-
1
-
-
51049113746
-
General Strain Theory: Current Status and Directions for Further Research
-
In:, In:, In: Cullen Francis T., editorsWright John P., editorsBlevins Kristie R., editors New Brunswick, NJ, Transaction
-
Agnew, Robert. 2006. "General Strain Theory: Current Status and Directions for Further Research." Pp. 137 - 158 in Taking Stock: The Status of Criminological Theory (Advances in Criminological Theory, Vol. 16), edited by Francis T. Cullen, John P. Wright, and Kristie R. Blevins. New Brunswick, NJ: Transaction.
-
(2006)
Taking Stock: The Status of Criminological Theory (Advances in Criminological Theory, Vol. 16)
, pp. 137-158
-
-
Agnew, R.1
-
2
-
-
84885164719
-
Understanding the Changing Needs of the US Online Consumer, 2010. An Empowered Report: How Online and Mobile Behaviors are Changing
-
Retrieved August 15, 2011
-
Anderson, Jacqueline. 2010. "Understanding the Changing Needs of the US Online Consumer, 2010. An Empowered Report: How Online and Mobile Behaviors are Changing." Forrester Research. Retrieved August 15, 2011 (http://www.forrester.com/rb/Research/understanding_changing_needs_of_us_on-line_consumer%2C/q/id/57861/t/2)
-
(2010)
Forrester Research
-
-
Anderson, J.1
-
3
-
-
77956054664
-
Lesson Spurned? Reactions of Online Music Pirates to Legal Prosecutions by the RIAA
-
Bachmann, Michael. 2007. "Lesson Spurned? Reactions of Online Music Pirates to Legal Prosecutions by the RIAA." International Journal of Cyber Criminology 2 (1): 213 - 227.
-
(2007)
International Journal of Cyber Criminology
, vol.2
, Issue.1
, pp. 213-227
-
-
Bachmann, M.1
-
4
-
-
27744598545
-
Cyber-Harassment: A study of a New Method for an Old Behavior
-
Beran, Tanya and Qing Li. 2005. "Cyber-Harassment: A study of a New Method for an Old Behavior." Journal of Educational Computing Research 32: 265 - 277.
-
(2005)
Journal of Educational Computing Research
, vol.32
, pp. 265-277
-
-
Beran, T.1
Li, Q.2
-
5
-
-
59849120503
-
The Relationship between Cyberbullying and School Bullying
-
Beran T Li Q. 2007. "The Relationship between Cyberbullying and School Bullying." Journal of Student Wellbeing 1: 15 - 33.
-
(2007)
Journal of Student Wellbeing
, vol.1
, pp. 15-33
-
-
Beran, T.1
Li, Q.2
-
7
-
-
84899252279
-
The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?
-
In:, In: Holt Thomas J., editorsSchell Bernadette H., editors Hershey, PA, IGI Global
-
Bossler, Adam M. and George W. Burruss. 2011. "The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?" Pp. 38 - 67 in Corporate Hacking and Technology Driven Crime: Social Dynamics and Implications, edited by Thomas J. Holt and Bernadette H. Schell. Hershey, PA: IGI Global.
-
(2011)
Corporate Hacking and Technology Driven Crime: Social Dynamics and Implications
, pp. 38-67
-
-
Bossler, A.M.1
Burruss, G.W.2
-
8
-
-
80052980820
-
On-Line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory
-
Bossler, Adam M. and Thomas J. Holt. 2009. "On-Line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory." International Journal of Cyber Criminology 3: 400 - 420.
-
(2009)
International Journal of Cyber Criminology
, vol.3
, pp. 400-420
-
-
Bossler, A.M.1
Holt, T.J.2
-
9
-
-
77953123853
-
The Effect of Self Control on Victimization in the Cyberworld
-
Bossler A.M. Holt T.J. 2010. "The Effect of Self Control on Victimization in the Cyberworld." Journal of Criminal Justice 38: 227 - 236.
-
(2010)
Journal of Criminal Justice
, vol.38
, pp. 227-236
-
-
Bossler, A.M.1
Holt, T.J.2
-
11
-
-
84873862286
-
Predicting Online Harassment among a Juvenile Population
-
Bossler, Adam M., Thomas J. Holt, and David C. May. 2012. "Predicting Online Harassment among a Juvenile Population." Youth and Society 44:500-523.
-
(2012)
Youth and Society
, vol.44
, pp. 500-523
-
-
Bossler, A.M.1
Holt, T.J.2
May, D.C.3
-
13
-
-
84859329159
-
Terrorism and Technology: Operationalizing Cyberterrorism and Identifying Concepts
-
In: Holt T. J., editors Raleigh, NC, Carolina Academic Press
-
Britz, M. T. 2010. "Terrorism and Technology: Operationalizing Cyberterrorism and Identifying Concepts." Pp. 193 - 220 in Crime On-Line: Correlates, Causes, and Context, edited by T. J. Holt. Raleigh, NC: Carolina Academic Press.
-
(2010)
Crime On-Line: Correlates, Causes, and Context
, pp. 193-220
-
-
Britz, M.T.1
-
14
-
-
84899190540
-
Control Systems Security
-
In:, In: Holt Thomas J., editorsSchell Bernadette H., editors Hershey, PA, IGI-Global
-
Brodscky, Jacob and Robert Radvanovsky. 2011. "Control Systems Security." Pp. 187 - 204 in Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by Thomas J. Holt and Bernadette H. Schell. Hershey, PA: IGI-Global.
-
(2011)
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
, pp. 187-204
-
-
Brodscky, J.1
Radvanovsky, R.2
-
15
-
-
84887542581
-
Assessing the Mediation of a Fuller Social Learning Model on Low Self-Control's Influence on Software Piracy
-
Burruss, George W., Adam M. Bossler, and Thomas J. Holt. 2012. "Assessing the Mediation of a Fuller Social Learning Model on Low Self-Control's Influence on Software Piracy." Crime and Delinquency. doi: 10.1177/0011128712437915.
-
(2012)
Crime and Delinquency
-
-
Burruss, G.W.1
Bossler, A.M.2
Holt, T.J.3
-
17
-
-
40549127737
-
Ordering Sex in Cyberspace: A Content Analysis of Escort Websites
-
Castle, Tammy and Jenifer Lee. 2008. "Ordering Sex in Cyberspace: A Content Analysis of Escort Websites." International Journal of Cultural Studies 11: 107 - 121.
-
(2008)
International Journal of Cultural Studies
, vol.11
, pp. 107-121
-
-
Castle, T.1
Lee, J.2
-
18
-
-
77949584268
-
Computer Crime Victimization and Integrated Theory: An Empirical Assessment
-
Choi, Kyung C. 2008. "Computer Crime Victimization and Integrated Theory: An Empirical Assessment." International Journal of Cyber Criminology 2: 308 - 333.
