-
2
-
-
34548446393
-
The demedicalization of self-injury: From psychopathology to sociological deviance
-
Adler, P. A., and P. Adler. 2007. The demedicalization of self-injury: From psychopathology to sociological deviance. Journal of Contemporary Ethnography 36: 537-570.
-
(2007)
Journal of Contemporary Ethnography
, vol.36
, pp. 537-570
-
-
Adler, P.A.1
Adler, P.2
-
6
-
-
56349130913
-
The quantitative/qualitative divide revisited: A study of published research, doctoral program curricula, and journal editor perceptions
-
Buckler, K. 2008. The quantitative/qualitative divide revisited: A study of published research, doctoral program curricula, and journal editor perceptions. Journal of Criminal Justice Education 19: 383-403.
-
(2008)
Journal of Criminal Justice Education
, vol.19
, pp. 383-403
-
-
Buckler, K.1
-
7
-
-
0002321809
-
Reading race online: Discovering racial identity in Usenet discussions
-
In M. A. Smith and P. Kollack (Eds.), New York: Routledge
-
Burkhalter, B. 1999. Reading race online: Discovering racial identity in Usenet discussions. In M. A. Smith and P. Kollack (Eds.), Communities in cyberspace (pp. 60-74). New York: Routledge.
-
(1999)
Communities in cyberspace
, pp. 60-74
-
-
Burkhalter, B.1
-
9
-
-
84859365388
-
-
Technical Report for National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018. Retrieved April 20, 2010, from
-
Chu, B., T. J. Holt, and G. J. Ahn. 2010. Examining the creation, distribution, and function of malware on-line. Technical Report for National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018. Retrieved April 20, 2010, from http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf
-
(2010)
Examining the creation, distribution, and function of malware on-line
-
-
Chu, B.1
Holt, T.J.2
Ahn, G.J.3
-
10
-
-
23044524781
-
The social organization of audio piracy on the Internet
-
Cooper, J., and D. M. Harrison. 2001. The social organization of audio piracy on the Internet. Media, Culture, and Society 23: 71-89.
-
(2001)
Media, Culture, and Society
, vol.23
, pp. 71-89
-
-
Cooper, J.1
Harrison, D.M.2
-
11
-
-
33947356707
-
Techniques of affirmation: Deviant behavior, moral commitment, and resistant subcultural identity
-
Copes, H., and P. Williams. 2007. Techniques of affirmation: Deviant behavior, moral commitment, and resistant subcultural identity. Deviant Behavior 28: 247-272.
-
(2007)
Deviant Behavior
, vol.28
, pp. 247-272
-
-
Copes, H.1
Williams, P.2
-
13
-
-
79959924444
-
Sex for sale: Online commerce in the world's oldest profession
-
In T. J. Holt (Ed.), Raleigh, NC: Carolina Academic Press
-
Cunningham, S., and T. Kendall. 2010. Sex for sale: Online commerce in the world's oldest profession. In T. J. Holt (Ed.), Crime on-line: Correlates, causes, and context (pp. 40-75). Raleigh, NC: Carolina Academic Press.
-
(2010)
Crime on-line: Correlates, causes, and context
, pp. 40-75
-
-
Cunningham, S.1
Kendall, T.2
-
14
-
-
77958471452
-
The dark side of the web: Terrorists' use of the Internet
-
In F. Schmalleger and M. Pittaro (Eds.), Upper Saddle River, NJ: Pearson Prentice Hall
-
Damphouse, K. 2009. The dark side of the web: Terrorists' use of the Internet. In F. Schmalleger and M. Pittaro (Eds.), Crimes of the Internet (pp. 573-592). Upper Saddle River, NJ: Pearson Prentice Hall.
-
(2009)
Crimes of the Internet
, pp. 573-592
-
-
Damphouse, K.1
-
17
-
-
84925795794
-
Investigating cybersociety: A consideration of the ethical and practical issues surrounding online research in chat rooms
-
In Y. Jewkes (Ed.), Portland, OR: Willan
-
DiMarco, A. D., and H. DiMarco. 2003. Investigating cybersociety: A consideration of the ethical and practical issues surrounding online research in chat rooms. In Y. Jewkes (Ed.), Dot.cons: Crime, deviance and identity on the Internet (pp. 164-179). Portland, OR: Willan.
