Skip to main content

SYSTEMATIC REVIEW article

Front. Psychol., 12 October 2021
Sec. Educational Psychology
This article is part of the Research Topic Social Networking Sites and Adjustment Problems in Offline and Online Contexts in Adolescence View all 10 articles

Adolescent Deviance and Cyber-Deviance. A Systematic Literature Review

  • 1Faculty of Social Humanistic Studies, Doctoral School of Sociology, University of Oradea, Oradea, Romania
  • 2Faculty of Social Humanistic Studies, Psychology Department, University of Oradea, Oradea, Romania

Deviance is a complex phenomenon that influences aspects both at the macro and micro levels, extensively studied by social scientists The main objective of this article was to conduct a systematic literature review for clustering the topics on adolescent deviance and online deviance. Grounded in Pickering's and Byrne's guidelines and PRISMA protocol, we identified the most recurrent themes, theories and predictors in the 61 most-cited articles related to the concept of deviance from the database of Web of Science, as well as in 488 abstracts of representative papers. The results emphasized four main clusters of topics, namely, predictors of deviance, online deviance, socio-constructivist theories, and research based theories of deviant behavior. The findings highlighted that researchers frequently use strain theory, social learning, self-control, and social control theories in their studies. Our systematic literature review revealed also the most encountered predictors of deviance, which we have classified into five main categories: family patterns, socio-demographic aspects, socialization, victimization, and school and individual factors. For online deviance, family patterns, socio-demographic aspects, victimization, school and individual factors, and Internet and computer use have been determined to be the main groups of predictors. The present systematic literature review makes an important contribution to the understanding of deviance by presenting an overview of the phenomenon.

Introduction

From a multidisciplinary view, deviance is a topic of interest for social scientists as it concerns the violation of approved rules and established norms. As such, there is an abundance of published studies on this research topic, which, however, makes the process of understanding the phenomenon quite challenging.

Consistent with the age-crime curve approach (Moffitt, 1993b; Shulman et al., 2013; Farrington, 2017) which sustains that teenagers engage into deviant behaviors more often than other categories, adolescence is worth considering in studying deviance. In addition, with the spread of Internet technology, a new type of deviant behavior emerged, which is known as cyber-deviance, particularly prevalent in adolescents' lives. As such, teenagers' online deviant behavior has become a matter of grave concern for parents, educators, and researchers.

The Concept of Deviance

The phenomenon of deviance occupies a central position in social science topics. It may be linked to morality, social order, and social inequality. Its genesis has been traced to the 1940s and is credited to Merton (1938) and Sellin (1938), scholars belonging to the Chicago School of Sociology. They defined deviance as a topic of analysis of socio-criminogenesis, a field that encompasses research in criminology, psychiatry, psychology, and sociology.

The wide range of fields interested in defining and studying deviance shows the level of complexity of this phenomenon. As Parsons (1951) emphasizes, deviance affects both the individual and the macrosystem, characterized by deviation from the moral and established rules that form the mainstream culture. According to the author, on an individual level, deviance represents the motivated tendency of an actor to behave in contradiction of one or more institutionalized social rules (Parsons, 1951). The behavior at the individual level has consequences at the social level. From a macro perspective, deviance is the opposite of social control. Hence, it represents the tendency to disbalance the social system, while social control mechanisms act to reestablish social equilibrium.

Social disapproval is an illustrative example of a social control mechanism. Therefore, deviant acts are not just rule-breaking, they are also behaviors that are against the societal or communal norms, which may trigger social disapproval (Clinard and Meier, 2015; Goode, 2016). Social disapproval is expressed by a lack of acceptance, isolation in a community, and social sanctions such as shame and guilt, which end up being accepted by community members as well as the individual as legitimate (Elias, 1978).

The mechanism of internalizing shame and guilt as a disciplinary practice is also a focus of Foucault's (1971) perspective that portrays deviance as normal and regulatory in society. With regards to presenting institutionalization and confinement as instruments to impose the rules of the dominant groups, Foucault (1971, 2007) explains how the external discipline is transferred to a discipline that is imposed from within. An internalized, self-disciplinary power is under the threat of being exposed. From this perspective, deviants seem to be the marginalized ones, the ones to lose their power to hold onto their own values and are forced to accept societal norms through isolation, surveillance, and discipline. The individuals committing rule-breaking, deviants, may be disciplined harshly and, therefore, eventually become a non-deviant (Foucault, 1971, 2007; Turkel, 1990). Complementary to Foucault's view, Durkheim (1938) characterizes deviance as being inevitable, present in any society, and necessary for its functioning.

Theories of Deviance

In the quest to understand the phenomenon of deviance, the question of whether deviant acts and, therefore, deviant individuals are born or is society the one that labels them as such arises. This is a central topic in the study of deviance, with essentialist and positivist approaches arguing that deviant individuals are born with specific traits that influence their behavior, whilst constructivist scholars contend that society marks individuals as deviant (Thio et al., 2013).

To expand on their idea of the presence of deviant traits in individuals, positivists attempted to identify specific characteristics of this phenomenon, which resulted in the formulation of many theories. The most common positivist theories include social learning theories (Bandura, 1978; Akers and Lee, 1999; Akers, 2017), strain theory (Cohen, 1955; Cloward, 1959), anomie theory (Merton, 1938), self-control theory (Akers, 1991; Hirschi and Gottfredson, 2000), deterrence theory (Gibbs and Erickson, 1975; Warr and Stafford, 1991), differential association theory (Sutherland et al., 1992). The inclination of an individual toward engaging in deviant acts is what distinguishes a deviant from a non-deviant. This framework traces back from the sociobiological, psychological, and criminological research of Italian naturalists who attempted to identify biological features or psychological traits unique to deviants (Lombroso-Ferrero, 1911). The biological orientation has now promoted more sophisticated approaches, assuming the presence of specific genes or genomic segments as proof of inclination toward addictive and risk-taking behaviors (Shostak et al., 2009; Linnér et al., 2019; Mills and Tropf, 2020). These studies belong to sociogenomics, a discipline that connects genetics and sociology (Udry, 1995; Duster, 2006a,b; Mills and Tropf, 2020).

While positivist theorists claim that an act is seen as deviant because it breaks the norms of a particular society, constructivists notice that some acts are perceived as deviant only in a particular context but are not universally categorized as deviant and distinguished between deviance and crime. The most relevant constructionist theorists include labeling theories (Erikson, 1962; Lemert, 1967; Ben-Yehuda, 1990; Becker, 1995, 2008), symbolic interactionism (Clinard and Meier, 2015), phenomenological theories (Matza and Blomberg, 2017), and social conflict theories (Foucault, 1971; Jensen et al., 1978; Mills, 1981; Hagan et al., 1985; Katz, 1988; Henry and Milovanovic, 1996; Milovanovic, 1996; Hagan and McCarthy, 1998). Constructivists argue that it is not the act that is deviant but society's act of labeling it as such that makes it deviant. In this sense, one has to acknowledge the role of cultural differences in labeling an act as deviant (Goffman, 1978; Clinard and Meier, 2015), although criminal acts are universally defined as deviant. Deviance is relative as it depends on the context in which it is judged and on how society labels a particular act or individual. Moreover, deviance is the result of a subjective experience, in that each person provides a certain meaning to the acts they are involved in. At the same time, deviance is voluntary, being regarded as an expression or choice of a person (Erikson, 1962; Ben-Yehuda, 1990; Becker, 2008).

In an integrative approach, Thio et al. (1978) argue that the two above-mentioned frameworks are complementary. Therefore, the authors distinguish between higher consensus deviance and lower consensus deviance. Higher consensus deviance includes acts that are generally perceived as deviant and cause major losses, while lower consensus deviance relates to acts that are seen as deviant by fewer persons because those acts cause minor losses (Thio et al., 2013).

The classification of deviant theories is related to many research areas. The present study focuses on the psychological and sociological aspects as they relate to deviance in teenagers. Specifically, psychologists analyze deviance from the point of individual characteristics. The main cause for deviant behavior is found strictly at the individual level and, in our case, at the adolescent stage. The most important psychological theories refer to psychoanalytic theories, such as, Freud's (2012), the cognitive development theory of Kohlberg and Hersh (1977), and the learning theory (Bandura and McClelland, 1977). Freud believes that all children are born with tendencies toward deviant behaviors, but appropriate socialization experiences can help them not become deviant. On the other hand, Kohlberg and Hersh (1977) claimed that there exist stages of moral development, with deviant adolescents being those who have failed to pass through the pre-conventional and conventional stages of moral development. According to Bandura, deviant behavior is learned by observation, imitation, and shaped by rewards and punishments (Bandura, 1971, 1978; Bandura and McClelland, 1977).

On the other hand, sociologists study the emergence of deviance and its impact on societies, communities, or groups and develop theories that view the phenomenon on a wide scale (Bandura, 1971, 1978; Bandura and McClelland, 1977). Hirschi's theories of social control (Hirschi, 1969, 2017; Pratt and Cullen, 2000), the theory of differential association (Sutherland et al., 1992; Ogien, 2002), and Glaser's theory of differential identifications (Erikson, 1962; Glaser, 1971; Rowitz, 1981) present deviance as a result of group socialization. Considering the ideas of these orientations, deviance in teenagers is associated with family factors, peer group pressure, and school climate. Another perspective links deviant acts to status frustration. Thus, Cohen's subcultural theory contends that teenagers' deviant behavior is a tactic used by those with low social status and unsatisfactory social conditions to attain a higher social status in a short time (Cohen, 1955, 2002; Barmaki, 2016). In addition, structural theorists view socioeconomic status as a predictor of deviant behavior, frequently encountered in middle-class teenagers (Hagan et al., 1985; Hagan, 1990; Hagan and McCarthy, 1998; Hagan and Foster, 2001). Therefore, deviance is a result of the antinomy between means and social aspirations, which is also a topic discussed by the anomie theory, with anomie being defined as the state of society characterized by a lack of norms and social values (Merton, 1938). Socio-constructivist theories that present deviance as a result of social judgment and labeling also have sociological orientations (Becker, 1995, 2008; Yoder, 2011).

Types of Deviance

Along with formulating the theories to explain the general tendency of deviance, scholars have also distinguished specific types of inappropriate behavior. Deviance behavior ranges from serious offenses, classified as delinquent acts (such as property crime, violent crime, delinquency, drug and substance-related crime, white-collar crime, etc.) to minor antisocial acts that are not sanctioned by the penal system (Gorman-Smith et al., 1998).

With regards to adolescents' engagement in deviant behaviors, scholars focused on substance and alcohol use (Durkin et al., 2005; Maimon and Browning, 2012b), marijuana use (Winfree and Griffiths, 1983; Akers and Cochran, 1985; McBroom, 1994; Ennett et al., 1997), school misconduct (Musgrave, 1980; Lepoutre, 2007; Peguero, 2011)), self-injury (Adler and Adler, 2007; Brossard, 2014; Taylor and Ibanez, 2015; Long, 2017), self-harming behaviors such as eating disorders (Sischo et al., 2006), bullying (Juvonen and Graham, 2014; Tippett and Wolke, 2014).

A particular category of deviance, increasingly common nowadays, is cyber-deviance, which refers to the harmful activities happening in the digital sphere (Jewkes and Yar, 2013; Graham and Smith, 2019; Yar and Steinmetz, 2019). While the current understanding of deviance is rooted in Durkheim's (2002) definition of crime, the debate on cyber deviance (online deviance) can be traced back to Wall's (2001) conceptualization of cybercrime. According to Wall (2001, p.2), it refers to an “occurrence of a harmful behavior that is somehow related to a computer, which generates a powerful response from the media, policy-makers, politicians, academics and the public.” This definition outlines two main characteristics of cybercrime, namely, the electronic environment and the impact related to the increased concern for cybersecurity. Arguing that Wall's definition of cybercrime is too broad, Yar and Steinmetz (2019) conceptualized cybercrime as a range of illicit activities related to information communication technologies. Therefore, cybercrime refers to online harmful activities sanctioned by formal laws. The other types of online disruptive activities are included under the umbrella term of cyber deviance, which relates to informal violations of laws (Jewkes and Yar, 2013; Graham and Smith, 2019; Yar and Steinmetz, 2019).

Nevertheless, like in the case of crime and deviance, there is no clear demarcation between cybercrime and cyber deviance. This is because norm-breaking behaviors may be included in the formal regulations at any time and certain behaviors that are sanctioned by law may not be regarded as deviant in all contexts. In the study of cyber deviance as occurring in the adolescent stage, scholars mostly focus on digital piracy (Udris, 2016), online harassment and computer hacking (Lee, 2018), cyberbullying (Hinduja and Patchin, 2010; Holt et al., 2012; Lee, 2018), sexting and online sexual exposure (Karaian, 2012; Garcia-Gomez, 2017; Dodaj et al., 2020).

The phenomenon of deviance has an extensive volume of literature that is organized in disparate clusters of studies on various specific types that arouse social concern on the one hand and a preoccupation with in-depth accounts of theoretical approaches on the other. Although extremely rich, the existing literature is narrow in terms of its focus, and there is a need for a more structured presentation of common topics by researchers in the field from a systematic point of view. Most of the reviews that follow a perspective rooted in social sciences (psychology, sociology, criminology, communication) relate to positive deviance (Albanna and Heeks, 2019; Alzunitan et al., 2020), workplace deviance (Götz et al., 2019; Arshad and Malik, 2020), and substance use. Other types of deviance under scrutiny are different types of aggression, antisocial disorders in adolescents, sexual offenses, sexual deviance, social deviance, white-collar crimes, delinquency, and cybercrime. With regards to the reviews conducted on the topic of deviance, the main topics of interest are specific forms of offline deviance, namely, drug use, alcohol abuse, violence, dating violence, sexual aggression, deviant sexual fantasies, illicit sexual behaviors, sexual deviance, ritualistic child abuse, pornography exposure, self-injury, etc. At the same time, researchers focus on different types of online deviance, such as cyberbullying (including adolescent cyberbullying), Internet-based radicalization, online sexual deviance, online negative user behavior, cyber dating abuse, social spamming, problematic social media usage, and problematic use of the Internet.

As far as our knowledge, there is no systematic review that covers the main theories of deviance from a psychological and sociological (including criminological) perspective. Still, comprehensive classifications of these theories are present in textbooks (Thio et al., 2013) and classical studies (Sagarin and Montanino, 1976; Short and Meier, 1981; Sampson and Laub, 1992; Birkbeck and Lafree, 1993; Moffitt, 1993b; Feinberg, 2011). Focused on examining the literature regarding the human reinforcement learning process, the systematic review of Brauer and Tittle (2012) presents the results of a comprehensive analysis of 179 experimental sources and 67 peer-reviewed journal articles. Other theories related to deviance covered in the literature reviews are social learning theory, social control theory, differential association theory, life-course perspectives, social disorganization, strain theory, subcultural theory, social concern theory, routine activities theory or situational approaches, lifestyle exposure theory, arousal theory, criminology's situational approach, rational choice, delinquent problem-solving, deviance regulation theory, interactionist conception, neo-cognitive learning theory, gene-based evolutionary theory, desistance theories, neutralization theory, frustration theory, etc. In the majority of the literature reviews, deviance was not studied as a single phenomenon, but as it related to other factors such as religiosity (Adamczyk et al., 2017), family influence (parental communication (Roisko et al., 2014), parental styles (Ruiz-Hernández et al., 2019), parental control, family processes, family history of substance use), peer-related factors (peer influence (Leung et al., 2014), peer network, peer association, motivations of dissent in social groups), individual factors (animal cruelty (Chan and Wong, 2019a,b; Longobardi and Badenes-Ribera, 2019), victimization and sexual victimization [(McGrath et al., 2011; Dennis et al., 2012; Engström, 2021), child maltreatment (Fitton et al., 2020), non-emotional callousness and impulsivity (Toro et al., 2020), motivational processes (Agnew, 1995)]. Concerning online deviance, most of the systematic reviews refer to a specific type of behavior, which is cyberbullying (Kowalski et al., 2014; Watts et al., 2017; Vale et al., 2018; Rosa et al., 2019; Zych et al., 2019). While reviews on online deviance focus on main theories of deviance, the systematic reviews in the field of online literature focus on specific online behaviors and their correlates, including the predictors of offline deviance mentioned before, Internet access, and computer use. Of particular interest is the systematic review of Estévez et al. (2020), which provides a bridge between online and cyber-deviance by revealing similar patterns in the development of bullying and cyberbullying behavior. In this sense, the authors show that risk factors and protective factors of the two problematic behaviors mostly coincide.

