메뉴 건너뛰기




Volumn 21, Issue 4, 2010, Pages 466-487

Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77958509140     PISSN: 10511253     EISSN: 17459117     Source Type: Journal    
DOI: 10.1080/10511253.2010.516565     Document Type: Article
Times cited : (53)

References (97)
  • 2
    • 34548446393 scopus 로고    scopus 로고
    • The demedicalization of self-injury: From psychopathology to sociological deviance
    • Adler, P. A., and P. Adler. 2007. The demedicalization of self-injury: From psychopathology to sociological deviance. Journal of Contemporary Ethnography 36: 537-570.
    • (2007) Journal of Contemporary Ethnography , vol.36 , pp. 537-570
    • Adler, P.A.1    Adler, P.2
  • 6
    • 56349130913 scopus 로고    scopus 로고
    • The quantitative/qualitative divide revisited: A study of published research, doctoral program curricula, and journal editor perceptions
    • Buckler, K. 2008. The quantitative/qualitative divide revisited: A study of published research, doctoral program curricula, and journal editor perceptions. Journal of Criminal Justice Education 19: 383-403.
    • (2008) Journal of Criminal Justice Education , vol.19 , pp. 383-403
    • Buckler, K.1
  • 7
    • 0002321809 scopus 로고    scopus 로고
    • Reading race online: Discovering racial identity in Usenet discussions
    • In M. A. Smith and P. Kollack (Eds.), New York: Routledge
    • Burkhalter, B. 1999. Reading race online: Discovering racial identity in Usenet discussions. In M. A. Smith and P. Kollack (Eds.), Communities in cyberspace (pp. 60-74). New York: Routledge.
    • (1999) Communities in cyberspace , pp. 60-74
    • Burkhalter, B.1
  • 9
    • 84859365388 scopus 로고    scopus 로고
    • Technical Report for National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018. Retrieved April 20, 2010, from
    • Chu, B., T. J. Holt, and G. J. Ahn. 2010. Examining the creation, distribution, and function of malware on-line. Technical Report for National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018. Retrieved April 20, 2010, from http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf
    • (2010) Examining the creation, distribution, and function of malware on-line
    • Chu, B.1    Holt, T.J.2    Ahn, G.J.3
  • 10
    • 23044524781 scopus 로고    scopus 로고
    • The social organization of audio piracy on the Internet
    • Cooper, J., and D. M. Harrison. 2001. The social organization of audio piracy on the Internet. Media, Culture, and Society 23: 71-89.
    • (2001) Media, Culture, and Society , vol.23 , pp. 71-89
    • Cooper, J.1    Harrison, D.M.2
  • 11
    • 33947356707 scopus 로고    scopus 로고
    • Techniques of affirmation: Deviant behavior, moral commitment, and resistant subcultural identity
    • Copes, H., and P. Williams. 2007. Techniques of affirmation: Deviant behavior, moral commitment, and resistant subcultural identity. Deviant Behavior 28: 247-272.
    • (2007) Deviant Behavior , vol.28 , pp. 247-272
    • Copes, H.1    Williams, P.2
  • 13
    • 79959924444 scopus 로고    scopus 로고
    • Sex for sale: Online commerce in the world's oldest profession
    • In T. J. Holt (Ed.), Raleigh, NC: Carolina Academic Press
    • Cunningham, S., and T. Kendall. 2010. Sex for sale: Online commerce in the world's oldest profession. In T. J. Holt (Ed.), Crime on-line: Correlates, causes, and context (pp. 40-75). Raleigh, NC: Carolina Academic Press.
    • (2010) Crime on-line: Correlates, causes, and context , pp. 40-75
    • Cunningham, S.1    Kendall, T.2
  • 14
    • 77958471452 scopus 로고    scopus 로고
    • The dark side of the web: Terrorists' use of the Internet
    • In F. Schmalleger and M. Pittaro (Eds.), Upper Saddle River, NJ: Pearson Prentice Hall
    • Damphouse, K. 2009. The dark side of the web: Terrorists' use of the Internet. In F. Schmalleger and M. Pittaro (Eds.), Crimes of the Internet (pp. 573-592). Upper Saddle River, NJ: Pearson Prentice Hall.