-
(2008)
International Journal of Cyber Criminology
, vol.2
, pp. 308-333
-
-
Choi, K.C.1
-
19
-
-
33750041677
-
Race, Gender, and Sex on the Net: Semantic Networks of Selling and Storytelling Sex Tourism
-
Chow-White, Peter A. 2006. "Race, Gender, and Sex on the Net: Semantic Networks of Selling and Storytelling Sex Tourism." Media, Culture, and Society 28: 883 - 905.
-
(2006)
Media, Culture, and Society
, vol.28
, pp. 883-905
-
-
Chow-White, P.A.1
-
20
-
-
84859365388
-
-
Washington, DC, National Institute of Justice, NIJ Grant No. 2007-IJ-CX-0018
-
Chu, Bill, Thomas J. Holt, and Gail Joon Ahn. 2010. Examining the Creation, Distribution, and Function of Malware On-Line. Washington, DC: National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018.
-
(2010)
Examining the Creation, Distribution, and Function of Malware On-Line
-
-
Chu, B.1
Holt, T.J.2
Ahn, G.J.3
-
21
-
-
84868531473
-
'Sexting' and Sex Offender Registration: Do Age, Gender, and Sexual Orientation Matter?
-
Comartin, Erin, Roger Kernsmith, and Poco Kernsmith. 2013. "'Sexting' and Sex Offender Registration: Do Age, Gender, and Sexual Orientation Matter?" Deviant Behavior 34 (1): 38 - 52.
-
(2013)
Deviant Behavior
, vol.34
, Issue.1
, pp. 38-52
-
-
Comartin, E.1
Kernsmith, R.2
Kernsmith, P.3
-
22
-
-
79959924444
-
Sex for Sale: Online Commerce in the World's Oldest Profession
-
In: Holt Thomas J., editors Raleigh, NC, Carolina Academic Press
-
Cunningham, Scott and Todd Kendall. 2010. "Sex for Sale: Online Commerce in the World's Oldest Profession." Pp. 114 - 140 in Crime On-line: Correlates, Causes, and Context, edited by Thomas J. Holt. Raleigh, NC: Carolina Academic Press.
-
(2010)
Crime On-line: Correlates, Causes, and Context
, pp. 114-140
-
-
Cunningham, S.1
Kendall, T.2
-
23
-
-
79959934672
-
Men-in-Transit and Prostitution: Using Political Conventions as a Natural Experiment
-
Cunningham S. Kendall T. 2011. "Men-in-Transit and Prostitution: Using Political Conventions as a Natural Experiment." The B. E. Journal of Economic Analysis and Policy 11: 1 - 18.
-
(2011)
The B. E. Journal of Economic Analysis and Policy
, vol.11
, pp. 1-18
-
-
Cunningham, S.1
Kendall, T.2
-
24
-
-
34548580204
-
A Virtual View of Managing Violence among British Escorts
-
Davies, Kim and Lorraine Evans. 2007. "A Virtual View of Managing Violence among British Escorts." Deviant Behavior 28 (6): 525 - 551.
-
(2007)
Deviant Behavior
, vol.28
, Issue.6
, pp. 525-551
-
-
Davies, K.1
Evans, L.2
-
25
-
-
84865416232
-
The Social Network of Hackers
-
Decary-Hetu, David and Benoit Dupont. 2012. "The Social Network of Hackers." Global Crime 13: 160 - 175.
-
(2012)
Global Crime
, vol.13
, pp. 160-175
-
-
Decary-Hetu, D.1
Dupont, B.2
-
26
-
-
34249034842
-
Prostitution, Sex Tourism on the Internet: Whose Voice is Being Heard?
-
DeCurtis, Christina. 2003. "Prostitution, Sex Tourism on the Internet: Whose Voice is Being Heard?" Computers and Society 33: 3 - 11.
-
(2003)
Computers and Society
, vol.33
, pp. 3-11
-
-
DeCurtis, C.1
-
27
-
-
84869807463
-
Characteristics of Successful Personal Ads in a BDSM On-Line Community
-
Denney, Andrew S. and Richard Tewksbury. 2013. "Characteristics of Successful Personal Ads in a BDSM On-Line Community." Deviant Behavior 34 (2): 153 - 168.
-
(2013)
Deviant Behavior
, vol.34
, Issue.2
, pp. 153-168
-
-
Denney, A.S.1
Tewksbury, R.2
-
28
-
-
84925759832
-
The Electronic Cloak: Secret Sexual Deviance in Cybersociety
-
In: Jewkes Yvonne, editors Portland, OR, Willan Publishing
-
DiMarco, Heather. 2003. "The Electronic Cloak: Secret Sexual Deviance in Cybersociety." Pp. 53 - 67 in Dot.cons: Crime, Deviance, and Identity on the Internet, edited by Yvonne Jewkes. Portland, OR: Willan Publishing.
-
(2003)
Dot.cons: Crime, Deviance, and Identity on the Internet
, pp. 53-67
-
-
DiMarco, H.1
-
29
-
-
84885107426
-
Russia Cybercrime Market Doubles in 2011, Says Report
-
Retrieved June 20, 2012 ()
-
Dunn, Jeff E. 2012. "Russia Cybercrime Market Doubles in 2011, Says Report." IT World Today. Retrieved June 20, 2012 (http://www.itworld.com/security/272448/russia-cybercrime-market-doubles-2011-says-report).
-
(2012)
IT World Today
-
-
Dunn, J.E.1
-
30
-
-
34249065822
-
Show Me the Money: Cybershrews and On-Line Money Masochists
-
Durkin, Keith F. 2007. "Show Me the Money: Cybershrews and On-Line Money Masochists." Deviant Behavior 28: 355 - 378.
-
(2007)
Deviant Behavior
, vol.28
, pp. 355-378
-
-
Durkin, K.F.1
-
31
-
-
0033468743
-
Propagandizing Pederasty: A Thematic Analysis of the Online Exculpatory Accounts of Unrepentant Pedophiles
-
Durkin, Keith F. and Clifton D. Bryant. 1999. "Propagandizing Pederasty: A Thematic Analysis of the Online Exculpatory Accounts of Unrepentant Pedophiles." Deviant Behavior 20: 103 - 127.
-
(1999)
Deviant Behavior
, vol.20
, pp. 103-127
-
-
Durkin, K.F.1
Bryant, C.D.2
-
32
-
-
33750335787
-
Pathological Internet Communities: A New Direction for Sexual Deviance Research in a Post Modern Era
-
Durkin, Keith, Craig J. Forsyth, and James F. Quinn. 2006. "Pathological Internet Communities: A New Direction for Sexual Deviance Research in a Post Modern Era." Sociological Spectrum 26: 595 - 606.
