-
1
-
-
84984361600
-
The Interactive Effect of Peer Variables on Delinquency
-
Agnew, R., 1991. “The Interactive Effect of Peer Variables on Delinquency.”. Criminology, 29: 47–72.
-
(1991)
Criminology
, vol.29
, pp. 47-72
-
-
Agnew, R.1
-
4
-
-
0018503050
-
Social Learning and Deviant Behavior: A Specific Test of a General Theory
-
Akers, R. L., Krohn, M. D., Lanza-Kaduce, L., and Radosevich, M., 1979. “Social Learning and Deviant Behavior: A Specific Test of a General Theory.”. American Sociological Review, 44: 636–655.
-
(1979)
American Sociological Review
, vol.44
, pp. 636-655
-
-
Akers, R.L.1
Krohn, M.D.2
Lanza-Kaduce, L.3
Radosevich, M.4
-
5
-
-
0029896618
-
A Longitudinal Test of Social Learning Theory: Adolescent Smoking
-
Akers, R. L., and Lee, G., 1996. “A Longitudinal Test of Social Learning Theory: Adolescent Smoking.”. Journal of Drug Issues, 26: 317–343.
-
(1996)
Journal of Drug Issues
, vol.26
, pp. 317-343
-
-
Akers, R.L.1
Lee, G.2
-
6
-
-
0003636015
-
-
4th ed., Los Angeles: Roxbury
-
Akers, R. L., and Sellers, C., 2005. Criminological Theories: Introduction, Evaluation, and Application., 4th ed., Los Angeles: Roxbury.
-
(2005)
Criminological Theories: Introduction, Evaluation, and Application.
-
-
Akers, R.L.1
Sellers, C.2
-
7
-
-
13444287611
-
Computer Crime
-
Forester T., (ed), Cambridge, MA: MIT Press,. Edited by
-
Ball, L. D., 1985. “Computer Crime.”. In The Information Technology Revolution., Edited by: Forester, T., Cambridge, MA: MIT Press.
-
(1985)
The Information Technology Revolution.
-
-
Ball, L.D.1
-
9
-
-
0030539836
-
Adolescents and Deviance in a Vietnamese American Community
-
Bankston, C. L., and Caldas, S. J., 1996. “Adolescents and Deviance in a Vietnamese American Community.”. Deviant Behavior, 17: 159–182.
-
(1996)
Deviant Behavior
, vol.17
, pp. 159-182
-
-
Bankston, C.L.1
Caldas, S.J.2
-
10
-
-
0038437408
-
The Contribution of Gang Membership to Delinquency Beyond Delinquent Friends
-
Battin, S. R., Hill, K. G., Abbott, R. D., Catalano, R. F., and Hawkins, D., 1998. “The Contribution of Gang Membership to Delinquency Beyond Delinquent Friends.”. Criminology, 36: 93–115.
-
(1998)
Criminology
, vol.36
, pp. 93-115
-
-
Battin, S.R.1
Hill, K.G.2
Abbott, R.D.3
Catalano, R.F.4
Hawkins, D.5
-
12
-
-
8744230918
-
Exploring the Relationship Between Social and Non-Social Reinforcement in the Context of Social Learning Theory
-
Akers R.L., Jensen G.F., (eds), New Bruswick, NJ: Transaction Publishers, and,. Edited by
-
Brezina, T., and Piquero, A. R., 2003. “Exploring the Relationship Between Social and Non-Social Reinforcement in the Context of Social Learning Theory.”. In Social Learning Theory and the Explanation of Crime: A Guide for a New Century. Advances in Criminological Theory, Edited by: Akers, R. L., and Jensen, G. F., vol. 11, New Bruswick, NJ: Transaction Publishers.
-
(2003)
Social Learning Theory and the Explanation of Crime: A Guide for a New Century. Advances in Criminological Theory
, vol.11
-
-
Brezina, T.1
Piquero, A.R.2
-
13
-
-
0041075825
-
A Test of General Strain Theory
-
Broidy, L., 2001. “A Test of General Strain Theory.”. Criminology, 39: 9–33.
-
(2001)
Criminology
, vol.39
, pp. 9-33
-
-
Broidy, L.1
-
14
-
-
33845959641
-
A Differential Association-Reinforcement Theory of Criminal Behavior
-
Burgess, R. L., and Akers, R. L., 1966. “A Differential Association-Reinforcement Theory of Criminal Behavior.”. Social Problems, 14: 128–147.