    • (2009) Crimes of the Internet , pp. 573-592
    • Damphouse, K.1
  • 17
    • 84925795794 scopus 로고    scopus 로고
    • Investigating cybersociety: A consideration of the ethical and practical issues surrounding online research in chat rooms
    • In Y. Jewkes (Ed.), Portland, OR: Willan
    • DiMarco, A. D., and H. DiMarco. 2003. Investigating cybersociety: A consideration of the ethical and practical issues surrounding online research in chat rooms. In Y. Jewkes (Ed.), Dot.cons: Crime, deviance and identity on the Internet (pp. 164-179). Portland, OR: Willan.
    • (2003) Dot.cons: Crime, deviance and identity on the Internet , pp. 164-179
    • DiMarco, A.D.1    DiMarco, H.2
  • 18
    • 34249065822 scopus 로고    scopus 로고
    • Show me the money: Cybershrews and on-line money masochists
    • Durkin, K. F. 2007. Show me the money: Cybershrews and on-line money masochists. Deviant Behavior 28: 355-378.
    • (2007) Deviant Behavior , vol.28 , pp. 355-378
    • Durkin, K.F.1
  • 19
    • 0033468743 scopus 로고    scopus 로고
    • Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles
    • Durkin, K. F., and C. D. Bryant. 1999. Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles. Deviant Behavior 20: 103-127.
    • (1999) Deviant Behavior , vol.20 , pp. 103-127
    • Durkin, K.F.1    Bryant, C.D.2
  • 21
    • 0038103908 scopus 로고    scopus 로고
    • The 419 scam: Information warfare on the spam front and a proposal for local filtering
    • Edelson, E. 2003. The 419 scam: Information warfare on the spam front and a proposal for local filtering. Computers and Security 22: 392-401.
    • (2003) Computers and Security , vol.22 , pp. 392-401
    • Edelson, E.1
  • 22
    • 0035841472 scopus 로고    scopus 로고
    • Ethical issues in qualitative research on Internet communities
    • Eysenbach, G., and J. E. Till. 2001. Ethical issues in qualitative research on Internet communities. British Medical Journal 323: 1103-1105.
    • (2001) British Medical Journal , vol.323 , pp. 1103-1105
    • Eysenbach, G.1    Till, J.E.2
  • 26
    • 22744453983 scopus 로고    scopus 로고
    • Tranny boyz: Cyber community support in negotiating sex and gender mobility among female to male transsexuals
    • Gauthier, D. A. K., and N. K. Chaudoir. 2004. Tranny boyz: Cyber community support in negotiating sex and gender mobility among female to male transsexuals. Deviant Behavior 25: 375-398.
    • (2004) Deviant Behavior , vol.25 , pp. 375-398
    • Gauthier, D.A.K.1    Chaudoir, N.K.2
  • 27
    • 0033483076 scopus 로고    scopus 로고
    • Bareback sex, bug chasers, and the gift of death
    • Gauthier, D. K., and C. J. Forsyth. 1999. Bareback sex, bug chasers, and the gift of death. Deviant Behavior 20: 85-100.
    • (1999) Deviant Behavior , vol.20 , pp. 85-100
    • Gauthier, D.K.1    Forsyth, C.J.2
  • 28
    • 22744434146 scopus 로고    scopus 로고
    • Make me your death slave: Men who have sex with men and use the Internet to intentionally spread HIV
    • Grov, C. 2004. Make me your death slave: Men who have sex with men and use the Internet to intentionally spread HIV. Deviant Behavior 25: 329-349.
    • (2004) Deviant Behavior , vol.25 , pp. 329-349
    • Grov, C.1
  • 30
    • 27944501186 scopus 로고    scopus 로고
    • Effects of personal salutations in e-mail invitations to participate in a web survey
    • Heerwegh, D. 2005. Effects of personal salutations in e-mail invitations to participate in a web survey. Public Opinion Quarterly 69: 588-598.
    • (2005) Public Opinion Quarterly , vol.69 , pp. 588-598
    • Heerwegh, D.1
  • 31
    • 0009876365 scopus 로고    scopus 로고
    • Animal rights talk: Moral debate over the Internet
    • Herzog, H. A., B. Dinoff, and J. R. Page. 1997. Animal rights talk: Moral debate over the Internet. Qualitative Sociology 20: 399-418.
