-
1
-
-
0034469994
-
An Empirical Study of Stalking Victimization
-
Bjerregaard, Beth. 2000. "An Empirical Study of Stalking Victimization." Violence and Victims 15:389-406.
-
(2000)
Violence and Victims
, vol.15
, pp. 389-406
-
-
Bjerregaard, B.1
-
3
-
-
0000204509
-
Social Change and Crime Rate Trends: A Routine Activity Approach
-
Cohen, Lawrence E. and Marcus Felson. 1979. "Social Change and Crime Rate Trends: A Routine Activity Approach." American Sociological Review 44:588-608.
-
(1979)
American Sociological Review
, vol.44
, pp. 588-608
-
-
Cohen, L.E.1
Felson, M.2
-
4
-
-
3242808612
-
-
Computer Security Institute, Retrieved June 3, 2007, from
-
Computer Security Institute. 2007. "Computer Crime and Security Survey." Retrieved June 3, 2007, from (http://www.cybercrime.gov/FBI2006. pdf).
-
(2007)
Computer Crime and Security Survey
-
-
-
7
-
-
1842424381
-
A Survey of Online Harassment at a University Campus
-
Finn, Jerry. 2004. "A Survey of Online Harassment at a University Campus." Journal of Interpersonal Violence 19(4):468-483.
-
(2004)
Journal of Interpersonal Violence
, vol.19
, Issue.4
, pp. 468-483
-
-
Finn, J.1
-
8
-
-
57649140097
-
-
Fisher, Bonnie S., Francis T. Cullen, and Michael G. Turner. 2002. Being Pursued: Stalking Victimization in a National Study of College Women. Criminology and Public Policy 1(2):257-308.
-
Fisher, Bonnie S., Francis T. Cullen, and Michael G. Turner. 2002. "Being Pursued: Stalking Victimization in a National Study of College Women." Criminology and Public Policy 1(2):257-308.
-
-
-
-
9
-
-
55149099320
-
-
the Information Society. Boston, MA: Addison-Wesley
-
Furnell, Steven. 2002. Cybercrime: Vandalizing the Information Society. Boston, MA: Addison-Wesley.
-
(2002)
Cybercrime: Vandalizing
-
-
Furnell, S.1
-
10
-
-
11344279136
-
Elites, Lamers, Nares and Whores: Exploring the Computer Underground
-
Pp, edited by L. Cherny and E. R. Weise. Seattle, WA: Seal Press
-
Gilboa, N. 1996. "Elites, Lamers, Nares and Whores: Exploring the Computer Underground." Pp. 98-113. In Wired Women: Gender and New Realities in Cyberspace, edited by L. Cherny and E. R. Weise. Seattle, WA: Seal Press.
-
(1996)
Wired Women: Gender and New Realities in Cyberspace
, pp. 98-113
-
-
Gilboa, N.1
-
11
-
-
0035381384
-
Virtual Criminality: Old Wine in New Bottles?
-
Grabosky, Peter N. 2001. "Virtual Criminality: Old Wine in New Bottles?" Social and Legal Studies 10:243-249.
-
(2001)
Social and Legal Studies
, vol.10
, pp. 243-249
-
-
Grabosky, P.N.1
-
12
-
-
85140541591
-
Telecommunication Fraud in the Digital Age: The Convergence of Technologies
-
Pp, edited by D. Wall. New York: Routledge
-
Grabosky P. N. and Smith R. 2001. "Telecommunication Fraud in the Digital Age: The Convergence of Technologies." Pp. 29-43. In Crime and the Internet, edited by D. Wall. New York: Routledge.
-
(2001)
Crime and the Internet
, pp. 29-43
-
-
Grabosky, P.N.1
Smith, R.2
-
13
-
-
0033240629
-
The Rhetorical Dynamics of Gender Harassment Online
-
Herring, S. C. 1999. "The Rhetorical Dynamics of Gender Harassment Online." The Information Society 15(3):151 -167.
-
(1999)
The Information Society
, vol.15
, Issue.3
, pp. 151-167
-
-
Herring, S.C.1
-
14
-
-
11144230997
-
Can Low Self-Control Help with the Understanding of the Software Piracy Problem?
-
Higgins, George E. 2005. "Can Low Self-Control Help with the Understanding of the Software Piracy Problem?" Deviant Behavior 26(1 ):1 -24.
-
(2005)
Deviant Behavior
, vol.26
, Issue.1
, pp. 1-24
-
-
Higgins, G.E.1
-
15
-
-
33847270657
-
Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures
-
Holt, Thomas J. 2007. "Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures." Deviant Behavior 28(2):171-198.
-
(2007)
Deviant Behavior
, vol.28
, Issue.2
, pp. 171-198
-
-
Holt, T.J.1
-
16
-
-
57649125022
-
-
Internet Crime Complaint Center, Retrieved on April 25, 2007 from
-
Internet Crime Complaint Center. 2007. "Internet Crime Report." Retrieved on April 25, 2007 from (http://www.ic3.gov/media/annual-report/2006- IC3Report.pdf).
-
(2007)
Internet Crime Report
-
-
-
17
-
-
0022732592
-
-
Jensen, Gary F. and David Brownfield. 1986. Gender, Lifestyles, and Victimization: Beyond Routine Activity. Violence and Victims 1:85-99.
-
Jensen, Gary F. and David Brownfield. 1986. "Gender, Lifestyles, and Victimization: Beyond Routine Activity." Violence and Victims 1:85-99.
-
-
-
-
19
-
-
0026440771
-
Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents
-
Lauritsen, Janet L., John H. Laub, and Robert J. Sampson. 1992. "Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents." Violence and Victims 7:91-108.
