Cyber Bullying in the Netherlands: A Criminological Perspective

IF 0.7 Q4 CRIMINOLOGY & PENOLOGY
Joyce Kerstens, K. Jaishankar, S. Veenstra
{"title":"Cyber Bullying in the Netherlands: A Criminological Perspective","authors":"Joyce Kerstens, K. Jaishankar, S. Veenstra","doi":"10.5281/ZENODO.55055","DOIUrl":null,"url":null,"abstract":"IntroductionThe internet has become a common and indispensable phenomenon in our society. At the same time, cyber crime generates a lot of media attention. Furthermore, reports on the prevalence of cyber crime appear regularly and the Dutch government prioritizes the tracking and prevention of cyber crime. The term 'cyber crime' refers to criminal and deviant behaviour through the use of online technologies (Wall, 2001; Yar, 2012). Cyber crime is, either implicitly or explicitly, conceptualized as the contemporary counterpart of traditional crime, i.e., crimes that occur only in the offline world (Taylor, Fritsch, Liederbach, & Holt, 2010). Studies on cyber crime predominantly focus on identifying the types and prevalence of cyber crimes and often lack a theoretical base. Studies on the applicability of criminological theories to cyber crime are scarce (McQuade, 2006; Taylor, Caeti, Loper, Fritsch & Liederbach, 2006). Anyone who studies cyber crime will eventually have to look in to theories in order to find an explanation for the findings. At the same time, research is necessary to test the applicability of criminological theories to cyber crime or, to further develop theoretical approaches (e.g., Bernard, 2002; Bottoms, 2000). Lately, criminologists have been debating whether existing criminological theories are useful for the explanation of cyber crime or whether the phenomenon requires novel theoretical explanations (Jaishankar, 2008). In essence, the question is whether cyber crime constitutes a new category of criminal behaviour (Yar, 2005; Jaishankar, 2008; Holt, 2013; Yar, 2012).The Offline-Online dichotomy in relation to Cyber CrimeResearchers, politicians, and policy makers see the offline and online worlds as two separate worlds. The two are regarded as opposites, and characteristics attributed to the online world do not apply to the offline world: the transformation of time-space relationships, (perceived) anonymity, and the relative ease with which social identities can be manipulated (Yar, 2006). Of these characteristics, (perceived) anonymity is particularly connected with online disinhibition: in the online world people behave with fewer restrictions and inhibitions than in the offline world (Suler, 2004). With the arrival of the internet, a new world seems to have emerged: the online world, or cyber space. The question is, however, whether the offline-online dichotomy does justice to the complexity and interrelatedness of offline and online interactions. Subrahmanyam and Smahel (2011) call attention to the immense development in the use of online technologies since the arrival of the internet and argue that the offline and online worlds are interwoven. Research also shows that online interactions of youth occur predominantly in the context of existing relationships (Livingstone, Haddon, Gorzig, & Olafsson, 2011) and that young people increasingly see their offline and online interactions as a coherent experience (Livingstone, 2009).Researchers, politicians, and policy makers also use a dichotomy with respect to crime. Traditional crime takes place in the offline world, whereas cyber crime is committed using online technologies (Wall, 2001; Yar, 2012). There is no consistent definition of cyber crime; it is an overarching term that includes new forms of criminal behaviour - such as hacking - as well as digital forms of traditional crime (Stol, 2012).3 In addition, online deviant behaviour - although not liable