-
(2006)
Sociological Spectrum
, vol.26
, pp. 595-606
-
-
Durkin, K.1
Forsyth, C.J.2
Quinn, J.F.3
-
33
-
-
77649242753
-
Cyberbullying and its Correlation to Traditional Bullying, Gender and Frequent Risky Usage of Internet-Mediated Communication Tools
-
Erdur-Baker, Odum. 2010. "Cyberbullying and its Correlation to Traditional Bullying, Gender and Frequent Risky Usage of Internet-Mediated Communication Tools." New Media Society 12: 109 - 125.
-
(2010)
New Media Society
, vol.12
, pp. 109-125
-
-
Erdur-Baker, O.1
-
34
-
-
0034310320
-
Macro and Micro Views of Erotic Tourism
-
Evans, Rhonda D., Craig J. Forsyth, and George Woodell. 2000. "Macro and Micro Views of Erotic Tourism." Deviant Behavior 21 (6): 537 - 550.
-
(2000)
Deviant Behavior
, vol.21
, Issue.6
, pp. 537-550
-
-
Evans, R.D.1
Forsyth, C.J.2
Woodell, G.3
-
35
-
-
77950331651
-
A Systematic Examination of Terrorist Use of the Internet
-
Freiburger, Tina and Jeffrey S. Crane. 2008. "A Systematic Examination of Terrorist Use of the Internet." International Journal of Cyber Criminology 2 (1): 309 - 319.
-
(2008)
International Journal of Cyber Criminology
, vol.2
, Issue.1
, pp. 309-319
-
-
Freiburger, T.1
Crane, J.S.2
-
36
-
-
27744552566
-
Bullying, Psychosocial Adjustment, and Academic Performance in Elementary School
-
Glew, Gwen M., Ming-Yu Fan, Wayne Katon, Frederick P. Rivara, and Mary A. Kernic. 2005. "Bullying, Psychosocial Adjustment, and Academic Performance in Elementary School." Archives of Pediatrics and Adolescent Medicine 159:1026-1031.
-
(2005)
Archives of Pediatrics and Adolescent Medicine
, vol.159
, pp. 1026-1031
-
-
Glew, G.M.1
Fan, M.-Y.2
Katon, W.3
Rivara, F.P.4
Kernic, M.A.5
-
40
-
-
0035381384
-
Virtual Criminality: Old Wine in New Bottles?
-
Grabosky, Peter N. 2001. "Virtual Criminality: Old Wine in New Bottles?" Social and Legal Studies 10: 243 - 249.
-
(2001)
Social and Legal Studies
, vol.10
, pp. 243-249
-
-
Grabosky, P.N.1
-
42
-
-
22744434146
-
Make Me Your Death Slave: Men Who Have Sex with Men and Use the Internet to Intentionally Spread HIV
-
Grov, Christian. 2004. "Make Me Your Death Slave: Men Who Have Sex with Men and Use the Internet to Intentionally Spread HIV." Deviant Behavior 25: 329 - 349.
-
(2004)
Deviant Behavior
, vol.25
, pp. 329-349
-
-
Grov, C.1
-
43
-
-
77956978565
-
Traditional Bullying, Cyber Bullying, and Deviance: A General Strain Theory Approach
-
Hay, Carter, Ryan C. Meldrum, and Karen Mann. 2010. "Traditional Bullying, Cyber Bullying, and Deviance: A General Strain Theory Approach." Journal of Contemporary Criminal Justice 26: 130 - 147.
-
(2010)
Journal of Contemporary Criminal Justice
, vol.26
, pp. 130-147
-
-
Hay, C.1
Meldrum, R.C.2
Mann, K.3
-
44
-
-
11144230997
-
Can Low Self-Control Help with the Understanding of the Software Piracy Problem?
-
Higgins, George E. 2005. "Can Low Self-Control Help with the Understanding of the Software Piracy Problem?" Deviant Behavior 26: 1 - 24.
-
(2005)
Deviant Behavior
, vol.26
, pp. 1-24
-
-
Higgins, G.E.1
-
46
-
-
85044912937
-
Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling
-
Higgins, George E., Brian D. Fell, and Abby L. Wilson. 2006. "Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling." Criminal Justice Studies 19: 3 - 22.
-
(2006)
Criminal Justice Studies
, vol.19
, pp. 3-22
-
-
Higgins, G.E.1
Fell, B.D.2
Wilson, A.L.3
-
47
-
-
84859192168
-
Examining the Role of Peer Influence and Self-Control on Downloading Behavior
-
Higgins, George E., Catherine D. Marcum, Tina L. Freiburger, and Melissa L. Ricketts. 2012. "Examining the Role of Peer Influence and Self-Control on Downloading Behavior." Deviant Behavior 33 (5): 412 - 423.
-
(2012)
Deviant Behavior
, vol.33
, Issue.5
, pp. 412-423
-
-
Higgins, G.E.1
Marcum, C.D.2
Freiburger, T.L.3
Ricketts, M.L.4
-
48
-
-
12744275983
-
Trends and Patterns among Software Pirates
-
Hinduja, Sameer. 2003. "Trends and Patterns among Software Pirates." Ethics and Information Technology 5: 49 - 61.
-
(2003)
Ethics and Information Technology
, vol.5
, pp. 49-61
-
-
Hinduja, S.1
-
49
-
-
8844253975
-
Perceptions of Local and State Law Enforcement Concerning the Role of Computer Crime Investigative Teams
-
Hinduja Sameer. 2004. "Perceptions of Local and State Law Enforcement Concerning the Role of Computer Crime Investigative Teams." Policing: An International Journal of Police Strategies and Management 27: 341 - 357.
-
(2004)
Policing: An International Journal of Police Strategies and Management
, vol.27
, pp. 341-357
-
-
Hinduja, S.1
-
50
-
-
59249093066
-
Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft
-
Hinduja, Sameer and Jason R. Ingram. 2008. "Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft." Western Criminology Review 9: 52 - 72.
-
(2008)
Western Criminology Review
, vol.9
, pp. 52-72
-
-
Hinduja, S.1
Ingram, J.R.2
-
53
-
-
33847270657
-
Subcultural Evolution? Examining the Influence of On-and Off-Line Experiences on Deviant Subcultures
-
Holt, Thomas J. 2007. "Subcultural Evolution? Examining the Influence of On-and Off-Line Experiences on Deviant Subcultures." Deviant Behavior 28: 171 - 198.
-
(2007)
Deviant Behavior
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
54
-
-
55149123066
-
Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers
-
Upper Saddle River, NJ, Pearson Prentice Hall
-
Smalleger F. Pittaro M. 2009. "Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers." Pp. 336 - 355 in Crimes of the Internet, edited by Frank Smalleger and Michael Pittaro. Upper Saddle River, NJ: Pearson Prentice Hall.
-
(2009)
Crimes of the Internet
, pp. 336-355
-
-
Smalleger, F.1
Pittaro, M.2
-
55
-
-
77958509140
-
Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-Line Data
-
Smalleger F. Pittaro M. 2010. "Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-Line Data." Journal of Criminal Justice Education 21: 300 - 321.