    • (1997) Qualitative Sociology , vol.20 , pp. 399-418
    • Herzog, H.A.1    Dinoff, B.2    Page, J.R.3
  • 33
    • 69649100929 scopus 로고    scopus 로고
    • Computer crime investigations in the United States: Leveraging knowledge from the past to address the future
    • Hinduja, S. 2007. Computer crime investigations in the United States: Leveraging knowledge from the past to address the future. International Journal of Cyber Criminology 1: 400-420.
    • (2007) International Journal of Cyber Criminology , vol.1 , pp. 400-420
    • Hinduja, S.1
  • 35
    • 33847270657 scopus 로고    scopus 로고
    • Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures
    • Holt, T. J. 2007a. Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior 28: 171-198.
    • (2007) Deviant Behavior , vol.28 , pp. 171-198
    • Holt, T.J.1
  • 36
    • 77958512512 scopus 로고    scopus 로고
    • The market for malware
    • August, Paper presented at the, Las Vegas, NV
    • Holt, T. J. 2007b, August. The market for malware. Paper presented at the Defcon 15 conference, Las Vegas, NV.
    • (2007) Defcon 15 conference
    • Holt, T.J.1
  • 37
    • 77957262153 scopus 로고    scopus 로고
    • Examining the role of technology in the formation of deviant subcultures
    • doi:10.1177/0894439309351344
    • Holt, T. J. 2009. Examining the role of technology in the formation of deviant subcultures. Social Science Computer Review. doi:10.1177/0894439309351344
    • (2009) Social Science Computer Review
    • Holt, T.J.1
  • 38
    • 34249054920 scopus 로고    scopus 로고
    • Examining sex work from the client's perspective: Assessing johns using online data
    • Holt, T. J., and K. R. Blevins. 2007. Examining sex work from the client's perspective: Assessing johns using online data. Deviant Behavior 28: 333-354.
    • (2007) Deviant Behavior , vol.28 , pp. 333-354
    • Holt, T.J.1    Blevins, K.R.2
  • 39
    • 76249114938 scopus 로고    scopus 로고
    • Considering the pedophile subculture online
    • Holt, T. J., K. R. Blevins, and N. Burkert. 2010. Considering the pedophile subculture online. Sexual Abuse 22: 3-24.
    • (2010) Sexual Abuse , vol.22 , pp. 3-24
    • Holt, T.J.1    Blevins, K.R.2    Burkert, N.3
  • 40
    • 55649120692 scopus 로고    scopus 로고
    • Examining the displacement practices of johns with on-line data
    • Holt, T. J., K. R. Blevins, and J. B. Kuhns. 2008. Examining the displacement practices of johns with on-line data. Journal of Criminal Justice 36: 522-528.
    • (2008) Journal of Criminal Justice , vol.36 , pp. 522-528
    • Holt, T.J.1    Blevins, K.R.2    Kuhns, J.B.3
  • 41
    • 84894283055 scopus 로고    scopus 로고
    • Examining diffusion and arrest avoidance practices among johns
    • doi:10.1177/0011128709347087
    • Holt, T. J., K. R. Blevins, and J. B. Kuhns. 2009. Examining diffusion and arrest avoidance practices among johns. Crime and Delinquency. doi:10.1177/0011128709347087
    • (2009) Crime and Delinquency
    • Holt, T.J.1    Blevins, K.R.2    Kuhns, J.B.3
  • 42
    • 77956038407 scopus 로고    scopus 로고
    • Transferring subcultural knowledge online: Practices and beliefs of persistent digital pirates
    • Holt, T. J., and H. Copes. 2010. Transferring subcultural knowledge online: Practices and beliefs of persistent digital pirates. Deviant Behavior 31: 625-654.
    • (2010) Deviant Behavior , vol.31 , pp. 625-654
    • Holt, T.J.1    Copes, H.2
  • 44
    • 77949555353 scopus 로고    scopus 로고
    • Exploring stolen data markets on-line: Products and market forces
    • Holt, T. J., and E. Lampke. 2010. Exploring stolen data markets on-line: Products and market forces. Criminal Justice Studies 23: 33-50.
