-
2
-
-
30344460323
-
Digital Piracy: Factors that Influence Attitude Toward Behavior
-
Al-Rafee, Sulaiman and Timothy P. Cronan. 2006. "Digital Piracy: Factors that Influence Attitude Toward Behavior." Journal of Business Ethics 63:237-259.
-
(2006)
Journal of Business Ethics
, vol.63
, pp. 237-259
-
-
Al-Rafee, S.1
Cronan, T.P.2
-
3
-
-
77956054664
-
Lesson Spurned? Reactions of Online Music Pirates to Legal Prosecutions by the RIAA
-
Bachman, Michael. 2007. "Lesson Spurned? Reactions of Online Music Pirates to Legal Prosecutions by the RIAA." International Journal of Cyber Criminology 1:213-227.
-
(2007)
International Journal of Cyber Criminology
, vol.1
, pp. 213-227
-
-
Bachman, M.1
-
4
-
-
0042225181
-
-
In Religion and the Social Order: Religion on the Internet, edited by J. K. Hadden and D. E. Cowan
-
Bainbridge, William S. 2000. "Religious Ethnography on the World Wide Web." Pp. 55-80. In Religion and the Social Order: Religion on the Internet, edited by J. K. Hadden and D. E. Cowan.
-
(2000)
Religious Ethnography On the World Wide Web
, pp. 55-80
-
-
Bainbridge, W.S.1
-
5
-
-
17444428885
-
The Antecedents of Music Piracy: Attitudes and Intentions
-
Chiou, Jyh-Shen, Chien-yi Huang, and Hsin-hui Lee. 2005. "The Antecedents of Music Piracy: Attitudes and Intentions." Journal of Business Ethics 57:161-174.
-
(2005)
Journal of Business Ethics
, vol.57
, pp. 161-174
-
-
Chiou, J.1
Huang, C.2
Lee, H.3
-
7
-
-
23044524781
-
The Social Organization of Audio Piracy on the Internet
-
Cooper, Jon and Daniel M. Harrison. 2001. "The Social Organization of Audio Piracy on the Internet." Media, Culture, and Society 23:71-89.
-
(2001)
Media, Culture, and Society
, vol.23
, pp. 71-89
-
-
Cooper, J.1
Harrison, D.M.2
-
8
-
-
43149118762
-
We Weren't Like No Regular Dope Fiends: Negotiating Hustler and Crackhead Identities
-
Copes, Heith, Andy Hochstetler, and Patrick Williams. 2008. "We Weren't Like No Regular Dope Fiends: Negotiating Hustler and Crackhead Identities." Social Problems 55:254-270.
-
(2008)
Social Problems
, vol.55
, pp. 254-270
-
-
Copes, H.1
Hochstetler, A.2
Williams, P.3
-
10
-
-
84925795794
-
Investigating Cyber-society: A Consideration of the Ethical and Practical Issues Surrounding Online Research in Chat Rooms
-
edited by Y. Jewkes. Portland, OR: Willan Publishing
-
DiMarco, Andrew D. and Heather DiMarco. 2003. "Investigating Cyber-society: A Consideration of the Ethical and Practical Issues Surrounding Online Research in Chat Rooms." Pp. 164-79. In Dot.cons: Crime, Deviance, and Identity on the Internet, edited by Y. Jewkes. Portland, OR: Willan Publishing.
-
(2003)
Dot.cons: Crime, Deviance, and Identity On the Internet
, pp. 164-179
-
-
Dimarco, A.D.1
Dimarco, H.2
-
11
-
-
84877002332
-
Rethinking Subculture: An Interactionist Analysis
-
Fine, Gary and Sherryl Kleinman. 1979. "Rethinking Subculture: An Interactionist Analysis." American Journal of Sociology 85:1-20.
-
(1979)
American Journal of Sociology
, vol.85
, pp. 1-20
-
-
Fine, G.1
Kleinman, S.2
-
13
-
-
84934000488
-
Criminality Theories and Behavioral Images
-
Glaser, David. 1956. "Criminality Theories and Behavioral Images." American Journal of Sociology 61:433-444.
-
(1956)
American Journal of Sociology
, vol.61
, pp. 433-444
-
-
Glaser, D.1
-
14
-
-
10944267724
-
Adolescent Internet Use: What We Expect, What Teens Report
-
Gross, Elisheva F. 2004. "Adolescent Internet Use: What We Expect, What Teens Report." Journal of Applied Developmental Psychology 25:633-649.