-
(1966)
Social Problems
, vol.14
, pp. 128-147
-
-
Burgess, R.L.1
Akers, R.L.2
-
15
-
-
84868936750
-
-
Retrieved April 16, 2006, from Business Software Alliance Web Site
-
Business Software Alliance. 2005. 2005 Piracy Study. Retrieved April 16, 2006, from Business Software Alliance Web Site: http://www.bsa.org/globalstudy/upload/2005-Global-Study-English.pdf
-
(2005)
2005 Piracy Study.
-
-
-
16
-
-
21344433201
-
The Changing Definition and Image of Hackers in Popular Discourse
-
Chandler, A., 1996. “The Changing Definition and Image of Hackers in Popular Discourse.”. International Journal of the Sociology of Law, 24: 229–251.
-
(1996)
International Journal of the Sociology of Law
, vol.24
, pp. 229-251
-
-
Chandler, A.1
-
18
-
-
84982607491
-
Social Control and Social Learning Models of Delinquency: A Synthesis
-
Conger, R., 1976. “Social Control and Social Learning Models of Delinquency: A Synthesis.”. Criminology, 14: 17–40.
-
(1976)
Criminology
, vol.14
, pp. 17-40
-
-
Conger, R.1
-
19
-
-
0033339151
-
Computer Crime and Abuse: A Survey of Public Attitudes and Awareness
-
Dowland, P., Furnell, S., Illingworth, H., and Reynolds, P. L., 1999. “Computer Crime and Abuse: A Survey of Public Attitudes and Awareness.”. Computers and Security, 18: 715–26.
-
(1999)
Computers and Security
, vol.18
, pp. 715-726
-
-
Dowland, P.1
Furnell, S.2
Illingworth, H.3
Reynolds, P.L.4
-
20
-
-
21344451327
-
Computer Crime in the Global Village: Strategies for Control and Regulation—in Defense of the Hacker
-
Duff, L., and Gardiner, S., 1996. “Computer Crime in the Global Village: Strategies for Control and Regulation—in Defense of the Hacker.”. International Journal of the Sociology of Law, 24: 211–228.
-
(1996)
International Journal of the Sociology of Law
, vol.24
, pp. 211-228
-
-
Duff, L.1
Gardiner, S.2
-
21
-
-
0003663529
-
-
Beverly Hills, CA: Sage
-
Elliott, D. S., Huizinga, D., and Ageton, S. S., 1982. Explaining Delinquency and Drug Use., Beverly Hills, CA: Sage.
-
(1982)
Explaining Delinquency and Drug Use.
-
-
Elliott, D.S.1
Huizinga, D.2
Ageton, S.S.3
-
22
-
-
0002548604
-
Delinquent Friends and Delinquent Behavior: Temporal and Developmental Patterns
-
Hawkins D., (ed), New York: Cambridge University Press, and,. Edited by
-
Elliott, D. S., and Menard, S., 1996. “Delinquent Friends and Delinquent Behavior: Temporal and Developmental Patterns.”. In Delinquency and Crime: Current Theories., Edited by: Hawkins, D., New York: Cambridge University Press.
-
(1996)
Delinquency and Crime: Current Theories.
-
-
Elliott, D.S.1
Menard, S.2
-
23
-
-
11344279136
-
Elites, Lamers, Narcs and Whores: Exploring the Computer Underground
-
Cherny L., Elizabeth R., Weise R., (eds), Seattle, WA: Seal Press,. Edited by
-
Gilbora, N., 1996. “Elites, Lamers, Narcs and Whores: Exploring the Computer Underground.”. In Wired Women: Gender and New Realities in Cyberspace., Edited by: Cherny, L., Elizabeth, R., and Weise, R., Seattle, WA: Seal Press.
-
(1996)
Wired Women: Gender and New Realities in Cyberspace.
-
-
Gilbora, N.1
-
24
-
-
3242808612
-
-
Retrieved November 13, 2007 from
-
Gordon, L. A., Loeb, M., Lucyshyn, W., and Richardson, P., 2004. Ninth Annual CSI/FBI Computer Crime and Security Survey. Retrieved November 13, 2007 from http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdf
-
(2004)
Ninth Annual CSI/FBI Computer Crime and Security Survey.