-
(2010)
Journal of Criminal Justice Education
, vol.21
, pp. 300-321
-
-
Smalleger, F.1
Pittaro, M.2
-
56
-
-
57649120953
-
Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization
-
Holt, Thomas J. and Adam M. Bossler. 2009. "Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization." Deviant Behavior 30: 1 - 25.
-
(2009)
Deviant Behavior
, vol.30
, pp. 1-25
-
-
Holt, T.J.1
Bossler, A.M.2
-
58
-
-
77949555353
-
Exploring Stolen Data Markets On-Line: Products and Market Forces
-
Holt, Thomas J. and Eric Lampke. 2010. "Exploring Stolen Data Markets On-Line: Products and Market Forces." Criminal Justice Studies 23: 33 - 50.
-
(2010)
Criminal Justice Studies
, vol.23
, pp. 33-50
-
-
Holt, T.J.1
Lampke, E.2
-
59
-
-
77956038407
-
Transferring Subcultural Knowledge On-line: Practices and Beliefs of Persistent Digital Pirates
-
Holt, Thomas J. and Heith Copes. 2010. "Transferring Subcultural Knowledge On-line: Practices and Beliefs of Persistent Digital Pirates." Deviant Behavior 31: 625 - 654.
-
(2010)
Deviant Behavior
, vol.31
, pp. 625-654
-
-
Holt, T.J.1
Copes, H.2
-
60
-
-
34249054920
-
Examining Sex Work from the Client's Perspective: Assessing Johns Using Online Data
-
Holt, Thomas J. and Kristie R. Blevins. 2007. "Examining Sex Work from the Client's Perspective: Assessing Johns Using Online Data." Deviant Behavior 28: 333 - 354.
-
(2007)
Deviant Behavior
, vol.28
, pp. 333-354
-
-
Holt, T.J.1
Blevins, K.R.2
-
62
-
-
84867092978
-
Examining Willingness to Attack Critical Infrastructure On and Off-Line
-
Holt T.J. Kilger M. 2012. "Examining Willingness to Attack Critical Infrastructure On and Off-Line." Crime and Delinquency 58 (5): 798 - 822.
-
(2012)
Crime and Delinquency
, vol.58
, Issue.5
, pp. 798-822
-
-
Holt, T.J.1
Kilger, M.2
-
63
-
-
84858179302
-
Examining Risks and Protective Factors of On Line Identity Theft
-
Holt, Thomas J. and Michael G. Turner. 2012. "Examining Risks and Protective Factors of On Line Identity Theft." Deviant Behavior 33:308-323.
-
(2012)
Deviant Behavior
, vol.33
, pp. 308-323
-
-
Holt, T.J.1
Turner, M.G.2
-
64
-
-
84865612809
-
Low Self-Control Deviant Peer Associations and Juvenile Cyberdeviance
-
Holt, Thomas J., Adam M. Bossler, and David C. May. 2012. "Low Self-Control Deviant Peer Associations and Juvenile Cyberdeviance." American Journal of Criminal Justice 37 (3): 378 - 395.
-
(2012)
American Journal of Criminal Justice
, vol.37
, Issue.3
, pp. 378-395
-
-
Holt, T.J.1
Bossler, A.M.2
May, D.C.3
-
65
-
-
84886364329
-
Social Learning and Cyber Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World
-
Holt, Thomas J., George W. Burruss, and Adam M. Bossler. 2010a. "Social Learning and Cyber Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World." Journal of Crime and Justice 33: 15 - 30.
-
(2010)
Journal of Crime and Justice
, vol.33
, pp. 15-30
-
-
Holt, T.J.1
Burruss, G.W.2
Bossler, A.M.3
-
66
-
-
55649120692
-
Examining the Displacement Practices of Johns with On-Line Data
-
Holt, Thomas J., Kristie R. Blevins, and Joseph B. Kuhns. 2008. "Examining the Displacement Practices of Johns with On-Line Data." Journal of Criminal Justice 36: 522 - 528.
-
(2008)
Journal of Criminal Justice
, vol.36
, pp. 522-528
-
-
Holt, T.J.1
Blevins, K.R.2
Kuhns, J.B.3
-
68
-
-
41649096818
-
Low Self-Control, Routine Activities, and Fraud Victimization
-
Holtfreter, Kristy, Michael D. Reisig, and Travis C. Pratt. 2008. "Low Self-Control, Routine Activities, and Fraud Victimization." Criminology 46: 189 - 220.
-
(2008)
Criminology
, vol.46
, pp. 189-220
-
-
Holtfreter, K.1
Reisig, M.D.2
Pratt, T.C.3
-
69
-
-
84959213751
-
Social Engineering Exploitations in Online Communications Examining Persuasions Used in Fraudulent Emails
-
In: Holt Thomas J., editors Durham, NC, Carolina Academic Press
-
Huang, Wilson and Andrea Brockman. 2010. "Social Engineering Exploitations in Online Communications Examining Persuasions Used in Fraudulent Emails." Pp. 87 - 111 in Crime On-Line: Correlates, Causes and Context, edited by Thomas J. Holt. Durham, NC: Carolina Academic Press.
-
(2010)
Crime On-Line: Correlates, Causes and Context
, pp. 87-111
-
-
Huang, W.1
Brockman, A.2
-
70
-
-
45949086382
-
Neutralizing Music Piracy: An Empirical Examination
-
Ingram, Jason R. and Sameer Hinduja. 2008. "Neutralizing Music Piracy: An Empirical Examination." Deviant Behavior 29: 334 - 366.
-
(2008)
Deviant Behavior
, vol.29
, pp. 334-366
-
-
Ingram, J.R.1
Hinduja, S.2
-
71
-
-
84885163425
-
-
Internet Crime Complaint Center (IC3), Retrieved April 5, 2013 ()
-
Internet Crime Complaint Center (IC3). 2012. "2011 Internet Crime Report." Retrieved April 5, 2013 (http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf)
-
(2012)
2011 Internet Crime Report
-
-
-
72
-
-
84875249347
-
Space Transition Theory of Cyber Crimes
-
In:, In: Schmalleger Frank, editorsPittaro Michael, editors Upper Saddle River, NJ, Prentice Hall
-
Jaishankar, K. 2008. "Space Transition Theory of Cyber Crimes." Pp. 283 - 301 in Crimes of the Internet, edited by Frank Schmalleger and Michael Pittaro. Upper Saddle River, NJ: Prentice Hall.
-
(2008)
Crimes of the Internet
, pp. 283-301
-
-
Jaishankar, K.1
-
73
-
-
35348877312
-
-
Rockland, MA, Syngress
-
James, Lance. 2005. Phishing Exposed. Rockland, MA: Syngress.
