This article investigates whether cyber delinquent behaviour of school friends, other offline friends and online contacts is related to cyber delinquent behaviour of individuals, and whether this relation differs for cyber dependent, cyber enabled and traditional crime. We used both direct and indirect measures of cyber delinquency of friends. We employed data from the first wave of a large-scale study on the causes of online delinquency among Dutch juveniles (n=889; mean age=16.8 years). The results suggest that both direct and indirect measures of levels of friend delinquency were related to levels of individual cyber offending. However, indirect measures had a stronger association with individual online delinquency than direct measures. This suggests that respondents make incorrect estimates of their friends’ levels of online delinquency. Moreover, no differences were found in the strength of the relation between individual online offending and indirect measures of online offending of school friends, offline friends and online friends. This suggests that friends of different types all play an important role in individual online offending. |
Zoekresultaat: 16 artikelen
Artikel |
Online jeugdcriminaliteit en ‘verkeerde vrienden’: wanneer is de samenhang het sterkst? |
Tijdschrift | Tijdschrift voor Criminologie, Aflevering 2-3 2020 |
Trefwoorden | cyber delinquency, cyber offenders, peer deviance, social network |
Auteurs | Yaloe van der Toolen MSc, Dr. Marleen Weulen Kranenbarg en Prof. dr. Frank Weerman |
SamenvattingAuteursinformatie |
Redactioneel |
Burgeropsporing: kansen en uitdagingen in een snel ontwikkelende praktijk |
Tijdschrift | Tijdschrift voor Veiligheid, Aflevering 2-3 2020 |
Auteurs | Nicolien Kop, Sven Brinkhoff en Robin Christiaan van Halderen |
Auteursinformatie |
Artikel |
|
Tijdschrift | Tijdschrift voor Criminologie, Aflevering 3 2019 |
Trefwoorden | far-right, online extremism, ideology, resistance, social media |
Auteurs | Dr. Robby Roks en Jolijn van der Schoot MSc |
SamenvattingAuteursinformatie |
This article focuses on the ways the NVU, Pegida and Voorpost - three far-right groups from the Netherlands - make use of social media platforms in the year 2017. Our results show that these extreme right-wing groups use social media to spread their ideology, to construct a group identity, and to call for (democratic) forms of resistances. In addition, our findings illustrate that these far-right groups seem to adjust to their digital surroundings: they do not change or conceal their extremist ideas, but rather manage their online content to ensure that their ideologies can be disseminated through social media. |
Artikel |
Criminaliteit, digitalisering en de online sociale wereld: dezelfde processen in een nieuwe sociale context? |
Tijdschrift | Tijdschrift voor Criminologie, Aflevering 4 2019 |
Trefwoorden | digitalisation, crime, cybercrime, social media, online |
Auteurs | Prof. dr. Frank Weerman |
SamenvattingAuteursinformatie |
This contribution reflects on the criminological meaning of the still ongoing trend of digitalisation. What does this mean for crime as a phenomenon and for the explanation of criminal behaviour? Not only did we see the emergence of new types of offending, also the context of crime has changed. In principle, the underlying explanatory processes can remain the same, but their application in the online world is complex and deserves further attention. Online social interactions are not only important for online crime, but also for traditional offenses. However, systematic research on how this actually takes place is scarce. |
Artikel |
De toekomst is aan de surfende criminoloog |
Tijdschrift | Tijdschrift voor Criminologie, Aflevering 4 2019 |
Trefwoorden | criminology, artificial intelligence, research methods, research funding, causality |
Auteurs | Prof. dr. Jeroen Maesschalck |
SamenvattingAuteursinformatie |
If, as criminologists, we really want to contribute to solutions for the great challenges of our time, we should be…surfing more. In a dynamic environment full of contradictions, we should be constantly in motion, moving left and right between different theoretical-normative perspectives as well as between methodological perspectives. This paper clarifies that surfing movement with some illustrations. It then proposes three goals for a criminological research agenda that should help us address the great challenges: actual (as opposed to superficial) relevance for practice, causal ambitions and multidisciplinarity. The paper concludes with some reflections about the organization and funding of criminological research. |
Artikel |
|
Tijdschrift | Tijdschrift voor Criminologie, Aflevering 1 2019 |
Trefwoorden | jihadi travellers, terrorism, terrorist financing, financial independence |
Auteurs | Dr. Melvin Soudijn |
SamenvattingAuteursinformatie |
The present article examines the financial life of 131 jihadi travellers (JTs), also known as foreign terrorist fighters, from the Netherlands. For the purpose of the research, access was acquired to all their banking transactions in the year preceding their departure: over 60,000 transactions in total. Their income from work or employment, various forms of social assistance, student grants, and other income or expenditure were examined. The data provided a good picture of their financial independence, i.e., the extent to which they were capable of making their own living or needed to claim assistance from the authorities. The analysis shows that it is highly exceptional for Dutch JTs to be financially independent. Only 5 percent have sufficient income from work or employment without making any claims on the government for financial assistance, and are free of mounting debts. The low score can for a large part be explained by the fact that almost half of the JTs are under 23 years of age and/or receive a student grant. Their financial picture largely resembles ordinary students. Older JTs (over 22 years of age, and not having received a student grant for at least one year) underperform, however. Only 9 percent are financially independent. Financial support could perhaps be used to monitor or steer recipients’ role in society. |