-
(2003)
Dot.cons: Crime, deviance and identity on the Internet
, pp. 164-179
-
-
DiMarco, A.D.1
DiMarco, H.2
-
18
-
-
34249065822
-
Show me the money: Cybershrews and on-line money masochists
-
Durkin, K. F. 2007. Show me the money: Cybershrews and on-line money masochists. Deviant Behavior 28: 355-378.
-
(2007)
Deviant Behavior
, vol.28
, pp. 355-378
-
-
Durkin, K.F.1
-
19
-
-
0033468743
-
Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles
-
Durkin, K. F., and C. D. Bryant. 1999. Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles. Deviant Behavior 20: 103-127.
-
(1999)
Deviant Behavior
, vol.20
, pp. 103-127
-
-
Durkin, K.F.1
Bryant, C.D.2
-
21
-
-
0038103908
-
The 419 scam: Information warfare on the spam front and a proposal for local filtering
-
Edelson, E. 2003. The 419 scam: Information warfare on the spam front and a proposal for local filtering. Computers and Security 22: 392-401.
-
(2003)
Computers and Security
, vol.22
, pp. 392-401
-
-
Edelson, E.1
-
22
-
-
0035841472
-
Ethical issues in qualitative research on Internet communities
-
Eysenbach, G., and J. E. Till. 2001. Ethical issues in qualitative research on Internet communities. British Medical Journal 323: 1103-1105.
-
(2001)
British Medical Journal
, vol.323
, pp. 1103-1105
-
-
Eysenbach, G.1
Till, J.E.2
-
23
-
-
77952415099
-
-
October-November, Paper presented at the 14th ACM conference on Computer and Communications Security, Alexandria, VA
-
Franklin, J., V. Paxson, A. Perrig, and S. Savage. 2007, October-November. An inquiry into the nature and cause of the wealth of Internet miscreants. Paper presented at the 14th ACM conference on Computer and Communications Security, Alexandria, VA.
-
(2007)
An inquiry into the nature and cause of the wealth of Internet miscreants
-
-
Franklin, J.1
Paxson, A.2
Perrig, V.3
Savage, S.4
-
24
-
-
57849119256
-
Ethnographic approaches to the Internet and computer-mediated communication
-
Garcia, A. C., A. I. Standlee, J. Bechkoff, and Y. Cui. 2009. Ethnographic approaches to the Internet and computer-mediated communication. Journal of Contemporary Ethnography 38: 52-84.
-
(2009)
Journal of Contemporary Ethnography
, vol.38
, pp. 52-84
-
-
Garcia, A.C.1
Standlee, J.2
Bechkoff, A.I.3
Cui, Y.4
-
26
-
-
22744453983
-
Tranny boyz: Cyber community support in negotiating sex and gender mobility among female to male transsexuals
-
Gauthier, D. A. K., and N. K. Chaudoir. 2004. Tranny boyz: Cyber community support in negotiating sex and gender mobility among female to male transsexuals. Deviant Behavior 25: 375-398.
-
(2004)
Deviant Behavior
, vol.25
, pp. 375-398
-
-
Gauthier, D.A.K.1
Chaudoir, N.K.2
-
27
-
-
0033483076
-
Bareback sex, bug chasers, and the gift of death
-
Gauthier, D. K., and C. J. Forsyth. 1999. Bareback sex, bug chasers, and the gift of death. Deviant Behavior 20: 85-100.
-
(1999)
Deviant Behavior
, vol.20
, pp. 85-100
-
-
Gauthier, D.K.1
Forsyth, C.J.2
-
28
-
-
22744434146
-
Make me your death slave: Men who have sex with men and use the Internet to intentionally spread HIV
-
Grov, C. 2004. Make me your death slave: Men who have sex with men and use the Internet to intentionally spread HIV. Deviant Behavior 25: 329-349.
-
(2004)
Deviant Behavior
, vol.25
, pp. 329-349
-
-
Grov, C.1
-
30
-
-
27944501186
-
Effects of personal salutations in e-mail invitations to participate in a web survey
-
Heerwegh, D. 2005. Effects of personal salutations in e-mail invitations to participate in a web survey. Public Opinion Quarterly 69: 588-598.
-
(2005)
Public Opinion Quarterly
, vol.69
, pp. 588-598
-
-
Heerwegh, D.1
-
31
-
-
0009876365
-
Animal rights talk: Moral debate over the Internet
-
Herzog, H. A., B. Dinoff, and J. R. Page. 1997. Animal rights talk: Moral debate over the Internet. Qualitative Sociology 20: 399-418.