-
(2005)
Phishing Exposed
-
-
James, L.1
-
75
-
-
84856111153
-
Trends in Youth Internet Victimization: Findings from Three Youth Internet Safety Surveys 2000-2010
-
Jones, Lisa M., Kimberly J. Mitchell, and David Finkelhor. 2012. "Trends in Youth Internet Victimization: Findings from Three Youth Internet Safety Surveys 2000-2010." Journal of Adolescent Health 50: 179 - 186.
-
(2012)
Journal of Adolescent Health
, vol.50
, pp. 179-186
-
-
Jones, L.M.1
Mitchell, K.J.2
Finkelhor, D.3
-
78
-
-
17844377362
-
School Bullying and Suicidal Risk in Korean Middle School Students
-
Kim, Young Shin, Yun-Joo Koh, and Bennett Leventhal. 2005. "School Bullying and Suicidal Risk in Korean Middle School Students." Pediatrics 115: 357 - 363.
-
(2005)
Pediatrics
, vol.115
, pp. 357-363
-
-
Kim, Y.S.1
Koh, Y.-J.2
Leventhal, B.3
-
79
-
-
77958477015
-
You Can't Cheat an Honest Man: Making ($$$s and) Sense of the Nigerian E-Mail Scams
-
In:, In: Schmalleger Frank, editorsPittaro Michael, editors Saddle River, NJ, Prentice Hall
-
King, Adam and Jim Thomas. 2009. "You Can't Cheat an Honest Man: Making ($$$s and) Sense of the Nigerian E-Mail Scams." Pp. 206 - 224 in Crimes of the Internet, edited by Frank Schmalleger and Michael Pittaro. Saddle River, NJ: Prentice Hall.
-
(2009)
Crimes of the Internet
, pp. 206-224
-
-
King, A.1
Thomas, J.2
-
80
-
-
43949094502
-
Childhood Bullying as a Risk for Later Depression and Suicidal Ideation among Finnish Males
-
Klomek, Anat B., Andre Sourander, Kirsti Kumpulainen, Jorma Piha, Tuula Tamminen, Irma Moilanen, Fredrik Almqvist, and Madelyn S. Gould. 2008. "Childhood Bullying as a Risk for Later Depression and Suicidal Ideation among Finnish Males." Journal of Affective Disorders 109: 47 - 55.
-
(2008)
Journal of Affective Disorders
, vol.109
, pp. 47-55
-
-
Klomek, A.B.1
Sourander, A.2
Kumpulainen, K.3
Piha, J.4
Tamminen, T.5
Moilanen, I.6
Almqvist, F.7
Gould, M.S.8
-
81
-
-
84871672947
-
Effectiveness of Cyber Bullying Prevention Strategies: A Study on Students' Perspectives
-
Kraft, Ellen M. and Jinchang Wang. 2009. "Effectiveness of Cyber Bullying Prevention Strategies: A Study on Students' Perspectives." International Journal of Cyber Criminology 3 (2): 513 - 535.
-
(2009)
International Journal of Cyber Criminology
, vol.3
, Issue.2
, pp. 513-535
-
-
Kraft, E.M.1
Wang, J.2
-
82
-
-
70449492764
-
Laid to Order: Male Escorts Advertising on the Internet
-
Lee-Gonyea, Jenifer A., Tammy Castle, and Nathan E. Gonyea. 2009. "Laid to Order: Male Escorts Advertising on the Internet." Deviant Behavior 30: 321 - 348.
-
(2009)
Deviant Behavior
, vol.30
, pp. 321-348
-
-
Lee-Gonyea, J.A.1
Castle, T.2
Gonyea, N.E.3
-
83
-
-
84858047531
-
Screwing the Pooch: Legitimizing Accounts in a Zoophilia On-Line Community
-
Maratea, Richard J. 2011. "Screwing the Pooch: Legitimizing Accounts in a Zoophilia On-Line Community." Deviant Behavior 32 (10): 918 - 943.
-
(2011)
Deviant Behavior
, vol.32
, Issue.10
, pp. 918-943
-
-
Maratea, R.J.1
-
84
-
-
84875313062
-
Examining Cyberstalking and Bullying: Causes, Context, and Control
-
In: Holt Thomas J., editors Raleigh, NC, Carolina Academic Press
-
Marcum, Catherine D. 2010. "Examining Cyberstalking and Bullying: Causes, Context, and Control." Pp. 175 - 192 in Crime On-Line: Correlates, Causes, and Context, edited by Thomas J. Holt. Raleigh, NC: Carolina Academic Press.
-
(2010)
Crime On-Line: Correlates, Causes, and Context
, pp. 175-192
-
-
Marcum, C.D.1
-
85
-
-
84866011421
-
The Hobbyist and the Girlfriend Experience: Behaviors and Preferences of Male Customers of Internet Sexual Service Providers
-
Milrod, Christine and Martin A. Monto. 2012. "The Hobbyist and the Girlfriend Experience: Behaviors and Preferences of Male Customers of Internet Sexual Service Providers." Deviant Behaviors 33 (10): 792 - 810.
-
(2012)
Deviant Behaviors
, vol.33
, Issue.10
, pp. 792-810
-
-
Milrod, C.1
Monto, M.A.2
-
86
-
-
84869026928
-
The Intimacy Prism: Emotion Management among the Clients of Escorts
-
Milrod, Christine and Ronald Weitzer. 2012. "The Intimacy Prism: Emotion Management among the Clients of Escorts." Men and Masculinities 15 (5): 447 - 467.
-
(2012)
Men and Masculinities
, vol.15
, Issue.5
, pp. 447-467
-
-
Milrod, C.1
Weitzer, R.2
-
87
-
-
84886368928
-
Parental Regulation and Online Activities: Examining Factors That Influence a Youth's Potential to Become a Victim of Online Harassment
-
Moore, Robert, Naga Tarun Guntupalli, and Tina Lee. 2010. "Parental Regulation and Online Activities: Examining Factors That Influence a Youth's Potential to Become a Victim of Online Harassment." International Journal of Cyber Criminology 4: 685 - 698.
-
(2010)
International Journal of Cyber Criminology
, vol.4
, pp. 685-698
-
-
Moore, R.1
Guntupalli, N.T.2
Lee, T.3
-
88
-
-
82955190605
-
An Analysis of Underground Forums
-
Motoyama, Marti, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker. 2011. "An Analysis of Underground Forums." 2011 Internet Measurement Conference, 71 - 79.
-
(2011)
2011 Internet Measurement Conference
, pp. 71-79
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Savage, S.4
Voelker, G.M.5
-
89
-
-
84885150856
-
Advance Fee Fraud: New Twists on an Old Scam
-
National White Collar Crime Center (NWC3), September 2010. Retrieved April 6, 2013 ()
-
National White Collar Crime Center (NWC3). 2010. "Advance Fee Fraud: New Twists on an Old Scam." NW3C Research Brief, September 2010. Retrieved April 6, 2013 (http://www.nw3c.org/docs/whitepapers/advance_fee_fraud_september_201002E40E1D11A1.pdf?sfvrsn=9)
-
(2010)
NW3C Research Brief
-
-
-
91
-
-
84873443277
-
Cybercrime Victimization: An Examination of Individual- and Situational-Level Factors
-
Ngo, Fawn T. and Raymond Paternoster. 2011. "Cybercrime Victimization: An Examination of Individual- and Situational-Level Factors." International Journal of Cyber Criminology 5: 773 - 793.