-
-
Gordon, L.A.1
Loeb, M.2
Lucyshyn, W.3
Richardson, P.4
-
26
-
-
21944448888
-
Discourses of Danger and the Computer Hacker
-
Halbert, D., 1997. “Discourses of Danger and the Computer Hacker.”. The Information Society, 13: 361–374.
-
(1997)
The Information Society
, vol.13
, pp. 361-374
-
-
Halbert, D.1
-
28
-
-
0011664858
-
Why People Copy Software and Create Computer Viruses: Individual Characteristics Of Situational Factors?
-
Harrington, S. J., 1989. “Why People Copy Software and Create Computer Viruses: Individual Characteristics Of Situational Factors?”. Information Resources Management Journal, 2: 28–37.
-
(1989)
Information Resources Management Journal
, vol.2
, pp. 28-37
-
-
Harrington, S.J.1
-
29
-
-
11144230997
-
Can Low Self-Control Help with the Understanding of Software Piracy Problem?
-
Higgins, G. E., 2005a. “Can Low Self-Control Help with the Understanding of Software Piracy Problem?”. Deviant Behavior, 26: 1–24.
-
(2005)
Deviant Behavior
, vol.26
, pp. 1-24
-
-
Higgins, G.E.1
-
30
-
-
84856727916
-
Statistical Significance Testing: The Bootstrap Method and an Application to Self-Control Theory
-
Higgins, G. E., 2005b. “Statistical Significance Testing: The Bootstrap Method and an Application to Self-Control Theory.”. Southwest Journal of Criminal Justice, 2: 54–76.
-
(2005)
Southwest Journal of Criminal Justice
, vol.2
, pp. 54-76
-
-
Higgins, G.E.1
-
31
-
-
85044912937
-
Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling
-
Higgins, G. E., Fell, B. D., and Wilson, A., 2006. “Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling.”. Criminal Justice Studies, 19: 3–22.
-
(2006)
Criminal Justice Studies
, vol.19
, pp. 3-22
-
-
Higgins, G.E.1
Fell, B.D.2
Wilson, A.3
-
32
-
-
29444457666
-
Does Social Learning Theory Condition the Effects of Low Self-Control on College Students’ Software Piracy?
-
Higgins, G. E., and Makin, D. A., 2004a. “Does Social Learning Theory Condition the Effects of Low Self-Control on College Students’ Software Piracy?”. Journal of Economic Crime Management, 2: 1–22.
-
(2004)
Journal of Economic Crime Management
, vol.2
, pp. 1-22
-
-
Higgins, G.E.1
Makin, D.A.2
-
33
-
-
12344305644
-
Self-control, Deviant Peers, and Software Piracy
-
Higgins, G. E., and Makin, D. A., 2004b. “Self-control, Deviant Peers, and Software Piracy.”. Psychological Reports, 95: 921–931.
-
(2004)
Psychological Reports
, vol.95
, pp. 921-931
-
-
Higgins, G.E.1
Makin, D.A.2
-
36
-
-
36949037524
-
Neutralization Theory and Online Software Piracy: An Empirical Analysis
-
Hinduja, S., 2007. “Neutralization Theory and Online Software Piracy: An Empirical Analysis.”. Ethics and Information Technology, 9: 187–204.
-
(2007)
Ethics and Information Technology
, vol.9
, pp. 187-204
-
-
Hinduja, S.1
-
37
-
-
0343001536
-
Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access
-
Hollinger, R. C., 1993. “Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access.”. Security Journal, 4: 2–12.
-
(1993)
Security Journal
, vol.4
, pp. 2-12
-
-
Hollinger, R.C.1
-
38
-
-
0023846187
-
The Process of Criminalization: The Case of Computer Crime Laws
-
Hollinger, R. C., and Lanza-Kaduce, L., 1988. “The Process of Criminalization: The Case of Computer Crime Laws.”. Criminology, 26: 101–126.
-
(1988)
Criminology
, vol.26
, pp. 101-126
-
-
Hollinger, R.C.1
Lanza-Kaduce, L.2
-
39
-
-
33846081431
-
Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?
-
Hughes, L. A., and DeLone, G. J., 2007. “Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?”. Social Science Computer Review, 25: 79–98.
-
(2007)
Social Science Computer Review
, vol.25
, pp. 79-98
-
-
Hughes, L.A.1
DeLone, G.J.2
-
40
-
-
45949086382
-
Neutralizing Music Piracy: An Empirical Examination
-
Ingram, J., and Hinduja, S., 2008. “Neutralizing Music Piracy: An Empirical Examination.”. Deviant Behavior, 29: 334–366.
