveys (especially relevant for the study of online offending) • Now: an established method with advantages and disadvantages. 2. Self-reported delinquency methodology in a nutshell 4
  • 5. research publications consultancy conferences www.ircp.ugent.be Lieven J.R. Pauwels +32 9 264 68 37 Lieven.Pauwels@UGent.be • A quick scan of the literature suggests that: • (1) International awareness has increased since the 1990s • Lamenting the inability of the criminal code to fully describe cyber-related phenomena (but a fraud in cyberspace remains a fraud) • Recognizing the problems of lack of data on perpetrators • (2) Published self-reported delinquency studies of cyber crime /digital crime go back to the 1990s and beginning of Y2K (eg Skinner and Fream, 1997; Rogers, 2001) • (3) Number of publications have increased significantly since the overwhelming popularity of social media • (4) Most self-report studies on online delinquency suffer similar criticisms of traditional (offline) self-reported delinquency studies 2. Self-reported delinquency methodology in a nutshell 5
  • 6. research publications consultancy conferences www.ircp.ugent.be Lieven J.R. Pauwels +32 9 264 68 37 Lieven.Pauwels@UGent.be • Survey measurement error refers to error in survey response arising from (1) the method of data collection, (2) respondent or (3) questionnaire 3. Cybercrime /online offending from a ‘Total Survey Error Approach’ 6 Conceptual issues: Definitions Operationalisation Behaviour victims, offenders In the general population
  • 7. research publications consultancy conferences www.ircp.ugent.be Lieven J.R. Pauwels +32 9 264 68 37 Lieven.Pauwels@UGent.be • Conceptualization and measurement (from ‘trying to steal a password’ and ‘deleting files from one’s computer’ to ‘online threatening using social media’). • Like early traditional self-reported delinquency surveys, ‘triviality’ is a threat. • Self-reported delinquency scales (from published studies): • Usually: hacking, digital piracy (illegal downloading / uploading), cyber bullying and harassment, cyber fraud (phishing and malware) • Reliabilities (measures of internal consistency: ‘moderate’ but it is hardly questioned whether measures to evaluate reliabilities of attitudinal scales should be applied to behavior) • Challenges: violent extremism and hate crime, sexting, child pornography, exposure • Beyond self-reported delinquency scales: randomized scenario studies? • Has been successfully applied to the study of victimization and reporting behavior (Vandeweijer et al 2019), applications to digital piracy (Van Rooij et al 2016) 3. Cybercrime /online offending from a ‘Total Survey Error Approach’ 7
  • 8. research publications consultancy conferences www.ircp.ugent.be Lieven J.R. Pauwels +32 9 264 68 37 Lieven.Pauwels@UGent.be • Digital crime studies require adequate measures of digital exposure • Measuring exposure to digital criminogenic settings • Often restricted to internet use (frequency of use is not enough) • Better measures necessary that capture the ‘criminogeneity’ of the setting [3W-model: what are people doing online, with whom are people spending time online, what kind of websites, social network sites, chat rooms, instant messaging fora are people using] + level of online monitoring – norm enforcement online. This is hardly done. • Less frequently studied: measures of exposure to explicit content (e.g. hate crime online, violent extremism online). This can be done succesfully (Pauwels & Hardyns, 2018), but remains controversial topic (‘cause or spurious relationship’) • Active & passive exposure, cumulative exposure • Target populations? • Too much WEIRD-people, undergraduate and graduate student populations • New panel data: is it really just a matter of time (and resources)? 3. Cybercrime /online offending from a ‘Total Survey Error Approach’ 8
  • 9. research publications consultancy conferences www.ircp.ugent.be Lieven J.R. Pauwels +32 9 264 68 37 Lieven.Pauwels@UGent.be • Definitional issues need to be clarified. • Much more descriptive research is necessary, before adequate testing can take place. • 1) First adequate descriptions of involvement (online + offline) • 2) Development of adequate measures of exposure (circumstances) and relevent personal characteristics (traits and experiences). • 3) Can sources be merged? Avoid bias stemming from the same measurement instrument. Eg: combination with Game Theory • 3) Discuss plausible and realistic mechanisms: improve theory development, testing and application (it ‘s better for prevention). • 4) Avoid the ‘endless testing of seemingly competing theories’. Integration: 1+1=3 4. Conclusion /discussion/avenues for future research 9
  • 10. Thanks for your attention! 10
