-
1
-
-
34250038821
-
Low self-control and imprudent behavior
-
Arneklev B.J., Grasmick H.G., Tittle C.R., Bursik R.J. Low self-control and imprudent behavior. Journal of Quantitative Criminology 1993, 9:225-247.
-
(1993)
Journal of Quantitative Criminology
, vol.9
, pp. 225-247
-
-
Arneklev, B.J.1
Grasmick, H.G.2
Tittle, C.R.3
Bursik, R.J.4
-
3
-
-
77953121182
-
-
Identity theft, 2005 (NCJ 219411). Retrieved from Bureau of Justice Statistics Web site:
-
Baum, K. (2007). Identity theft, 2005 (NCJ 219411). Retrieved from Bureau of Justice Statistics Web site: http://www.ojp.usdoj.gov/bjs/abstract/it05.htm.
-
(2007)
-
-
Baum, K.1
-
5
-
-
77953123739
-
-
On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3
-
Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3, 400-420.
-
(2009)
, pp. 400-420
-
-
Bossler, A.M.1
Holt, T.J.2
-
6
-
-
14544308792
-
The effects of sophistication, access and monitoring on use of pornography in three technological contexts
-
Buzzell T. The effects of sophistication, access and monitoring on use of pornography in three technological contexts. Deviant Behavior 2005, 26:109-132.
-
(2005)
Deviant Behavior
, vol.26
, pp. 109-132
-
-
Buzzell, T.1
-
7
-
-
33748656935
-
Explaining use of online pornography: A test of self-control theory and opportunities for deviance
-
Buzzell T., Foss D., Middleton Z. Explaining use of online pornography: A test of self-control theory and opportunities for deviance. Journal of Criminal Justice and Popular Culture 2006, 13:96-116.
-
(2006)
Journal of Criminal Justice and Popular Culture
, vol.13
, pp. 96-116
-
-
Buzzell, T.1
Foss, D.2
Middleton, Z.3
-
8
-
-
77953122289
-
-
Malicious threats of peer-to-peer networking. Retrieved July 15, 2007, from Symantec AntiVirus Research Center Web site:
-
Chien, E. (2003). Malicious threats of peer-to-peer networking. Retrieved July 15, 2007, from Symantec AntiVirus Research Center Web site: http://enterprisesecurity.symantec.com/content/knowledgelibrary.cfm?EID=0.
-
(2003)
-
-
Chien, E.1
-
9
-
-
77953120236
-
-
Computer Security Institute. Computer crime and security survey. Retrieved June 3, 2007, from
-
Computer Security Institute. (2007). Computer crime and security survey. Retrieved June 3, 2007, from http://www.cybercrime.gov/FBI2006.pdf.
-
(2007)
-
-
-
10
-
-
1842424381
-
A survey of online harassment at a university campus
-
Finn J. A survey of online harassment at a university campus. Journal of Interpersonal Violence 2004, 19:468-483.
-
(2004)
Journal of Interpersonal Violence
, vol.19
, pp. 468-483
-
-
Finn, J.1
-
11
-
-
85055401848
-
Being pursued: Stalking victimization in a national study of college women
-
Fisher B.S., Cullen F.T., Turner M.G. Being pursued: Stalking victimization in a national study of college women. Criminology and Public Policy 2002, 1:257-308.
-
(2002)
Criminology and Public Policy
, vol.1
, pp. 257-308
-
-
Fisher, B.S.1
Cullen, F.T.2
Turner, M.G.3
-
12
-
-
0000497604
-
Risky lifestyles, routine activities, and the general theory of crime
-
Forde D.R., Kennedy L.W. Risky lifestyles, routine activities, and the general theory of crime. Justice Quarterly 1997, 14:265-294.
-
(1997)
Justice Quarterly
, vol.14
, pp. 265-294
-
-
Forde, D.R.1
Kennedy, L.W.2
-
14
-
-
0035510792
-
Low self-control and coworker delinquency: A research note
-
Gibson C., Wright J. Low self-control and coworker delinquency: A research note. Journal of Criminal Justice 2001, 29:483-492.
-
(2001)
Journal of Criminal Justice
, vol.29
, pp. 483-492
-
-
Gibson, C.1
Wright, J.2
-
15
-
-
11344279136
-
Elites, lamers, narcs and whores: Exploring the computer underground
-
Seal Press, Seattle, WA, L. Cherny, E.R. Weise (Eds.)