Grounded on the previous analyses conducted in this field, our present systematic literature review inquires the following: How are the topics of deviance and online deviance covered in the in the field of social sciences?

In consideration of our question, the goal of this systematic review is to collate and summarize the literature on the field of deviance and online deviance, with a particular focus on teenagers' behaviors, and to achieve this purpose, the article proposes specific objectives in order to go beyond a panoramic understanding of the phenomenon. They are as follows:

➢ Identification of the main topics addressed in articles written on adolescent online and offline deviance until 2021;

➢ Comparing the psychological and sociological approaches on deviance and revealing overlaps;

➢ Highlighting the main predictors and indicators of online and offline deviance;

By systematically and qualitatively reviewing the literature in the field of deviance, we ultimately seek to gather the relevant findings on this field in a single paper and provide a better understanding of the same.

Methods

As the main method, the article employs the 15 steps of systematic quantitative literature review proposed by Pickering and Byrne (2014). We began by defining the topic, formulating research questions, and identifying the keywords. Then, we searched and analyzed the relevant articles. At the same time, we followed the guidelines of PRISMA Protocol (Moher et al., 2009; Page et al., 2021) for ensuring that articles are systematically and transparently reviewed.

For the comprehensive analysis carried out in this study, we implemented computational text analysis methods using KH Coder (Higuchi, 2016), which allowed us to explore almost 500 articles. We employed this software for identifying patterns in the data and comparing different datasets by constructing a coding schema, which may be further used for analyzing other datasets. The use of a reproducible review technique, followed in the present article, has the major benefit that it diminishes researchers' subjectivity in conducting a review.

Inclusion and Exclusion Criteria

The present research attempts to examine a large dataset of articles on deviance and online deviance from the Web of Science database. The rationale behind choosing Web of Science was to include only objective peer-reviewed articles from specific fields. It also facilitates the selection of articles based on the field of study using its filtering options.

The inclusion criteria were:

– Articles indexed in Web of Science

– Studies about deviance

– Language: English

The exclusion criteria used in the selection process consisted of:

– Field: at least one of the three of them should be Sociology (Web of Science filter)

– Studies that have an abstract available on the Internet in English language

– For Dataset 1: Articles' impact: top cited filter and most cited for the full-text articles

– For Dataset 2: Articles that refer to adolescent deviance (TS 2) and online adolescent deviance (TS 3) – for detail see section Stage 1 – Preparing the datasets

Considering the objective of this paper, for the analysis, we chose to include only those sources that have Sociology as one of their three focus fields. We employed this criterion in order to systematically narrow the extensive dataset while keeping focused on the impact of deviance in society. The included sources are articles, reviews, and book chapters in English, with an abstract. Furthermore, the sources belonging to the dataset have as one of their keywords “deviance” or “online deviance.” In terms of timeframe, we included in our systematic review the articles that were published between January 1975 and April 2021.

For objectively selecting the articles with the highest impact, we applied the highly cited articles filter on the previous results. Parallel to this dataset, we created a second dataset that included articles, reviews, and book chapters that also contain “deviance” and “adolescence” or “online deviance” and “adolescence” as their key focuses. In addition, all the selected sources were in English and had an abstract that was available for free.

The inclusion criteria were established to ensure the objectivity of sources selection and study replicability. As the main goal of our study was to offer an overview of the phenomenon of adolescent deviance, we did not use an extensive number of exclusion criteria.

Computational Text-Analysis Using KH-Coder

Based on the analysis model proposed by Pickering and Byrne (2014), our systematic analysis, which uses KH Coder, followed three main steps:

➢ Stage 1 – Preparing the datasets (includes steps 1 to 6 according to Pickering and Byrne, 2014)

➢ Stage 2 – Identifying the coding schema (includes steps 7 and 8 according to Pickering and Byrne, 2014)

➢ Stage 3 – Analyzing the bulk set of articles (includes steps 9 to 11 according to Pickering and Byrne, 2014)

➢ Stage 4 – Presenting the main results (includes steps 12 to 15 according to Pickering and Byrne, 2014).

Stage 1 – Preparing the Datasets

Based on the above-mentioned terms, first, we made repetitive composed queries on the Web of Science database. For building our database, we chose words that referred to deviance in general, deviance as occurring in adolescence, and online deviance during teenage years.

The dataset was created by employing three main criteria (TS = Topic/Subject):

TS1 = (devian* OR disruptive behavior OR immoral OR amoral OR harming practices OR incivility OR bad behavior OR harming behavior OR deviant behavior OR moral panic OR delinquency OR anomie OR immorality OR social disorder OR antisocial behavior);

TS2 = (devian* AND adolescen*) OR TS = (devian* AND teenage*) OR TS = (devian* AND school*);

TS3 = (Online devian* AND adolesc*) OR TS = (Online devian* AND teenage*) OR TS = (Cyber* AND adolesc*) OR TS = (Cyber* AND teenage) OR TS = (Digital* AND adolesc*) OR TS = (Digital* AND teenage*);

From the obtained results, we constructed two datasets, one with the most cited articles (full text based on all three criteria) and a larger one comprising only abstracts (focused on adolescent deviance – criteria 2 and 3).

Preparing Dataset 1

Based on the mentioned queries, we selected 10% of the most cited articles from the Web of Science database by filtering the obtained results on the field. In this step, we took into consideration the top-cited articles on deviance related to the field of sociology. After applying this filter for the first criterion, 21 sources were found.

For the second criterion, three articles belonging to the highly cited articles were identified, while for the third criterion, only one article could be found. The four articles were already included from the previous stage. For completing the database with relevant articles in the field of teenagers' engagement in deviant behavior, we decided to include the 21 most cited articles that correspond to these two criteria such that the number of articles is the same as that for the first criterion. Further, we removed the duplicates and were left with 61 articles.

Preparing Dataset 2

This dataset comprises abstracts focusing on deviance and online deviance in the teenage years as found in the articles complying with the second and third criteria. In this step, we introduced 488 abstracts (from the 515 sources initially selected, we excluded 27 as they were duplicates or had no abstract).

Stage 2 – Identifying the Coding Schema

The abstracts of 61 articles were used for developing the coding schema, an extensive process that involves the following steps:

➢ Employing the preliminary word frequency, the automatic process using KH Coder software for identifying the most frequent terms;

➢ Manually organizing the most frequent words identified in the first step in thematic codes;

➢ Automatically generating self-organizing maps of words by automatically classifying them through Jaccard similarity coefficient using a multiple iteration process;

➢ Automatically generating self-organizing maps of our thematic codes and comparing them with the previously obtained automatic codes;

➢ Developing the coding schema by adding new codes based on the literature; at this stage, we manually assigned the terms of the 61 abstracts to the existing codes and created new ones.

In the end, we obtained 33 codes. The coding schema was furtherly employed for computational text analysis.

Stage 3 – Analyzing the Complete Dataset

Using the coding schema, we analyzed the full text of the most cited sources (61 articles) using the KH Coder software (through correspondence analysis).

Next, we examined the results of applying the coding schema to a new dataset, as well as the 488 abstracts on deviance and online deviance.

Before effectively applying the coding schema, we conducted a preliminary analysis. This includes making automated queries focused on terms frequencies and manual analysis of the 488 sources. The manual exploration facilitated a comprehensive understanding, thereby facilitating the acquisition of an overview of the field covered, the type of analysis, and the theories addressed, as well as additional aspects that could not be captured with the KH Coder software.

Results

Stage 1 – Preparing the Dataset

At this stage, we had 250,825 articles, out of which 2,874 are clustered in potentially relevant fields (e.g., sociology AND psychology; sociology; sociology AND criminology AND penology; sociology AND social issues).

For the second criteria, referring to adolescent deviance, we obtained a total of 3,800 sources and 374 results in the same potentially relevant fields.

For the third criterion, we obtained a total of 6,221 sources and 131 results in the same potentially relevant fields. The third criterion was more specific and included articles on online adolescent deviance.

To facilitate an understanding of the process, we present the outline of the methodological approach below (Figure 1). The robustness of the schema was ensured by developing it based on PRISMA Protocol (Page et al., 2021); the employed PRISMA guidelines for Dataset 1 and Dataset 2 may be consulted in the Supplementary Material section.

FIGURE 1
www.frontiersin.org

Figure 1. The systematic literature review process.

Stage 2 – Identifying the Coding Schema

The creation of the coding schema started by making queries to explore the relationships between words and their co-occurrences patterns. Then, we classified relevant terms into categories.

In the first phase of the analysis, we identified the most frequent words from the 61 abstracts. The list of the most common words includes “adolescent,” “health,” “social,” “online,” “school,” “family,” etc.

From the word association query, we defined the thematic categories.

Consequently, the word association revealed that there are seven major themes.

Next, we presented the main themes identified in the previous step and the frequency of the terms. With reference to the occurring medium, we distinguished the terms indicating the digital environment, namely, online (45), digital (41), Internet (39), technology (15), Facebook (10), ICT (9), computer (7), informational (6), cyber (5), and cyberspace (2), and the offline context: family (52), school (47), life (39), parent (24), neighborhood (14), physical (13), offline (110), country (5), and gentrification (7).

One interesting finding concerns the frequency of the health term (59), which seems, at first sight only, indirectly connected to deviance. The associated terms in this category include mental (18), stress (9), autism (7), autistic (6), anxiety (5), medical (5), stressor (5), disorder (4), harm (4), psychological (4), hospital (3), and fitness (3). Their occurrence may be the result of including a more general query in the selection criteria, which resulted in a high number of results (2,874 articles in sociology), even after applying the field filter.

The word frequency query also revealed the population of interest in the selected studies, namely, adolescent (71), child (31), youth (30), student (14), undergraduate (13), teenage (9), teenager (8), adolescence (5).

Moreover, the abstracts included in the dataset refer to specific behaviors perceived as deviant in the online and offline context. Hence, terms such as cyberbullying (10), sexting [sext (5), sexting (4), sexter (1)], suggest deviant behaviors online, while words such as bullying (12), harassment (10), violence (9), aggression (5), violent (4), grooming (2) indicate deviant offline behaviors. Along with specific deviant behaviors, the articles refer to deviance in general, comprising terms such as deviance (23), deviant (16), and deviancy (2). The way terms are employed changes if they are associated with the words digital, online, or cyber.

The last category revealed that most frequent words consist of terms reflecting delinquency, namely, delinquency (25), delinquent (7), crime (17), criminal (14), arrest (7), incarceration (9), imprisonment (5), desistance (4), criminological (3), and illicit (3).

At this stage, we compressed the dimensions into three main clusters by employing hierarchical cluster analysis with Jaccard distance, as shown in Figure 2.

FIGURE 2
www.frontiersin.org

Figure 2. Hierarchical cluster analysis of the preliminary dimensions.

The first cluster included the terms related to the digital environment and online deviance. In the case of the second cluster, this included only terms related to health and mental health. The third one comprised the other codes, namely, offline context, adolescent, adolescent, offline deviance, and delinquency.

Improving the Initial Coding Schema

For assessing the reliability of the created coding schema, we prepared a self-organizing map of the words from the abstracts the created coding schema, we prepared a self-organizing map of the words from the abstracts (Figure 3A) and compared it with the self-organizing map of the preliminary codes (Figure 3B).

FIGURE 3
www.frontiersin.org

Figure 3. (A) Self-organizing map data set 1. (B) Self-organizing map data set 1.

The self-organizing map of abstracts partially reflected the map of codes that we developed, even if the employed colors did not coincide.

In the main clusters of the self-organizing map of abstracts, we identified key terms that relate to the distinguished dimensions (a. digital environment; b. offline context; 3. health and mental health, d. adolescent; 5. online deviance; 6. offline deviance; 7. delinquency). The other emerged category consists mostly of terms related to divide and inequality, including the issue of digital divide and differential access to resources (8). The least consistent category between those created using word frequency query is related to adolescence. Considering the finding of comparing the two figures generated from preliminary coding and self-organizing map of words, we reviewed the classification by manually coding each abstract.

The Final Coding Schema

At this stage, we added specific codes to the preliminary classification for including the predictors of deviance, as well as of cyber-deviance mentioned in the abstracts and codes that relate to the main influencing factors. In the end, the final coding schema had 33 codes, with the most recurrent being predictors of deviance, school and education, socioeconomic status, age, children and adolescents, discipline and power relations, family factors (Figure 4). The final codes were grouped into eight clusters using a self-organizing map with the Jaccard similarity coefficient query.

FIGURE 4
www.frontiersin.org

Figure 4. The coding schema.

Along with the substantive categories mentioned above, we identified terms referring to the main theoretical frameworks such as social learning, opportunity routine theories, differential association, normative theory, self-control, social control, strain theory, subcultural theories, life course theory, digital divide, and labeling theories. Moreover, we created specific codes for terms related to lifestyle (habitus lifestyle), health, and well-being.

For a better understanding of the resulting clusters, we generated a co-occurrence network of codes, which is based on the probability of two codes appearing in the same abstract. The network revealed correlations between the predictors of cyber-deviance, deviance, peer influence, children, school and education, delinquency, and deviance and digital environment (Figure 5). At the same time, terms related to health, well-being, and neighborhood are negatively correlated to the items mentioned above. Figure 5 also reveals the connections among identity, inequality, neighborhood, and ethnicity codes.

FIGURE 5
www.frontiersin.org

Figure 5. Co-occurrence network of the most encountered codes as applied to abstracts.

After inspecting the correlations among codes, we considered the coding schema as final and employed it for the following analysis procedures.

Stage 3 – Analyzing the Complete Data Sets

Stage 3 consisted of applying the coding schema to the two established datasets (61 full text and 488 abstracts) and compared the results with the hierarchical word clusters through correspondence analysis and crosstabulations.

Dataset 1 (61 in Extenso Articles)

The analysis of the first dataset was conducted in four stages, consisting of correspondence analysis and crosstabulations of hierarchical clusters and the coding schema (unit of analysis: articles). The third stage consisted of examining the associations among 33 generated codes using a similarity matrix to identify overlaps. The last procedure involved creating a detailed network between predictors of interest in the field of deviance and online deviance.