to punishment - is also seen as part of cyber crime; an often cited example is cyber bullying (Yar, 2012). For example, in the Dutch Safety Monitor, one of the four investigated cyber crimes is cyber bullying (Veiligheidsmonitor 2013, p. 75). Technology has always been used in criminal activities, but the definition and categorizing of a large variety of criminal and deviant behaviours on the basis of technology is new (McGuire, 2007). The question is whether cyber crime differs fundamentally from traditional crime or whether the arrival of the internet merely offers new options for criminal behaviour (Leukfeldt, Domenie, & Stol, 2010). …","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":0.7000,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Criminology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5281/ZENODO.55055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
引用次数: 9

Abstract

IntroductionThe internet has become a common and indispensable phenomenon in our society. At the same time, cyber crime generates a lot of media attention. Furthermore, reports on the prevalence of cyber crime appear regularly and the Dutch government prioritizes the tracking and prevention of cyber crime. The term 'cyber crime' refers to criminal and deviant behaviour through the use of online technologies (Wall, 2001; Yar, 2012). Cyber crime is, either implicitly or explicitly, conceptualized as the contemporary counterpart of traditional crime, i.e., crimes that occur only in the offline world (Taylor, Fritsch, Liederbach, & Holt, 2010). Studies on cyber crime predominantly focus on identifying the types and prevalence of cyber crimes and often lack a theoretical base. Studies on the applicability of criminological theories to cyber crime are scarce (McQuade, 2006; Taylor, Caeti, Loper, Fritsch & Liederbach, 2006). Anyone who studies cyber crime will eventually have to look in to theories in order to find an explanation for the findings. At the same time, research is necessary to test the applicability of criminological theories to cyber crime or, to further develop theoretical approaches (e.g., Bernard, 2002; Bottoms, 2000). Lately, criminologists have been debating whether existing criminological theories are useful for the explanation of cyber crime or whether the phenomenon requires novel theoretical explanations (Jaishankar, 2008). In essence, the question is whether cyber crime constitutes a new category of criminal behaviour (Yar, 2005; Jaishankar, 2008; Holt, 2013; Yar, 2012).The Offline-Online dichotomy in relation to Cyber CrimeResearchers, politicians, and policy makers see the offline and online worlds as two separate worlds. The two are regarded as opposites, and characteristics attributed to the online world do not apply to the offline world: the transformation of time-space relationships, (perceived) anonymity, and the relative ease with which social identities can be manipulated (Yar, 2006). Of these characteristics, (perceived) anonymity is particularly connected with online disinhibition: in the online world people behave with fewer restrictions and inhibitions than in the offline world (Suler, 2004). With the arrival of the internet, a new world seems to have emerged: the online world, or cyber space. The question is, however, whether the offline-online dichotomy does justice to the complexity and interrelatedness of offline and online interactions. Subrahmanyam and Smahel (2011) call attention to the immense development in the use of online technologies since the arrival of the internet and argue that the offline and online worlds are interwoven. Research also shows that online interactions of youth occur predominantly in the context of existing relationships (Livingstone, Haddon, Gorzig, & Olafsson, 2011) and that young people