  • 11. research publications consultancy conferences www.ircp.ugent.be Lieven J.R. Pauwels +32 9 264 68 37 Lieven.Pauwels@UGent.be • De Kimpe, L., Ponnet, K., Walrave, M., Snaphaan, T., Pauwels, L., & Hardyns, W. (2020). Help, I need somebody : examining the antecedents of social support seeking among cybercrime victims. COMPUTERS IN HUMAN BEHAVIOR, 108. • De Kimpe, L., Ponnet, K., Walrave, M., Snaphaan, T., Pauwels, L., & Hardyns, W. (2020). Research note: An investigation of reporting behavior among cybercrime victims. European Journal of Crime, Criminal Law and Criminal Justice. Accepted for publication. • Diamond, B., & Bachmann, M. (2015). Out of the beta phase: Obstacles, challenges, and promising paths in the study of cybercriminology. International Journal of Cyber Criminology, 9(1), 24–34. • Enzmann, D., Kivivuori, J., Marshall, I. H., Steketee, M., Hough, M., & Killias, M. (2018). A Global Perspective on Young People as Offenders and Victims (First Results from the ISRD3 Study). Cham, Switzerland. • Flores, W. R., Holm, H., Svensson, G., & Ericsson, G. (2014). Using phishing experiments and scenario- based surveys to understand security behaviours in practice. Information Management & Computer Security. • Groves, R. M., & Lyberg, L. (2010). Total survey error: Past, present, and future. Public opinion quarterly, 74(5), 849-879. • Hawdon, J., Bernatzky, C., & Costello, M. (2019). Cyber-routines, political attitudes, and exposure to violence-advocating online extremism. Social Forces, 98(1), 329-354. • Hardy, W., Krawczyk, M., & Tyrowicz, J. (2013). Why is online piracy ethically different from theft? A vignette experiment. Université de Varsovie, faculté des sciences économiques, Working Paper, (2013), 24. • Gunter, W. D. (2008). Piracy on the high speeds: A test of social learning theory on digital piracy among college students. International Journal of Criminal Justice Sciences, 3(1), 54. • Hawdon, J., Bernatzky, C., & Costello, M. (2019). Cyber-routines, political attitudes, and exposure to violence-advocating online extremism. Social Forces, 98(1), 329-354. • Higgins, G. E. (2007). Digital piracy, self-control theory, and rational choice: An examination of the role of value. International Journal of Cyber Criminology, 1(1), 33-55. Some references 11
  • 12. research publications consultancy conferences www.ircp.ugent.be Lieven J.R. Pauwels +32 9 264 68 37 Lieven.Pauwels@UGent.be • Holt, T. J. (2010). Crime on-line: Correlates, causes, and context. Raleigh, NC: Carolina Academic Press. • Kivivuori, J. (2015). Discovery of hidden crime: Self-report delinquency surveys in criminal policy context. Oxford University Press. • Lee, J., Onifade, E., Ryu, J., Rasul, A., & Maynard, Q. R. (2014). Online activity, alcohol use, and internet delinquency among Korean youth: A multilevel approach. Journal of Ethnicity in Criminal Justice, 12(4), 247-263. • Louderback, E. R., & Antonaccio, O. (2020). New Applications of Self-Control Theory to Computer-Focused Cyber Deviance and Victimization: A Comparison of Cognitive and Behavioral Measures of Self-Control and Test of Peer Cyber Deviance and Gender as Moderators. Crime & Delinquency, 0011128720906116. • Marshall, I. H., & Steketee, M. (2019). What May Be Learned about Crime in Europe (and Beyond) from International Surveys of Youth: Results from the International Self-Report Delinquency Study (ISRD3). European Journal on Criminal Policy and Research, 25(3), 219-223. • Morris, R. G., & Higgins, G. E. (2010). Criminological theory in the digital age: The case of social learning theory and digital piracy. Journal of Criminal Justice, 38(4), 470-480. • Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173-195. • Pauwels, L., & Schils, N. (2016). Differential online exposure to extremist content and political violence: Testing the relative strength of social learning and competing perspectives. Terrorism and Political Violence, 28(1), 1-29. • Pauwels, L. J., & Hardyns, W. (2018). Endorsement for extremism, exposure to extremism via social media and self-reported political/religious aggression. International journal of developmental science, 12(1-2), 51-69. • Rokven, J. J., Weijters, G., Beerthuizen, M. G., & van der Laan, A. M. (2018). Juvenile delinquency in the virtual world: Similarities and differences between cyber-enabled, cyber-dependent and offline delinquents in the Netherlands. International journal of cyber criminology, 12(1), 27-46. • Rogers, M. K. (2001). A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. • Smallridge, J. L., & Roberts, J. R. (2013). Crime Specific Neutralizations: An Empirical Examination of Four Types of Digital Piracy. International Journal of Cyber Criminology, 7(2). • Staksrud, E. (2009). Problematic conduct: Juvenile delinquency on the Internet. Kids online: Opportunities and risks for children, 147-159. • van de Weijer, S., Leukfeldt, R., & Van der Zee, S. (2020). Reporting cybercrime victimization: determinants, motives, and previous experiences. Policing: An International Journal. Some references 12
  • 13. https://ircp.ugent.be/ Contact Lieven J.R. Pauwels T. +32 9 264 68 37 Lieven.Pauwels@UGent.be IRCP Ghent University Universiteitstraat 4 B – 9000 Ghent