The correspondence analysis revealed co-occurrent topics. This method revealed four latent groups of topics, namely, online deviance, identity, and communication in the online sphere, peer influence, and explanatory theories of deviance (See Figure 6 below). The first identified cluster mostly overlaps with the nodes related to online deviance, predictors of cyber-deviance, predictors of deviance, delinquency, and opportunity theories. At the periphery of this class, we found terms that refer to children, gender, age, and health. In total, the first group of topics includes 10 articles. The second group, which encompasses cluster 2 (3 articles) and 3 (14 articles), focuses on aspects related to identity and communication in the online sphere. The theory of the digital divide and the articles referring to well-being are also included in this group. The fourth cluster forms the third group on its own, and it includes 19 articles. For this cluster, the most representative codes are peer influence, ethnicity, differential association theory, and the subcultural approach. The last group is composed of clusters 5 (5 articles) and 6 (10 articles), and it presents an integrative view. Thus, as the main codes may show, articles that question the causes of deviance (social control, life-course theory, normative theory, and strain theory) and articles that focus on understanding deviance as a social construct (labeling theory, the relationship between lifestyle, deviance, and social inequality) belong to this category.

FIGURE 6
www.frontiersin.org

Figure 6. Correspondence analysis of codes and hierarchical clusters in extenso articles.

A more in-depth examination of the clusters is possible with the use of the crosstabulations available in KH Coder. The results of this examination allowed the identification of the most encountered codes and their statistical signification in establishing the clusters. Thus, the most frequent themes covered in the articles are predictors of deviance (61 articles), school education (60 articles), socioeconomic status (57 articles), age (55 articles), children& adolescents (55 articles**1 – present in clusters 1, 2, 3, 4, and 5), abstraction of power (55 articles* – present in clusters 1, 3, 4, 5, and 6), family influence (54 articles), deviance (53 articles** – present in clusters 1, 3, 4, 5, and 6), health (52 articles), gender (52 articles), and identity (51 articles), as presented in Figure 7.

FIGURE 7
www.frontiersin.org

Figure 7. Heat map of the in extenso articles.

The other codes that influenced the composition of the clusters are digital environment (46 articles** – present in clusters 1, 2, 3, 5, and 6), online deviance (10 articles** – present mostly in cluster 1), delinquency (40 articles** – present mostly in clusters 1 and 4, and to a lesser extent in cluster 3, 5, and 6), differential association (10** - present mostly in cluster 4 in 9 articles and in 1 article from cluster 1), social control (23** - present mostly in cluster 4 in 13 articles and in clusters 3, 5 and 6), life-course theory (21** – present mostly in clusters 4 and 5 and to a less extent in clusters 3 and 6), digital divide (9** – present mostly in cluster 2 and to a less extent in clusters 1, 3, 4, and 5), normative theory (36* – present in clusters 3, 4, 5, and 6) and strain theory (36* – present mostly in clusters 3, 4, and 5 and to a less extent in cluster 1).

The similarity matrix of codes shows consistent overlaps among the nodes included in the coding schema. Thus, terms belonging to the codes, namely, predictors of cyber-deviance, deviance and predictors of deviance, family influence, school and education, gender, age, socioeconomic status, children, identity, abstraction of power, and delinquency, have a correlation value higher than 0.5. The most distinctive nodes have fewer occurrences, including online deviance, religious commitment, opportunity theories, differential association, self-control, subcultural theories, digital divide, life-course theory, and social control.

Further, we generated two networks, including the predictors of deviance and online deviance, for a more in-depth inquiry. The resulting networks facilitate the identification of the terms that are mainly associated with them.

As revealed by the presented network, the most encountered predictors for deviance are paternal incarceration, violent victimization, socialization, selection, parental deviance, socioeconomic status, family factors, parental control, parenting practices and monitoring, school factors, self-efficacy, peer affiliation, popularity, network friendship, self-control, alcohol and substance use, educational attainment, deviant exposure, delinquent parents, aggression, neighborhood disadvantage, risk, and others.

Given the grouping of predictors based on technical modularity shown in Figure 8, we identified five main categories of predictors of deviance: family patterns (parental deviance, parental monitoring, paternal incarceration, parenting practices, etc.), socio-demographic aspects (SES difference, life style background and drug abuse, family background, etc.), socialization (low self-control, socialization process, selection process, etc.), victimization (violent victimization, risk, age and gender risk, life-course consequences, etc.) and school and individual factors (traditional bullying, school grades, adolescent self-efficacy, school drop-out, etc.).

FIGURE 8
www.frontiersin.org

Figure 8. Predictors of deviance grounded on modularity procedure.

In relation to cyber-deviance (see Figure 9), the frequent predictors for cyber deviance encompass the following: traditional bullying, offline victimization, parental abuse, alcohol and substance use, Internet access, Internet misuse, compulsive Internet use, substance use, online exposure, parental control, school factors, self-efficacy, socioeconomic status, parenting, digital inequality, information habitus, etc.

FIGURE 9
www.frontiersin.org

Figure 9. Predictors of cyber deviance grounded on modularity procedure.

With regards to the most common predictors of online deviance, they can be grouped into five categories: family patterns (parental abuse, parental deviance, family history and abuse, parenting style, etc.), socio-demographic aspects (gender and age effects, demographic and socio-economic, etc.), victimization (offline victimization, traditional bullying, physical and offline activities, exposure, etc.), school and individual factors (school problems, school bonding, school involvement, empathy, school perception, school behavior, prosocial involvement, etc.) and Internet and computer use (home Internet access, digital inequality, frequency usage of Internet, technology information habitus, etc.).

Dataset 2 (488 Abstracts)

The last stage of analysis recommended by Pickering and Byrne (2014) consists of adding the whole set of articles that correspond to the searching criteria.

The exploration of the second dataset required conducting preliminary analysis, considering its extensive dimension. Consequently, we added two additional stages, a manual assessment of the study field of research methods and a frequency query. The analysis of the second dataset was conducted in five stages: manual inspection of study field and research methods, word frequency, correspondence analysis of clusters and codes, crosstabulations of clusters and codes, and similarity matrix.

As mentioned already, the preliminary review was a manual analysis of 488 articles to gain an overview of the types of the articles. Note that, our first criterion of selection was the field of sociology. Thus, all 488 articles were from the field of sociology. Along with sociology, 143 articles were also from the field of psychology, 131 from the field of criminology, and 117 published in other fields such as education, communication, religion, health, biomedical, social sciences, etc.

Of the 488 sources analyzed, only a few (2) were systematic analyses; 16 were literature reviews; 16 were aimed at reviewing theories or theoretical issues in general; 348 used quantitative methods, 93 qualitative methods, and 13 a mixed approach (quantitative as well as qualitative methods).

From the complete dataset, the articles mostly approached strain theories, closely followed by social learning, self-control, and social control theories. Opportunities and routine theories, bonding theory, differential association theories, reinforcement theory, life-course perspectives, and social disorganization theory are other main perspectives.

The next stage consisted of generating a self-map analysis based on the terms' frequency and cluster identification (Figures 10A,B)

FIGURE 10
www.frontiersin.org

Figure 10. (A) Self-organizing map Data set 2. (B) Self-organizing map Data set 2.

After employing word frequency and self-map analysis for data exploration, we examined the network among hierarchical clusters generated using the Ward technique with the Jaccard coefficient and the topics defined in our coding schema.

The inclusion of a higher number of sources in dataset 2 created a clearer demarcation between the observed categories. The classification suggests a structure of four groups of topics, similar to those identified in the first dataset. The specificity of the current classification makes it better at distinguishing socio-constructivist theories and the predictors of deviance. Thus, the main groups consist of predictors of deviance and cyber deviance (clusters 1 and 2), online deviance and digital environment (clusters 3 and 6), post-positivist and integrative theories of deviance (cluster 5), and a smaller group related to a constructional approach of deviance focused on identity, inequality, and power relations (cluster 4).

As Figure 11 illustrates, the first category, composed mostly of cluster 1 (116 abstracts) and cluster 2 (124 abstracts) data covers the codes, namely, family influence, peer influence, school and education, predictors of cyber-deviance, predictors of deviance, strain theory, religious commitment, self-control, social control, gender, social learning, differential association, opportunity theories, health, well-being, and socioeconomic status.

FIGURE 11
www.frontiersin.org

Figure 11. Correspondence analysis of codes as hierarchical clusters abstracts from the whole dataset.

A second category, which encompasses cluster 3 (23 abstracts) and cluster 6 (92 abstracts) data comprises terms related to online deviance, digital divide, digital environment, and age. It emphasizes aspects related to patterns of online communication and deviant behaviors in the cyber-environment.

The third class (72 abstracts of cluster 5) presents an integrative post-positivist approach to deviance and includes main theories such as social control, strain theory, life-course theory, subcultural theory, and social disorganization perspective (creating inequalities among neighborhoods as a cause of deviance). Considering that the main nodes of this class represent deviance and education, it may be assumed that this class investigates the relationship between deviance and education.

The last class presents a constructivist approach, including the following codes: labeling theories, inequality, identity, abstraction of power, habitus lifestyle, and normative theory (norms/normative theory). This class is weakly associated with the automatically constructed hierarchical clusters (a part of cluster 4 that is composed of 61 abstracts). As the figure shows, the categories of lifestyle and identity are located far from the main center, moving closer to class 2.

We proceed with inspecting the associations among hierarchical clusters with crosstabs, which allow us to indicate the recurrent themes (Figure 12).

FIGURE 12
www.frontiersin.org

Figure 12. Crosstab bulk articles heatmap filtered.

The most frequent nodes in the 488 abstracts are children and adolescents (357** abstracts – present in all clusters, but in only a few abstracts in cluster 4), deviance (326** – present mostly in clusters 1, 2, 4, and 5 and in a few abstracts from the other clusters), school education (226** – present mostly in clusters 1, 2, 4, and 5), predictors of deviance (203** – present mostly in clusters 1, 2, and 6), family influence (140* – present in clusters 1, 2, 4, 5, and 6), peer influence (138** – present in clusters 1, 2, 5, and 6), digital environment (135** – present mostly in clusters 3 and 6 and to a less extent in clusters 1, 2, 4, and 5), delinquency (134** – present mostly in clusters 1, 2, and 5 and to a less extent in clusters 3, 4, and 6), predictors of cyber-deviance (119** – present mostly in clusters 1, 2, and 6 and to a less extent in clusters 3, 4, and 5), gender (107 – present in every cluster), and health (101 – present in every cluster). The structure of clusters is also significantly influenced by the following topics: online deviance (13** mostly present in cluster 6), identity (87** – mostly present in clusters 3, 4, and 6 and to a less extent in clusters 1, 2, and 5), social learning (69** – mostly present in clusters 1 and 2), abstraction of power (73** – mostly present in clusters 3, 4, and 6 and to a less extent in clusters 1, 2, and 5), digital divide (8** – present in cluster 6), labeling theories (42** – mostly present in clusters 4, 5, and 6), lifestyle (36** – mostly present in clusters 3, 5 and 6 and to a less extent in clusters 1, 2, and 4), social control (35* – mostly present in clusters 1 and 2), differential association (11* – mostly present in cluster 1), neighborhood disadvantage (53* – mostly present 2, 4, 5, and 6). While for the first dataset, the similarity matrix shows consistent overlaps among the codes included in the coding schema, the second dataset reveals consistent differences among the codes. Thus, the highest similarity values are between deviance – children and adolescents (0.535), children and adolescents – predictors of deviance (0.414), deviance – predictors of deviance (0.381), and peers influence – predictors of deviance (0.375).

Predictors of Deviance and Cyber-Deviance in Social Sciences

Given the high concern of researchers for the predictors of deviance and online deviance, we have provided a more detailed review of them predictors. Therefore, the present review attempted to provide more clarity on the most encountered predictors of deviance. To provide an understanding and an overview of this field, we considered it necessary to categorize these predictors, which are widely presented in the literature. The analyses presented show that the most common predictors of deviance relate to family patterns, socio-demographic aspects, socialization, victimization, and school and individual factors. Family, peer group, and school are the main social spaces of adolescents. In addition, considering the impact of the Internet and Web 2.0 technologies on socialization, identity formation, and leisure, we explored the predictors of offline and online deviance.

Family Patterns

Family relationships have a major influence on teenagers' level of engagement in deviant acts by loosening social constraints - Loeber and Stouthamer-Loeber (1986), Thornberry (1987). Centered on the impact of parents' deviant behavior and attitudes on children's delinquency, deviant behaviors and attitudes paradigm analyzes family deviance, which includes family disorganization, parental involvement in lawbreaking acts and parental deviant values, and tolerating attitude related to dishonesty and criminality, as major risk factors of engagement in deviant conducts. According to the disruption paradigm, conflicts between parents, the absence of a parent, parent separation, and divorce affect children's conduct directly and indirectly. Variables such as inappropriate parenting practices and parental supervision (Sampson and Laub, 1992, 1994; Zhang and Messner, 1995; Wiesner and Shukla, 2018) and family structure aspects including broken home, household size, sibling rank, and family environment (LeFlore, 1988) are worthy to be taken into consideration while studying deviance in general and teenagers' deviance, in particular. The relationship between parents is considered a very important factor in adolescents' engagement in deviant acts. The better the parents' relationship and the more they provide a peaceful environment for their child to grow up in, the less likely they are to engage in deviant acts (Lu et al., 2020). Harsh parental discipline (Hong et al., 2017), depression, and school engagement are other risk factors of deviance in teenagers (Lin and Yi, 2016) related to family deviance and family functioning.

Socio-Demographic Aspects

Researchers indicate a link between living in a certain area of a city and deviance. Grounded on the seminal work of Wilson (2012) regarding the criminalization process of people living in poor neighborhoods, the underclass, sociologists have noticed that there is a high rate of crimes and delinquency in such disadvantaged neighborhoods, which are inhabited by jobless people. The link between deviancy and the neighborhood context represents a factor that mediates the link among peer influence, family context, and deviance (Sampson and Laub, 1997; Sampson et al., 2002; Hwang and Sampson, 2014; Billings and Hoekstra, 2019). In addition, the structural inequality mirrored by urban topology is amplified by network effects (DiMaggio and Garip, 2012). Recently, network research scientists also demonstrated that income inequality is correlated to network fragmentation, which implies that an increase in social and income inequality is visible when social network fragmentation interacts with neighborhood distribution (Tóth et al., 2021).

Socialization

Association with deviant peers is related to the engagement in deviant and delinquent behavior (Agnew, 1991; Warr and Stafford, 1991; Sutherland et al., 1992; Matsueda and Anderson, 1998; Haynie and Osgood, 2005; Akers, 2017). The inquiry of whether one is deviant because one belongs to a deviant group, encompassed in the socialization theories (Agnew, 1985, 1991; Warr and Stafford, 1991; Dishion and Tipsord, 2011; Lin and Yi, 2016; Akers, 2017; McGloin and Thomas, 2019; Schwartz et al., 2019), or whether one chooses to be a part of a group with antisocial behavior because of a personal inclination for deviance, known as selection mechanism (Matsueda and Anderson, 1998; Haynie and Osgood, 2005; Barnes et al., 2006; Schwartz et al., 2019; Gallupe et al., 2020), helps capture this causal relationship.

Contrary to the perception of social learning theorists that deviance is a result of socialization with peers that have antisocial behavior, social control theorists hold that getting involved in crimes is a process that does not require any learning (Hirschi, 1969; Hirschi and Gottfredson, 2000; Costello and Zozula, 2016). A slightly different approach is taken by routine activity theorists who hold that deviant friends provide more opportunities to engage in norm-breaking and law-breaking activities (Osgood et al., 1996; Haynie and Osgood, 2005; Boman et al., 2019; Hoeben et al., 2021). Considering Giordano's observations regarding the need to explain peer relations from a multidimensional perspective (Giordano, 2003), researchers assess the impact of conflict (Boman and Mowen, 2019) and friendship quality (Poulin et al., 1999; Boman et al., 2019) on deviant behaviors of individuals.