-
Gilboa N. Elites, lamers, narcs and whores: Exploring the computer underground. Wired women: Gender and new realities in cyberspace 1996, 98-113. Seal Press, Seattle, WA. L. Cherny, E.R. Weise (Eds.).
-
(1996)
Wired women: Gender and new realities in cyberspace
, pp. 98-113
-
-
Gilboa, N.1
-
17
-
-
85140541591
-
Telecommunication fraud in the digital age: The convergence of technologies
-
Routledge, New York, D. Wall (Ed.)
-
Grabosky P.N., Smith R. Telecommunication fraud in the digital age: The convergence of technologies. Crime and the Internet 2001, 29-43. Routledge, New York. D. Wall (Ed.).
-
(2001)
Crime and the Internet
, pp. 29-43
-
-
Grabosky, P.N.1
Smith, R.2
-
18
-
-
0027476181
-
Testing the core empirical implications of Gottfredson and Hirschi's general theory of crime
-
Grasmick H.G., Tittle C.R., Bursik R.J., Arneklev B.J. Testing the core empirical implications of Gottfredson and Hirschi's general theory of crime. Journal of Research in Crime and Delinquency 1993, 30:5-29.
-
(1993)
Journal of Research in Crime and Delinquency
, vol.30
, pp. 5-29
-
-
Grasmick, H.G.1
Tittle, C.R.2
Bursik, R.J.3
Arneklev, B.J.4
-
19
-
-
0040968793
-
Parenting, self-control, and delinquency: A test of self-control theory
-
Hay C. Parenting, self-control, and delinquency: A test of self-control theory. Criminology 2001, 39:707-736.
-
(2001)
Criminology
, vol.39
, pp. 707-736
-
-
Hay, C.1
-
20
-
-
30744464084
-
Reconsidering peers and delinquency: How do peers matter
-
Haynie D.L., Osgood D.W. Reconsidering peers and delinquency: How do peers matter. Social Forces 2005, 84:1109-1130.
-
(2005)
Social Forces
, vol.84
, pp. 1109-1130
-
-
Haynie, D.L.1
Osgood, D.W.2
-
21
-
-
0033240629
-
The rhetorical dynamics of gender harassment online
-
Herring S.C. The rhetorical dynamics of gender harassment online. The Information Society 1999, 15:151-167.
-
(1999)
The Information Society
, vol.15
, pp. 151-167
-
-
Herring, S.C.1
-
22
-
-
11144230997
-
Can low self-control help with the understanding of the software piracy problem?
-
Higgins G.E. Can low self-control help with the understanding of the software piracy problem?. Deviant Behavior 2005, 26:1-24.
-
(2005)
Deviant Behavior
, vol.26
, pp. 1-24
-
-
Higgins, G.E.1
-
23
-
-
46349099392
-
Gender differences in software piracy: The mediating roles of self-control theory and social learning theory
-
Higgins G.E. Gender differences in software piracy: The mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management 2006, 4:1-30.
-
(2006)
Journal of Economic Crime Management
, vol.4
, pp. 1-30
-
-
Higgins, G.E.1
-
24
-
-
85044912937
-
Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling
-
Higgins G.E., Fell B.D., Wilson A.L. Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies 2006, 19:3-22.
-
(2006)
Criminal Justice Studies
, vol.19
, pp. 3-22
-
-
Higgins, G.E.1
Fell, B.D.2
Wilson, A.L.3
-
25
-
-
34548057051
-
Low self-control and social learning in understanding, students' intentions to pirate movies in the United States
-
Higgins G.E., Fell B.D., Wilson A.L. Low self-control and social learning in understanding, students' intentions to pirate movies in the United States. Social Science Computer Review 2007, 25:339-357.
-
(2007)
Social Science Computer Review
, vol.25
, pp. 339-357
-
-
Higgins, G.E.1
Fell, B.D.2
Wilson, A.L.3
-
26
-
-
12344305644
-
Self-control, deviant peers, and software piracy
-
Higgins G.E., Makin D.A. Self-control, deviant peers, and software piracy. Psychological Reports 2004, 95:921-931.
-
(2004)
Psychological Reports
, vol.95
, pp. 921-931
-
-
Higgins, G.E.1
Makin, D.A.2
-
27
-
-
46349084062
-
Digital piracy: An examination of three measurements of self-control
-
Higgins G.E., Wolfe S.E., Marcum C. Digital piracy: An examination of three measurements of self-control. Deviant Behavior 2008, 29:440-460.