-
(2004)
Journal of Applied Developmental Psychology
, vol.25
, pp. 633-649
-
-
Gross, E.F.1
-
15
-
-
11144230997
-
Can Low Self-Control Help with the Understanding of the Software Piracy Problem?"
-
Higgins, George E. 2005. "Can Low Self-Control Help with the Understanding of the Software Piracy Problem?" Deviant Behavior 26:1-24.
-
(2005)
Deviant Behavior
, vol.26
, pp. 1-24
-
-
Higgins, G.E.1
-
16
-
-
85044912937
-
Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling
-
Higgins, George E., Brian D. Fell, and Abby L. Wilson. 2006. "Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling." Criminal Justice Studies 19:3-22.
-
(2006)
Criminal Justice Studies
, vol.19
, pp. 3-22
-
-
Higgins, G.E.1
Fell, B.D.2
Wilson, A.L.3
-
17
-
-
12344305644
-
Self-Control, Deviant Peers, and Software Piracy
-
Higgins, George E. and David A. Makin. 2004. "Self-Control, Deviant Peers, and Software Piracy." Psychological Reports 95:921-931.
-
(2004)
Psychological Reports
, vol.95
, pp. 921-931
-
-
Higgins, G.E.1
Makin, D.A.2
-
18
-
-
46349084062
-
Digital Piracy: An Examination of Three Measurements of Self-Control
-
Higgins, George E., Scott E. Wolfe, and Catherine D. Marcum. 2008. "Digital Piracy: An Examination of Three Measurements of Self-Control." Deviant Behavior 29:440-460.
-
(2008)
Deviant Behavior
, vol.29
, pp. 440-460
-
-
Higgins, G.E.1
Wolfe, S.E.2
Marcum, C.D.3
-
20
-
-
12744275983
-
Trends and Patterns among Software Pirates
-
Hinduja, Sameer. 2003. "Trends and Patterns among Software Pirates." Ethics and Information Technology 5:49-61.
-
(2003)
Ethics and Information Technology
, vol.5
, pp. 49-61
-
-
Hinduja, S.1
-
21
-
-
36949037524
-
Neutralization Theory and Online Software Piracy: An Empirical Analysis
-
Hinduja, Sameer. 2007. "Neutralization Theory and Online Software Piracy: An Empirical Analysis." Ethics and Information Technology 9:187-204.
-
(2007)
Ethics and Information Technology
, vol.9
, pp. 187-204
-
-
Hinduja, S.1
-
22
-
-
33847270657
-
Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures
-
Holt, Thomas J. 2007. "Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures." Deviant Behavior 28:171-198.
-
(2007)
Deviant Behavior
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
23
-
-
77958509140
-
Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-line Data
-
In Press
-
Holt, Thomas J. In Press. "Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-line Data." Journal of Criminal Justice Education.
-
Journal of Criminal Justice Education
-
-
Holt, T.J.1
-
24
-
-
45949086382
-
Neutralizing Music Piracy: An Empirical Examination
-
Ingram, Jason and Sameer Hinduja. 2008. "Neutralizing Music Piracy: An Empirical Examination." Deviant Behavior 29:334-366.
-
(2008)
Deviant Behavior
, vol.29
, pp. 334-366
-
-
Ingram, J.1
Hinduja, S.2
-
27
-
-
0032376197
-
Netcrime: More Changes in the Organisation of Thieving
-
Mann, David and Mike Sutton. 1998. "Netcrime: More Changes in the Organisation of Thieving." British Journal of Criminology 38:201-229.
-
(1998)
British Journal of Criminology
, vol.38
, pp. 201-229
-
-
Mann, D.1
Sutton, M.2
-
28
-
-
33645465637
-
What Have We Learned from Fifty Years of Neutralization Research?"
-
Maruna, Shadd and Heith Copes. 2005. "What Have We Learned from Fifty Years of Neutralization Research?" Crime and Justice: A Review of Research 32:221-320.
-
(2005)
Crime and Justice: A Review of Research
, vol.32
, pp. 221-320
-
-
Maruna, S.1
Copes, H.2
-
29
-
-
0030557714
-
The Attitudes and Actions of Others: Tutelage and Sutherland's Theory of Differential Association
-
McCarthy, Bill. 1996. "The Attitudes and Actions of Others: Tutelage and Sutherland's Theory of Differential Association." British Journal of Criminology 36:135-147.
-
(1996)
British Journal of Criminology
, vol.36
, pp. 135-147
-
-
McCarthy, B.1
-
30
-
-
54349123858
-
Putting Social Context Into Text: The Semiotics of E-Mail Interaction
-
Menchik, Daniel and Xiaoli Tian. 2008. "Putting Social Context Into Text: The Semiotics of E-Mail Interaction." American Journal of Sociology 114:332-370.