Victimization

Researchers (Gorman-Smith et al., 1998) have established that there are significant associations among the profiles of offenders and patterns of family involvement, with non-offenders being more likely to have families with minimal problems, with serious chronic offenders belonging to families with many problems, such as issues of neglect, and with escalating offenders having a conflictual family background that is characterized by disruption. In the case of escalating offenders, the influence of family functioning toward engaging in deviant acts seems to be corroborated with peer deviance, the authors conclude. Researchers proved that peer offending represents a more powerful predictor of cyber-deviance, in general, and cyberpiracy, in particular, than low self-control (Lee, 2018; Lee et al., 2018). In the case of cyberbullying, exposure to risky online content and cyberbullying victimization, along with gender, school grade, school control, and perception of cyberbullying factors have significant impacts (Bae, 2021).

School and Individual Factors

As Davies (1995, 1999) emphasizes, the socio-economic background is a weak predictor of deviance, while difficulties with school, operationalized as lower grades and the likeness to drop out of school, strongly predict engagement in deviant acts. Despite the way the causal relationship between academic failure and deviance is questioned (Phillips and Kelly, 1979), there is no doubt that school deviance correlates to academic underachievement. Researchers have found that socioeconomic status, cultural capital, and social capital have an impact on academic results, even after controlling for family characteristics (DiMaggio, 1982).

Regarding school success and academic achievements, (Hatos, 2010a,b; Hatos and Bǎlţǎtescu, 2013) identified socioeconomic status, school engagement, and leisure style as individual-level predictors. The authors also identified classroom level – the proportion of students with fathers with higher education – and school-level predictors – average achievement of the school students and school type. As the author explained, school-level variables account for the largest variance (Hatos, 2010b). In this sense, the differences between schools concerning students' backgrounds and teachers correlate with educational achievements. Consequently, students with lower grades are nested together with low satisfaction with regard to school and lower socioeconomic status. These groups are mostly composed of boys (Hatos, 2010b).

Welsh et al. (1999) present evidence of school deviance predictors at multiple levels, namely, age, race, gender, school involvement, belief in rules, and positive peer association at the individual level and school size, student perception of school climate, and school at the community level. A recently published analysis (Dullas et al., 2021) shows that adolescent boys are more likely to engage in delinquent behavior or more serious deviant acts, while adolescent girls are more often perpetrators of minor deviant acts.

Internet and Computer Use

Lee (2018) identifies two main theoretical frameworks that explain the occurrence of online deviant behaviors: self-control and social learning theory. Rooted in the general theory of crime, self-control theory asserts that individuals with low-level control have a higher chance of engaging in online deviant acts such as computer piracy, online exposure to sexually explicit materials, online harassment, and cyber deviance in general (Holt et al., 2012, 2015). Moreover, teenagers who have a higher sensation-seeking attitude have a positive attitude toward risk-taking and most often indulge in illegal downloading of music, games, and sexual content (Weisskirch and Murphy, 2004). Deviant peer affiliation partially mediates the link between adolescent sensation seeking and internet gaming addiction (Tian et al., 2019).

Association with deviant peers, including online interaction with virtual peers, is the main predictor of cyber-deviance (Bossler and Holt, 2009; Burgess-Proctor et al., 2009; Bossler et al., 2011; Holt et al., 2012; Lee, 2018). Subcultural theorists explain the mechanisms through which cyberspace assists in justifying engagement in deviant acts such as computer hacking and digital piracy, transferring social relationships from offline to online, and creating communities and shared norms (Holt, 2007, 2020; Holt and Copes, 2010; McCuddy and Esbensen, 2020).

Rooted in Bourdieu and Weber's theories, the theory of digital divide holds that the Internet amplifies the existent social inequalities, with people lacking digital skills (second-level digital divide) and the opportunities for making effective use of them if they acquired (third-level digital divide) left behind (DiMaggio and Hargittai, 2001; DiMaggio et al., 2001; Van Dijk and Hacker, 2003; DiMaggio and Garip, 2012; Barbovschi and Balea, 2013; Van Deursen and Van Dijk, 2015; Van Deursen et al., 2015; Scheerder et al., 2017; Hatos, 2019; Van Dijk, 2020).

Computer proficiency and technology use correlate with cyber deviant acts, including hacking, digital piracy, and online harassment (Lee, 2018). Therefore, we can conclude that the digital world is a field where actors attempt to gain social, symbolic, and digital capital to ensure and justify their power (Ragnedda and Muschert, 2013; Lindell, 2017; O'Neil and Ackland, 2020).

Discussion

Starting from the question how the topics of deviance and cyber-deviance are covered in social sciences, the present review gathers the relevant findings on the field in order to create a comprehensive account of the phenomenon. As we have presented in the results section, our systematic literature review involved the analysis of two databases, namely 61 sources in extenso (Dataset 1) and 488 abstracts (Dataset 2). We chose to review the 61 articles in extenso in order to understand in more detail the most common themes and the main predictors of deviance. These issues could not be reflected so accurately by only the abstract analysis. The articles in extenso give us detailed information with a smaller number of sources, and in addition, the extrapolation of the analysis to the database of 488 abstracts allows us a holistic understanding of the phenomenon of deviance. The analysis of a higher number of articles in dataset 2 also facilitated the inclusion of more recent articles that do not have a consistent number of citations yet, with articles addressing more specific aspects of deviance. It may be noticed that the most cited articles are those that deal with classical theories of deviance.

A more detailed assessment of the results of in extenso articles highlights that the main themes in the 61 most cited articles published in the Web of Science database on the topic of deviance among adolescents refer to the predictors of deviance (61 articles), as a category in which all predictors are included such as school education, socioeconomic status, as well as two important categories that also represent predictors but taken as separately.

By holistically examining the two datasets, we provided an overview of the field. As compared to other systematic reviews focused only on a specific field of deviance (McGrath et al., 2011; Brauer and Tittle, 2012; Longobardi and Badenes-Ribera, 2019; Estévez et al., 2020), we analyzed the deviance in a general manner. This was possible by using computational text analysis, method which allowed an accurate screening of nearly 500 sources. As related to this aspect, a first objective consisted of identifying the main topics approached in the literature on deviance. From our knowledge, this objective was not addressed by any other systematic reviews. This method revealed four latent clusters of topics: explanatory theories of the causes of deviance (social learning, social control, subcultural theories), socio-constructionist theories (labeling theory, power theory, conflict theory), predictors of deviance (gender, socioeconomic status, family influence, family background, peers' affiliation) and online deviance (frequency of Internet use, digital divide).

With regards to the objective of revealing the most frequently encountered themes, our review shows that the phenomenon of deviance is explained grounded on the classical theories. The researchers choose between explanatory theories such as: differential association, routine activities and opportunities theories, social learning, social control, social disorganization, anomie and strain theories, subcultural theories, power relations, and neutralization and deterrence theories (Benda and Corwyn, 1997; Wagner et al., 2004; Wallace et al., 2007; Dolliver and Rocker, 2017; Meldrum et al., 2020), or socio-constructionist- symbolic interactionism, labeling theory, phenomenological theory, critical discourse analysis, cultural theories, framing theory, convenience theory, and post-modernist theories (Giordano et al., 2009; Herman-Kinney and Kinney, 2013; Gottschalk, 2018, 2020; Barmaki, 2021) or even the integrative ones, respectively social disorganization theory and life-course theories (Apel and Sweeten, 2010; Peguero, 2011; Payne and Welch, 2016; Gostjev and Nielsen, 2017). Consequently, our review showed that most of the analyzed studies centered on the predictors and correlates of deviance. It highlights their focus on revealing and characterizing the predictors of deviance, mainly using strain theory (Aseltine et al., 2000; Cheung and Cheung, 2010; Adamczyk, 2012; Bruno et al., 2012; Scheuerman, 2019), social control (Free, 1992; Woodward et al., 2001; Jang, 2002; Byrd et al., 2015), social learning theories (Barnes and Farrell, 1992; Benda, 1994; Winfree et al., 1994; Terrell, 1997; Regnerus, 2002), or routine opportunity theories (Osgood et al., 1996; Marcum et al., 2010; Maimon and Browning, 2012b; Ragan et al., 2014; Yuan and McNeeley, 2018). As we observed from the manual analysis of the 488 articles, this is mainly done through quantitative analysis; 348 articles out of 488 were examined using quantitative methods. Furthermore, there is a significant concern for online deviance and online deviant behaviors (Marcum et al., 2010; Oksanen et al., 2014; Rafalow, 2015; Vejmelka et al., 2017; Mesch, 2018; Tomczyk, 2018; Chester et al., 2019; Granic et al., 2020; Semenza, 2021). The extensive number of identified studies focused on online deviance and adolescents is connected to the popularity of Internet among teenagers and compulsive use of it (Wachs et al., 2015; Kapoor et al., 2017; Ohannessian and Vannucci, 2020). In addition, with the spread of Internet technology, teenagers' online deviant behavior has become a matter of grave concern for parents, educators, social workers and researchers.

As related to the second objective, we observed an overlap between psychological and sociological approaches, with researchers making use of predictors at individual and social levels to explain deviance. Hence, theories such as differential reinforcement, social learning, problem-behavior, social bond theory, self-control theory, rational choice theory, differential social support, terror management theory, theories of maturation, and psychanalytic theories represent interdisciplinary perspectives that are of interest both for sociologists and psychologists. At the same time, our research revealed theories developed both by sociologists and criminologists to explain the nature of deviant behavior, including differential association, routine activities and opportunities theories, social control, social disorganization, anomie and strain theories, subcultural theories, power relations, and neutralization and deterrence theories. In addition, the dataset contained articles concerning the social construction of deviance, encompassing theories, such as: symbolic interactionism, labeling theory, phenomenological theory, critical discourse analysis, cultural theories, framing theory, convenience theory, and post-modernist theories.

Consistent to the literature, our review identified five main categories of predictors (the third objective addressed) that influence the engagement of teenagers in online and offline deviant behaviors, namely: family patterns, socio-demographic aspects, victimization, school and individual factors, Internet and computer use. The most employed predictors for explaining deviance include: family characteristics, family background, peer affiliation, school factors, school results, religion, risk attitude, religion, risk factors, victimization (Dukes and Lorch, 1989; Bahr et al., 1993; Aseltine, 1995; Benda and Corwyn, 1997; Amato and Fowler, 2002; Bjarnason et al., 2005; Haynie and Osgood, 2005; Chapple et al., 2014; Corkin et al., 2015; Buehler, 2020). At the same time, most of the longitudinal studies that we analyzed deal with the topic of delinquency follow a life-course perspective (Uggen and Kruttschnitt, 1998; Macmillan, 2001; Giordano et al., 2002; Kirk and Sampson, 2013; Salvatore and Markowitz, 2014; Pratt et al., 2016). As the papers analyzed show, online deviance has similar predictors with offline deviance, fact that suggests a continuity between the two. Still, the engagement into online deviance has some specific predictors, such as: frequency of internet use, patterns of internet use, computer skills, with digital divide theory as a main paradigm (Broos and Roe, 2006; Hinduja and Patchin, 2008; Clark, 2009; DiMaggio and Garip, 2012; Lindsay and Krysik, 2012; Chen et al., 2017; Chan and Wong, 2019a,b). Moreover, the articles analyzed on online deviance focus on the influence of lifestyle and the issue of identity (Zhao, 2005; Robinson, 2009; Karaian, 2012; Harvey et al., 2013; Barmaki, 2021).

Taking everything into consideration, our results show that social scientists employ classical theories of deviance for understanding the nature of the phenomenon and are particularly concerned with identifying the predictors and the interactions between them as related to online and offline deviance.

Limitations

The results of this study need to be interpreted with caution. In this sense, we recommend future researchers conduct more in-depth systematic text review analyses based on other search queries that permit the identification of relevant articles on the study of deviance and cyber-deviance in the period of adolescence. Considering the present research, we state some limits related to the number of analyzed texts, code creation, and interpretation and computational constraints. First, in the last stage of analysis, we decided to select only the articles that responded to the second and third criteria as the number of articles that fit the first criterion was consistently large. We chose to use this approach because of computational limits as employing text searches on 488 articles exceeds the capacity of our computer memory.

Considering that for the last two criteria, the in extenso articles were selected only on the basis of the number of citations; the studies selected in the first dataset include a higher number of classical sources and, therefore, possibly excluded some recent impact articles.

Another limit relates to subjective code creation. However, the data was automatically clustered for diminishing the potential bias. The revealed clusters were compared to the data that are classified based on the designed codes.

Conclusion

This paper presents a systematic review of the literature on the phenomenon of online and offline adolescent deviance grounded in the main findings reported in the studies published in the Web of Science database until April 2021.

For the analysis, we decided to use a validated methodology – the systematic quantitative literature review method described by Pickering and Byrne (2014), with additional tools from the PRISMA model. For reliability and systematic inquiry, the reviews were performed using the KH Coder software.

Our systematic literature review provides a clearer picture of adolescent deviance. At the same time, the differences and overlaps among the sociological and psychological approaches to the phenomenon were clarified. Psychologists and sociologists often take an interdisciplinary approach to explain the phenomenon of deviance. The most employed theories consist of strain theory, social learning, self-control, and social control theories.

The results of the research analyzed showed that the most frequently encountered themes in the area of deviance, can be grouped in four main topics: predictors of deviance, online deviance, socio-constructivist theories, and explanatory theories of the nature of deviant behaviors.

The present systematic literature review emphasized that the main categories of predictors in the case of deviance consist of family patterns, socio-demographic aspects, socialization, victimization, and school and individual factors. The study of online deviance needs to consider the existing digital divides. Along with the digital divide, the study of online behavior must examine the types of online capital and their interdependence with the offline world. Specific to online deviance, in addition to the predictors related to the above-mentioned offline context, the use of the internet and computer skills also have a significant impact in explaining the deviance phenomenon.

The paper asserts that deviance and online deviance are interrelated phenomena that can be explained by distinct theoretical approaches. As the study may show, the online sphere does not represent just the medium where activities or behaviors take place. Rather, it deepens the existing social inequalities, amplifying the differences attributed to social status. Moreover, deviance in the online environment is mostly studied in relation to children, teenagers, and youth, since the Internet is quite popular among these age groups.

We believe that the present systematic literature review makes an important contribution to the understanding of deviance by presenting an overview of the phenomenon. The findings of this literature review are useful for experts in the fields of psychology, sociology, and other related fields. The methods and software used for source analysis (Pickering and KH Coder) allowed us to identify the most relevant predictors of deviance and the most common themes for approaching the phenomenon. Our methods may also be applied to the research of experts of other fields who are interested in studying a specific phenomenon, as it allows a significant number of sources to be included in the analysis.

Data Availability Statement

The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding author.

Author Contributions

SC and AH were responsible for designing the research. AH and CB supervised the data analysis and the manuscript writing. SC contributed to the data coding and analysis. SC and AL wrote the first draft of this manuscript. CB and AL contributed to the conceptualization of the study, to editing, and to revising the manuscript. All authors listed have made a substantial, direct and intellectual contribution to the work, and approved it for publication.

Funding

This work was partial funded by Project 123008, SmartDoct – High quality programs for doctoral and post-doctoral students of Oradea University, for the increase of relevance in research and innovation, in the context of the regional economy, project financed by Human Capital Operational Program 2014-2020.

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher's Note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Supplementary Material

The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fpsyg.2021.748006/full#supplementary-material

Footnotes

1 ^** < 0.01
* < 0.05.

