-
2
-
-
0345475379
-
Missing data techniques for structural equation models
-
Allison, P. D. (2003). Missing data techniques for structural equation models. Journal of Abnormal Psychology, 112, 545-557.
-
(2003)
Journal of Abnormal Psychology
, vol.112
, pp. 545-557
-
-
Allison, P.D.1
-
4
-
-
0037217139
-
Missing data problems in criminological research: Two case studies
-
Brame, R., & Paternoster, R. (2003). Missing data problems in criminological research: Two case studies. Journal of Quantitative Criminology, 19, 55-78.
-
(2003)
Journal of Quantitative Criminology
, vol.19
, pp. 55-78
-
-
Brame, R.1
Paternoster, R.2
-
5
-
-
17444428885
-
The antecedents of music piracy: Attitudes and intentions
-
Chiou, J. S., Huang, C. Y., & Lee, H. H. (2005). The antecedents of music piracy: Attitudes and intentions. Journal of Business Ethics, 57, 161-174.
-
(2005)
Journal of Business Ethics
, vol.57
, pp. 161-174
-
-
Chiou, J.S.1
Huang, C.Y.2
Lee, H.H.3
-
6
-
-
3042571365
-
A behavioral model of digital music piracy
-
Gopal, R., Sanders, G. L., Bhattacharjee, S., Agrawal, M., & Wagner, S. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic Commerce, 14, 89-105.
-
(2004)
Journal of Organizational Computing and Electronic Commerce
, vol.14
, pp. 89-105
-
-
Gopal, R.1
Sanders, G.L.2
Bhattacharjee, S.3
Agrawal, M.4
Wagner, S.5
-
8
-
-
34548292493
-
Digital piracy: An examination of low self-control and motivation using short-term longitudinal data
-
Higgins, G. E. (2007). Digital piracy: An examination of low self-control and motivation using short-term longitudinal data. CyberPsychology & Behavior, 10, 523-529.
-
(2007)
CyberPsychology & Behavior
, vol.10
, pp. 523-529
-
-
Higgins, G.E.1
-
9
-
-
46349084062
-
Digital piracy: An examination of three measurements of self-control
-
Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Digital piracy: An examination of three measurements of self-control. Deviant Behavior: An Interdisciplinary Journal, 29, 440-460.
-
(2008)
Deviant Behavior: An Interdisciplinary Journal
, vol.29
, pp. 440-460
-
-
Higgins, G.E.1
Wolfe, S.E.2
Marcum, C.D.3
-
10
-
-
12744275983
-
Trends and patterns among online software pirates
-
Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5, 49-61.
-
(2003)
Ethics and Information Technology
, vol.5
, pp. 49-61
-
-
Hinduja, S.1
-
11
-
-
8844253975
-
Perceptions of local and state law enforcement concerning the role of computer crime investigative teams
-
Hinduja, S. (2004). Perceptions of local and state law enforcement concerning the role of computer crime investigative teams. Policing: An International Journal of Police Strategies & Management, 27, 341-357.
-
(2004)
Policing: An International Journal of Police Strategies & Management
, vol.27
, pp. 341-357
-
-
Hinduja, S.1
-
12
-
-
36949037524
-
Neutralization theory and online software piracy: An empirical analysis
-
Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187-204.
-
(2007)
Ethics and Information Technology
, vol.9
, Issue.3
, pp. 187-204
-
-
Hinduja, S.1
-
13
-
-
67650706330
-
Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives
-
Hu, L. T., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling , 6, 1-55.
-
(1999)
Structural Equation Modeling
, vol.6
, pp. 1-55
-
-
Hu, L.T.1
Bentler, P.M.2
-
16
-
-
0039686012
-
Software piracy and its legal implications
-
Koen, C. M., & Im, J. H. (1997). Software piracy and its legal implications. Security Journal, 31, 265-272.
-
(1997)
Security Journal
, vol.31
, pp. 265-272
-
-
Koen, C.M.1
Im, J.H.2
-
18
-
-
25144504209
-
Excuses, excuses: What have we learned from five decades of neutralization research?
-
M. J. Tonry (Eds.), Chicago, IL: University of Chicago Press.
-
Maruna, S., & Copes, H. (2004). Excuses, excuses: What have we learned from five decades of neutralization research? In M. J. Tonry (Eds.), Crime and justice 2004-2008 (pp. 1-100). Chicago, IL: University of Chicago Press.
-
(2004)
Crime and justice 2004-2008
, pp. 1-100
-
-
Maruna, S.1
Copes, H.2
-
19
-
-
0345040656
-
How to use a Monte Carlo study to decide on sample size and determine power
-
Muthen, L. K., & Muthen, B. O. (2002). How to use a Monte Carlo study to decide on sample size and determine power. Structural Equation Modeling, 9, 599-620.
-
(2002)
Structural Equation Modeling
, vol.9
, pp. 599-620
-
-
Muthen, L.K.1
Muthen, B.O.2
-
20
-
-
0003753978
-
-
(3rd ed.). Los Angeles, CA: Muthen and Muthen.
-
Muthen, L. K., & Muthen, B. O. (1998-2004). Mplus users'guide (3rd ed.). Los Angeles, CA: Muthen and Muthen.
-
(1998)
Mplus users'guide
-
-
Muthen, L.K.1
Muthen, B.O.2
-
22
-
-
0001155759
-
Techniques of neutralization: A theory of delinquency
-
Sykes, G., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664-670.
-
(1957)
American Sociological Review
, vol.22
, pp. 664-670
-
-
Sykes, G.1
Matza, D.2
-
23
-
-
84949564522
-
The Internet as a conduit for criminal activity
-
A. Pattavina (Ed.), Thousand Oaks, CA: Sage Publications.
-
Wall, D. S. (2005). The Internet as a conduit for criminal activity. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 78-94). Thousand Oaks, CA: Sage Publications.
-
(2005)
Information technology and the criminal justice system
, pp. 78-94
-
-
Wall, D.S.1
|