-
(2008)
Deviant Behavior
, vol.29
, pp. 440-460
-
-
Higgins, G.E.1
Wolfe, S.E.2
Marcum, C.3
-
29
-
-
38549162730
-
Personal information of adolescents on the Internet: A quantitative content analysis of MySpace
-
Hinduja S., Patchin J.W. Personal information of adolescents on the Internet: A quantitative content analysis of MySpace. Journal of Adolescence 2008, 31:125-146.
-
(2008)
Journal of Adolescence
, vol.31
, pp. 125-146
-
-
Hinduja, S.1
Patchin, J.W.2
-
30
-
-
38849187891
-
Cyberbullying: An exploratory analysis of factors related to offending and victimization
-
Hinduja S., Patchin J.W. Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior 2008, 29:129-156.
-
(2008)
Deviant Behavior
, vol.29
, pp. 129-156
-
-
Hinduja, S.1
Patchin, J.W.2
-
31
-
-
33847270657
-
Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures
-
Holt T.J. Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior 2007, 28:171-198.
-
(2007)
Deviant Behavior
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
32
-
-
57649120953
-
Examining the applicability of lifestyle-routine activities theory for cybercrime victimization
-
Holt T.J., Bossler A.M. Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior 2009, 30:1-25.
-
(2009)
Deviant Behavior
, vol.30
, pp. 1-25
-
-
Holt, T.J.1
Bossler, A.M.2
-
34
-
-
41649096818
-
Low self-control, routine activities, and fraud victimization
-
Holtfreter K., Reisig M.D., Pratt T.C. Low self-control, routine activities, and fraud victimization. Criminology 2008, 46:189-220.
-
(2008)
Criminology
, vol.46
, pp. 189-220
-
-
Holtfreter, K.1
Reisig, M.D.2
Pratt, T.C.3
-
35
-
-
0022732592
-
Gender, lifestyles, and victimization: Beyond routine activity theory
-
Jensen G.F., Brownfield D. Gender, lifestyles, and victimization: Beyond routine activity theory. Violence and Victims 1986, 1:85-99.
-
(1986)
Violence and Victims
, vol.1
, pp. 85-99
-
-
Jensen, G.F.1
Brownfield, D.2
-
37
-
-
0026440771
-
Conventional and delinquent activities: Implications for the prevention of violent victimization among adolescents
-
Lauritsen J.L., Laub J.H., Sampson R.J. Conventional and delinquent activities: Implications for the prevention of violent victimization among adolescents. Violence and Victims 1992, 7:91-108.
-
(1992)
Violence and Victims
, vol.7
, pp. 91-108
-
-
Lauritsen, J.L.1
Laub, J.H.2
Sampson, R.J.3
-
38
-
-
84984289483
-
The link between offending and victimization among adolescents
-
Lauritsen J.L., Sampson R.J., Laub J.H. The link between offending and victimization among adolescents. Criminology 1991, 29:265-292.
-
(1991)
Criminology
, vol.29
, pp. 265-292
-
-
Lauritsen, J.L.1
Sampson, R.J.2
Laub, J.H.3
-
39
-
-
0033843057
-
Stalking as a variant of intimate violence: Implications from a young adult sample
-
Logan T.K., Leukefeld C., Walker R. Stalking as a variant of intimate violence: Implications from a young adult sample. Violence and Victims 2000, 15:91-111.
-
(2000)
Violence and Victims
, vol.15
, pp. 91-111
-
-
Logan, T.K.1
Leukefeld, C.2
Walker, R.3
-
40
-
-
4744366792
-
Self-control and social bonds: A combined control perspective on deviance
-
Longshore D., Chang E., Hsieh S.C., Messina N. Self-control and social bonds: A combined control perspective on deviance. Crime and Delinquency 2004, 50:542-564.
-
(2004)
Crime and Delinquency
, vol.50
, pp. 542-564
-
-
Longshore, D.1
Chang, E.2
Hsieh, S.C.3
Messina, N.4
-
43
-
-
0003543517
-
-
State University of New York Press, Albany
-
Miethe T.D., Meier R.F. Crime and its social context: Toward an integrated theory of offenders, victims, and situations 1994, State University of New York Press, Albany.
-
(1994)
Crime and its social context: Toward an integrated theory of offenders, victims, and situations
-
-
Miethe, T.D.1
Meier, R.F.2
-
46
-
-
0001373743
-
Routine activities and individual deviant behavior
-
Osgood D.W., Wilson J.K., O'Malley P.M., Bachman J.G., Johnston L.D. Routine activities and individual deviant behavior. American Sociological Review 1996, 61:635-655.