    • (2010) Criminal Justice Studies , vol.23 , pp. 33-50
    • Holt, T.J.1    Lampke, E.2
  • 45
    • 77958467314 scopus 로고    scopus 로고
    • Characterizing malware writers and computer attackers in their own words
    • April, Paper presented at the, Peter Kiewit Institute, University of Nebraska at Omaha, NE
    • Holt, T. J., J. B. Soles, and L. Leslie. 2008, April. Characterizing malware writers and computer attackers in their own words. Paper presented at the 2008 International Conference on Information Warfare and Security, Peter Kiewit Institute, University of Nebraska at Omaha, NE.
    • (2008) 2008 International Conference on Information Warfare and Security
    • Holt, T.J.1    Soles, J.B.2    Leslie, L.3
  • 46
    • 77949543969 scopus 로고    scopus 로고
    • Profile: Automated credit card fraud
    • Honeynet Research Alliance, Retrieved July 20, 2008, from
    • Honeynet Research Alliance. 2003. Profile: Automated credit card fraud. Know Your Enemy Paper series. Retrieved July 20, 2008, from http://www.honeynet.org/papers/profiles/cc-fraud.pdf
    • (2003) Know Your Enemy Paper series
  • 47
    • 38549120841 scopus 로고    scopus 로고
    • Entering the blogosphere: Some strategies for using blogs in social research
    • Hookway, N. 2008. Entering the blogosphere: Some strategies for using blogs in social research. Qualitative Research 8: 91-113.
    • (2008) Qualitative Research , vol.8 , pp. 91-113
    • Hookway, N.1
  • 48
    • 0007437527 scopus 로고    scopus 로고
    • Researching crack dealers: Dilemmas and contradictions
    • In J. Ferrell and M. S. Hamm (Eds.), Boston, MA: Northeastern University Press
    • Jacobs, B. A. 1998. Researching crack dealers: Dilemmas and contradictions. In J. Ferrell and M. S. Hamm (Eds.), Ethnography at the edge: Crime, deviance, and field research (pp. 160-177). Boston, MA: Northeastern University Press.
    • (1998) Ethnography at the edge: Crime, deviance, and field research , pp. 160-177
    • Jacobs, B.A.1
  • 50
    • 3042539428 scopus 로고    scopus 로고
    • You've got mail! You don't want it: Cyber-victimization and on-line dating
    • Jerin, R., and B. Dolinsky. 2001. You've got mail! You don't want it: Cyber-victimization and on-line dating. Journal of Criminal Justice and Popular Culture 9: 15-21.
    • (2001) Journal of Criminal Justice and Popular Culture , vol.9 , pp. 15-21
    • Jerin, R.1    Dolinsky, B.2
  • 51
    • 84925797895 scopus 로고    scopus 로고
    • Crime, deviance and the disembodied self: Transcending the dangers of corporeality
    • In Y. Jewkes (Ed.), Portland, OR: Willan
    • Jewkes, Y., and K. Sharpe. 2003. Crime, deviance and the disembodied self: Transcending the dangers of corporeality. In Y. Jewkes (Ed.), Dot.cons: Crime, deviance and identity on the Internet (pp. 1-14). Portland, OR: Willan.
    • (2003) Dot.cons: Crime, deviance and identity on the Internet , pp. 1-14
    • Jewkes, Y.1    Sharpe, K.2
  • 53
    • 77954682392 scopus 로고    scopus 로고
    • Participants and observers in online ethnography: Five stories about identity
    • In M. D. Johns, S.-L. S. Chen, and G. J. Hall (Eds.), New York: Peter Lang
    • Kendall, L. 2004. Participants and observers in online ethnography: Five stories about identity. In M. D. Johns, S.-L. S. Chen, and G. J. Hall (Eds.), Online social research: Methods, issues, and ethics (pp. 125-140). New York: Peter Lang.
    • (2004) Online social research: Methods, issues, and ethics , pp. 125-140
    • Kendall, L.1
  • 54
    • 77958477015 scopus 로고    scopus 로고
    • You can't cheat an honest man: Making ($$$ and) sense of the Nigerian e-mail scams
    • In F. Schmalleger and M. Pittaro (Eds.), Upper Saddle River, NJ: Pearson Prentice Hall
    • King, A., and J. Thomas. 2009. You can't cheat an honest man: Making ($$$ and) sense of the Nigerian e-mail scams. In F. Schmalleger and M. Pittaro (Eds.), Crimes of the Internet (pp. 206-224). Upper Saddle River, NJ: Pearson Prentice Hall.