-
(1997)
Qualitative Sociology
, vol.20
, pp. 399-418
-
-
Herzog, H.A.1
Dinoff, B.2
Page, J.R.3
-
32
-
-
4043098912
-
Qualitative research on adolescent risk using email: A methodological assessment
-
Hessler, R., L. Downing, C. Beltz, A. Pelliccio, M. Powell, and W. Vale. 2003. Qualitative research on adolescent risk using email: A methodological assessment. Qualitative Sociology 26: 111-124.
-
(2003)
Qualitative Sociology
, vol.26
, pp. 111-124
-
-
Hessler, R.1
Downing, C.2
Beltz, A.3
Pelliccio, M.4
Powell, L.5
Vale, W.6
-
33
-
-
69649100929
-
Computer crime investigations in the United States: Leveraging knowledge from the past to address the future
-
Hinduja, S. 2007. Computer crime investigations in the United States: Leveraging knowledge from the past to address the future. International Journal of Cyber Criminology 1: 400-420.
-
(2007)
International Journal of Cyber Criminology
, vol.1
, pp. 400-420
-
-
Hinduja, S.1
-
35
-
-
33847270657
-
Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures
-
Holt, T. J. 2007a. Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior 28: 171-198.
-
(2007)
Deviant Behavior
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
36
-
-
77958512512
-
The market for malware
-
August, Paper presented at the, Las Vegas, NV
-
Holt, T. J. 2007b, August. The market for malware. Paper presented at the Defcon 15 conference, Las Vegas, NV.
-
(2007)
Defcon 15 conference
-
-
Holt, T.J.1
-
37
-
-
77957262153
-
Examining the role of technology in the formation of deviant subcultures
-
doi:10.1177/0894439309351344
-
Holt, T. J. 2009. Examining the role of technology in the formation of deviant subcultures. Social Science Computer Review. doi:10.1177/0894439309351344
-
(2009)
Social Science Computer Review
-
-
Holt, T.J.1
-
38
-
-
34249054920
-
Examining sex work from the client's perspective: Assessing johns using online data
-
Holt, T. J., and K. R. Blevins. 2007. Examining sex work from the client's perspective: Assessing johns using online data. Deviant Behavior 28: 333-354.
-
(2007)
Deviant Behavior
, vol.28
, pp. 333-354
-
-
Holt, T.J.1
Blevins, K.R.2
-
39
-
-
76249114938
-
Considering the pedophile subculture online
-
Holt, T. J., K. R. Blevins, and N. Burkert. 2010. Considering the pedophile subculture online. Sexual Abuse 22: 3-24.
-
(2010)
Sexual Abuse
, vol.22
, pp. 3-24
-
-
Holt, T.J.1
Blevins, K.R.2
Burkert, N.3
-
40
-
-
55649120692
-
Examining the displacement practices of johns with on-line data
-
Holt, T. J., K. R. Blevins, and J. B. Kuhns. 2008. Examining the displacement practices of johns with on-line data. Journal of Criminal Justice 36: 522-528.
-
(2008)
Journal of Criminal Justice
, vol.36
, pp. 522-528
-
-
Holt, T.J.1
Blevins, K.R.2
Kuhns, J.B.3
-
41
-
-
84894283055
-
Examining diffusion and arrest avoidance practices among johns
-
doi:10.1177/0011128709347087
-
Holt, T. J., K. R. Blevins, and J. B. Kuhns. 2009. Examining diffusion and arrest avoidance practices among johns. Crime and Delinquency. doi:10.1177/0011128709347087
-
(2009)
Crime and Delinquency
-
-
Holt, T.J.1
Blevins, K.R.2
Kuhns, J.B.3
-
42
-
-
77956038407
-
Transferring subcultural knowledge online: Practices and beliefs of persistent digital pirates
-
Holt, T. J., and H. Copes. 2010. Transferring subcultural knowledge online: Practices and beliefs of persistent digital pirates. Deviant Behavior 31: 625-654.
-
(2010)
Deviant Behavior
, vol.31
, pp. 625-654
-
-
Holt, T.J.1
Copes, H.2
-
44
-
-
77949555353
-
Exploring stolen data markets on-line: Products and market forces
-
Holt, T. J., and E. Lampke. 2010. Exploring stolen data markets on-line: Products and market forces. Criminal Justice Studies 23: 33-50.