-
(1996)
American Sociological Review
, vol.61
, pp. 635-655
-
-
Osgood, D.W.1
Wilson, J.K.2
O'Malley, P.M.3
Bachman, J.G.4
Johnston, L.D.5
-
47
-
-
77953121210
-
-
PandaLabs. Malware infections in protected systems. Retrieved November 1, 2007, from
-
PandaLabs. (2007). Malware infections in protected systems. Retrieved November 1, 2007, from http://research.pandasecurity.com/blogs/images/wp_pb_malware_infections_in_protected_systems.pdf.
-
(2007)
-
-
-
49
-
-
85140545116
-
Crime futures and foresight: Challenging criminal behavior in the information age
-
Routledge, New York, D. Wall (Ed.)
-
Pease K. Crime futures and foresight: Challenging criminal behavior in the information age. Crime and the Internet 2001, 18-28. Routledge, New York. D. Wall (Ed.).
-
(2001)
Crime and the Internet
, pp. 18-28
-
-
Pease, K.1
-
50
-
-
5644223529
-
Discerning unfairness where others may not: Low self-control and unfair sanction perceptions
-
Piquero A.R., Gomez-Smith Z., Langton L. Discerning unfairness where others may not: Low self-control and unfair sanction perceptions. Criminology 2004, 42:699-733.
-
(2004)
Criminology
, vol.42
, pp. 699-733
-
-
Piquero, A.R.1
Gomez-Smith, Z.2
Langton, L.3
-
51
-
-
16244403936
-
Self-control, violent offending, and homicide victimization: Assessing the general theory of crime
-
Piquero A.R., MacDonald J., Dobrin A., Daigle L.E., Cullen F.T. Self-control, violent offending, and homicide victimization: Assessing the general theory of crime. Journal of Quantitative Criminology 2005, 21:55-71.
-
(2005)
Journal of Quantitative Criminology
, vol.21
, pp. 55-71
-
-
Piquero, A.R.1
MacDonald, J.2
Dobrin, A.3
Daigle, L.E.4
Cullen, F.T.5
-
52
-
-
0000392842
-
Specifying the direct and indirect effects of low self control and situational factors in offenders' decision making: Toward a more complete model of rational offending
-
Piquero A.R., Tibbetts S. Specifying the direct and indirect effects of low self control and situational factors in offenders' decision making: Toward a more complete model of rational offending. Justice Quarterly 1996, 13:481-510.
-
(1996)
Justice Quarterly
, vol.13
, pp. 481-510
-
-
Piquero, A.R.1
Tibbetts, S.2
-
53
-
-
0039842473
-
The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis
-
Pratt T.C., Cullen F.T. The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis. Criminology 2000, 38:931-964.
-
(2000)
Criminology
, vol.38
, pp. 931-964
-
-
Pratt, T.C.1
Cullen, F.T.2
-
54
-
-
77953123249
-
-
Cybercrime against businesses, 2005 (NCJ 221943). Retrieved from Bureau of Justice Statistics Web site:
-
Rantala, R. R. (2008). Cybercrime against businesses, 2005 (NCJ 221943). Retrieved from Bureau of Justice Statistics Web site: http://www.ojp.usdoj.gov/bjs/abstract/cb05.htm.
-
(2008)
-
-
Rantala, R.R.1
-
55
-
-
77953122361
-
-
A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. Unpublished doctoral dissertation, University of Manitoba, Winnipeg, Manitoba, Canada.
-
Rogers, M. K. (2001). A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. Unpublished doctoral dissertation, University of Manitoba, Winnipeg, Manitoba, Canada.
-
(2001)
-
-
Rogers, M.K.1
-
56
-
-
33745740196
-
Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis
-
Rogers M.K., Smoak N.D., Liu J. Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior 2006, 27:245-268.
-
(2006)
Deviant Behavior
, vol.27
, pp. 245-268
-
-
Rogers, M.K.1
Smoak, N.D.2
Liu, J.3
-
57
-
-
0025310742
-
Deviant lifestyles, proximity to crime, and the offender-victim link in personal violence
-
Sampson R.J., Lauritsen J.L. Deviant lifestyles, proximity to crime, and the offender-victim link in personal violence. Journal of Research in Crime and Delinquency 1990, 27:110-139.
-
(1990)
Journal of Research in Crime and Delinquency
, vol.27
, pp. 110-139
-
-
Sampson, R.J.1
Lauritsen, J.L.2
-
58
-
-
0001157723
-
Criminal victimization and self control: An extension and test of a general theory of crime
-
Schreck C.J. Criminal victimization and self control: An extension and test of a general theory of crime. Justice Quarterly 1999, 16:633-654.