-
(1992)
Violence and Victims
, vol.7
, pp. 91-108
-
-
Lauritsen, J.L.1
Laub, J.H.2
Sampson, R.J.3
-
20
-
-
0033843057
-
Stalking as a Variant of Intimate Violence: Implications from a Young Adult Sample
-
Logan, T. K., Carl Leukefeld, and Robert Walker. 2000. "Stalking as a Variant of Intimate Violence: Implications from a Young Adult Sample." Violence and Victims 15:91 -111.
-
(2000)
Violence and Victims
, vol.15
, pp. 91-111
-
-
Logan, T.K.1
Leukefeld, C.2
Walker, R.3
-
21
-
-
57649117736
-
-
Miethe, Terance D. and Robert F. Meier. 1994. Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations. Albany: SUNY Press.
-
Miethe, Terance D. and Robert F. Meier. 1994. Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations. Albany: SUNY Press.
-
-
-
-
22
-
-
0040676527
-
Predicting Risk of Larceny Theft Victimization: A Routine Activity Analysis Using Refined Lifestyle Measures
-
Mustaine, Elizabeth Ehrhardt, and Richard Tewksbury. 1998. "Predicting Risk of Larceny Theft Victimization: A Routine Activity Analysis Using Refined Lifestyle Measures." Criminology 36:829-857.
-
(1998)
Criminology
, vol.36
, pp. 829-857
-
-
Mustaine, E.E.1
Tewksbury, R.2
-
24
-
-
0001373743
-
Routine Activities and Individual Deviant Behavior
-
Osgood, D. Wayne, Janet K. Wilson, Patrick M. O'Malley, Jerald G. Bachman, and Lloyd D.Johnston. 1996. "Routine Activities and Individual Deviant Behavior." American Sociological Review 61 (4):635-655.
-
(1996)
American Sociological Review
, vol.61
, Issue.4
, pp. 635-655
-
-
Osgood, D.W.1
Wilson, J.K.2
O'Malley, P.M.3
Bachman, J.G.4
Johnston, L.D.5
-
26
-
-
85140545116
-
Crime Futures and Foresight: Challenging Criminal Behavior in the Information Age
-
Pp, edited by D. Wall. New York: Routledge
-
Pease, K. 2001. "Crime Futures and Foresight: Challenging Criminal Behavior in the Information Age." Pp. 18-28. In Crime and the Internet, edited by D. Wall. New York: Routledge.
-
(2001)
Crime and the Internet
, pp. 18-28
-
-
Pease, K.1
-
28
-
-
0025310742
-
Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence
-
Sampson, Robert J. and Janet L. Lauritsen. 1990. "Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence." Journal of Research in Crime and Delinquency 27:110-139.
-
(1990)
Journal of Research in Crime and Delinquency
, vol.27
, pp. 110-139
-
-
Sampson, R.J.1
Lauritsen, J.L.2
-
29
-
-
84946310687
-
Exploring a Feminist Routine Activities Approach to Explaining Sexual Assault
-
Schwartz, Martin D. and Victoria L. Pitts. 1995. "Exploring a Feminist Routine Activities Approach to Explaining Sexual Assault." Justice Quarterly' 12:9-31.
-
(1995)
Justice Quarterly
, vol.12
, pp. 9-31
-
-
Schwartz, M.D.1
Pitts, V.L.2
-
30
-
-
0030668250
-
A Social Learning Theory Analysis of Computer Crime among College Students
-
Skinner, William F. and Anne M. Fream. 1997. "A Social Learning Theory Analysis of Computer Crime among College Students." Journal of Research in Crime and Delinquency 34(4):495-518.
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, Issue.4
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
31
-
-
84925740654
-
Maestros or Misogynists? Gender and the Social Construction of Hacking
-
Pp, edited by Y. Jewkes. Portland, OR: Willan Publishing
-
Taylor, Paul A. 2003. "Maestros or Misogynists? Gender and the Social Construction of Hacking." Pp. 126-146. In Dot.cons: Crime, Deviance and Identity on the Internet, edited by Y. Jewkes. Portland, OR: Willan Publishing.
-
(2003)
Dot.cons: Crime, Deviance and Identity on the Internet
, pp. 126-146
-
-
Taylor, P.A.1
-
32
-
-
57649127720
-
-
Taylor, Robert W. Tory J. Caeti, D. Kall Loper, Eric J. Fritsch, and John Lieder bach. 2006. Digital Crime and Digital Terrorism. Upper Saddle River, NJ: Pearson Prentice Hall.
-
Taylor, Robert W. Tory J. Caeti, D. Kall Loper, Eric J. Fritsch, and John Lieder bach. 2006. Digital Crime and Digital Terrorism. Upper Saddle River, NJ: Pearson Prentice Hall.
-
-
-
-
34
-
-
85140528371
-
Cybercrimes and the Internet
-
Pp, edited by D. S. Wall. New York: Routledge
-
Wall, D. S. 2001. "Cybercrimes and the Internet." Pp. 1-17. In Crime and the Internet, edited by D. S. Wall. New York: Routledge.
-
(2001)
Crime and the Internet
, pp. 1-17
-
-
Wall, D.S.1
-
35
-
-
34247657469
-
The Novelty of 'Cybercrime': An Assessment in Light of Routine Activity Theory
-
Yar, Majid. 2005. "The Novelty of 'Cybercrime': An Assessment in Light of Routine Activity Theory." European Journal of Criminology 2(4):407-427.
-
(2005)
European Journal of Criminology
, vol.2
, Issue.4
, pp. 407-427
-
-
Yar, M.1
|