-
1
-
-
11344287619
-
Exploring the Crime of Identity Theft: Prevalence, Clearance Rates, and Victim/Offender Characteristics
-
Allison, Stuart F. H., Amie M. Schuck, and Kim Michelle Lersch. 2005. "Exploring the Crime of Identity Theft: Prevalence, Clearance Rates, and Victim/Offender Characteristics." Journal of Criminal Justice 33: 19-29.
-
(2005)
Journal of Criminal Justice
, vol.33
, pp. 19-29
-
-
Allison, S.F.H.1
Schuck, A.M.2
Lersch, K.M.3
-
2
-
-
84858251080
-
-
U.S. Department of Justice, Office of Justice Statistics Available at () (accessed April 15, 2007)
-
Baum, Katrina. 2006. First Estimates from the National Crime Victimization Survey: Identity Theft, 2004. Washington, DC: U.S. Department of Justice, Office of Justice Statistics. Available at (http://www.ojp.usdoj.gov/bjs/pub/pdf/it04.pdf) (accessed April 15, 2007).
-
(2006)
First Estimates from the National Crime Victimization Survey: Identity Theft, 2004
-
-
Baum, K.1
-
3
-
-
11344257651
-
Training: Identity Theft
-
Bellah, John. 2001. "Training: Identity Theft." Law and Order 49: 222-226.
-
(2001)
Law and Order
, vol.49
, pp. 222-226
-
-
Bellah, J.1
-
4
-
-
80052980820
-
On-Line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory
-
Bossler, Adam M. and Thomas J. Holt. 2009. "On-Line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory." The International Journal of Cyber Criminology 3: 400-420.
-
(2009)
The International Journal of Cyber Criminology
, vol.3
, pp. 400-420
-
-
Bossler, A.M.1
Holt, T.J.2
-
5
-
-
77949584268
-
Computer Crime Victimization and Integrated Theory: An Empirical Assessment
-
Choi, Kyung C. 2008. "Computer Crime Victimization and Integrated Theory: An Empirical Assessment." International Journal of Cyber Criminology 2: 308-333.
-
(2008)
International Journal of Cyber Criminology
, vol.2
, pp. 308-333
-
-
Choi, K.C.1
-
6
-
-
84859365388
-
-
Technical report for National Institute of Justice NIJGrant No. 2007-IJ-CX-0018
-
Chu, Bill, Thomas J. Holt, and Gail Joon Ahn. 2010. Examining the Creation, Distribution, and Function of Malware On-Line. Technical report for National Institute of Justice. NIJGrant No. 2007-IJ-CX-0018.
-
(2010)
Examining the Creation, Distribution, and Function of Malware On-Line
-
-
Chu, B.1
Holt, T.J.2
Ahn, G.J.3
-
7
-
-
33748435812
-
-
Computer Security Institute
-
Computer Security Institute. 2009. Computer Crime and Security Survey. Available at (http://www.cybercrime.gov/FBI2008.pdf) (accessed June 5, 2010).
-
(2009)
Computer Crime and Security Survey
-
-
-
9
-
-
77649139924
-
The Risks, Rewards, and Strategies of Stealing Identities
-
Criminal Justice Press
-
Copes, Heith and Lynne Vieraitis. 2008. "The Risks, Rewards, and Strategies of Stealing Identities." Pp. 87-110 in Identity Theft and Opportunity, Crime Prevention Studies, Vol. 23, edited by M. McNally and G. Newman. Monsey, NY: Criminal Justice Press.
-
(2008)
Identity Theft and Opportunity, Crime Prevention Studies
, vol.23
, pp. 87-110
-
-
Copes, H.1
Lynne, V.2
-
10
-
-
85044911536
-
Bounded Rationality of Identity Thieves: Using Research to Inform Policy
-
Copes, Heith and Lynne Vieraitis. 2009. "Bounded Rationality of Identity Thieves: Using Research to Inform Policy." Criminology and Public Policy 8: 237-262.