-
(2008)
American Journal of Sociology
, vol.114
, pp. 332-370
-
-
Menchik, D.1
Tian, X.2
-
31
-
-
65649098362
-
Neutralizing Potential and Self-Reported Digital Piracy: A Multitheoretical Exploration among College Undergraduates
-
Morris, Robert G. and George E. Higgins. 2009. "Neutralizing Potential and Self-Reported Digital Piracy: A Multitheoretical Exploration among College Undergraduates." Criminal Justice Review 34:173-195.
-
(2009)
Criminal Justice Review
, vol.34
, pp. 173-195
-
-
Morris, R.G.1
Higgins, G.E.2
-
33
-
-
18444388003
-
Describing Sexual Behavior in the Era of the Internet: A Typology for Empirical Research
-
Quinn, James F. and Craig J. Forsyth. 2005. "Describing Sexual Behavior in the Era of the Internet: A Typology for Empirical Research." Deviant Behavior 26:191-207.
-
(2005)
Deviant Behavior
, vol.26
, pp. 191-207
-
-
Quinn, J.F.1
Forsyth, C.J.2
-
34
-
-
84984350422
-
The Stooper: A Professional Thief in the Sutherland Manner
-
Rosecrance, John. 1986. "The Stooper: A Professional Thief in the Sutherland Manner." Criminology 24:29-40.
-
(1986)
Criminology
, vol.24
, pp. 29-40
-
-
Rosecrance, J.1
-
36
-
-
0030668250
-
A Social Learning Theory Analysis of Computer Crime among College Students
-
Skinner, William F. and Anne M. Fream. 1997. "A Social Learning Theory Analysis of Computer Crime among College Students." Journal of Research in Crime and Delinquency 34:495-518.
-
(1997)
Journal of Research In Crime and Delinquency
, vol.34
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
37
-
-
77956026505
-
Confessions of a Dying Thief: Understanding Criminal Careers and Illegal Enterprise
-
NJ: Aldine Transaction
-
Steffensmeier, Darrell J. and Jeffery T. Ulmer. 2005. Confessions of a Dying Thief: Understanding Criminal Careers and Illegal Enterprise. New Brunswick, NJ: Aldine Transaction.
-
(2005)
New Brunswick
-
-
Steffensmeier, D.J.1
Ulmer, J.T.2
-
40
-
-
0001155759
-
Techniques of Neutralization: A Theory of Delinquency
-
Sykes, Gresham and David Matza. 1957. "Techniques of Neutralization: A Theory of Delinquency." American Sociological Review 22:664-670.
-
(1957)
American Sociological Review
, vol.22
, pp. 664-670
-
-
Sykes, G.1
Matza, D.2
-
41
-
-
33646414637
-
The Art of Computer Virus Research and Defense
-
NJ: Addison Wesley
-
Szor, Peter. 2005. The Art of Computer Virus Research and Defense. Upper Saddle River, NJ: Addison Wesley.
-
(2005)
Upper Saddle River
-
-
Szor, P.1
-
42
-
-
33846043733
-
Digital Crime and Digital Terrorism
-
NJ: Pearson Prentice Hall
-
Taylor, Robert W., Tory J. Caeti, D. Kall Loper, Eric J. Fritsch, and John Liederbach. 2006. Digital Crime and Digital Terrorism. Upper Saddle River, NJ: Pearson Prentice Hall.
-
(2006)
Upper Saddle River
-
-
Taylor, R.W.1
Caeti, T.J.2
Kall, L.D.3
Fritsch, E.J.4
Liederbach, J.5
-
44
-
-
18144381963
-
How Edge are You? Constructing Authentic Identities and Subcultural Boundaries in a Straightedge Internet Forum
-
Williams, Patrick and Heith Copes. 2005. "How Edge are You? Constructing Authentic Identities and Subcultural Boundaries in a Straightedge Internet Forum." Symbolic Interaction 28:67-89.
-
(2005)
Symbolic Interaction
, vol.28
, pp. 67-89
-
-
Williams, P.1
Copes, H.2
-
45
-
-
47249099793
-
Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses
-
Wolfe, Scott, George Higgins, and Catherine Marcum. 2008. "Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses." Social Science Computer Review 26:1-17.
-
(2008)
Social Science Computer Review
, vol.26
, pp. 1-17
-
-
Wolfe, S.1
Higgins, G.2
Marcum, C.3
|