-
2
-
-
80051936424
-
-
Alexa Web Information Company Retrieved on March 25, 2010 from
-
Alexa Web Information Company. (2010). Site information: Facebook. Retrieved on March 25, 2010 fromhttp://www.alexa.com/siteinfo/facebook.com.
-
(2010)
Site information: Facebook
-
-
-
5
-
-
80051925908
-
-
CheckFacebook.com Retrieved October 25, 2010, from
-
CheckFacebook.com. (2010). United States: User demographics. Retrieved October 25, 2010, fromhttp://www.checkfacebook.com/.
-
(2010)
United States: User demographics
-
-
-
6
-
-
77949584268
-
Computer crime victimization and integrated theory: An empirical assessment
-
Choi K.Computer crime victimization and integrated theory: An empirical assessment.International Journal of Cyber Criminology. 2008;2:308-333.
-
(2008)
International Journal of Cyber Criminology
, vol.2
, pp. 308-333
-
-
Choi, K.1
-
7
-
-
0034366421
-
Web surveys: A review of issues and approaches
-
Couper M. P.Web surveys: A review of issues and approaches.Public Opinion Quarterly. 2000;64:464-494.
-
(2000)
Public Opinion Quarterly
, vol.64
, pp. 464-494
-
-
Couper, M.P.1
-
8
-
-
58149476761
-
Response rate and measurement differences in mixed-mode surveys using mail, telephone, interactive voice response (IVR) and the Internet
-
Dillman D. A.,Phelps G.,Tortora R.,Swift K.,Kohrell J.,Berck J.,Messer B. L.Response rate and measurement differences in mixed-mode surveys using mail, telephone, interactive voice response (IVR) and the Internet.Social Science Research. 2009;38:1-18.
-
(2009)
Social Science Research
, vol.38
, pp. 1-18
-
-
Dillman, D.A.1
Phelps, G.2
Tortora, R.3
Swift, K.4
Kohrell, J.5
Berck, J.6
Messer, B.L.7
-
9
-
-
27244447793
-
A study on cyberstalking: Understanding investigative hurdles
-
D'Ovidio R.,Doyle J.A study on cyberstalking: Understanding investigative hurdles.FBI Law Enforcement Bulletin. 2003;73:10-17.
-
(2003)
FBI Law Enforcement Bulletin
, vol.73
, pp. 10-17
-
-
D'Ovidio, R.1
Doyle, J.2
-
10
-
-
67549113728
-
Trust and privacy concern within social networking sites
-
Proceedings of the Thirteenth Americas Conference on Information Systems
-
Dwyer C.,Hiltz S. R.,Passerini K.Trust and privacy concern within social networking sites. Proceedings of the Thirteenth Americas Conference on Information Systems; 2007; 2007.
-
(2007)
-
-
Dwyer, C.1
Hiltz, S.R.2
Passerini, K.3
-
11
-
-
77951895676
-
-
Facebook Retrieved March 30, 2010, from
-
Facebook. (2010). Press room: Statistics. Retrieved March 30, 2010, fromhttp://www.facebook.com/press/info.php?statistics.
-
(2010)
Press room: Statistics
-
-
-
13
-
-
1842424381
-
A survey of online harassment at a university campus
-
Finn J.A survey of online harassment at a university campus.Journal of Interpersonal Violence. 2004;19:468-483.
-
(2004)
Journal of Interpersonal Violence
, vol.19
, pp. 468-483
-
-
Finn, J.1
-
14
-
-
85055401848
-
Being pursued: Stalking victimization in a national sample of college women
-
Fisher B. S.,Cullen F. T.,Turner M. G.Being pursued: Stalking victimization in a national sample of college women.Criminology & Public Policy. 2002;1:257-308.
-
(2002)
Criminology and Public Policy
, vol.1
, pp. 257-308
-
-
Fisher, B.S.1
Cullen, F.T.2
Turner, M.G.3
-
16
-
-
65249123151
-
Fear of crime among college students: A test of the shadow of sexual assault hypothesis
-
Hilinski C. M.Fear of crime among college students: A test of the shadow of sexual assault hypothesis.American Journal of Criminal Justice. 2009;34:84-102.
-
(2009)
American Journal of Criminal Justice
, vol.34
, pp. 84-102
-
-
Hilinski, C.M.1
-
17
-
-
38549162730
-
Personal information of adolescents on the Internet: A quantitative content analysis of MySpace
-
Hinduja S.,Patchin J. W.Personal information of adolescents on the Internet: A quantitative content analysis of MySpace.Journal of Adolescence. 2008;31:125-146.
-
(2008)
Journal of Adolescence
, vol.31
, pp. 125-146
-
-
Hinduja, S.1
Patchin, J.W.2
-
18
-
-
37249019175
-
The Fourth Amendment and privacy issues on the "new" Internet: Facebook.com and MySpace.com
-
Hodge M. J.The Fourth Amendment and privacy issues on the "new" Internet: Facebook.com and MySpace.com.Southern Illinois University Law Journal. 2007;31:95-123.
-
(2007)
Southern Illinois University Law Journal
, vol.31
, pp. 95-123
-
-
Hodge, M.J.1
-
19
-
-
57649120953
-
Examining the applicability of lifestyle-routine activities theory for cybercrime victimization
-
Holt T. J.,Bossler A. M.Examining the applicability of lifestyle-routine activities theory for cybercrime victimization.Deviant Behavior. 2009;30:1-25.