References

Adamczyk, A. (2012). Understanding delinquency with friendship group religious context. Soc. Sci. Q. 93, 482–505. doi: 10.1111/j.1540-6237.2012.00839.x

CrossRef Full Text | Google Scholar

Adamczyk, A., Freilich, J. D., and Kim, C. (2017). Religion and crime: a systematic review and assessment of next steps. Sociol. Relig. 78, 192–232. doi: 10.1093/socrel/srx012

CrossRef Full Text | Google Scholar

Adler, P. A., and Adler, P. (2007). The demedicalization of self-injury - From psychopathology to sociological deviance. J. Contemp. Ethnogr. 36, 537–570. doi: 10.1177/0891241607301968

CrossRef Full Text | Google Scholar

Agnew, R. (1985). Social control theory and delinquency: a longitudinal test. Criminology 23, 47–61. doi: 10.1111/j.1745-9125.1985.tb00325.x

CrossRef Full Text | Google Scholar

Agnew, R. (1991). The interactive effects of peer variables on delinquency. Criminology 29, 47–72. doi: 10.1111/j.1745-9125.1991.tb01058.x

CrossRef Full Text | Google Scholar

Agnew, R. (1995). Testing the leading crime theories - an alternative strategy focusing on motivational processes. J. Res. Crime Delinq. 32, 363–398. doi: 10.1177/0022427895032004001

CrossRef Full Text | Google Scholar

Akers, R. L. (1991). Self-control as a general theory of crime. J. Quantit. Criminol. 7, 201–211. doi: 10.1007/BF01268629

CrossRef Full Text | Google Scholar

Akers, R. L. (2017). Social Learning and Social Structure: A General Theory of Crime and Deviance. Militon Park: Routledge.

Google Scholar

Akers, R. L., and Cochran, J. K. (1985). Adolescent marijuana use - a test of 3 theories of deviant-behavior. Deviant Behav. 6, 323–346. doi: 10.1080/01639625.1985.9967683

CrossRef Full Text | Google Scholar

Akers, R. L., and Lee, G. (1999). Age, social learning, and social bonding in adolescent substance use. Deviant Behav. 20, 1–25. doi: 10.1080/016396299266579

CrossRef Full Text | Google Scholar

Albanna, B., and Heeks, R. (2019). Positive deviance, big data, and development: a systematic literature review. Electr. J. Inform. Syst. Devel. Count. 85:e12063. doi: 10.1002/isd2.12063

CrossRef Full Text | Google Scholar

Alzunitan, M., Edmond, M., Alsuhaibani, M., Samuelson, R., Schweizer, M., and Marra, A. (2020). Positive deviance in infection prevention and control: a systematic literature review. J. Infect. Control Hosp. Epidemiol. 31, 1–8. doi: 10.1017/ice.2020.1256

PubMed Abstract | CrossRef Full Text | Google Scholar

Amato, P. R., and Fowler, F. (2002). Parenting practices, child adjustment, and family diversity. J. Marr. Fam. 64, 703–716. doi: 10.1111/j.1741-3737.2002.00703.x

CrossRef Full Text | Google Scholar

Apel, R., and Sweeten, G. (2010). The impact of incarceration on employment during the transition to adulthood. Soc. Prob. 57, 448–479. doi: 10.1525/sp.2010.57.3.448

CrossRef Full Text | Google Scholar

Arshad, M., and Malik, M. A. R. (2020). Workplace deviance: a systematic literature review and future agenda. Acad. Manag. Proc. 2020:12473. doi: 10.5465/AMBPP.2020.12473abstract

CrossRef Full Text | Google Scholar

Aseltine, R. H. (1995). A reconsideration of parental and peer influences on adolescent deviance. J. Health Soc. Behav. 36, 103–121. doi: 10.2307/2137219

PubMed Abstract | CrossRef Full Text | Google Scholar

Aseltine, R. H., Gore, S., and Gordon, J. (2000). Life stress, anger and anxiety, and delinquency: an empirical test of general strain theory. J. Health Soc. Behav. 41, 256–275. doi: 10.2307/2676320

PubMed Abstract | CrossRef Full Text | Google Scholar

Bae, S.-M. (2021). The relationship between exposure to risky online content, cyber victimization, perception of cyberbullying, and cyberbullying offending in Korean adolescents. Child. Youth Serv. Rev. 123:105946. doi: 10.1016/j.childyouth.2021.105946

CrossRef Full Text | Google Scholar

Bahr, S. J., Hawks, R. D., and Wang, G. (1993). Family and religious influences on adolescent substance-abuse. Youth Soc. 24, 443–465. doi: 10.1177/0044118X93024004007

CrossRef Full Text | Google Scholar

Bandura, A. (1971). Social Learning Theory. New York, NY: General Learning Corporation.

Google Scholar

Bandura, A. (1978). Social learning theory of aggression. J. Commun. 28, 12–29. doi: 10.1111/j.1460-2466.1978.tb01621.x

PubMed Abstract | CrossRef Full Text | Google Scholar

Bandura, A., and McClelland, D. C. (1977). Social Learning Theory. Englewood Cliffs: Prentice Hall.

Google Scholar

Barbovschi, M., and Balea, B. (2013). “Closing the gap, are we there yet? Reflections on the persistence of second-level digital divide among adolescents in Central and Eastern Europe,” in The Digital Divide: The Internet and Social Inequality in International Perspective, eds M. Ragnedda, and G. W. Muschert (London, Routledge), 179–192. Available online at: https://www.diva-portal.org/smash/get/diva2:693036/FULLTEXT01.pdf#page=200

Google Scholar

Barmaki, R. (2016). On the origin of the concept of “Deviant Subculture” in criminology: W. I. Thomas and the Chicago School of Sociology. Deviant Behav. 37, 795–810. doi: 10.1080/01639625.2016.1145023

CrossRef Full Text | Google Scholar

Barmaki, R. (2021). Erving goffman's view of “Deviance”: “Self” and “Society” as the sources of deviancy and conformity. Deviant Behav. 42:845. doi: 10.1080/01639625.2019.1658845

CrossRef Full Text | Google Scholar

Barnes, G. M., and Farrell, M. P. (1992). Parental support and control as predictors of adolescent drinking, delinquency, and related problem behaviors. J. Marr. Fam. 54, 763–776. doi: 10.2307/353159

CrossRef Full Text | Google Scholar

Barnes, G. M., Hoffman, J. H., Welte, J. W., Farrell, M. P., and Dintcheff, B. A. (2006). Effects of parental monitoring and peer deviance on substance use and delinquency. J. Marr. Fam. 68, 1084–1104. doi: 10.1111/j.1741-3737.2006.00315.x

CrossRef Full Text | Google Scholar

Becker, H. S. (1995). Moral Entrepreneurs: The Creation and Enforcement of Deviant Categories. Deviance: A Symbolic Interactionist Approach. Herman, MO: General Hall, 169–178. Available online at: https://books.google.ro/books?hl=en&lr=&id=wGbhKS3BvqMC&oi=fnd&pg=PA169&dq=moral+entrepreneurs+Becker&ots=Zbg8G5R1nl&sig=KdvkKlyUhwG2aDtE0sA-YfxNUTs&redir_esc=y#v=onepage&q=moral%20entrepreneurs%20Becker&f=false

Google Scholar

Becker, H. S. (2008). Outsiders. New York, NY: Simon and Schuster.

Benda, B. B. (1994). Testing competing theoretical concepts - adolescent alcohol-consumption. Deviant Behav. 15, 375–396. doi: 10.1080/01639625.1994.9967980

CrossRef Full Text | Google Scholar

Benda, B. B., and Corwyn, R. F. (1997). Religion and delinquency: the relationship after considering family and peer influences. J. Sci. Study Relig. 36, 81–92. doi: 10.2307/1387884

CrossRef Full Text | Google Scholar

Ben-Yehuda, N. (1990). The Politics and Morality of Deviance: Moral Panics, Drug Abuse, Deviant Science, and Reversed Stigmatization. Albany, NY: SUNY Press.

Google Scholar

Billings, S. B., and Hoekstra, M. (2019). Schools, Neighborhoods, and the Long-Run Effect of Crime-Prone Peers (No. w25730). Cambridge: National Bureau of Economic Research. Available online at: https://www.nber.org/system/files/working_papers/w25730/w25730.pdf

Google Scholar

Birkbeck, C., and Lafree, G. (1993). The situational analysis of crime and deviance. Ann. Rev. Sociol. 19, 113–137. doi: 10.1146/annurev.so.19.080193.000553

CrossRef Full Text | Google Scholar

Bjarnason, T., Thorlindsson, T., Sigfusdottir, I. D., and Welch, M. R. (2005). Familial and religious influences on adolescent alcohol use: a multi-level study of students and school communities. Social Forces 84, 375–390. doi: 10.1353/sof.2005.0088

CrossRef Full Text | Google Scholar

Boman, J. H., Agnich, L., Miller, B. L., Stogner, J. M., and Mowen, T. J. (2019). The “other side of the fence”: a learning- and control-based investigation of the relationship between deviance and friendship quality. Deviant Behav. 40, 1553–1573. doi: 10.1080/01639625.2019.1596451

PubMed Abstract | CrossRef Full Text | Google Scholar

Boman, J. H., and Mowen, T. J. (2019). Unpacking the role of conflict in peer relationships: implications for peer deviance and crime. Deviant Behav. 40, 882–895. doi: 10.1080/01639625.2018.1443779

PubMed Abstract | CrossRef Full Text | Google Scholar

Bossler, A. M., and Holt, T. J. (2009). On-line activities, guardianship, and malware infection: an examination of routine activities theory. Int. J. Cyber Criminol. 3, 400–420. Available online at: http://www.cybercrimejournal.com/bosslerholtijcc2009.pdf

Google Scholar

Bossler, A. M., Holt, T. J., and May, D. C. (2011). Predicting online harassment victimization among a juvenile population. Youth Soc. 44, 500–523. doi: 10.1177/0044118X11407525

CrossRef Full Text | Google Scholar

Brauer, J. R., and Tittle, C. R. (2012). Social learning theory and human reinforcement. Sociol. Spect. 32, 157–177. doi: 10.1080/02732173.2012.646160

CrossRef Full Text | Google Scholar

Broos, A., and Roe, K. (2006). The digital divide in the playstation generation: self-efficacy, locus of control and ICT adoption among adolescents. Poetics 34, 306–317. doi: 10.1016/j.poetic.2006.05.002

CrossRef Full Text | Google Scholar

Brossard, B. (2014). Fighting with oneself to maintain the interaction order: a sociological approach to self-injury daily process. Symb. Inter. 37, 558–575. doi: 10.1002/symb.118

CrossRef Full Text | Google Scholar

Bruno, T. L., Butters, J. E., Erickson, P. G., and Wekerle, C. (2012). Missed conceptions: a gendered extension of early conception among street youth. Deviant Behav. 33, 550–565. doi: 10.1080/01639625.2011.636698

CrossRef Full Text | Google Scholar

Buehler, C. (2020). Family processes and children's and adolescents' well-being. J. Marr. Fam. 82, 145–174. doi: 10.1111/jomf.12637

CrossRef Full Text | Google Scholar

Burgess-Proctor, A., Patchin, J. W., and Hinduja, S. (2009). “Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls,” in Female Crime Victims: Reality Reconsidered, eds V. Garcia, J. Clifford, and R. Muraskin (Prentice Hall), 153–175.

Google Scholar

Byrd, K. M., Kahle, L. L., Peguero, A. A., and Popp, A. M. (2015). Social control and intersectionality: a multilevel analysis of school misconduct, location, race, ethnicity, and sex. Sociol. Spect. 35, 109–135. doi: 10.1080/02732173.2014.1000552

CrossRef Full Text | Google Scholar

Chan, H. C., and Wong, D. S. W. (2019a). Traditional school bullying and cyberbullying perpetration: examining the psychosocial characteristics of hong kong male and female adolescents. Youth Soc. 51, 3–29. doi: 10.1177/0044118X16658053

CrossRef Full Text | Google Scholar

Chan, H. C., and Wong, R. W. Y. (2019b). Childhood and adolescent animal cruelty and subsequent interpersonal violence in adulthood: a review of the literature. Aggres. Violent Behav. 48, 83–93. doi: 10.1016/j.avb.2019.08.007

CrossRef Full Text | Google Scholar

Chapple, C., Vaske, J., and Worthen, M. G. F. (2014). Gender differences in associations with deviant peer groups: examining individual, interactional, and compositional factors. Deviant Behav. 35, 394–411. doi: 10.1080/01639625.2014.855098

CrossRef Full Text | Google Scholar

Chen, L., Ho, S. S., and Lwin, M. O. (2017). A meta-analysis of factors predicting cyberbullying perpetration and victimization: from the social cognitive and media effects approach. New Media Soc. 19, 1194–1213. doi: 10.1177/1461444816634037

CrossRef Full Text | Google Scholar

Chester, K. L., Magnusson, J., Klemera, E., Spencer, N. H., and Brooks, F. (2019). The mitigating role of ecological health assets in adolescent cyberbullying victimization. Youth Soc. 51, 291–317. doi: 10.1177/0044118X16673281

CrossRef Full Text | Google Scholar

Cheung, N. W. T., and Cheung, Y. W. (2010). Strain, self-control, and gender differences in delinquency among chinese adolescents: extending general strain theory. Sociol. Perspect. 53, 321–345. doi: 10.1525/sop.2010.53.3.321

CrossRef Full Text | Google Scholar

Clark, L. S. (2009). digital media and the generation gap qualitative research on US teens and their parents. Inform. Commun. Soc. 12, 388–407. doi: 10.1080/13691180902823845

CrossRef Full Text | Google Scholar

Clinard, M. B., and Meier, R. F. (2015). Sociology of Deviant Behavior. Toronto, ON: Nelson Education.

Google Scholar

Cloward, R. A. (1959). Illegitimate eans, anommie, and deviant behavior. Am. Sociol. Rev. 24, 164–176. doi: 10.2307/2089427. Available online at: https://www.jstor.org/stable/2089427

CrossRef Full Text | Google Scholar

Cohen, A. K. (1955). Delinquent Boys; The Culture of the Gang. Glencoe, Il: The Free Press. Available online at: https://psycnet.apa.org/record/1955-07594-000

Google Scholar

Cohen, S. (2002). Folk Devils and Moral Panics: The Creation of the Mods and Rockers. London: Psychology Press; Routledge. P. 280. Available online at: https://books.google.ro/books?hl=en&lr=&id=eDhPbH9roU4C&oi=fnd&pg=PR7&ots=4L5x7TsBhO&sig=P_VeGvMODxpc0BMLXLEE-_WbmKw&redir_esc=y#v=onepage&q&f=false

Google Scholar

Corkin, D., Wiesner, M., Reyna, R. S., and Shukla, K. (2015). The role of deviant lifestyles on violent victimization in multiple contexts. Deviant Behav. 36, 405–428. doi: 10.1080/01639625.2014.935690

CrossRef Full Text | Google Scholar

Costello, B. J., and Zozula, C. (2016). Peer influence: mechanisms and motivations. Deviant Behav. 39, 94–110. doi: 10.1080/01639625.2016.1260387

CrossRef Full Text | Google Scholar

Davies, S. (1995). Reproduction and resistance in canadian high schools: an empirical examination of the willis thesis. Br. J. Sociol. 46, 662–687. doi: 10.2307/591577

CrossRef Full Text | Google Scholar

Davies, S. (1999). Subcultural explanations and interpretations of school deviance. Aggress. Violent Behav. 4, 191–202. doi: 10.1016/S1359-1789(97)00053-0

CrossRef Full Text | Google Scholar

Dennis, J. A., Khan, O., Ferriter, M., Huband, N., Powney, M. J., and Duggan, C. (2012). Psychological interventions for adults who have sexually offended or are at risk of offending. Cochrane Database Syst. Rev. 12:CD007507. doi: 10.1002/14651858.CD007507.pub2

PubMed Abstract | CrossRef Full Text | Google Scholar

DiMaggio, P. (1982). Cultural capital and school success: the impact of status culture participation on the grades of US high school students. Am. Sociol. Rev. 47, 189–201. doi: 10.2307/2094962

CrossRef Full Text | Google Scholar

DiMaggio, P., and Garip, F. (2012). Network effects and social inequality. Ann. Rev. Sociol. 38, 93–118. doi: 10.1146/annurev.soc.012809.102545

CrossRef Full Text | Google Scholar

DiMaggio, P., and Hargittai, E. (2001). From the “digital divide” to “digital inequality”: Studying Internet Use as Penetration Increases. Princeton: Center for Arts and Cultural Policy Studies, Woodrow Wilson School, Princeton University, 4–2.