-
(2009)
Criminology and Public Policy
, vol.8
, pp. 237-262
-
-
Copes, H.1
Lynne, V.2
-
12
-
-
4444355305
-
-
Federal Trade Commission
-
Federal Trade Commission. 2003. Identity Theft Survey Report. Available at (http://www.ftc.gov/bcp/edu/microsites/idtheft/downloads/synovate_report.pdf) (accessed March 15, 2005).
-
(2003)
Identity Theft Survey Report
-
-
-
13
-
-
84858191563
-
-
Federal Trade Commission
-
Federal Trade Commission. 2007. Identity Theft Victim Complaint Data. Available at (http://www.ftc.gov/bcp/edu/microsites/idtheft/downloads/clearinghouse_2006.pdf) (accessed May 19, 2008).
-
(2007)
Identity Theft Victim Complaint Data
-
-
-
14
-
-
1842424381
-
A Survey of Online Harassment at a University Campus
-
Finn, Jerry. 2004. "A Survey of Online Harassment at a University Campus." Journal of Interpersonal Violence 19: 468-483.
-
(2004)
Journal of Interpersonal Violence
, vol.19
, pp. 468-483
-
-
Finn, J.1
-
15
-
-
85055401848
-
Being Pursued: Stalking Victimization in a National Study of College Women
-
Fisher, Bonnie S., Francis T. Cullen, and Michael G. Turner. 2002. "Being Pursued: Stalking Victimization in a National Study of College Women." Criminology and Public Policy 1: 257-308.
-
(2002)
Criminology and Public Policy
, vol.1
, pp. 257-308
-
-
Fisher, B.S.1
Cullen, F.T.2
Turner, M.G.3
-
16
-
-
0344513859
-
A Tale of Two Ivory Towers: A Comparative Analysis of Victimization Rates and Risks between University Students in the United States and England
-
Fisher, Bonnie S. and Andrew R. P. Wilkes. 2003. "A Tale of Two Ivory Towers: A Comparative Analysis of Victimization Rates and Risks between University Students in the United States and England."British Journal of Criminology43:526-545.
-
(2003)
British Journal of Criminology
, vol.43
, pp. 526-545
-
-
Fisher, B.S.1
Wilkes, A.R.P.2
-
18
-
-
0000931753
-
Stress-Resistant Children: The Search of Protective Factors
-
In: Stevenson J. E., editors Pergamon Press
-
Garmezy, N. 1985. "Stress-Resistant Children: The Search of Protective Factors." Pp. 213-233 in Recent Research in Developmental Psychopathology, edited by J. E. Stevenson. New York: Pergamon Press.
-
(1985)
Recent Research in Developmental Psychopathology
, pp. 213-233
-
-
Garmezy, N.1
-
19
-
-
0021379982
-
The Study of Stress and Competence in Children: A Building Block of Developmental Psychopathology
-
Garmezy, Norman, Ann S. Masten, and Auke Tellegen. 1984. "The Study of Stress and Competence in Children: A Building Block of Developmental Psychopathology." Child Development 55: 97-111.
-
(1984)
Child Development
, vol.55
, pp. 97-111
-
-
Garmezy, N.1
Masten, A.S.2
Tellegen, A.3
-
20
-
-
77949545382
-
TJX Breach was Twice as Big as Admitted, Banks Say
-
Available at(accessed October 23, 2008)
-
Goodin, Dan. 2007. "TJX Breach was Twice as Big as Admitted, Banks Say." The Register. Available at (http://www.theregister.co.uk/2007/10/24/tjx_breach_estimate_grows/) (accessed October 23, 2008).
-
(2007)
The Register
-
-
Goodin, D.1
-
22
-
-
85140541591
-
Telecommunication Fraud in the Digital Age: The Convergence of Technologies
-
In: Wall D., editors Routledge
-
Grabosky, P. N. and R. Smith. 2001. "Telecommunication Fraud in the Digital Age: The Convergence of Technologies." Pp. 29-43 in Crime and the Internet, edited by D. Wall. New York: Routledge.