-
(2010)
Criminal Justice Studies
, vol.23
, pp. 33-50
-
-
Holt, T.J.1
Lampke, E.2
-
45
-
-
77958467314
-
Characterizing malware writers and computer attackers in their own words
-
April, Paper presented at the, Peter Kiewit Institute, University of Nebraska at Omaha, NE
-
Holt, T. J., J. B. Soles, and L. Leslie. 2008, April. Characterizing malware writers and computer attackers in their own words. Paper presented at the 2008 International Conference on Information Warfare and Security, Peter Kiewit Institute, University of Nebraska at Omaha, NE.
-
(2008)
2008 International Conference on Information Warfare and Security
-
-
Holt, T.J.1
Soles, J.B.2
Leslie, L.3
-
46
-
-
77949543969
-
Profile: Automated credit card fraud
-
Honeynet Research Alliance, Retrieved July 20, 2008, from
-
Honeynet Research Alliance. 2003. Profile: Automated credit card fraud. Know Your Enemy Paper series. Retrieved July 20, 2008, from http://www.honeynet.org/papers/profiles/cc-fraud.pdf
-
(2003)
Know Your Enemy Paper series
-
-
-
47
-
-
38549120841
-
Entering the blogosphere: Some strategies for using blogs in social research
-
Hookway, N. 2008. Entering the blogosphere: Some strategies for using blogs in social research. Qualitative Research 8: 91-113.
-
(2008)
Qualitative Research
, vol.8
, pp. 91-113
-
-
Hookway, N.1
-
48
-
-
0007437527
-
Researching crack dealers: Dilemmas and contradictions
-
In J. Ferrell and M. S. Hamm (Eds.), Boston, MA: Northeastern University Press
-
Jacobs, B. A. 1998. Researching crack dealers: Dilemmas and contradictions. In J. Ferrell and M. S. Hamm (Eds.), Ethnography at the edge: Crime, deviance, and field research (pp. 160-177). Boston, MA: Northeastern University Press.
-
(1998)
Ethnography at the edge: Crime, deviance, and field research
, pp. 160-177
-
-
Jacobs, B.A.1
-
50
-
-
3042539428
-
You've got mail! You don't want it: Cyber-victimization and on-line dating
-
Jerin, R., and B. Dolinsky. 2001. You've got mail! You don't want it: Cyber-victimization and on-line dating. Journal of Criminal Justice and Popular Culture 9: 15-21.
-
(2001)
Journal of Criminal Justice and Popular Culture
, vol.9
, pp. 15-21
-
-
Jerin, R.1
Dolinsky, B.2
-
51
-
-
84925797895
-
Crime, deviance and the disembodied self: Transcending the dangers of corporeality
-
In Y. Jewkes (Ed.), Portland, OR: Willan
-
Jewkes, Y., and K. Sharpe. 2003. Crime, deviance and the disembodied self: Transcending the dangers of corporeality. In Y. Jewkes (Ed.), Dot.cons: Crime, deviance and identity on the Internet (pp. 1-14). Portland, OR: Willan.
-
(2003)
Dot.cons: Crime, deviance and identity on the Internet
, pp. 1-14
-
-
Jewkes, Y.1
Sharpe, K.2
-
53
-
-
77954682392
-
Participants and observers in online ethnography: Five stories about identity
-
In M. D. Johns, S.-L. S. Chen, and G. J. Hall (Eds.), New York: Peter Lang
-
Kendall, L. 2004. Participants and observers in online ethnography: Five stories about identity. In M. D. Johns, S.-L. S. Chen, and G. J. Hall (Eds.), Online social research: Methods, issues, and ethics (pp. 125-140). New York: Peter Lang.
-
(2004)
Online social research: Methods, issues, and ethics
, pp. 125-140
-
-
Kendall, L.1
-
54
-
-
77958477015
-
You can't cheat an honest man: Making ($$$ and) sense of the Nigerian e-mail scams
-
In F. Schmalleger and M. Pittaro (Eds.), Upper Saddle River, NJ: Pearson Prentice Hall
-
King, A., and J. Thomas. 2009. You can't cheat an honest man: Making ($$$ and) sense of the Nigerian e-mail scams. In F. Schmalleger and M. Pittaro (Eds.), Crimes of the Internet (pp. 206-224). Upper Saddle River, NJ: Pearson Prentice Hall.