-
(2008)
Deviant Behavior
, vol.29
, pp. 334-366
-
-
Ingram, J.1
Hinduja, S.2
-
41
-
-
85063701458
-
-
Retrieved November 12, 2007 from
-
International Federation of Phonographic Industries. 2005. Commercial Piracy Report Key Figures Summary. Retrieved November 12, 2007 from http://www.ifpi.org/site-content/press/20050623a.html
-
(2005)
Commercial Piracy Report Key Figures Summary.
-
-
-
42
-
-
85050417819
-
Criminal Behavior and Learning Theory
-
Jeffery, C. R., 1965. “Criminal Behavior and Learning Theory.”. Journal of Criminal Law, Criminology, and Police Science, 56: 294–300.
-
(1965)
Journal of Criminal Law, Criminology, and Police Science
, vol.56
, pp. 294-300
-
-
Jeffery, C.R.1
-
44
-
-
66549088878
-
The Economics of Computer Hacking
-
Leeson, P. T., and Coyne, C. J., 2006. “The Economics of Computer Hacking.”. Journal of Law, Economics and Policy, 1: 511–532.
-
(2006)
Journal of Law, Economics and Policy
, vol.1
, pp. 511-532
-
-
Leeson, P.T.1
Coyne, C.J.2
-
46
-
-
0004139607
-
-
Second Edition, College Station, TX: Stata Press
-
Long, J. S., and Freese, J., 2006. Regression Models for Categorical Dependent Variables Using Stata, Second Edition, College Station, TX: Stata Press.
-
(2006)
Regression Models for Categorical Dependent Variables Using Stata
-
-
Long, J.S.1
Freese, J.2
-
47
-
-
0041181067
-
The Dynamics of Delinquent Peers and Delinquent Behavior
-
Matsueda, R. L., and Anderson, K., 1998. “The Dynamics of Delinquent Peers and Delinquent Behavior.”. Criminology, 36: 269–308.
-
(1998)
Criminology
, vol.36
, pp. 269-308
-
-
Matsueda, R.L.1
Anderson, K.2
-
48
-
-
4043097445
-
The Baudy World of the Byte Bandit: A Postmodernist Interpretation of the Computer Underground
-
Schmalleger F., (ed), Bristol, IN: Wyndham Hall, and,. Edited by
-
Meyer, G., and Thomas, J., 1990. “The Baudy World of the Byte Bandit: A Postmodernist Interpretation of the Computer Underground.”. In Computers in Criminal Justice., Edited by: Schmalleger, F., Bristol, IN: Wyndham Hall.
-
(1990)
Computers in Criminal Justice.
-
-
Meyer, G.1
Thomas, J.2
-
49
-
-
85063697349
-
-
Retrieved January 13, 2008 from
-
Motion Picture Association of America. 2005. 2005 U.S. Piracy Fact Sheet. Retrieved January 13, 2008 from http://www.mpaa.org/USPiracyFactSheet.pdf
-
(2005)
2005 U.S. Piracy Fact Sheet.
-
-
-
53
-
-
13444299304
-
Hackers: Taking a Byte Out of Computer Crime
-
Roush, W., 1995. Hackers: Taking a Byte Out of Computer Crime. Technology Review, 98: 32–40.
-
(1995)
Technology Review
, vol.98
, pp. 32-40
-
-
Roush, W.1
-
54
-
-
21244489423
-
-
Westport, CT: Quorum Books
-
Schell, B. H., and Dodge, J. L., 2002. The Hacking of America: Who's Doing It, Why, and How., Westport, CT: Quorum Books.
-
(2002)
The Hacking of America: Who's Doing It, Why, and How.
-
-
Schell, B.H.1
Dodge, J.L.2
-
55
-
-
21644442518
-
Social Learning Theory and Courtship Violence: An Empirical Test
-
Akers R.L., Jensen G.F., (eds), New Bruswick, NJ: Transaction Publishers, and,. Edited by
-
Sellers, C. S., Cochran, J., and Winfree, L. T., 2003. “Social Learning Theory and Courtship Violence: An Empirical Test.”. In Social Learning Theory and the Explanation of Crime: A Guide for a New Century. Advances in Criminological Theory, Edited by: Akers, R. L., and Jensen, G. F., vol. 11, New Bruswick, NJ: Transaction Publishers.