-
(2001)
Crime and the Internet
, pp. 29-43
-
-
Grabosky, P.N.1
Smith, R.2
-
23
-
-
65349086115
-
Exploring the Gender Differences in Protective Factors: Implications for Understanding Resiliency
-
Hartman, Jennifer L., Michael G. Turner, Leah E. Daigle, M. Lyn Exum, and Francis T. Cullen. 2009. "Exploring the Gender Differences in Protective Factors: Implications for Understanding Resiliency." International Journal of Offender Therapy and Comparative Criminology 53: 249-277.
-
(2009)
International Journal of Offender Therapy and Comparative Criminology
, vol.53
, pp. 249-277
-
-
Hartman, J.L.1
Turner, M.G.2
Daigle, L.E.3
Lyn, E.M.4
Cullen, F.T.5
-
25
-
-
33847270657
-
Subcultural Evolution? Examining the Influence of On-and Off-Line Experiences on Deviant Subcultures
-
Holt, Thomas J. 2007. "Subcultural Evolution? Examining the Influence of On-and Off-Line Experiences on Deviant Subcultures." Deviant Behavior 28: 171-198.
-
(2007)
Deviant Behavior
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
26
-
-
57649120953
-
Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization
-
Holt, Thomas J. and Adam M. Bossler. 2009. "Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization." Deviant Behavior 30: 1-25.
-
(2009)
Deviant Behavior
, vol.30
, pp. 1-25
-
-
Holt, T.J.1
Bossler, A.M.2
-
28
-
-
77949555353
-
Exploring Stolen Data Markets On-Line: Products and Market Forces
-
Holt, Thomas J. and Eric Lampke. 2010. "Exploring Stolen Data Markets On-Line: Products and Market Forces." Criminal Justice Studies 23: 33-50.
-
(2010)
Criminal Justice Studies
, vol.23
, pp. 33-50
-
-
Holt, T.J.1
Lampke, E.2
-
29
-
-
41649096818
-
Low Self-Control, Routine Activities, and Fraud Victimization
-
Holtfreter, Kristy, Michael D. Reisig, and Travis C. Pratt. 2008. "Low Self-Control, Routine Activities, and Fraud Victimization." Criminology 46: 189-220.
-
(2008)
Criminology
, vol.46
, pp. 189-220
-
-
Holtfreter, K.1
Reisig, M.D.2
Pratt, T.C.3
-
30
-
-
84858174630
-
-
Internet Crime Complaint Center
-
Internet Crime Complaint Center. 2010. Internet Crime Report. Available at (http://www.ic3.gov/media/annualreport/2009_IC3Report.pdf (accessed April 20, 2010).
-
(2010)
Internet Crime Report
-
-
-
31
-
-
0026440771
-
Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents
-
Lauritsen, Janet L., John H. Laub, and Robert J. Sampson. 1992. "Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents." Violence and Victims 7: 91-108.
-
(1992)
Violence and Victims
, vol.7
, pp. 91-108
-
-
Lauritsen, J.L.1
Laub, J.H.2
Sampson, R.J.3
-
34
-
-
77649164501
-
Identity Thieves and Levels of Sophistication: Findings from a National Probability Sample of American Newspaper Articles 1995-2005
-
Morris, Robert G. 2010. "Identity Thieves and Levels of Sophistication: Findings from a National Probability Sample of American Newspaper Articles 1995-2005." Deviant Behavior 31: 184-207.
-
(2010)
Deviant Behavior
, vol.31
, pp. 184-207
-
-
Morris, R.G.1
-
37
-
-
68149146473
-
-
PandaLabs
-
PandaLabs. 2007. Malware Infections in Protected Systems. Available at (http://research.pandasecurity.com/blogs/images/wp_pb_malware_infections_in_protected_systems.pdf) (accessed May 20, 2010).
-
(2007)
Malware Infections in Protected Systems
-
-
-
39
-
-
35048877207
-
-
Pew Internet and American Life
-
Pew Internet and American Life. 2005. Pew Internet and American Life Project. Available at (http://www.pewinternet.org/Reports/2009/10Home_BroadbandAdoption-2009.aspx) (accessed August 4, 2007).