-
(2009)
Crimes of the Internet
, pp. 206-224
-
-
King, A.1
Thomas, J.2
-
55
-
-
36348980446
-
Surf and turf wars online: Growing implications of Internet gang violence
-
King, J. E., C. E. Walpole, and K. Lamon. 2007. Surf and turf wars online: Growing implications of Internet gang violence. Journal of Adolescent Health 6: 66-68.
-
(2007)
Journal of Adolescent Health
, vol.6
, pp. 66-68
-
-
King, J.E.1
Walpole, C.E.2
Lamon, K.3
-
56
-
-
33745184506
-
Online interviewing and the research relationship
-
In C. Hine (Ed.), Oxford: Berg
-
Kivits, J. 2005. Online interviewing and the research relationship. In C. Hine (Ed.), Virtual methods: Issues in social research on the Internet (pp. 35-50). Oxford: Berg.
-
(2005)
Virtual methods: Issues in social research on the Internet
, pp. 35-50
-
-
Kivits, J.1
-
57
-
-
33645921665
-
What methods are most frequently used in research in criminology and criminal justice?
-
Kleck, G., J. Tark, and J. J. Bellows. 2006. What methods are most frequently used in research in criminology and criminal justice? Journal of Criminal Justice 34: 147-152.
-
(2006)
Journal of Criminal Justice
, vol.34
, pp. 147-152
-
-
Kleck, G.1
Tark, J.2
Bellows, J.J.3
-
59
-
-
70449492764
-
Laid to order: Male escorts advertising on the Internet
-
Lee-Gonyea, J. A., T. Castle, and N. E. Gonyea. 2009. Laid to order: Male escorts advertising on the Internet. Deviant Behavior 30: 321-348.
-
(2009)
Deviant Behavior
, vol.30
, pp. 321-348
-
-
Lee-Gonyea, J.A.1
Castle, T.2
Gonyea, N.E.3
-
63
-
-
26444454124
-
Supportive distortions: An analysis of posts on a pedophile Internet message board
-
Malesky Jr., L. A., and L. Ennis. 2004. Supportive distortions: An analysis of posts on a pedophile Internet message board. Journal of Addictions and Offender Counseling 24: 92-100.
-
(2004)
Journal of Addictions and Offender Counseling
, vol.24
, pp. 92-100
-
-
Malesky Jr., L.A.1
Ennis, L.2
-
64
-
-
10644268153
-
Internet interviewing
-
In J. A. Holstein and J. F. Gubrium (Eds.), London: Sage
-
Mann, C., and F. Stewart. 2002. Internet interviewing. In J. A. Holstein and J. F. Gubrium (Eds.), Handbook of Internet research: Context and method (pp. 603-628). London: Sage.
-
(2002)
Handbook of Internet research: Context and method
, pp. 603-628
-
-
Mann, C.1
Stewart, F.2
-
65
-
-
0032376197
-
Netcrime: More changes in the organisation of thieving
-
Mann, D., and M. Sutton. 1998. Netcrime: More changes in the organisation of thieving. British Journal of Criminology 38: 201-229.
-
(1998)
British Journal of Criminology
, vol.38
, pp. 201-229
-
-
Mann, D.1
Sutton, M.2
-
66
-
-
0032336129
-
An ethics for the new surveillance
-
Marx, G. 1998. An ethics for the new surveillance. Information Society 14: 171-185.
-
(1998)
Information Society
, vol.14
, pp. 171-185
-
-
Marx, G.1
-
70
-
-
20444494965
-
End user searching: A Web log analysis of NAVER, a Korean web search engine
-
Park, S., J. H. Lee, and H. J. Bae. 2005. End user searching: A Web log analysis of NAVER, a Korean web search engine. Library and Information Science Research 27: 203-221.
-
(2005)
Library and Information Science Research
, vol.27
, pp. 203-221
-
-
Park, S.1
Lee, J.H.2
Bae, H.J.3
-
72
-
-
37749048683
-
Deviant research: Deception, male Internet escorts, and response rates
-
Pruitt, M. V. 2008. Deviant research: Deception, male Internet escorts, and response rates. Deviant Behavior 29: 70-82.
-
(2008)
Deviant Behavior
, vol.29
, pp. 70-82
-
-
Pruitt, M.V.1
-
73
-
-
18444388003
-
Describing sexual behavior in the era of the Internet: A typology for empirical research
-
Quinn, J. F., and C. J. Forsyth. 2005. Describing sexual behavior in the era of the Internet: A typology for empirical research. Deviant Behavior 26: 191-207.