-
(2003)
Social Learning Theory and the Explanation of Crime: A Guide for a New Century. Advances in Criminological Theory
, vol.11
-
-
Sellers, C.S.1
Cochran, J.2
Winfree, L.T.3
-
58
-
-
0030668250
-
A Social Learning Theory Analysis of Computer Crime Among College Students
-
Skinner, W. F., and Fream, A. M., 1997. “A Social Learning Theory Analysis of Computer Crime Among College Students.”. Journal of Research in Crime and Delinquency, 34: 495–518.
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
64
-
-
33846043733
-
-
Saddle River, NJ: Prentice Hall
-
Taylor, R. W., Caeti, T. J., Loper, K., Fritsch, E. J., and Liederback, J., 2005. Digital Crime and Digital Terrorism., Saddle River, NJ: Prentice Hall.
-
(2005)
Digital Crime and Digital Terrorism.
-
-
Taylor, R.W.1
Caeti, T.J.2
Loper, K.3
Fritsch, E.J.4
Liederback, J.5
-
65
-
-
84984308480
-
Delinquent Peers, Beliefs, and Delinquent Behavior: A Longitudinal Test of Interactional Theory
-
Thornberry, T. P., Lizotte, A. J., Krohn, M. D., Farnworth, M., and Jang, S. J., 1994. “Delinquent Peers, Beliefs, and Delinquent Behavior: A Longitudinal Test of Interactional Theory.”. Criminology, 32: 47–84.
-
(1994)
Criminology
, vol.32
, pp. 47-84
-
-
Thornberry, T.P.1
Lizotte, A.J.2
Krohn, M.D.3
Farnworth, M.4
Jang, S.J.5
-
66
-
-
13444293285
-
Hackers’ Accounts: Hacking as a Social Entertainment
-
Turgeman-Goldschmidt, O., 2005. “Hackers’ Accounts: Hacking as a Social Entertainment.”. Social Science Computer Review, 23: 8–23.
-
(2005)
Social Science Computer Review
, vol.23
, pp. 8-23
-
-
Turgeman-Goldschmidt, O.1
-
68
-
-
0037927949
-
Attitudes Towards Computer Hacking In Russia
-
Thomas D., Loader B.D., (eds), London: Routledge, and,. Edited by
-
Voiskounsky, A. E., Babaeva, J. D., and Smyslova, O. V., 2000. “Attitudes Towards Computer Hacking In Russia.”. In Cybercrime: Law Enforcement, Security and Surveillance in the Information Age., Edited by: Thomas, D., and Loader, B. D., London: Routledge.
-
(2000)
Cybercrime: Law Enforcement, Security and Surveillance in the Information Age.
-
-
Voiskounsky, A.E.1
Babaeva, J.D.2
Smyslova, O.V.3
-
69
-
-
21144484341
-
Age, Peers, and Delinquency
-
Warr, M., 1993. “Age, Peers, and Delinquency.”. Criminology, 31: 17–40.
-
(1993)
Criminology
, vol.31
, pp. 17-40
-
-
Warr, M.1
-
71
-
-
84984380590
-
The Influence of Delinquent Peers: What They Think or What They Do?
-
Warr, M., and Stafford, M., 1991. “The Influence of Delinquent Peers: What They Think or What They Do?”. Criminology, 29: 851–866.
-
(1991)
Criminology
, vol.29
, pp. 851-866
-
-
Warr, M.1
Stafford, M.2
-
72
-
-
84965760422
-
Social Learning Theory, Self-Reported Delinquency, and Young Gangs: A New Twist on a General Theory of Crime and Delinquency
-
Winfree, L. T., Backstrom, T. V., and Mays, G. L., 1994. “Social Learning Theory, Self-Reported Delinquency, and Young Gangs: A New Twist on a General Theory of Crime and Delinquency.”. Youth and Society, 26: 147–177.
-
(1994)
Youth and Society
, vol.26
, pp. 147-177
-
-
Winfree, L.T.1
Backstrom, T.V.2
Mays, G.L.3
-
73
-
-
85045160218
-
Computer Hacking: Just another Case of Juvenile Delinquency?
-
Yar, M., 2005. “Computer Hacking: Just another Case of Juvenile Delinquency?”. The Howard Journal of Criminal Justice, 44: 387–399.
-
(2005)
The Howard Journal of Criminal Justice
, vol.44
, pp. 387-399
-
-
Yar, M.1
|