-
(2009)
Deviant Behavior
, vol.30
, pp. 1-25
-
-
Holt, T.J.1
Bossler, A.M.2
-
21
-
-
59949099735
-
-
Retrieved March 30, 2010, from
-
JonesH.SoltrenJ. H. (2005). Facebook: Threats to privacy. Retrieved March 30, 2010, fromhttp://www.swiss.ai.mit.edu/6095/student-papers/fall05-papers/facebook.pdf.
-
(2005)
Facebook: Threats to privacy
-
-
Jones, H.1
Soltren, J.H.2
-
22
-
-
80051937844
-
-
LinkedIn Retrieved April 30, 2010, from
-
LinkedIn. (2010). About. Retrieved April 30, 2010, fromhttp://press.linkedin.com/about.
-
(2010)
About
-
-
-
23
-
-
77952140052
-
Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory
-
Marcum C. D.,Higgins G. E.,Ricketts M. L.Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory.Deviant Behavior. 2010a;31:381-410.
-
(2010)
Deviant Behavior
, vol.31
, pp. 381-410
-
-
Marcum, C.D.1
Higgins, G.E.2
Ricketts, M.L.3
-
24
-
-
78650111985
-
Assessing sex experiences of online victimization: An examination of adolescent online behaviors using routine activity theory
-
Marcum C. D.,Higgins G. E.,Ricketts M. L.Assessing sex experiences of online victimization: An examination of adolescent online behaviors using routine activity theory.Criminal Justice Review. 2010b;35:412-427.
-
(2010)
Criminal Justice Review
, vol.35
, pp. 412-427
-
-
Marcum, C.D.1
Higgins, G.E.2
Ricketts, M.L.3
-
25
-
-
80051953002
-
-
MySpace Retrieved March 30, 2010, from
-
MySpace. (2010). Press room: Fact sheet. Retrieved March 30, 2010, fromhttp://www.myspace.com/pressroom?url=/fact+sheet/.
-
(2010)
Press room: Fact sheet
-
-
-
28
-
-
66249084194
-
Child abuse, avatar choices, and other risk factors associated with Internet-initiated victimization of adolescent girls
-
Noll J. G.,Shenk C. E.,Barnes J. E.,Putnam F. W.Child abuse, avatar choices, and other risk factors associated with Internet-initiated victimization of adolescent girls.Pediatrics. 2010;123:1078-1083.
-
(2010)
Pediatrics
, vol.123
, pp. 1078-1083
-
-
Noll, J.G.1
Shenk, C.E.2
Barnes, J.E.3
Putnam, F.W.4
-
29
-
-
77953121627
-
Look who's stalking: Obsessive pursuit and attachment theory
-
Patton C. L.,Nobles M. R.,Fox K. A.Look who's stalking: Obsessive pursuit and attachment theory.Journal of Criminal Justice. 2010;38 (3): 282-290.
-
(2010)
Journal of Criminal Justice
, vol.38
, Issue.3
, pp. 282-290
-
-
Patton, C.L.1
Nobles, M.R.2
Fox, K.A.3
-
31
-
-
77949590385
-
A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers
-
Reyns B. W.A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers.Crime Prevention and Community Safety. 2010b;12:99-118.
-
(2010)
Crime Prevention and Community Safety
, vol.12
, pp. 99-118
-
-
Reyns, B.W.1
-
33
-
-
0036116614
-
Cyberstalking and the technologies of interpersonal terrorism
-
Spitzberg B. H.,Hoobler G.Cyberstalking and the technologies of interpersonal terrorism.New Media & Society. 2002;4:71-92.
-
(2002)
New Media & Society
, vol.4
, pp. 71-92
-
-
Spitzberg, B.H.1
Hoobler, G.2
-
34
-
-
80051944691
-
-
Tagged Retrieved April 30, 2010, from
-
Tagged. (2010). About. Retrieved April 30, 2010, fromhttp://about-tagged.com/.
-
(2010)
About
-
-
-
35
-
-
40049108338
-
Online "predators" and their victims: Myths, realities, and implications for prevention and treatment
-
Wolak J.,Finkelhor D.,Mitchell K. J.,Ybarra M. L.Online "predators" and their victims: Myths, realities, and implications for prevention and treatment.American Psychologist. 2008;63:111-128.
-
(2008)
American Psychologist
, vol.63
, pp. 111-128
-
-
Wolak, J.1
Finkelhor, D.2
Mitchell, K.J.3
Ybarra, M.L.4
-
36
-
-
36348932137
-
The co-occurrence of Internet harassment and unwanted sexual solicitation victimization and perpetration: Associations with psychosocial indicators
-
Ybarra M. L.,Espelage D. L.,Mitchell K. J.The co-occurrence of Internet harassment and unwanted sexual solicitation victimization and perpetration: Associations with psychosocial indicators.Journal of Adolescent Health. 2007;41:31-41.
-
(2007)
Journal of Adolescent Health
, vol.41
, pp. 31-41
-
-
Ybarra, M.L.1
Espelage, D.L.2
Mitchell, K.J.3
-
37
-
-
38849154633
-
How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs
-
Ybarra M. L.,Mitchell K. J.How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs.Pediatrics. 2008;121:350-357.
-
(2008)
Pediatrics
, vol.121
, pp. 350-357
-
-
Ybarra, M.L.1
Mitchell, K.J.2
|