    • (2009) Crimes of the Internet , pp. 206-224
    • King, A.1    Thomas, J.2
  • 55
    • 36348980446 scopus 로고    scopus 로고
    • Surf and turf wars online: Growing implications of Internet gang violence
    • King, J. E., C. E. Walpole, and K. Lamon. 2007. Surf and turf wars online: Growing implications of Internet gang violence. Journal of Adolescent Health 6: 66-68.
    • (2007) Journal of Adolescent Health , vol.6 , pp. 66-68
    • King, J.E.1    Walpole, C.E.2    Lamon, K.3
  • 56
    • 33745184506 scopus 로고    scopus 로고
    • Online interviewing and the research relationship
    • In C. Hine (Ed.), Oxford: Berg
    • Kivits, J. 2005. Online interviewing and the research relationship. In C. Hine (Ed.), Virtual methods: Issues in social research on the Internet (pp. 35-50). Oxford: Berg.
    • (2005) Virtual methods: Issues in social research on the Internet , pp. 35-50
    • Kivits, J.1
  • 57
    • 33645921665 scopus 로고    scopus 로고
    • What methods are most frequently used in research in criminology and criminal justice?
    • Kleck, G., J. Tark, and J. J. Bellows. 2006. What methods are most frequently used in research in criminology and criminal justice? Journal of Criminal Justice 34: 147-152.
    • (2006) Journal of Criminal Justice , vol.34 , pp. 147-152
    • Kleck, G.1    Tark, J.2    Bellows, J.J.3
  • 59
    • 70449492764 scopus 로고    scopus 로고
    • Laid to order: Male escorts advertising on the Internet
    • Lee-Gonyea, J. A., T. Castle, and N. E. Gonyea. 2009. Laid to order: Male escorts advertising on the Internet. Deviant Behavior 30: 321-348.
    • (2009) Deviant Behavior , vol.30 , pp. 321-348
    • Lee-Gonyea, J.A.1    Castle, T.2    Gonyea, N.E.3
  • 63
    • 26444454124 scopus 로고    scopus 로고
    • Supportive distortions: An analysis of posts on a pedophile Internet message board
    • Malesky Jr., L. A., and L. Ennis. 2004. Supportive distortions: An analysis of posts on a pedophile Internet message board. Journal of Addictions and Offender Counseling 24: 92-100.
    • (2004) Journal of Addictions and Offender Counseling , vol.24 , pp. 92-100
    • Malesky Jr., L.A.1    Ennis, L.2
  • 64
    • 10644268153 scopus 로고    scopus 로고
    • Internet interviewing
    • In J. A. Holstein and J. F. Gubrium (Eds.), London: Sage
    • Mann, C., and F. Stewart. 2002. Internet interviewing. In J. A. Holstein and J. F. Gubrium (Eds.), Handbook of Internet research: Context and method (pp. 603-628). London: Sage.
    • (2002) Handbook of Internet research: Context and method , pp. 603-628
    • Mann, C.1    Stewart, F.2
  • 65
    • 0032376197 scopus 로고    scopus 로고
    • Netcrime: More changes in the organisation of thieving
    • Mann, D., and M. Sutton. 1998. Netcrime: More changes in the organisation of thieving. British Journal of Criminology 38: 201-229.
    • (1998) British Journal of Criminology , vol.38 , pp. 201-229
    • Mann, D.1    Sutton, M.2
  • 66
    • 0032336129 scopus 로고    scopus 로고
    • An ethics for the new surveillance
    • Marx, G. 1998. An ethics for the new surveillance. Information Society 14: 171-185.
    • (1998) Information Society , vol.14 , pp. 171-185
    • Marx, G.1
  • 70
    • 20444494965 scopus 로고    scopus 로고
    • End user searching: A Web log analysis of NAVER, a Korean web search engine
    • Park, S., J. H. Lee, and H. J. Bae. 2005. End user searching: A Web log analysis of NAVER, a Korean web search engine. Library and Information Science Research 27: 203-221.
    • (2005) Library and Information Science Research , vol.27 , pp. 203-221
    • Park, S.1    Lee, J.H.2    Bae, H.J.3
  • 72
    • 37749048683 scopus 로고    scopus 로고
    • Deviant research: Deception, male Internet escorts, and response rates
    • Pruitt, M. V. 2008. Deviant research: Deception, male Internet escorts, and response rates. Deviant Behavior 29: 70-82.