Google Scholar

DiMaggio, P., Hargittai, E., Neuman, W. R., and Robinson, J. P. (2001). Social implications of the internet. Ann. Rev. Sociol. 27, 307–336. doi: 10.1146/annurev.soc.27.1.307

CrossRef Full Text | Google Scholar

Dishion, T. J., and Tipsord, J. M. (2011). “Peer contagion in child and adolescent social and emotional development,” in Annual Review of Psychology, eds. S. T. Fiske, D.L. Schacter and S.E. Taylor. (Palo Alto: Annual Reviews), 189–214.

PubMed Abstract | Google Scholar

Dodaj, A., Sesar, K., and Jerinic, S. (2020). A prospective study of high-school adolescent sexting behavior and psychological distress. J. Psychol. 154, 111–128. doi: 10.1080/00223980.2019.1666788

PubMed Abstract | CrossRef Full Text | Google Scholar

Dolliver, M. J., and Rocker, D. L. (2017). Addressing a divide in the conceptualization of the gender-crime relationship: a comparative test of gender and sex using general strain theory. Deviant Behav. 39, 1552–1565. doi: 10.1080/01639625.2017.1410619

CrossRef Full Text | Google Scholar

Dukes, R. L., and Lorch, B. D. (1989). Concept of self, mediating factors, and adolescent deviance. Sociol. Spect. 9, 301–319. doi: 10.1080/02732173.1989.9981892

CrossRef Full Text | Google Scholar

Dullas, A. R., Yncierto, K. D., Labiano, M. A., and Marcelo, J. C. (2021). Determinants of a variety of deviant behaviors: an analysis of family satisfaction, personality traits, and their relationship to deviant behaviors among filipino adolescents. Front Psychol. 12:645126. doi: 10.3389/fpsyg.2021.645126

PubMed Abstract | CrossRef Full Text | Google Scholar

Durkheim, E. (1938). The Rules of Sociological Method, 8th Edn. Chicago, IL: University of Chicago Press.

Google Scholar

Durkheim, E. (2002). Regulile metodei sociologice (The Rules of the Sociological Method). Polirom: English Edition.

Durkin, K. F., Wolfe, T. W., and Clark, G. A. (2005). College students and binge drinking: an evaluation of social learning theory. Sociol. Spect. 25, 255–272. doi: 10.1080/027321790518681

CrossRef Full Text | Google Scholar

Duster, T. (2006a). Comparative perspectives and competing explanations: taking on the newly configured reductionist challenge to sociology. Am. Sociol. Rev. 71, 1–15. doi: 10.1177/000312240607100101

CrossRef Full Text | Google Scholar

Duster, T. (2006b). Lessons from history: why race and ethnicity have played a major role in biomedical research. J. Law Med. Ethics. 34, 487–496. doi: 10.1111/j.1748-720X.2006.00060.x

PubMed Abstract | CrossRef Full Text | Google Scholar

Elias, N. (1978). The Civilizing Process. Oxford: Blackwell.

Engström, A. (2021). Conceptualizing lifestyle and routine activities in the early 21st century: a systematic review of self-report measures in studies on direct-contact offenses in young populations. Crime Delinq. 67, 737–782. doi: 10.1177/0011128720937640

CrossRef Full Text | Google Scholar

Ennett, S. T., Flewelling, R. L., Lindrooth, R. C., and Norton, E. C. (1997). School and neighborhood characteristics associated with school rates of alcohol, cigarette, and marijuana use. J. Health Soc. Behav. 38, 55–71. doi: 10.2307/2955361

PubMed Abstract | CrossRef Full Text | Google Scholar

Erikson, K. T. (1962). Notes on the sociology of deviance. Soc. Prob. 9, 307–314. doi: 10.2307/798544

CrossRef Full Text | Google Scholar

Estévez, E., Cañas, E., Estévez, J. F., and Povedano, A. (2020). Continuity and overlap of roles in victims and aggressors of bullying and cyberbullying in adolescence: a systematic review. Int. J. Environ. Res. Public Health 17:7452. doi: 10.3390/ijerph17207452

PubMed Abstract | CrossRef Full Text | Google Scholar

Farrington, D. P. (2017). Integrated Developmental and Life-Course Theories of Offending. New York, NY: Transaction Publishers.

Google Scholar

Feinberg, S. L. (2011). Defining deviance: a comparative review of textbooks in the sociology of deviance. Teach. Sociol. 39, 382–387. doi: 10.1177/0092055X11418684

CrossRef Full Text | Google Scholar

Fitton, L., Yu, R., and Fazel, S. (2020). Childhood maltreatment and violent outcomes: a systematic review and meta-analysis of prospective studies. Trauma Viol. Abuse 21, 754–768. doi: 10.1177/1524838018795269

PubMed Abstract | CrossRef Full Text | Google Scholar

Foucault, M. (1971). Madness and Civilization. London: Routledge.

Google Scholar

Foucault, M. (2007). Discipline and Punish: The Birth of the Prison. Durham: Duke University Press, 445–471.

Google Scholar

Free, M. D. (1992). Religious affiliation, religiosity, and impulsive and intentional deviance. Sociol. Focus 25, 77–91. doi: 10.1080/00380237.1992.10570608

CrossRef Full Text | Google Scholar

Freud, S. (2012). The Basic Writings of Sigmund Freud. [S.I.]: New York, NY: Random House Publishing Group.

Google Scholar

Gallupe, O., Boman, J. H., Nash, R., and Castro, E. D. (2020). Deviant peer preferences: a simplified approach to account for peer selection effects. Deviant Behav. 41, 1143–1156. doi: 10.1080/01639625.2019.1597321

PubMed Abstract | CrossRef Full Text | Google Scholar

Garcia-Gomez, A. (2017). Teen girls and sexual agency: exploring the intrapersonal and intergroup dimensions of sexting. Media Culture Soc. 39, 391–407. doi: 10.1177/0163443716683789

CrossRef Full Text | Google Scholar

Gibbs, J., and Erickson, M. (1975). Major developments in sociological study of deviance. Ann. Rev. Sociol. 1, 21–42. doi: 10.1146/annurev.so.01.080175.000321

CrossRef Full Text | Google Scholar

Giordano, P. C. (2003). Relationships in adolescence. Ann. Rev. Sociol. 29, 257–281. doi: 10.1146/annurev.soc.29.010202.100047

CrossRef Full Text | Google Scholar

Giordano, P. C., Cernkovich, S. A., and Rudolph, J. L. (2002). Gender, crime, and desistance: toward a theory of cognitive transformation. Am. J. Sociol. 107, 990–1064. doi: 10.1086/343191

CrossRef Full Text | Google Scholar

Giordano, P. C., Longmore, M. A., Manning, W. D., and Northcutt, M. J. (2009). Adolescent identities and sexual behavior: an examination of anderson's player hypothesis. Soc. Forces 87, 1813–1843. doi: 10.1353/sof.0.0186

PubMed Abstract | CrossRef Full Text | Google Scholar

Glaser, D. (1971). Social Deviance. Chicago, IL: Markham Publishing Company.

Goffman, E. (1978). The Presentation of Self in Everyday Life. London; Hammondsworth: Penguin Books.

Google Scholar

Goode, E. (2016). Deviant Behavior. Milton Park: Routledge.

Google Scholar

Gorman-Smith, D., Tolan, P. H., Loeber, R., and Henry, D. B. (1998). Relation of family problems to patterns of delinquent involvement among urban youth. J. Abnorm. Child Psychol. 26, 319–333. doi: 10.1023/A:1021995621302

PubMed Abstract | CrossRef Full Text | Google Scholar

Gostjev, F. A., and Nielsen, A. L. (2017). Speaking the same language? English language fluency and violent crime at the neighborhood level. Sociol. Q. 58, 111–139. doi: 10.1080/00380253.2016.1246901

CrossRef Full Text | Google Scholar

Gottschalk, P. (2018). Empirical study of convenience theory: a student elicitation on white-collar crime. Deviant Behav. 39, 747–757. doi: 10.1080/01639625.2017.1305203

CrossRef Full Text | Google Scholar

Gottschalk, P. (2020). Theory of convenience: determinants of white-collar crime intention. Deviant Behav. 41, 1431–1439. doi: 10.1080/01639625.2019.1624101

CrossRef Full Text | Google Scholar

Götz, M., Bollmann, G., and O'Boyle, E. H. (2019). Contextual undertow of workplace deviance by and within units: a systematic review. Small Group Res. 50, 39–80. doi: 10.1177/1046496418790044

CrossRef Full Text | Google Scholar

Graham, R. S., and Smith, S. K. (2019). Cybercrime and Digital Deviance. New York, NY: Taylor and Francis; Routledge. Available online at: https://www.taylorfrancis.com/books/mono/10.4324/9781351238090/cybercrime-digital-deviance-roderick-graham-shawn-smith

Google Scholar

Granic, I., Morita, H., and Scholten, H. (2020). Beyond screen time: identity development in the digital age. Psychol. Inquiry 31, 195–223. doi: 10.1080/1047840X.2020.1820214

CrossRef Full Text | Google Scholar

Hagan, J. (1990). The structuration of gender and deviance: a power-control theory of vulnerability to crime and the search for deviant role exits. Can. Rev. Sociol Revue Can. Sociol. 27, 137–156. doi: 10.1111/j.1755-618X.1990.tb00448.x

CrossRef Full Text | Google Scholar

Hagan, J., and Foster, H. (2001). Youth violence and the end of adolescence. Am. Sociol. Rev. 66, 874–899. doi: 10.2307/3088877

CrossRef Full Text | Google Scholar

Hagan, J., Gillis, A. R., and Simpson, J. (1985). The class structure of gender and delinquency: toward a power-control theory of common delinquent behavior. Am. J. Sociol. 90, 1151–1178. doi: 10.1086/228206

CrossRef Full Text | Google Scholar

Hagan, J., and McCarthy, B. (1998). Mean Streets: Youth Crime and Homelessness. Cambridge: Cambridge University Press.

Google Scholar

Harvey, L., Ringrose, J., and Gill, R. (2013). Swagger, ratings and masculinity: theorising the circulation of social and cultural value in teenage boys' digital peer networks. Sociol. Res. Online 18, 57–67. doi: 10.5153/sro.3153

CrossRef Full Text | Google Scholar

Hatos, A. (2010a). The (little) effect that parents' labour emigration has on their children's school performance: a study of secondary school students in Oradea (Romania). New Educ. Rev. 20, 85–96.

Google Scholar

Hatos, A. (2010b). Multilevel analysis of academic achievements of upper secondary students in a Romanian city. Studia Univ. Babes-Bolyai-Sociol. 55, 89–116.

Google Scholar

Hatos, A. (2019). The Impact of digitalization on educational achievement: a literature review from a sociological perspective. Calitatea Vieţii 30, 3–16.

Google Scholar

Hatos, A., and Bǎlţǎtescu, S. (2013). Family structure and school results: multivariate analysis of answers of teenage students in a Romanian city. Child Indic. Res. 6, 281–295. doi: 10.1007/s12187-012-9169-z

CrossRef Full Text | Google Scholar

Haynie, D. L., and Osgood, D. W. (2005). Reconsidering peers and delinquency: how do peers matter? Soc. Forces 84, 1109–1130. doi: 10.1353/sof.2006.0018

CrossRef Full Text | Google Scholar

Henry, S., and Milovanovic, D. (1996). Constitutive Criminology: Beyond Postmodernism. SAGE Publications Limited.

Google Scholar

Herman-Kinney, N. J., and Kinney, D. A. (2013). Sober as deviant: the stigma of sobriety and how some college students “stay dry” on a “wet” campus. J. Contemp. Ethnogr. 42, 64–103. doi: 10.1177/0891241612458954

CrossRef Full Text | Google Scholar

Higuchi, K. (2016). KH Coder 3 Reference Manual. Kioto: Ritsumeikan University.

Google Scholar

Hinduja, S., and Patchin, J. W. (2008). Cyberbuilying: an exploratory analysis of factors related to offending and victimization. Deviant Behav. 29, 129–156. doi: 10.1080/01639620701457816

CrossRef Full Text | Google Scholar

Hinduja, S., and Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Arch Suicide Res. 14, 206–221. doi: 10.1080/13811118.2010.494133

PubMed Abstract | CrossRef Full Text | Google Scholar

Hirschi, T. (1969). A control theory of delinquency. Criminol. Theory Select. Classic Read. 1969, 289–305.

Hirschi, T. (2017). Causes of Delinquency. Milton Park: Routledge.

Google Scholar

Hirschi, T., and Gottfredson, M. R. (2000). In defense of self-control. Theor. Criminol. 4, 55–69. doi: 10.1177/1362480600004001003

CrossRef Full Text | Google Scholar

Hoeben, E. M., Osgood, D. W., Siennick, S. E., and Weerman, F. M. (2021). Hanging out with the wrong crowd? The role of unstructured socializing in adolescents' specialization in delinquency and substance use. J. Quant. Criminol. 37, 141–177. doi: 10.1007/s10940-019-09447-4

CrossRef Full Text | Google Scholar

Holt, T. J. (2007). subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behav. 28, 171–198. doi: 10.1080/01639620601131065

CrossRef Full Text | Google Scholar

Holt, T. J. (2020). “Subcultural theories of crime,” in The Palgrave Handbook of International Cybercrime and Cyberdeviance, eds. T. J. Holt and A. M. Bossler (Cham: Springer International Publishing), 513–526.