-
(2005)
Deviant Behavior
, vol.26
, pp. 191-207
-
-
Quinn, J.F.1
Forsyth, C.J.2
-
74
-
-
84993012484
-
Informed consent in the study of online communities: A reflection on the effects of computer-mediated social research
-
Reid, E. M. 1996. Informed consent in the study of online communities: A reflection on the effects of computer-mediated social research. Information Society 12: 169-174.
-
(1996)
Information Society
, vol.12
, pp. 169-174
-
-
Reid, E.M.1
-
75
-
-
0036940588
-
The sociocognitive psychology of computer-mediated communication: The present and future of technology-based interactions
-
Riva, G. 2002. The sociocognitive psychology of computer-mediated communication: The present and future of technology-based interactions. CyberPsychology and Behavior 5: 581-598.
-
(2002)
CyberPsychology and Behavior
, vol.5
, pp. 581-598
-
-
Riva, G.1
-
77
-
-
0007249843
-
E-mail as a research tool
-
21. Retrieved November 14, 2005, from
-
Selwyn, N., and K. Robson. 1998. E-mail as a research tool. Social Research Update 21. Retrieved November 14, 2005, from http://www.soc.surrey.ac.uk/sru/SRU21.html
-
(1998)
Social Research Update
-
-
Selwyn, N.1
Robson, K.2
-
78
-
-
17444421751
-
Cyberpunters and cyberwhores: Prostitution on the Internet
-
In Y. Jewkes (Ed.), Portland, OR: Willan
-
Sharpe, K., and S. Earle. 2003. Cyberpunters and cyberwhores: Prostitution on the Internet. In Y. Jewkes (Ed.), Dot.cons: Crime, deviance and identity on the Internet (pp. 36-52). Portland, OR: Willan.
-
(2003)
Dot.cons: Crime, deviance and identity on the Internet
, pp. 36-52
-
-
Sharpe, K.1
Earle, S.2
-
80
-
-
17444386358
-
The geographical mobility, preferences and pleasures of prolific punters: A demonstration study of the activities of prostitutes' clients
-
Retrieved from
-
Soothill, K., and T. Sanders. 2005. The geographical mobility, preferences and pleasures of prolific punters: A demonstration study of the activities of prostitutes' clients. Sociological Research On-Line 10 (1). Retrieved from http://www.socresonline.org.uk/10/1/soothill/soothill.pdf
-
(2005)
Sociological Research On-Line
, vol.10
, Issue.1
-
-
Soothill, K.1
Sanders, T.2
-
82
-
-
33644611681
-
Ethics in Internet ethnography
-
In E. A. Buchanan (Ed.), Hershey, PA: Information Science
-
Sveningsson, M. 2004. Ethics in Internet ethnography. In E. A. Buchanan (Ed.), Virtual research ethics: Issues and controversies (pp. 45-61). Hershey, PA: Information Science.
-
(2004)
Virtual research ethics: Issues and controversies
, pp. 45-61
-
-
Sveningsson, M.1
-
84
-
-
33846043733
-
-
(2nd ed.). Upper Saddle River, NJ: Pearson Prentice Hall
-
Taylor, R. W., E. J. Fritsch, J. Liederbach, and T. J. Holt. 2010. Digital crime and digital terrorism (2nd ed.). Upper Saddle River, NJ: Pearson Prentice Hall.
-
(2010)
Digital crime and digital terrorism
-
-
Taylor, R.W.1
Fritsch, J.2
Liederbach, E.J.3
Holt, T.J.4
-
85
-
-
0042261041
-
Bareback sex and the quest for HIV: Assessing the relationship in Internet personal advertisements of men who have sex with men
-
Tewksbury, R. 2003. Bareback sex and the quest for HIV: Assessing the relationship in Internet personal advertisements of men who have sex with men. Deviant Behavior 24: 467-482.
-
(2003)
Deviant Behavior
, vol.24
, pp. 467-482
-
-
Tewksbury, R.1
-
86
-
-
33744980670
-
Click here for HIV: An analysis of Internet-based bug chasers and bug givers
-
Tewksbury, R. 2006. Click here for HIV: An analysis of Internet-based bug chasers and bug givers. Deviant Behavior 27: 379-395.