-
(1999)
Justice Quarterly
, vol.16
, pp. 633-654
-
-
Schreck, C.J.1
-
59
-
-
4243071709
-
Specifying the influence of family and peers on violent victimization: Extending routine activities and lifestyle theories
-
Schreck C.J., Fisher B.S. Specifying the influence of family and peers on violent victimization: Extending routine activities and lifestyle theories. Journal of Interpersonal Violence 2004, 19:1021-1041.
-
(2004)
Journal of Interpersonal Violence
, vol.19
, pp. 1021-1041
-
-
Schreck, C.J.1
Fisher, B.S.2
-
60
-
-
33749682069
-
Self control, victimization, and the influence on risky lifestyles: A longitudinal analysis using panel data
-
Schreck C.J., Stewart E.A., Fisher B.S. Self control, victimization, and the influence on risky lifestyles: A longitudinal analysis using panel data. Journal of Quantitative Criminology 2006, 22:319-340.
-
(2006)
Journal of Quantitative Criminology
, vol.22
, pp. 319-340
-
-
Schreck, C.J.1
Stewart, E.A.2
Fisher, B.S.3
-
61
-
-
43249189258
-
A study of individual and situational antecedents of violent victimization
-
Schreck C.J., Wright R.A., Miller J.M. A study of individual and situational antecedents of violent victimization. Justice Quarterly 2002, 19:159-180.
-
(2002)
Justice Quarterly
, vol.19
, pp. 159-180
-
-
Schreck, C.J.1
Wright, R.A.2
Miller, J.M.3
-
62
-
-
0030668250
-
A social learning theory analysis of computer crime among college students
-
Skinner W.F., Fream A.M. A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency 1997, 34:495-518.
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
64
-
-
27144504019
-
Integrating the general theory of crime into an explanation of violent victimization among female offenders
-
Stewart E.A., Elifson K.W., Sterk C.E. Integrating the general theory of crime into an explanation of violent victimization among female offenders. Justice Quarterly 2004, 21:159-181.
-
(2004)
Justice Quarterly
, vol.21
, pp. 159-181
-
-
Stewart, E.A.1
Elifson, K.W.2
Sterk, C.E.3
-
66
-
-
33846043733
-
-
Pearson Prentice Hall, Upper Saddle River, NJ
-
Taylor R.W., Caeti T.J., Loper D.K., Fritsch E.J., Liederbach J. Digital crime and digital terrorism 2006, Pearson Prentice Hall, Upper Saddle River, NJ.
-
(2006)
Digital crime and digital terrorism
-
-
Taylor, R.W.1
Caeti, T.J.2
Loper, D.K.3
Fritsch, E.J.4
Liederbach, J.5
-
67
-
-
0003551640
-
-
(NCJ 169592), U.S. Department of Justice, National Institute of Justice, Washington, DC
-
Tjaden P., Thoennes N. Stalking in America: Findings from the National Violence Against Women Survey 1998, (NCJ 169592), U.S. Department of Justice, National Institute of Justice, Washington, DC.
-
(1998)
Stalking in America: Findings from the National Violence Against Women Survey
-
-
Tjaden, P.1
Thoennes, N.2
-
68
-
-
33947706683
-
The family, low self-control, and deviance: A cross cultural and cross-national test of self-control theory
-
Vazsonyi A.T., Belliston L.M. The family, low self-control, and deviance: A cross cultural and cross-national test of self-control theory. Criminal Justice and Behavior 2007, 34:505-530.
-
(2007)
Criminal Justice and Behavior
, vol.34
, pp. 505-530
-
-
Vazsonyi, A.T.1
Belliston, L.M.2
-
69
-
-
85140528371
-
Cybercrimes and the Internet
-
Routledge, New York, D.S. Wall (Ed.)
-
Wall D.S. Cybercrimes and the Internet. Crime and the Internet 2001, 1-17. Routledge, New York. D.S. Wall (Ed.).
-
(2001)
Crime and the Internet
, pp. 1-17
-
-
Wall, D.S.1
-
70
-
-
34247657469
-
The novelty of "cybercrime": An assessment in light of routine activity theory
-
Yar M. The novelty of "cybercrime": An assessment in light of routine activity theory. European Journal of Criminology 2005, 2:407-427.
-
(2005)
European Journal of Criminology
, vol.2
, pp. 407-427
-
-
Yar, M.1
|