-
(2011)
International Journal of Cyber Criminology
, vol.5
, pp. 773-793
-
-
Ngo, F.T.1
Paternoster, R.2
-
92
-
-
84885113128
-
The Evolution of Online Piracy: Challenge and Response
-
In: Holt Thomas J., editors 2nd ed, Raleigh, NC, Carolina Academic Press
-
Nhan, Johnny. 2013. "The Evolution of Online Piracy: Challenge and Response." Pp. 61 - 80 in Crime On-Line: Causes, Correlates, and Context, 2nd ed., edited by Thomas J. Holt. Raleigh, NC: Carolina Academic Press.
-
(2013)
Crime On-Line: Causes, Correlates, and Context
, pp. 61-80
-
-
Nhan, J.1
-
93
-
-
68149146473
-
-
PandaLabs, Retrieved February 20, 2008 ()
-
PandaLabs. 2007. "Malware Infections in Protected Systems." Retrieved February 20, 2008 (http://research.pandasecurity.com/blogs/images/wp_pb_malware_infections_in_protected_systems.pdf).
-
(2007)
Malware Infections in Protected Systems
-
-
-
94
-
-
79958740734
-
Traditional and Nontraditional Bullying among Youth: A Test of General Strain Theory
-
Patchin, Justin W. and Sameer Hinduja. 2011. "Traditional and Nontraditional Bullying among Youth: A Test of General Strain Theory." Youth and Society 43: 727 - 751.
-
(2011)
Youth and Society
, vol.43
, pp. 727-751
-
-
Patchin, J.W.1
Hinduja, S.2
-
95
-
-
84868575663
-
Keyboard Gangsters: Analysis of Incidence and Correlates of Cyberbullying in a Large Urban Student Population
-
Pelfrey, Jr., William V. and Nicole L. Weber. 2013. "Keyboard Gangsters: Analysis of Incidence and Correlates of Cyberbullying in a Large Urban Student Population." Deviant Behavior 34 (1): 68 - 84.
-
(2013)
Deviant Behavior
, vol.34
, Issue.1
, pp. 68-84
-
-
Pelfrey Jr., W.V.1
Weber, N.L.2
-
96
-
-
35048877207
-
-
Pew Internet and American Life, Retrieved November 7, 2007 ()
-
Pew Internet and American Life. 2005. "Pew Internet and American Life Project." Retrieved November 7, 2007 (http://www.pewinternet.org/Reports/2009/10_Home_Broadband_Adoption-2009.aspx).
-
(2005)
Pew Internet and American Life Project
-
-
-
97
-
-
0039842473
-
The Empirical Status of Gottfredson and Hirschi's General Theory of Crime: A Meta-Analysis
-
Pratt, Travis C. and Francis T. Cullen. 2000. "The Empirical Status of Gottfredson and Hirschi's General Theory of Crime: A Meta-Analysis." Criminology 38: 931 - 964.
-
(2000)
Criminology
, vol.38
, pp. 931-964
-
-
Pratt, T.C.1
Cullen, F.T.2
-
98
-
-
77954936505
-
Routine On-line Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory
-
Pratt, Travis C., Kristie Holtfreter, and Matthew D. Reisig. 2010. "Routine On-line Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory." Journal of Research in Crime and Delinquency 47: 267 - 296.
-
(2010)
Journal of Research in Crime and Delinquency
, vol.47
, pp. 267-296
-
-
Pratt, T.C.1
Holtfreter, K.2
Reisig, M.D.3
-
99
-
-
77958566340
-
The Empirical Status of Social Learning Theory: A Meta-Analysis
-
Pratt, Travis C., Francis T. Cullen, Christine S. Sellers, Thomas Winfree, Tamara D. Madensen, Leah E. Daigle, Noelle E. Fearn, and Jacinta M. Gau. 2009. "The Empirical Status of Social Learning Theory: A Meta-Analysis." Justice Quarterly 27: 765 - 802.
-
(2009)
Justice Quarterly
, vol.27
, pp. 765-802
-
-
Pratt, T.C.1
Cullen, F.T.2
Sellers, C.S.3
Winfree, T.4
Madensen, T.D.5
Daigle, L.E.6
Fearn, N.E.7
Gau, J.M.8
-
100
-
-
78650403578
-
Escort Advertisements and Male Patronage of Prostitutes
-
Pruitt, Matthew and Amy Krull. 2011. "Escort Advertisements and Male Patronage of Prostitutes." Deviant Behavior 32: 38 - 63.
-
(2011)
Deviant Behavior
, vol.32
, pp. 38-63
-
-
Pruitt, M.1
Krull, A.2
-
101
-
-
0036660265
-
Child Pornography and the Internet: Perpetuating a Cycle of Abuse
-
Quayle, Ethel and Max Taylor. 2002. "Child Pornography and the Internet: Perpetuating a Cycle of Abuse." Deviant Behavior 23: 331 - 361.
-
(2002)
Deviant Behavior
, vol.23
, pp. 331-361
-
-
Quayle, E.1
Taylor, M.2
-
102
-
-
18444388003
-
Describing Sexual Behavior in the Era of the Internet: A Typology for Empirical Research
-
Quinn, James F. and Craig J. Forsyth. 2005. "Describing Sexual Behavior in the Era of the Internet: A Typology for Empirical Research." Deviant Behavior 26: 191 - 207.
-
(2005)
Deviant Behavior
, vol.26
, pp. 191-207
-
-
Quinn, J.F.1
Forsyth, C.J.2
-
103
-
-
84875957116
-
Red Light Districts on Blue Screens: A Typology for Understanding the Evolution of Deviant Communities on the Internet
-
Quinn J.F. Forsyth C.J. 2013. "Red Light Districts on Blue Screens: A Typology for Understanding the Evolution of Deviant Communities on the Internet." Deviant Behavior 34: 579 - 585.
-
(2013)
Deviant Behavior
, vol.34
, pp. 579-585
-
-
Quinn, J.F.1
Forsyth, C.J.2
-
104
-
-
84885099418
-
Industrial Control Systems and Cybercrime
-
In: Holt Thomas J., editors 2nd ed., Raleigh, NC, Carolina Academic Press
-
Rege, Aunshul. 2013. "Industrial Control Systems and Cybercrime." Pp. 191 - 218 in Crime On-line: Causes, Correlates, and Context, 2nd ed., edited by Thomas J. Holt. Raleigh, NC: Carolina Academic Press.