-
(2006)
Deviant Behavior
, vol.27
, pp. 379-395
-
-
Tewksbury, R.1
-
87
-
-
77958450500
-
The prominence of qualitative research in criminology and criminal justice scholarship
-
Tewksbury, R., D. Dabney, and H. Copes. 2010. The prominence of qualitative research in criminology and criminal justice scholarship. Journal of Criminal Justice Education 21: 391-411.
-
(2010)
Journal of Criminal Justice Education
, vol.21
, pp. 391-411
-
-
Tewksbury, R.1
Dabney, D.2
Copes, H.3
-
88
-
-
33750552227
-
Methodological orientations of articles appearing in criminal justice's top journals: Who publishes what and where
-
Tewksbury, R., M. T. DeMichele, and J. M. Miller. 2005. Methodological orientations of articles appearing in criminal justice's top journals: Who publishes what and where. Journal of Criminal Justice Education 16: 265-279.
-
(2005)
Journal of Criminal Justice Education
, vol.16
, pp. 265-279
-
-
Tewksbury, R.1
DeMichele, M.T.2
Miller, J.M.3
-
89
-
-
70350423437
-
The underground economy: Priceless
-
Thomas, R., and J. Martin. 2006. The underground economy: Priceless. login 31: 7-16.
-
(2006)
Login
, vol.31
, pp. 7-16
-
-
Thomas, R.1
Martin, J.2
-
91
-
-
0004682473
-
It's difficult to hide it: The presentation of self on Internet home pages
-
Walker, K. 2000. It's difficult to hide it: The presentation of self on Internet home pages. Qualitative Sociology 23: 99-120.
-
(2000)
Qualitative Sociology
, vol.23
, pp. 99-120
-
-
Walker, K.1
-
92
-
-
85140528371
-
Cybercrimes and the Internet
-
In D. S. Wall (Ed.), New York: Routledge
-
Wall, D. S. 2001. Cybercrimes and the Internet. In D. S. Wall (Ed.), Crime and the Internet (pp. 1-17). New York: Routledge.
-
(2001)
Crime and the Internet
, pp. 1-17
-
-
Wall, D.S.1
-
93
-
-
24144442711
-
Digital realism and the governance of spam as cybercrime
-
Wall, D. S. 2004. Digital realism and the governance of spam as cybercrime. European Journal on Criminal Policy and Research 10: 309-335.
-
(2004)
European Journal on Criminal Policy and Research
, vol.10
, pp. 309-335
-
-
Wall, D.S.1
-
94
-
-
18144381963
-
How edge are you? Constructing authentic identities and subcultural boundaries in a Straightedge Internet forum
-
Williams, P., and H. Copes. 2005. How edge are you? Constructing authentic identities and subcultural boundaries in a Straightedge Internet forum. Symbolic Interaction 28: 67-89.
-
(2005)
Symbolic Interaction
, vol.28
, pp. 67-89
-
-
Williams, P.1
Copes, H.2
-
95
-
-
14544293551
-
Rave and Straightedge, the virtual and the real: Exploring online and offline experiences in Canadian youth subcultures
-
Wilson, B., and M. Atkinson. 2005. Rave and Straightedge, the virtual and the real: Exploring online and offline experiences in Canadian youth subcultures. Youth and Society 36: 276-311.
-
(2005)
Youth and Society
, vol.36
, pp. 276-311
-
-
Wilson, B.1
Atkinson, M.2
-
96
-
-
0026547773
-
A snowball's chance in hell: Doing field research with residential burglars
-
Wright, R. T., S. H. Decker, A. K. Redfern, and D. L. Smith. 1992. A snowball's chance in hell: Doing field research with residential burglars. Journal of Research in Crime and Delinquency 29: 148-161.
-
(1992)
Journal of Research in Crime and Delinquency
, vol.29
, pp. 148-161
-
-
Wright, R.T.1
Decker, A.K.2
Redfern, S.H.3
Smith, D.L.4
-
97
-
-
77958515493
-
Seeing ourselves: Exploring the social production of criminological knowledge in a qualitative methods course
-
Wright, R. T., and M. Stein. 1996. Seeing ourselves: Exploring the social production of criminological knowledge in a qualitative methods course. Journal of Criminal Justice Education 7: 65-77.
-
(1996)
Journal of Criminal Justice Education
, vol.7
, pp. 65-77
-
-
Wright, R.T.1
Stein, M.2
|