Boekbespreking |
Dadergroepen op het internet en hun doelwitkeuzes |
Tijdschrift | Tijdschrift voor Criminologie, Aflevering 4 2017 |
Auteurs | Dr. Johan van Wilsem |
Auteursinformatie |
Redactioneel |
Criminele groepen: een inleiding |
Tijdschrift | Tijdschrift voor Criminologie, Aflevering 4 2017 |
Trefwoorden | Criminal groups, Gangs, Youth groups, Hybrid groups, Online offline |
Auteurs | Dr. Robby Roks, Prof. dr. Arjan Blokland en Prof. dr. Frank Weerman |
SamenvattingAuteursinformatie |
Criminal groups have traditionally been the focus of criminological research because of the collective dimension of many criminal activities or deviance. However, what constitutes a ‘criminal group’ or how specific criminal groups, like gangs, should be defined, remains open for discussion in the scientific literature. This introductory article highlights a number of recent developments illustrating the blurring boundaries between various criminal groups as defined by both insiders and outsiders. In addition, it suggests that the rise of social media and smartphones is changing the structure and dynamics of criminal groups. Future research should focus on how these (new) criminal groups originate, develop and function, but should also address the role of the group in criminal activities. |
Artikel |
De rol van sociale media bij rampen en (mini)crises |
Tijdschrift | Tijdschrift voor Veiligheid, Aflevering 4 2016 |
Trefwoorden | Sociale media, Crises, Crisiscommunicatie, geruchten |
Auteurs | Menno van Duin, Vina Wijkhuijs en Jan Eberg |
SamenvattingAuteursinformatie |
Professionals dealing with crises are more or less forced to a next level of crisis communication and crisis management. This is because of the influence of social media. Messages on Twitter, Facebook and other social media can have a significant impact on the course of developments during a crisis. Sometimes in a positive way, when help is mobilized quickly and people can be informed almost instantly. On other occasions the impact is more negative, when for instance rumors lead to false accusations or threats. In the past several years, crisis management authorities have built up more experience with the use and application of social media and monitoring tools. There are still cases where officials and professionals are taken by surprise because of the shift stream of messages and their impact on public opinion and crisis control. But also lessons have been learned, e.g. in terms of online and offline reactions, cooperation with the public, and rumor control. |
Artikel |
Recht op kwaliteit, maar geen recht op toegangHerstelrecht in de EU-regelgeving omtrent slachtoffers van misdrijven |
Tijdschrift | Tijdschrift voor Herstelrecht, Aflevering 2 2013 |
Trefwoorden | Restorative justice, Victims’ rights, EU-legislation, framework decision 2001, directive 2012 |
Auteurs | Katrien Lauwaert |
SamenvattingAuteursinformatie |
Some ten years ago, victim-offender mediation was introduced for the first time in EU-legislation through article 10 of the 2001 framework decision on the standing of victims in criminal proceedings. In 2012 this framework decision was replaced by a more extensive directive establishing minimum standards for victims of crime. This article examines the position of restorative justice in this new legal instrument. The outcome is mixed. The emphasis on safeguards in case restorative justice is applied is a positive move towards good practices, but it is disappointing that a right to access restorative justice services was not adopted. |
Artikel |
Virtuele ontmoetingsruimtes voor cybercriminelen |
Tijdschrift | Tijdschrift voor Criminologie, Aflevering 4 2012 |
Trefwoorden | offender convergence settings, cyber crime, phishing, carding |
Auteurs | Dr. Melvin Soudijn en Eileen Monsma MSc |
SamenvattingAuteursinformatie |
Felson introduced the concept of offender convergence settings in his articles on situational crime prevention. He refers to physical locations where criminals get together to relax, share information, fence stolen goods, plot new crimes, etc. Such places come in the form of restaurants and cafes that are in the hands of the ‘underworld’, but may equally well consist of deserted schoolyards where unruly adolescents gather. According to Felson, such settings facilitate the committing of crimes and enable the creation of structure and continuity in criminal networks. |
Artikel |
Politieonderzoek in open bronnen op internetStrafvorderlijke aspecten |
Tijdschrift | Tijdschrift voor Veiligheid, Aflevering 2 2012 |
Trefwoorden | criminal investigation, surveillance, OSINT, investigation powers, legal basis |
Auteurs | Bert-Jaap Koops |
SamenvattingAuteursinformatie |
Analysing large amounts of data goes to the heart of the challenges confronting intelligence and law enforcement professionals today. Increasingly, this involves Internet data that are ‘open source’ or ‘publicly available’. Projects such as the European FP7 VIRTUOSO aim at developing platforms for open-source intelligence by law enforcement and public security, which open up opportunities for large-scale, automated data gathering and analysis. However, the mere fact that data are publicly available does not imply an absence of restrictions to researching them. This paper investigates one area of legal constraints, namely Dutch criminal-procedure law in relation to open-source data gathering by the police. Which legal basis is there for this activity? And under what conditions can foreign open sources be investigated? |