Google Scholar

Holt, T. J., Bossler, A. M., Malinski, R., and May, D. C. (2015). Identifying predictors of unwanted online sexual conversations among youth using a low self-control and routine activity framework. J. Contemp. Crim. Justice 32, 108–128. doi: 10.1177/1043986215621376

CrossRef Full Text | Google Scholar

Holt, T. J., Bossler, A. M., and May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. Am. J. Crim. Justice 37, 378–395. doi: 10.1007/s12103-011-9117-3

CrossRef Full Text | Google Scholar

Holt, T. J., and Copes, H. (2010). Transferring subcultural knowledge on-line: practices and beliefs of persistent digital pirates. Deviant Behav. 31, 625–654. doi: 10.1080/01639620903231548

CrossRef Full Text | Google Scholar

Hong, J. S., Kim, D. H., and Piquero, A. R. (2017). Assessing the links between punitive parenting, peer deviance, social isolation and bullying perpetration and victimization in South Korean adolescents. Child Abuse Neglect 73, 63–70. doi: 10.1016/j.chiabu.2017.09.017

PubMed Abstract | CrossRef Full Text | Google Scholar

Hwang, J., and Sampson, R. J. (2014). Divergent pathways of gentrification. Am. Sociol. Rev. 79, 726–751. doi: 10.1177/0003122414535774

CrossRef Full Text | Google Scholar

Jang, S. J. (2002). Race, ethnicity, and deviance: A study of Asian and non-Asian adolescents in America. Sociol. Forum 17, 647–680. doi: 10.1023/A:1021081524775

CrossRef Full Text | Google Scholar

Jensen, G. F., Erickson, M. L., and Gibbs, J. P. (1978). Perceived risk of punisment and self-reported delinquency. Soc. Forces 57, 57–78. doi: 10.2307/2577626

CrossRef Full Text | Google Scholar

Juvonen, J., and Graham, S. (2014). Bullying in schools: the power of bullies and the plight of victims. Annu. Rev. Psychol. 65, 159–185. doi: 10.1146/annurev-psych-010213-115030

PubMed Abstract | CrossRef Full Text | Google Scholar

Kapoor, K. K., Tamilmani, K., Rana, N. P., Patil, P., Dwivedi, Y. K., and Nerur, S. (2017). Advances in social media research: past, present and future. Inform. Syst. Front. 20, 531–558. doi: 10.1007/s10796-017-9810-y

CrossRef Full Text | Google Scholar

Karaian, L. (2012). Lolita speaks: ‘Sexting,’ teenage girls and the law. Crime Media Culture 8, 57–73. doi: 10.1177/1741659011429868

CrossRef Full Text | Google Scholar

Katz, J. (1988). Seductions of Crime: Moral and Sensual Attractions in Doing Evil. New York, NY: Basic Books.

Google Scholar

Kirk, D. S., and Sampson, R. J. (2013). Juvenile arrest and collateral educational damage in the transition to adulthood. Sociol. Educ. 86, 36–62. doi: 10.1177/0038040712448862

PubMed Abstract | CrossRef Full Text | Google Scholar

Kohlberg, L., and Hersh, R. H. (1977). Moral development: a review of the theory. Theory Pract. 16, 53–59. doi: 10.1080/00405847709542675

CrossRef Full Text | Google Scholar

Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., and Lattanner, M. R. (2014). Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Psychol. Bull. 140, 1073–1137. doi: 10.1037/a0035618

PubMed Abstract | CrossRef Full Text | Google Scholar

Lee, B. H. (2018). Explaining cyber deviance among school-aged youth. Child Indic. Res. 11, 563–584. doi: 10.1007/s12187-017-9450-2

CrossRef Full Text | Google Scholar

Lee, B. H., Paek, S. Y., and Fenoff, R. (2018). Factors associated with digital piracy among early adolescents. Child. Youth Serv. Rev. (2017) 86, 287–295. doi: 10.1016/j.childyouth.2018.02.002

CrossRef Full Text | Google Scholar

LeFlore, L. (1988). Delinquent youths and family. Adolescence 23, 629–642.

Google Scholar

Lemert, E. M. (1967). Human Deviance, Social Problems, and Social Control. Englewood Cliffs, NJ, Prentice-Hall.

Lepoutre, D. (2007). School Deviance and Social Control. An Ethnography of Youths at School.

Leung, R. K., Toumbourou, J. W., and Hemphill, S. A. (2014). The effect of peer influence and selection processes on adolescent alcohol use: a systematic review of longitudinal studies. Health Psychol. Rev. 8, 426–457. doi: 10.1080/17437199.2011.587961

PubMed Abstract | CrossRef Full Text | Google Scholar

Lin, W. H., and Yi, C. C. (2016). Family and school strains and their effects on adolescent deviance in taiwan: a mediating study. Youth Soc. 48, 496–520. doi: 10.1177/0044118X13499595

CrossRef Full Text | Google Scholar

Lindell, J. (2017). Bringing field theory to social media, and vice-versa: network-crawling an economy of recognition on facebook. Social Media Soc. 3:752. doi: 10.1177/2056305117735752

CrossRef Full Text | Google Scholar

Lindsay, M., and Krysik, J. (2012). Online harassment among college students a replication incorporating new internet trends. Inform. Commun. Soc. 15, 703–719. doi: 10.1080/1369118X.2012.674959

CrossRef Full Text | Google Scholar

Linnér, R. K., Biroli, P., Kong, E., Meddens, S. F. W., Wedow, R., Fontana, M. A., et al. (2019). Genome-wide association analyses of risk tolerance and risky behaviors in over 1 million individuals identify hundreds of loci and shared genetic influences. Nat. Genet. 51, 245–257. doi: 10.1038/s41588-018-0309-3

PubMed Abstract | CrossRef Full Text | Google Scholar

Loeber, R., and Stouthamer-Loeber, M. (1986). Family factors as correlates and predictors of juvenile conduct problems and delinquency. Crime Just. 7, 29–149. doi: 10.1086/449112

CrossRef Full Text | Google Scholar

Lombroso-Ferrero, G. (1911). Criminal man: according to the classification of Cesare Lombroso. New York, NY; London GP: Putnam.

Google Scholar

Long, M. (2017). ‘We’re not monsters … we're just really sad sometimes:' hidden self-injury, stigma and help-seeking. Health Sociol. Rev. 27, 89–103. doi: 10.1080/14461242.2017.1375862

CrossRef Full Text | Google Scholar

Longobardi, C., and Badenes-Ribera, L. (2019). The relationship between animal cruelty in children and adolescent and interpersonal violence: a systematic review. Aggress. Viol. Behav. 46, 201–211. doi: 10.1016/j.avb.2018.09.001

CrossRef Full Text | Google Scholar

Lu, H., Chen, Q., Xie, C., Liang, Q., Wang, L., Xie, M., et al. (2020). Interparental conflict and delinquency among chinese adolescents: parental knowledge as a mediator and deviant peer affiliation as a moderator. Fornt Psychol. 11:1775. doi: 10.3389/fpsyg.2020.01775

PubMed Abstract | CrossRef Full Text | Google Scholar

Macmillan, R. (2001). Violence and the life course: the consequences of victimization for personal and social development. Ann. Rev. Sociol. 27, 1–22. doi: 10.1146/annurev.soc.27.1.1

CrossRef Full Text | Google Scholar

Maimon, D., and Browning, C. R. (2012a). Underage drinking, alcohol sales and collective efficacy: informal control and opportunity in the study of alcohol use. Soc. Sci. Res. 41, 977–990. doi: 10.1016/j.ssresearch.2012.01.09

PubMed Abstract | CrossRef Full Text | Google Scholar

Maimon, D., and Browning, C. R. (2012b). Underage drinking, alcohol sales and collective efficacy: informal control and opportunity in the study of alcohol use. Soc. Sci. Res. 41, 977–990. doi: 10.1016/j.ssresearch.2012.01.009

PubMed Abstract | CrossRef Full Text | Google Scholar

Marcum, C. D., Higgins, G. E., and Ricketts, M. L. (2010). Potential factors of online victimization of youth: an examination of adolescent online behaviors utilizing routine activity theory. Deviant Behav. 31, 381–410. doi: 10.1080/01639620903004903

CrossRef Full Text | Google Scholar

Matsueda, R. L., and Anderson, K. (1998). The dynamics of delinquent peers and delinquent behavior. Criminology 36, 269–308. doi: 10.1111/j.1745-9125.1998.tb01249.x

PubMed Abstract | CrossRef Full Text | Google Scholar

Matza, D., and Blomberg, T. G. (2017). Becoming Deviant. Milton Park: Routledge.

Google Scholar

McBroom, J. R. (1994). Correlates of alcohol and marijuana use among junior-high-school students - family, peers, school problems, and psychosocial concerns. Youth Soc. 26, 54–68. doi: 10.1177/0044118X94026001003

CrossRef Full Text | Google Scholar

McCuddy, T., and Esbensen, F.-A. (2020). “The role of online communication among gang and non-gang youth,” in Gangs in the Era of Internet and Social Media. (Berlin: Springer), 81–104.

Google Scholar

McGloin, J. M., and Thomas, K. J. (2019). Peer influence and delinquency. Ann. Rev. Criminol. 2, 241–264. doi: 10.1146/annurev-criminol-011518-024551

CrossRef Full Text | Google Scholar

McGrath, S. A., Nilsen, A. A., and Kerley, K. R. (2011). Sexual victimization in childhood and the propensity for juvenile delinquency and adult criminal behavior: a systematic review. Aggress. Violent Behav. 16, 485–492. doi: 10.1016/j.avb.2011.03.008

CrossRef Full Text | Google Scholar

Meldrum, R. C., Patchin, J. W., Young, J. T. N., and Hinduja, S. (2020). Bullying victimization, negative emotions, and digital self-harm: testing a theoretical model of indirect effects. Deviant Behav. 1–9. doi: 10.1080/01639625.2020.1833380

CrossRef Full Text | Google Scholar

Merton, R. K. (1938). Social structure and anomie. Am. Sociol. Rev. 3, 672–682. doi: 10.2307/2084686

CrossRef Full Text | Google Scholar

Mesch, G. S. (2018). Parent-child connections on social networking sites and cyberbullying. Youth Soc. 50, 1145–1162. doi: 10.1177/0044118X16659685

CrossRef Full Text | Google Scholar

Mills, C. W. (1981). The Power Elite [1956]. New York, NY; London: Oxford University Press.

Google Scholar

Mills, M. C., and Tropf, F. C. (2020). Sociology, genetics, and the coming of age of sociogenomics. Ann. Rev. Sociol. 46, 553–581. doi: 10.1146/annurev-soc-121919-054756

CrossRef Full Text | Google Scholar

Milovanovic, D. (1996). Postmodern criminology: mapping the terrain. Just. Q. 13, 567–610. doi: 10.1080/07418829600093121

CrossRef Full Text | Google Scholar

Moffitt, T. E. (1993a). Adolescence-limited and life-course-persistent antisocial behavior: a developmental taxonomy. Psychol. Rev. 100, 674–701. doi: 10.1037/0033-295X.100.4.74

PubMed Abstract | CrossRef Full Text | Google Scholar

Moffitt, T. E. (1993b). Adolescence-limited and life-course-persistent antisocial behavior: a developmental taxonomy. Psychol. Rev. 100, 674–701. doi: 10.1037/0033-295X.100.4.674

PubMed Abstract | CrossRef Full Text | Google Scholar

Moher, D., Liberati, A., Tetzlaff, J., Altman, D. G., and Group, P. (2009). Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. PLoS Med. 6:e1000097. doi: 10.1371/journal.pmed.1000097

PubMed Abstract | CrossRef Full Text | Google Scholar

Musgrave, P. W. (1980). Schools, pupils and deviance - Barton, L, Meighan, R. Br. J. Sociol. Educ. 1, 221–225. doi: 10.1080/0142569800010207

CrossRef Full Text

Ogien, A. (2002). Sociologia devianţei. Romania: Editura Polirom.

Google Scholar

Ohannessian, C. M., and Vannucci, A. (2020). Social media use and externalizing behaviors during early adolescence. Youth Soc. 53, 871–893. doi: 10.1177/0044118X20901737. Available online at: https://journals.sagepub.com/doi/abs/10.1177/0044118X20901737?journalCode=yasa

PubMed Abstract | CrossRef Full Text | Google Scholar

Oksanen, A., Hawdon, J., Holkeri, E., Nasi, M., and Rasanen, P. (2014). Exposure to Online Hate Among Young Social Media Users. Bingley: Emerald Group Publishing Limited.

Google Scholar

O'Neil, M., and Ackland, R. (2020). “Online field theory,” in Second International Handbook of Internet Research, eds. J. Hunsinger, M. M. Allen and L. Klastrup (Dordrecht: Springer Netherlands), 445–467.

Google Scholar

Osgood, D. W., Wilson, J. K., O'Malley, P. M., Bachman, J. G., and Johnston, L. D. (1996). Routine activities and individual deviant behavior. Am. Sociol. Rev. 61, 635–655. doi: 10.2307/2096397. Available online at: http://faculty.washington.edu/matsueda/courses/587/readings/Osgood%20et%20al.%201996%20Routine%20Activities.pdf

CrossRef Full Text | Google Scholar

Page, M. J., McKenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C. D., et al. (2021). The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. BMJ 372:n71. doi: 10.1136/bmj.n7

PubMed Abstract | CrossRef Full Text | Google Scholar

Parsons, T. (1951). The Social System. New York, NY, US: Free Press.

Google Scholar

Payne, A. A., and Welch, K. (2016). The centrality of schools in the lifecourse: the case for focusing on school-related influences in developmental theory and research. Deviant Behav. 37, 748–760. doi: 10.1080/01639625.2015.1071134

CrossRef Full Text | Google Scholar

Peguero, A. A. (2011). Immigration, schools, and violence: assimilation and student misbehavior. Sociol. Spect. 31, 695–717. doi: 10.1080/02732173.2011.606726

CrossRef Full Text | Google Scholar

Phillips, J. C., and Kelly, D. H. (1979). School failure and delinquency which causes which? Criminology 17, 194–207. doi: 10.1111/j.1745-9125.1979.tb01286.x

CrossRef Full Text | Google Scholar

Pickering, C., and Byrne, J. (2014). The benefits of publishing systematic quantitative literature reviews for PhD candidates and other early-career researchers. Higher Educ. Res. Dev. 33, 534–548. doi: 10.1080/07294360.2013.841651

CrossRef Full Text | Google Scholar

Poulin, F., Dishion, T. J., and Haas, E. (1999). The peer influence paradox: friendship quality and deviancy training within male adolescent friendships. Merrill Palmer Q. 45, 42.

Google Scholar

Pratt, T. C., Barnes, J. C., Cullen, F. T., and Turanovic, J. J. (2016). “I suck at everything”: crime, arrest, and the generality of failure. Deviant Behav. 37, 837–851. doi: 10.1080/01639625.2016.1147809

PubMed Abstract | CrossRef Full Text | Google Scholar

Pratt, T. C., and Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi's general theory of crime: a meta-analysis. Criminology 38, 931–964. doi: 10.1111/j.1745-9125.2000.tb00911.x

CrossRef Full Text | Google Scholar

Rafalow, M. H. (2015). n00bs, Trolls, and Idols: Boundary-Making among Digital Youth. Bingley: Emerald Group Publishing Ltd.

Google Scholar

Ragan, D. T., Osgood, D. W., and Feinberg, M. E. (2014). Friends as a bridge to parental influence: implications for adolescent alcohol use. Soc. Forces 92, 1061–1085. doi: 10.1093/sf/sot117

PubMed Abstract | CrossRef Full Text | Google Scholar

Regnerus, M. D. (2002). Friends' influence on adolescent theft and minor delinquency: a developmental test of peer-reported effects. Soc. Sci. Res. 31, 681–705. doi: 10.1016/S0049-089X(02)00010-8

CrossRef Full Text | Google Scholar

Robinson, L. (2009). A taste for the necessary a bourdieuian approach to digital inequality. Inform. Commun. Soc. 12, 488–507. doi: 10.1080/13691180902857678

CrossRef Full Text | Google Scholar

Roisko, R., Wahlberg, K. E., Miettunen, J., and Tienari, P. (2014). Association of parental communication deviance with offspring's psychiatric and thought disorders. A systematic review and meta-analysis. Eur. Psychiatry 29, 20–31. doi: 10.1016/j.eurpsy.2013.05.002

PubMed Abstract | CrossRef Full Text | Google Scholar

Rosa, H., Pereira, N., Ribeiro, R., Ferreira, P. C., Carvalho, J. P., Oliveira, S., et al. (2019). Automatic cyberbullying detection: a systematic review. Comput. Hum. Behav. 93, 333–345. doi: 10.1016/j.chb.2018.12.021

CrossRef Full Text | Google Scholar

Rowitz, L. (1981). A sociological perspective on labeling in mental retardation. Mental Retard. 19, 47–51.