-
(2005)
Pew Internet and American Life Project
-
-
-
40
-
-
84858230810
-
Gartner: Victims of Online Phishing up nearly 40 Percent in 2007
-
Available at(accessed March 2, 2009)
-
Rogers, Jack. 2007. "Gartner: Victims of Online Phishing up nearly 40 Percent in 2007." SC Magazine. Available at (http://www.scmagazineus.com/Gartner-Victims-ofonline-phishing-up-nearly-40-percent-in-2007/article/99768) (accessed March 2, 2009).
-
(2007)
SC Magazine
-
-
Rogers, J.1
-
42
-
-
0002038917
-
Protective Factors in Children's Responses to Stress and Disadvantage
-
In: Kent M. W., editorsRolf J. E., editors University Press of New England
-
Rutter, M. 1979. "Protective Factors in Children's Responses to Stress and Disadvantage." Pp. 49-79 in Primary Prevention in Psychopathology: Social Competence in Children, edited by M. W. Kent and J. E. Rolf. Hanover, NH: University Press of New England.
-
(1979)
Primary Prevention in Psychopathology: Social Competence in Children
, pp. 49-79
-
-
Rutter, M.1
-
43
-
-
0030668250
-
A Social Learning Theory Analysis of Computer Crime among College Students
-
Skinner, William F. and Anne M. Fream. 1997. "A Social Learning Theory Analysis of Computer Crime among College Students." Journal of Research in Crime and Delinquency 34: 495-518.
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
44
-
-
0000981354
-
Resilient Youth: Identifying Factors that Prevent High-Risk Youth from Engaging in Delinquency and Drug Use
-
In: Blau Z. S., editorsHagan J., editors Jai Press
-
Smith, C., A. J. Lizotte, T. P. Thornberry, and M. D. Krohn. 1995. "Resilient Youth: Identifying Factors that Prevent High-Risk Youth from Engaging in Delinquency and Drug Use." Pp. 217-247 in Current Perspectives on Aging and the Life Cycle, edited by Z. S. Blau and J. Hagan. Greenwich, CT: Jai Press.
-
(1995)
Current Perspectives on Aging and the Life Cycle
, pp. 217-247
-
-
Smith, C.1
Lizotte, A.J.2
Thornberry, T.P.3
Krohn, M.D.4
-
46
-
-
33846043733
-
-
Pearson Prentice Hall
-
Taylor, Robert W., Eric J. Fritsch, John Liederbach, and Thomas J. Holt. 2010. Digital Crime and Digital Terrorism, 2nd edition. Upper Saddle River, NJ: Pearson Prentice Hall.
-
(2010)
Digital Crime and Digital Terrorism
-
-
Taylor, R.W.1
Fritsch, E.J.2
Liederbach, J.3
Holt, T.J.4
-
47
-
-
65349183727
-
Examining the Cumulative Effects of Protective Factors: Resiliency among a National Sample of High-Risk Youths
-
Turner, Michael G., Jennifer L. Hartman, M. Lyn Exum, and Francis T. Cullen. 2007. "Examining the Cumulative Effects of Protective Factors: Resiliency among a National Sample of High-Risk Youths." Journal of Offender Rehabilitation 46: 81-111.
-
(2007)
Journal of Offender Rehabilitation
, vol.46
, pp. 81-111
-
-
Turner, M.G.1
Hartman, J.L.2
Lyn Exum, M.3
Cullen, F.T.4
-
49
-
-
0001924695
-
Stress and Protective Factors in Children's Lives
-
In: Nichol A. R., editors John Wiley and Sons
-
Werner, E. E. 1985. "Stress and Protective Factors in Children's Lives." Pp. 335-355 in Longitudinal Studies in Child Psychology and Psychiatry, edited by A. R. Nichol. New York: John Wiley and Sons.
-
(1985)
Longitudinal Studies in Child Psychology and Psychiatry
, pp. 335-355
-
-
Werner, E.E.1
-
51
-
-
34247657469
-
The Novelty of Cybercrime
-
Yar, Majid. 2005. "The Novelty of Cybercrime." European Journal of Criminology 2: 407-427.
-
(2005)
European Journal of Criminology
, vol.2
, pp. 407-427
-
-
Yar, M.1
|