Artikel |
Identificatie van Nederlandse jongeren die risico lopen op internet |
Tijdschrift | Tijdschrift voor Veiligheid, Aflevering 2 2012 |
Trefwoorden | Youth, internet use, online victimization, risk profile, risk factors |
Auteurs | Joyce Kerstens en Johan van Wilsem |
SamenvattingAuteursinformatie |
This article describes the findings of a national representative survey on online victimization. The survey was conducted in the Netherlands in 2011 amongst youth aged 10 to 18. Purpose of this research is to identify various risk factors related to cyber bullying, online sexual activities and online financial crime (e.g. e-fraude and commercial deceit). More than 9 percent of the youths had negative experiences with cyber bullying, about 5 percent with e-fraude and over 11 percent with commercial deceit. Also unwanted online sexual solicitations (6%) and unwanted exposure to sexually explicit internet material (12%) occurred with some regularity. |
Artikel |
Drugs in je drankjeSchuldattributie en genderstereotypen in nieuwsberichtgeving en onlinediscussies |
Tijdschrift | Tijdschrift voor Criminologie, Aflevering 4 2010 |
Trefwoorden | Gender, Verkrachtigsdrugs, Slachtoffers, Online fora |
Auteurs | Peter Burger en Gabry Vanderveen |
SamenvattingAuteursinformatie |
Rape drugs (or drink spiking) discourse reflects gender stereotypes in a much more differentiated way than previous studies suppose. Quantitative and qualitative analysis of news items and online discussions proved stereotypes of ideal female victims and male perpetrators to be most prominent in news media. Postings to online bulletin boards were more skeptical about the alleged victims’ innocence and truthfulness. Studies in this area that focus on news media and institutional discourse overestimate the predominance of the ideal victim stereotype. In order to correct this bias, the authors urge criminologists to be more attentive to the relevance and power of informal crime stories and discussions, particularly those appearing in social media. |
Artikel |
Gekocht, maar niet gekregenSlachtofferschap van online oplichting nader onderzocht |
Tijdschrift | Tijdschrift voor Veiligheid, Aflevering 4 2010 |
Trefwoorden | Online oplichting, Slachtofferschap, Slachtofferenquête, Lage zelfcontrole |
Auteurs | Johan van Wilsem |
SamenvattingAuteursinformatie |
Consumer fraud seems to be widespread, yet little research is devoted to understanding why certain social groups are more vulnerable to this type of victimization than others. The present paper deals with internet consumer fraud victimization, and uses an explanatory model that combines insights from self control theory and routine activity theory. The results from large-scale victimization survey data among the Dutch general population (N=6,201) reveal that people with low self-control run substantially higher victimization risk, as well as people performing ‘risky’ routine activities, such as online shopping and participation in online forums. Though a minority share of the self-control-victimization link is indirect – because people with low self-control are more involved in risk-enhancing routine activities – a large direct effect on internet fraud victimization remains. This suggests that, within similar situations, people with poor impulse control respond differently to deceptive online commercial offers. |
Artikel |
Filteren op internetDe rol van de Nederlandse overheid in het blokkeren van kinderpornografische websites |
Tijdschrift | Tijdschrift voor Veiligheid, Aflevering 4 2009 |
Trefwoorden | filteren, internet, kinderporno, politie |
Auteurs | Rutger Leukfeldt, Wouter Stol, Rik Kaspersen e.a. |
SamenvattingAuteursinformatie |
The distribution of child pornography on the internet is observed as a major social problem. In the Netherlands a lively political-social discussion has emerged concerning the manner in which this can be prevented. The discussion moves between two polarities. On the one hand the dangers of internet censure are emphasised and on the other hand the need for a clamp down in which every measure seems to be justified. The present government wants to combat child pornography and by doing so answer the moral indignation of society. A means that the Dutch government, and on her behalf the police, uses, is blocking websites with child-pornographic content. The possibilities of the Dutch government to filter effectively, however, are restricted. The accuracy of existing filters is low and it is easy to get around filters. In addition, opportunities are restricted by constitutional rights. A filter that stops all websites with child pornography is bound to stop legal internet traffic too. That is at odds with the constitutional rights of freedom of expression and freedom of information gathering. The realisation of a filter that respects fundamental rights and still is able to block child pornography requires a lot of police manpower. This comes at the expense of the tracking down of criminals who produce and distribute child pornography. Furthermore, it is unknown whether the use of the child-pornography filter leads to the purposes for which they are deployed, such as hindering the sale of child pornography or reducing the abuse of children. The police, therefore, is assigned to a task that requires a considerable amount of time, but the benefits of which are unclear. |