    • (2008) Deviant Behavior , vol.29 , pp. 70-82
    • Pruitt, M.V.1
  • 73
    • 18444388003 scopus 로고    scopus 로고
    • Describing sexual behavior in the era of the Internet: A typology for empirical research
    • Quinn, J. F., and C. J. Forsyth. 2005. Describing sexual behavior in the era of the Internet: A typology for empirical research. Deviant Behavior 26: 191-207.
    • (2005) Deviant Behavior , vol.26 , pp. 191-207
    • Quinn, J.F.1    Forsyth, C.J.2
  • 74
    • 84993012484 scopus 로고    scopus 로고
    • Informed consent in the study of online communities: A reflection on the effects of computer-mediated social research
    • Reid, E. M. 1996. Informed consent in the study of online communities: A reflection on the effects of computer-mediated social research. Information Society 12: 169-174.
    • (1996) Information Society , vol.12 , pp. 169-174
    • Reid, E.M.1
  • 75
    • 0036940588 scopus 로고    scopus 로고
    • The sociocognitive psychology of computer-mediated communication: The present and future of technology-based interactions
    • Riva, G. 2002. The sociocognitive psychology of computer-mediated communication: The present and future of technology-based interactions. CyberPsychology and Behavior 5: 581-598.
    • (2002) CyberPsychology and Behavior , vol.5 , pp. 581-598
    • Riva, G.1
  • 77
    • 0007249843 scopus 로고    scopus 로고
    • E-mail as a research tool
    • 21. Retrieved November 14, 2005, from
    • Selwyn, N., and K. Robson. 1998. E-mail as a research tool. Social Research Update 21. Retrieved November 14, 2005, from http://www.soc.surrey.ac.uk/sru/SRU21.html
    • (1998) Social Research Update
    • Selwyn, N.1    Robson, K.2
  • 78
    • 17444421751 scopus 로고    scopus 로고
    • Cyberpunters and cyberwhores: Prostitution on the Internet
    • In Y. Jewkes (Ed.), Portland, OR: Willan
    • Sharpe, K., and S. Earle. 2003. Cyberpunters and cyberwhores: Prostitution on the Internet. In Y. Jewkes (Ed.), Dot.cons: Crime, deviance and identity on the Internet (pp. 36-52). Portland, OR: Willan.
    • (2003) Dot.cons: Crime, deviance and identity on the Internet , pp. 36-52
    • Sharpe, K.1    Earle, S.2
  • 80
    • 17444386358 scopus 로고    scopus 로고
    • The geographical mobility, preferences and pleasures of prolific punters: A demonstration study of the activities of prostitutes' clients
    • Retrieved from
    • Soothill, K., and T. Sanders. 2005. The geographical mobility, preferences and pleasures of prolific punters: A demonstration study of the activities of prostitutes' clients. Sociological Research On-Line 10 (1). Retrieved from http://www.socresonline.org.uk/10/1/soothill/soothill.pdf
    • (2005) Sociological Research On-Line , vol.10 , Issue.1
    • Soothill, K.1    Sanders, T.2
  • 82
    • 33644611681 scopus 로고    scopus 로고
    • Ethics in Internet ethnography
    • In E. A. Buchanan (Ed.), Hershey, PA: Information Science
    • Sveningsson, M. 2004. Ethics in Internet ethnography. In E. A. Buchanan (Ed.), Virtual research ethics: Issues and controversies (pp. 45-61). Hershey, PA: Information Science.
    • (2004) Virtual research ethics: Issues and controversies , pp. 45-61
    • Sveningsson, M.1
  • 85
    • 0042261041 scopus 로고    scopus 로고
    • Bareback sex and the quest for HIV: Assessing the relationship in Internet personal advertisements of men who have sex with men
    • Tewksbury, R. 2003. Bareback sex and the quest for HIV: Assessing the relationship in Internet personal advertisements of men who have sex with men. Deviant Behavior 24: 467-482.
    • (2003) Deviant Behavior , vol.24 , pp. 467-482
    • Tewksbury, R.1
  • 86
    • 33744980670 scopus 로고    scopus 로고
    • Click here for HIV: An analysis of Internet-based bug chasers and bug givers
    • Tewksbury, R. 2006. Click here for HIV: An analysis of Internet-based bug chasers and bug givers. Deviant Behavior 27: 379-395.