-
(2013)
Crime On-line: Causes, Correlates, and Context
, pp. 191-218
-
-
Rege, A.1
-
105
-
-
80053022445
-
Stalking in the Twilight Zone: Extent of Cyberstalking Victimization and Offending among College Students
-
Reyns, Bradford W., Billy Henson, and Bonnie S. Fisher. 2012. "Stalking in the Twilight Zone: Extent of Cyberstalking Victimization and Offending among College Students." Deviant Behavior 33: 1 - 25.
-
(2012)
Deviant Behavior
, vol.33
, pp. 1-25
-
-
Reyns, B.W.1
Henson, B.2
Fisher, B.S.3
-
106
-
-
84866018228
-
Social Control in a Sexually Deviant Cybercommunity: A Cappers' Code of Conduct
-
Roberts, Joshua W. and Scott A. Hunt. 2012. "Social Control in a Sexually Deviant Cybercommunity: A Cappers' Code of Conduct." Deviant Behavior 33 (10): 757 - 773.
-
(2012)
Deviant Behavior
, vol.33
, Issue.10
, pp. 757-773
-
-
Roberts, J.W.1
Hunt, S.A.2
-
107
-
-
84871555760
-
Displacing the Dominant 'Down Low' Discourse: Deviance, Same-Sex Desire, and Craigslist.org
-
Robinson, Brandon Andrew and Salvador Vidal-Ortiz. 2013. "Displacing the Dominant 'Down Low' Discourse: Deviance, Same-Sex Desire, and Craigslist.org." Deviant Behavior 34 (3): 224 - 241.
-
(2013)
Deviant Behavior
, vol.34
, Issue.3
, pp. 224-241
-
-
Robinson, B.A.1
Vidal-Ortiz, S.2
-
108
-
-
33745740196
-
Self-Reported Deviant Computer Behavior: A Big-5 Moral Choice, and Manipulative Exploitive Behavior Analysis
-
Rogers, Marcus, Natalie D. Smoak, and Jia Liu. 2006. "Self-Reported Deviant Computer Behavior: A Big-5 Moral Choice, and Manipulative Exploitive Behavior Analysis." Deviant Behavior 27: 245 - 268.
-
(2006)
Deviant Behavior
, vol.27
, pp. 245-268
-
-
Rogers, M.1
Smoak, N.D.2
Liu, J.3
-
109
-
-
33751333476
-
Forced Online: Pushed Factors of Internet Sexuality: A Preliminary Study of Paraphilic Empowerment
-
Rosenmann, Amir and Marylin P. Safir. 2006. "Forced Online: Pushed Factors of Internet Sexuality: A Preliminary Study of Paraphilic Empowerment." Journal of Homosexuality 51: 71 - 92.
-
(2006)
Journal of Homosexuality
, vol.51
, pp. 71-92
-
-
Rosenmann, A.1
Safir, M.P.2
-
110
-
-
21244489423
-
-
Westport, CT, Quorum Books
-
Schell, Bernadette H. and John L. Dodge. 2002. The Hacking of America: Who's Doing it, Why, and How. Westport, CT: Quorum Books.
-
(2002)
The Hacking of America: Who's Doing it, Why, and How
-
-
Schell, B.H.1
Dodge, J.L.2
-
111
-
-
76149098346
-
Self-Reported Online Child Pornography Behavior: A Psychological Analysis
-
Seigfried, Katherine C., Richard W. Lovely, and Marcus K. Rogers. 2008. "Self-Reported Online Child Pornography Behavior: A Psychological Analysis." International Journal of Cyber Criminology 2 (1): 286 - 297.
-
(2008)
International Journal of Cyber Criminology
, vol.2
, Issue.1
, pp. 286-297
-
-
Seigfried, K.C.1
Lovely, R.W.2
Rogers, M.K.3
-
112
-
-
79955910993
-
An Analysis of Computer-Related Crime: Comparing Police Officer Perceptions with Empirical Data
-
Senjo, Scott R. 2004. "An Analysis of Computer-Related Crime: Comparing Police Officer Perceptions with Empirical Data." Security Journal 17: 55 - 71.
-
(2004)
Security Journal
, vol.17
, pp. 55-71
-
-
Senjo, S.R.1
-
113
-
-
17444421751
-
Cyberpunters and Cyberwhores: Prostitution on the Internet
-
In: Jewkes Yvonne, editors Portland, OR, Willan Publishing
-
Sharp, Keith and Sarah Earle. 2003. "Cyberpunters and Cyberwhores: Prostitution on the Internet." Pp. 33 - 89 in Dot Cons. Crime, Deviance and Identity on the Internet, edited by Yvonne Jewkes. Portland, OR: Willan Publishing.
-
(2003)
Dot Cons. Crime, Deviance and Identity on the Internet
, pp. 33-89
-
-
Sharp, K.1
Earle, S.2
-
114
-
-
77953831052
-
The True Cost of Sound Recording Piracy to the U.S. Economy
-
Retrieved April 1, 2013
-
Siwek, Stephen E. 2007. "The True Cost of Sound Recording Piracy to the U.S. Economy." Institute for Policy Innovation Policy Report 188. Retrieved April 1, 2013 (http://ipi.org/IPI/IPIPublications.nsf/PublicationLookupFullTextPDF/51CC65A1D4779E408625733E00529174/$File/SoundRecordingPiracy.pdf?OpenElement).
-
(2007)
Institute for Policy Innovation Policy Report 188
-
-
Siwek, S.E.1
-
115
-
-
0030668250
-
A Social Learning Theory Analysis of Computer Crime among College Students
-
Skinner, William F. and Anne F. Fream. 1997. "A Social Learning Theory Analysis of Computer Crime among College Students." Journal of Research in Crime and Delinquency 34: 495 - 518.
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.F.2
-
117
-
-
84885129358
-
-
Socialbakers,. Retrieved June 1, 2011 ()
-
Socialbakers. 2011. United States Facebook Statistics. Retrieved June 1, 2011 (http://www.socialbakers.com/facebook-statistics/united-states).
-
(2011)
United States Facebook Statistics
-
-
-
118
-
-
79955879107
-
-
Washington, DC, NCJ 186276
-
Stambaugh, Hollis, David S. Beaupre, David J. Icove, Richard Baker, Wayne Cassady, and Wayne P. Williams. 2001. Electronic Crime Needs Assessment for State and Local Law Enforcement, National Institute of Justice. Washington, DC: NCJ 186276.
-
(2001)
Electronic Crime Needs Assessment for State and Local Law Enforcement, National Institute of Justice
-
-
Stambaugh, H.1
Beaupre, D.S.2
Icove, D.J.3
Baker, R.4
Cassady, W.5
Williams, W.P.6
-
119
-
-
84868557794
-
Under the Pixelated Jolly Roger: A Study of On-Line Pirates
-
Steinmetz, Kevin F. and Kenneth D. Tunnell. 2013. "Under the Pixelated Jolly Roger: A Study of On-Line Pirates." Deviant Behavior 34: 53 - 67.