PubMed Abstract | Google Scholar

Ruiz-Hernández, J. A., Moral-Zafra, E., Llor-Esteban, B., and Jiménez-Barbero, J. A. (2019). Influence of parental styles and other psychosocial variables on the development of externalizing behaviors in adolescents: a sytematic review. Eur. J. Psychol. Appl. Legal Context. 11, 9–21. doi: 10.5093/ejpalc2018a11

CrossRef Full Text | Google Scholar

Sagarin, E., and Montanino, F. (1976). Anthologies and readers on deviance. Contemp. Sociol. J. Rev. 5, 259–267. doi: 10.2307/2064065

CrossRef Full Text | Google Scholar

Salvatore, C., and Markowitz, M. W. (2014). Do life course transitions and social bonds influence male and female offending differently? Gender contrasts and criminality. Deviant Behav. 35, 628–653. doi: 10.1080/01639625.2013.867727

CrossRef Full Text | Google Scholar

Sampson, R. J., and Laub, J. H. (1992). Crime and deviance in the life course. Ann. Rev. Sociol. 18, 63–84. doi: 10.1146/annurev.so.18.080192.000431

CrossRef Full Text | Google Scholar

Sampson, R. J., and Laub, J. H. (1994). Urban poverty and the family context of delinquency - a new look at structure and process in a classic study. Child Dev. 65, 523–540. doi: 10.2307/1131400

PubMed Abstract | CrossRef Full Text | Google Scholar

Sampson, R. J., and Laub, J. H. (1997). A life-course theory of cumulative disadvantage and the stability of delinquency. Dev. Theor. Crime Delinq. 7, 133–161.

Google Scholar

Sampson, R. J., Morenoff, J. D., and Gannon-Rowley, T. (2002). Assessing “neighborhood effects”: social processes and new directions in research. Ann. Rev. Soc. 28, 443–478. doi: 10.1146/annurev.soc.28.110601.141114

CrossRef Full Text | Google Scholar

Scheerder, A., Van Deursen, A. J. A. M., and Van Dijk, J. A. G. M. (2017). Determinants of Internet skills, uses and outcomes. A systematic review of the second- and third-level digital divide. Telemat. Inform. 34, 1607–1624. doi: 10.1016/j.tele.2017.07.007

CrossRef Full Text | Google Scholar

Scheuerman, H. L. (2019). Intersectionality and crime: an exploratory look at how gender and race influence responses to injustice associated with strain. Deviant Behav. 40, 1349–1371. doi: 10.1080/01639625.2018.1512218

CrossRef Full Text | Google Scholar

Schwartz, J. A., Solomon, S. J., and Valgardson, B. A. (2019). Socialization, selection, or both? The role of gene-environment interplay in the association between exposure to antisocial peers and delinquency. J. Quant. Criminol. 35, 1–26. doi: 10.1007/s10940-017-9368-3

CrossRef Full Text | Google Scholar

Sellin, T. (1938). Culture conflict and crime. Am. J. Sociol. 44, 97–103. doi: 10.1086/217919

CrossRef Full Text | Google Scholar

Semenza, D. C. (2021). Cross-modal peer polyvictimization and teen dating violence. Deviant Behav. 42, 130–145. doi: 10.1080/01639625.2019.1656743

CrossRef Full Text | Google Scholar

Short, J. F., and Meier, R. F. (1981). Criminology and the study of deviance. Am. Behav. Sci. 24, 462–478. doi: 10.1177/000276428102400309

CrossRef Full Text | Google Scholar

Shostak, S., Freese, J., Link, B. G., and Phelan, J. C. (2009). The politics of the gene: social status and beliefs about genetics for individual outcomes. Soc. Psychol. Q. 72, 77–93. doi: 10.1177/019027250907200107

PubMed Abstract | CrossRef Full Text | Google Scholar

Shulman, E. P., Steinberg, L. D., and Piquero, A. R. (2013). The age-crime curve in adolescence and early adulthood is not due to age differences in economic status. J. Youth Adolesc. 42, 848–860. doi: 10.1007/s10964-013-9950-4

PubMed Abstract | CrossRef Full Text | Google Scholar

Sischo, L., Taylor, J., and Martin, P. Y. (2006). Carrying the weight of self-derogation? Disordered eating practices as social deviance in young adults. Deviant Behav. 27, 1–30. doi: 10.1080/016396290968371

CrossRef Full Text | Google Scholar

Sutherland, E. H., Cressey, D. R., and Luckenbill, D. F. (1992). Principles of Criminology. Lanham: Altamira Press.

Google Scholar

Taylor, J. D., and Ibanez, L. M. (2015). Sociological approaches to self-injury. Sociol. Compass 9, 1005–1014. doi: 10.1111/soc4.12327

CrossRef Full Text | Google Scholar

Terrell, N. E. (1997). Street life - aggravated and sexual assaults among homeless and runaway adolescents. Youth Soc. 28, 267–290. doi: 10.1177/0044118X97028003001

CrossRef Full Text | Google Scholar

Thio, A., Taylor, J. D., and Schwartz, M. D. (1978). Deviant Behavior. Boston, MA: Houghton Mifflin.

Thio, A., Taylor, J. D., and Schwartz, M. D. (2013). Deviant Behavior. London: Pearson.

Thornberry, T. P. (1987). Toward an interactional theory of delinquency. Criminology 25, 863–892. doi: 10.1111/j.1745-9125.1987.tb00823.x

CrossRef Full Text | Google Scholar

Tian, Y., Yu, C., Lin, S., Lu, J., Liu, Y., and Zhang, W. (2019). Sensation seeking, deviant peer affiliation, and internet gaming addiction among chinese adolescents: the moderating effect of parental knowledge. Front Psychol. 9:2727. doi: 10.3389/fpsyg.2018.02727

PubMed Abstract | CrossRef Full Text | Google Scholar

Tippett, N., and Wolke, D. (2014). Socioeconomic status and bullying: a meta-analysis. Am. J. Public Health 104, 48–59. doi: 10.2105/AJPH.2014.301960

PubMed Abstract | CrossRef Full Text | Google Scholar

Tomczyk, Ł. (2018). “Digital piracy among adolescents-scale and conditions,” in New Trends and Research Challenges in Pedagogy and Andragogy, eds L. Tomczyk, A. Ryk, and J. Prokop (Kraków: Uniwersytet Pedagogiczny w Krakowie). doi: 10.24917/9788394156893.5

CrossRef Full Text | Google Scholar

Toro, R., García-García, J., and Zaldívar-Basurto, F. (2020). Antisocial disorders in adolescence and youth, according to structural, emotional, and cognitive transdiagnostic variables: a systematic review. Int. J. Environ. Res. Public Health 17:3036. doi: 10.3390/ijerph17093036

PubMed Abstract | CrossRef Full Text | Google Scholar

Tóth, G., Wachs, J., Di Clemente, R., Jakobi, Á., Ságvári, B., Kertész, J., et al. (2021). Inequality is rising where social network segregation interacts with urban topology. Nat. Commun. 12:1143. doi: 10.1038/s41467-021-21465-0

PubMed Abstract | CrossRef Full Text

Turkel, G. (1990). Michel foucault: law, power, and knowledge. J. Law Soc. 17, 170–193. doi: 10.2307/1410084

CrossRef Full Text | Google Scholar

Udris, R. (2016). Cyber deviance among adolescents and the role of family, school, and neighborhood: a cross-national study. Int. J. Cyber Criminol. 10, 127–146. doi: 10.5281/zenodo.163393

CrossRef Full Text | Google Scholar

Udry, J. R. (1995). Sociology and biology: what biology do sociologists need to know? Soc. Forces 73, 1267–1278. doi: 10.1093/sf/73.4.1267

CrossRef Full Text | Google Scholar

Uggen, C., and Kruttschnitt, C. (1998). Crime in the breaking: gender differences in desistance. Law Soc. Rev. 32, 339–366. doi: 10.2307/827766

CrossRef Full Text | Google Scholar

Vale, A., Pereira, F., Gonçalves, M., and Matos, M. (2018). Cyber-aggression in adolescence and internet parenting styles: a study with victims, perpetrators and victim-perpetrators. Child. Youth Serv. Rev. 93, 88–99. doi: 10.1016/j.childyouth.2018.06.021

CrossRef Full Text | Google Scholar

Van Deursen, A. J. A. M., and Van Dijk, J. A. G. M. (2015). Toward a multifaceted model of internet access for understanding digital divides: an empirical investigation. Inform. Soc. 31, 379–391. doi: 10.1080/01972243.2015.1069770

CrossRef Full Text | Google Scholar

Van Deursen, A. J. A. M., Van Dijk, J. A. G. M., and Ten Klooster, P. M. (2015). Increasing inequalities in what we do online: a longitudinal cross sectional analysis of Internet activities among the Dutch population (2010 to 2013) over gender, age, education, and income. Telemat. Inform. 32, 259–272. doi: 10.1016/j.tele.2014.09.003

CrossRef Full Text | Google Scholar

Van Dijk, J. A. G. M. (2020). The Digital Divide. Hoboken, NJ: Wiley.

Google Scholar

Van Dijk, J. A. G. M., and Hacker, K. (2003). The digital divide as a complex and dynamic phenomenon the multifaceted concept of access. Inform. Soc. 19, 315–326. doi: 10.1080/01972240309487

CrossRef Full Text | Google Scholar

Vejmelka, L., Strabic, N., and Jazvo, M. (2017). Online activities and risk behaviors among adolescents in the virtual environment. Drustvena Istrazivanja 26, 59–78. doi: 10.5559/di.26.1.04

CrossRef Full Text | Google Scholar

Wachs, S., Junger, M., and Sittichai, R. (2015). Traditional, cyber and combined bullying roles: differences in risky online and offline activities. Societies 5, 109–135. doi: 10.3390/soc5010109

CrossRef Full Text | Google Scholar

Wagner, M., Dunkake, I., and Weiss, B. (2004). Truancy. An empirical analysis of the deviant behavior of pupils. Kolner Zeitschrift Fur Soziologie Und Sozialpsychologie 56:457. doi: 10.1007/s11577-004-0074-4

CrossRef Full Text

Wall, D. (2001). Crime and the Internet. Milton Park: Routledge.

Google Scholar

Wallace, J. M., Yamaguchi, R., Bachman, J. G., O'Malley, P. M., Schulenberg, J. E., and Johnston, L. D. (2007). Religiosity and adolescent substance use: the role of individual and contextual influences. Soc. Prob. 54, 308–327. doi: 10.1525/sp.2007.54.2.308

CrossRef Full Text | Google Scholar

Warr, M., and Stafford, M. (1991). The influence of delinquent peers: what they think or what they do? Criminology 29, 851–866. doi: 10.1111/j.1745-9125.1991.tb01090.x

CrossRef Full Text | Google Scholar

Watts, L. K., Wagner, J., Velasquez, B., and Behrens, P. I. (2017). Cyberbullying in higher education: a literature review. Comput. Hum. Behav. 69, 268–274. doi: 10.1016/j.chb.2016.12.038

CrossRef Full Text | Google Scholar

Weisskirch, R. S., and Murphy, L. C. (2004). Friends, porn, and punk: sensation seeking in personal relationships, internet activities, and music preference among college students. Adolescence 39, 189–201. Retrieved from https://www.proquest.com/scholarly-journals/friends-porn-punk-sensation-seeking-personal/docview/195943947/se-2?accountid=8027

PubMed Abstract | Google Scholar

Welsh, W. N., Greene, J. R., and Jenkins, P. H. (1999). School disorder: the influence of individual, institutional, and community factors. Criminology 37, 73–115. doi: 10.1111/j.1745-9125.1999.tb00480.x

CrossRef Full Text | Google Scholar

Wiesner, M., and Shukla, K. (2018). Family deviance, self-control, deviant lifestyles, and youth violent victimization: a latent indirect effects analysis. Victims Offend. 13, 504–525. doi: 10.1080/15564886.2017.1381211

CrossRef Full Text | Google Scholar

Wilson, W. J. (2012). The Truly Disadvantaged: The Inner City, the Underclass, and Public Policy. Chicago, IL: University of Chicago Press.

Google Scholar

Winfree, L. T., Backstrom, T. V., and Mays, G. L. (1994). Social-learning theory, self-reported delinquency, and youth gangs - a new twist on a general-theory of crime and delinquency. Youth Soc. 26, 147–177. doi: 10.1177/0044118X94026002001

CrossRef Full Text | Google Scholar

Winfree, L. T., and Griffiths, C. T. (1983). Social-learning and adolescent marijuana use - a trend study of deviant behavior in a rural middle school. Rural Sociol. 48, 219–239.

Google Scholar

Woodward, L., Fergusson, D. M., and Horwood, L. J. (2001). Risk factors and life processes associated with teenage pregnancy: results of a prospective study from birth to 20 years. J. Marr. Fam. 63, 1170–1184. doi: 10.1111/j.1741-3737.2001.01170.x

CrossRef Full Text | Google Scholar

Yar, M., and Steinmetz, K. F. (2019). Cybercrime and Society. Thousand Oaks, CA: SAGE Publications.

Yoder, R. S. (2011). Labelling Conflict Theory: Inequality and Deviance. Bristol: Polity Press.

Yuan, Y., and McNeeley, S. (2018). Fear of crime and behavioral adaptations: testing the effects of fear of violence on unstructured socializing with peers. Deviant Behav. 39, 1633–1646. doi: 10.1080/01639625.2017.1410625

CrossRef Full Text | Google Scholar

Zhang, L., and Messner, S. F. (1995). Family deviance and delinquency in China. Criminology 33:359. doi: 10.1111/j.1745-9125.1995.tb01182.x

CrossRef Full Text | Google Scholar

Zhao, S. Y. (2005). The digital self: through the looking glass of telecopresent others. Symbol. Interact. 28, 387–405. doi: 10.1525/si.2005.28.3.387

CrossRef Full Text | Google Scholar

Zych, I., Baldry, A. C., Farrington, D. P., and Llorent, V. J. (2019). Are children involved in cyberbullying low on empathy? A systematic review and meta-analysis of research on empathy versus different cyberbullying roles. Aggress. Violent Behav. 45, 83–97. doi: 10.1016/j.avb.2018.03.004

CrossRef Full Text | Google Scholar

Keywords: deviance, cyber-deviance, adolescents, predictors of deviance, systematic (literature) review, KH coder

Citation: Cioban S, Lazăr AR, Bacter C and Hatos A (2021) Adolescent Deviance and Cyber-Deviance. A Systematic Literature Review. Front. Psychol. 12:748006. doi: 10.3389/fpsyg.2021.748006

Received: 27 July 2021; Accepted: 09 September 2021;
Published: 12 October 2021.

Edited by:

Angel Alberto Valdés-Cuervo, Instituto Tecnológico de Sonora (ITSON), Mexico

Reviewed by:

Celeste León Moreno, Pablo de Olavide University, Spain
Andreia de Bem Machado, Federal University of Santa Catarina, Brazil

Copyright © 2021 Cioban, Lazăr, Bacter and Hatos. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Smaranda Cioban, smaranda.cioban@gmail.com

These authors have contributed equally to this work and share first authorship

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.