    • (2006) Deviant Behavior , vol.27 , pp. 379-395
    • Tewksbury, R.1
  • 87
    • 77958450500 scopus 로고    scopus 로고
    • The prominence of qualitative research in criminology and criminal justice scholarship
    • Tewksbury, R., D. Dabney, and H. Copes. 2010. The prominence of qualitative research in criminology and criminal justice scholarship. Journal of Criminal Justice Education 21: 391-411.
    • (2010) Journal of Criminal Justice Education , vol.21 , pp. 391-411
    • Tewksbury, R.1    Dabney, D.2    Copes, H.3
  • 88
    • 33750552227 scopus 로고    scopus 로고
    • Methodological orientations of articles appearing in criminal justice's top journals: Who publishes what and where
    • Tewksbury, R., M. T. DeMichele, and J. M. Miller. 2005. Methodological orientations of articles appearing in criminal justice's top journals: Who publishes what and where. Journal of Criminal Justice Education 16: 265-279.
    • (2005) Journal of Criminal Justice Education , vol.16 , pp. 265-279
    • Tewksbury, R.1    DeMichele, M.T.2    Miller, J.M.3
  • 89
    • 70350423437 scopus 로고    scopus 로고
    • The underground economy: Priceless
    • Thomas, R., and J. Martin. 2006. The underground economy: Priceless. login 31: 7-16.
    • (2006) Login , vol.31 , pp. 7-16
    • Thomas, R.1    Martin, J.2
  • 91
    • 0004682473 scopus 로고    scopus 로고
    • It's difficult to hide it: The presentation of self on Internet home pages
    • Walker, K. 2000. It's difficult to hide it: The presentation of self on Internet home pages. Qualitative Sociology 23: 99-120.
    • (2000) Qualitative Sociology , vol.23 , pp. 99-120
    • Walker, K.1
  • 92
    • 85140528371 scopus 로고    scopus 로고
    • Cybercrimes and the Internet
    • In D. S. Wall (Ed.), New York: Routledge
    • Wall, D. S. 2001. Cybercrimes and the Internet. In D. S. Wall (Ed.), Crime and the Internet (pp. 1-17). New York: Routledge.
    • (2001) Crime and the Internet , pp. 1-17
    • Wall, D.S.1
  • 93
    • 24144442711 scopus 로고    scopus 로고
    • Digital realism and the governance of spam as cybercrime
    • Wall, D. S. 2004. Digital realism and the governance of spam as cybercrime. European Journal on Criminal Policy and Research 10: 309-335.
    • (2004) European Journal on Criminal Policy and Research , vol.10 , pp. 309-335
    • Wall, D.S.1
  • 94
    • 18144381963 scopus 로고    scopus 로고
    • How edge are you? Constructing authentic identities and subcultural boundaries in a Straightedge Internet forum
    • Williams, P., and H. Copes. 2005. How edge are you? Constructing authentic identities and subcultural boundaries in a Straightedge Internet forum. Symbolic Interaction 28: 67-89.
    • (2005) Symbolic Interaction , vol.28 , pp. 67-89
    • Williams, P.1    Copes, H.2
  • 95
    • 14544293551 scopus 로고    scopus 로고
    • Rave and Straightedge, the virtual and the real: Exploring online and offline experiences in Canadian youth subcultures
    • Wilson, B., and M. Atkinson. 2005. Rave and Straightedge, the virtual and the real: Exploring online and offline experiences in Canadian youth subcultures. Youth and Society 36: 276-311.
    • (2005) Youth and Society , vol.36 , pp. 276-311
    • Wilson, B.1    Atkinson, M.2
  • 97
    • 77958515493 scopus 로고    scopus 로고
    • Seeing ourselves: Exploring the social production of criminological knowledge in a qualitative methods course
    • Wright, R. T., and M. Stein. 1996. Seeing ourselves: Exploring the social production of criminological knowledge in a qualitative methods course. Journal of Criminal Justice Education 7: 65-77.
    • (1996) Journal of Criminal Justice Education , vol.7 , pp. 65-77
    • Wright, R.T.1    Stein, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.