-
(2013)
Deviant Behavior
, vol.34
, pp. 53-67
-
-
Steinmetz, K.F.1
Tunnell, K.D.2
-
122
-
-
33846043733
-
-
2nd ed., Upper Saddle River, NJ, Pearson Prentice Hall
-
Taylor, Robert W., Eric J. Fritsch, Jeff Liederbach, and Thomas J. Holt. 2010. Digital Crime and Digital Terrorism., 2nd ed. Upper Saddle River, NJ: Pearson Prentice Hall.
-
(2010)
Digital Crime and Digital Terrorism.
-
-
Taylor, R.W.1
Fritsch, E.J.2
Liederbach, J.3
Holt, T.J.4
-
123
-
-
33744980670
-
Click Here for HIV: An Analysis of Internet-Based Bug Chasers and Bug Givers
-
Tewksbury, Richard. 2006. "Click Here for HIV: An Analysis of Internet-Based Bug Chasers and Bug Givers." Deviant Behavior 27: 379 - 395.
-
(2006)
Deviant Behavior
, vol.27
, pp. 379-395
-
-
Tewksbury, R.1
-
124
-
-
84885090512
-
Studios Struggle for Focus on Film Pirates' Booty
-
April 5, 2013. Retrieved April 13, 2013 ()
-
The Numbers Guy. 2013. "Studios Struggle for Focus on Film Pirates' Booty." The Wall Street Journal, April 5, 2013. Retrieved April 13, 2013 (http://on-line.wsj.com/article/SB10001424127887324600704578402850894445768.html).
-
(2013)
The Wall Street Journal
-
-
Guy, T.N.1
-
125
-
-
84940686841
-
Understanding On-line Work-At-Home Scams through an Analysis of Electronic Mail and Websites
-
In: Holt Thomas J., editors 2nd ed., Raleigh, NC, Carolina Academic Press
-
Turner, Sarah, Heith Copes, Kent R. Kerley, and Gary Warner. 2013. "Understanding On-line Work-At-Home Scams through an Analysis of Electronic Mail and Websites." Pp. 81 - 108 in Crime On-Line: Causes, Correlates, and Context, 2nd ed., edited by Thomas J. Holt. Raleigh, NC: Carolina Academic Press.
-
(2013)
Crime On-Line: Causes, Correlates, and Context
, pp. 81-108
-
-
Turner, S.1
Copes, H.2
Kerley, K.R.3
Warner, G.4
-
126
-
-
84885155959
-
The Great Cyberheist
-
November 14, 2010. Retrieved November 15, 2010 ()
-
Verini, James. 2010. "The Great Cyberheist." The New York Times, November 14, 2010. Retrieved November 15, 2010 (http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?_r=1).
-
(2010)
The New York Times
-
-
Verini, J.1
-
127
-
-
84885091138
-
-
Verison, Retrieved August 10, 2012 ()
-
Verison. 2012. "2012 Data Breach Investigations Report and Executive Summary." Retrieved August 10, 2012 (http://www.verisionbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf)
-
(2012)
2012 Data Breach Investigations Report and Executive Summary
-
-
-
128
-
-
85140528371
-
Cybercrimes and the Internet
-
In: Wall David S., editors New York, Routledge
-
Wall, David S. 2001. "Cybercrimes and the Internet." Pp. 1 - 17 in Crime and the Internet, edited by David S. Wall. New York: Routledge.
-
(2001)
Crime and the Internet
, pp. 1-17
-
-
Wall, D.S.1
-
131
-
-
84869765081
-
Identifying Sexual Grooming Themes Used by Internet Sex Offenders
-
Williams, Rebecca, Ian A. Elliott, and Anthony R. Beech. 2013. "Identifying Sexual Grooming Themes Used by Internet Sex Offenders." Deviant Behavior 34: 135 - 152.
-
(2013)
Deviant Behavior
, vol.34
, pp. 135-152
-
-
Williams, R.1
Elliott, I.A.2
Beech, A.R.3
-
132
-
-
5644270277
-
Internet-Initiated Sex Crimes against Minors: Implications for Prevention Based on Findings from a National Study
-
Wolak, Janice, David Finkelhor, and Kimberly Mitchell. 2004. "Internet-Initiated Sex Crimes against Minors: Implications for Prevention Based on Findings from a National Study." Journal of Adolescent Health 35: 424.e11 - 424.20.
-
(2004)
Journal of Adolescent Health
, vol.35
, pp. 424-442
-
-
Wolak, J.1
Finkelhor, D.2
Mitchell, K.3
-
134
-
-
47249099793
-
Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses
-
Wolfe, Scott E., George E. Higgins, and Catherine D. Marcum. 2007. "Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses." Social Science Computer Review 26: 317 - 333.
-
(2007)
Social Science Computer Review
, vol.26
, pp. 317-333
-
-
Wolfe, S.E.1
Higgins, G.E.2
Marcum, C.D.3
-
135
-
-
49649085285
-
School Bullying among Hong Kong Chinese Primary Schoolchildren
-
Wong, Dennis S. W., David P. P. Lok, T. Wing Lo, and Stephen K. Ma. 2008. "School Bullying among Hong Kong Chinese Primary Schoolchildren." Youth and Society 40: 35 - 54.
-
(2008)
Youth and Society
, vol.40
, pp. 35-54
-
-
Wong, D.S.W.1
Lok, D.P.P.2
Wing, L.T.3
Ma, S.K.4
-
136
-
-
34247657469
-
The Novelty of Cybercrime
-
Yar, Majid. 2005. "The Novelty of Cybercrime." European Journal of Criminology 2: 407 - 427.
-
(2005)
European Journal of Criminology
, vol.2
, pp. 407-427
-
-
Yar, M.1
-
137
-
-
33846928035
-
Internet Prevention Messages: Targeting the Right Online Behaviors
-
Ybarra, Michele L., Kimberly J. Mitchell, David Finkelhor, and Janis Wolak. 2007. "Internet Prevention Messages: Targeting the Right Online Behaviors." Archives of Pediatrics and Adolescent Medicine 161: 138 - 145.
-
(2007)
Archives of Pediatrics and Adolescent Medicine
, vol.161
, pp. 138-145
-
-
Ybarra, M.L.1
Mitchell, K.J.2
Finkelhor, D.3
Wolak, J.4
-
138
-
-
84886368307
-
Understanding Sexually Deviant Online Behavior from an Addiction Perspective
-
Young, Kimberly. 2008. "Understanding Sexually Deviant Online Behavior from an Addiction Perspective." International Journal of Cyber Criminology 2 (1): 298 - 307.
-
(2008)
International Journal of Cyber Criminology
, vol.2
, Issue.1
, pp. 298-307
-
-
Young, K.1
|