increasingly see their offline and online interactions as a coherent experience (Livingstone, 2009).Researchers, politicians, and policy makers also use a dichotomy with respect to crime. Traditional crime takes place in the offline world, whereas cyber crime is committed using online technologies (Wall, 2001; Yar, 2012). There is no consistent definition of cyber crime; it is an overarching term that includes new forms of criminal behaviour - such as hacking - as well as digital forms of traditional crime (Stol, 2012).3 In addition, online deviant behaviour - although not liable to punishment - is also seen as part of cyber crime; an often cited example is cyber bullying (Yar, 2012). For example, in the Dutch Safety Monitor, one of the four investigated cyber crimes is cyber bullying (Veiligheidsmonitor 2013, p. 75). Technology has always been used in criminal activities, but the definition and categorizing of a large variety of criminal and deviant behaviours on the basis of technology is new (McGuire, 2007). The question is whether cyber crime differs fundamentally from traditional crime or whether the arrival of the internet merely offers new options for criminal behaviour (Leukfeldt, Domenie, & Stol, 2010). …
荷兰的网络欺凌:犯罪学视角
互联网已经成为我们社会中一个普遍而不可或缺的现象。与此同时,网络犯罪也引起了媒体的广泛关注。此外,关于网络犯罪流行的报告定期出现,荷兰政府优先考虑跟踪和预防网络犯罪。“网络犯罪”一词指的是通过使用在线技术进行的犯罪和越轨行为(Wall, 2001;纱线,2012)。网络犯罪或隐或显地被定义为传统犯罪的当代对应,即只发生在线下世界的犯罪(Taylor, Fritsch, Liederbach, & Holt, 2010)。对网络犯罪的研究主要集中在识别网络犯罪的类型和流行程度,往往缺乏理论基础。关于犯罪学理论在网络犯罪中的适用性的研究很少(McQuade, 2006;Taylor, Caeti, Loper, Fritsch & Liederbach, 2006)。任何研究网络犯罪的人最终都将不得不研究理论,以便为这些发现找到解释。同时,研究是必要的,以测试犯罪学理论对网络犯罪的适用性,或进一步发展理论方法(例如,Bernard, 2002;底部,2000)。最近,犯罪学家一直在争论现有的犯罪学理论是否有助于解释网络犯罪,或者这种现象是否需要新的理论解释(Jaishankar, 2008)。本质上,问题是网络犯罪是否构成一种新的犯罪行为类别(亚尔,2005;Jaishankar, 2008;霍尔特,2013;纱线,2012)。与网络犯罪相关的离线-在线二分法研究人员、政治家和政策制定者将离线和在线世界视为两个独立的世界。这两者被认为是对立的,网络世界的特征并不适用于线下世界:时空关系的转变,(可感知的)匿名性,以及相对容易操纵的社会身份(Yar, 2006)。在这些特征中,(可感知的)匿名性与在线去抑制特别相关:在网络世界中,人们的行为比在线下世界中受到更少的限制和抑制(Suler, 2004)。随着互联网的到来,一个新的世界似乎已经出现:在线世界,或网络空间。然而,问题是,离线-在线的二分法是否公正地反映了离线和在线互动的复杂性和相互关联性。Subrahmanyam和Smahel(2011)呼吁关注自互联网出现以来在线技术使用的巨大发展,并认为离线和在线世界是交织在一起的。研究还表明,年轻人的在线互动主要发生在现有关系的背景下(Livingstone, Haddon, Gorzig, & Olafsson, 2011),年轻人越来越多地将他们的离线和在线互动视为一种连贯的体验(Livingstone, 2009)。研究人员、政治家和政策制定者在犯罪问题上也使用二分法。传统犯罪发生在线下世界,而网络犯罪是利用在线技术实施的(Wall, 2001;纱线,2012)。网络犯罪没有统一的定义;这是一个包罗万象的术语,包括新形式的犯罪行为-如黑客攻击-以及传统犯罪的数字形式(Stol, 2012)此外,网络越轨行为——尽管不会受到惩罚——也被视为网络犯罪的一部分;一个经常被引用的例子是网络欺凌(Yar, 2012)。例如,在荷兰安全监测中,四种被调查的网络犯罪之一是网络欺凌(Veiligheidsmonitor 2013, p. 75)。技术一直被用于犯罪活动,但基于技术的大量犯罪和越轨行为的定义和分类是新的(McGuire, 2007)。问题是网络犯罪是否与传统犯罪有根本区别,或者互联网的到来是否仅仅为犯罪行为提供了新的选择(Leukfeldt, Domenie, & Stol, 2010)。…
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
2.60
自引率
40.00%
发文量
0
审稿时长
16 weeks
期刊介绍: International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy. IJCC is an unique Diamond open access, not for profit international journal, where the author(s) need not pay article processing charges / page charges and it is totally free for both the authors and the audience. IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of cyber crimes in the real world, Policing Cyber space, International Perspectives of Cyber Crime, Developing cyber safety policy, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cyber crime, Cyber offender behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Theft, Mobile Phone Safety, Human Factor of Cyber Crime and Cyber Security and Policy issues, Online Gambling, Copyright and Intellectual property Law. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCC will be a nodal centre to develop and disseminate the knowledge of cyber crimes primarily from a social science perspective to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews. We do not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信