메뉴 건너뛰기




Volumn 35, Issue 1, 2014, Pages 20-40

An Assessment of the Current State of Cybercrime Scholarship

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84885115078     PISSN: 01639625     EISSN: 15210456     Source Type: Journal    
DOI: 10.1080/01639625.2013.822209     Document Type: Article
Times cited : (199)

References (138)
  • 1
    • 51049113746 scopus 로고    scopus 로고
    • General Strain Theory: Current Status and Directions for Further Research
    • In:, In:, In: Cullen Francis T., editorsWright John P., editorsBlevins Kristie R., editors New Brunswick, NJ, Transaction
    • Agnew, Robert. 2006. "General Strain Theory: Current Status and Directions for Further Research." Pp. 137 - 158 in Taking Stock: The Status of Criminological Theory (Advances in Criminological Theory, Vol. 16), edited by Francis T. Cullen, John P. Wright, and Kristie R. Blevins. New Brunswick, NJ: Transaction.
    • (2006) Taking Stock: The Status of Criminological Theory (Advances in Criminological Theory, Vol. 16) , pp. 137-158
    • Agnew, R.1
  • 2
    • 84885164719 scopus 로고    scopus 로고
    • Understanding the Changing Needs of the US Online Consumer, 2010. An Empowered Report: How Online and Mobile Behaviors are Changing
    • Retrieved August 15, 2011
    • Anderson, Jacqueline. 2010. "Understanding the Changing Needs of the US Online Consumer, 2010. An Empowered Report: How Online and Mobile Behaviors are Changing." Forrester Research. Retrieved August 15, 2011 (http://www.forrester.com/rb/Research/understanding_changing_needs_of_us_on-line_consumer%2C/q/id/57861/t/2)
    • (2010) Forrester Research
    • Anderson, J.1
  • 3
    • 77956054664 scopus 로고    scopus 로고
    • Lesson Spurned? Reactions of Online Music Pirates to Legal Prosecutions by the RIAA
    • Bachmann, Michael. 2007. "Lesson Spurned? Reactions of Online Music Pirates to Legal Prosecutions by the RIAA." International Journal of Cyber Criminology 2 (1): 213 - 227.
    • (2007) International Journal of Cyber Criminology , vol.2 , Issue.1 , pp. 213-227
    • Bachmann, M.1
  • 4
    • 27744598545 scopus 로고    scopus 로고
    • Cyber-Harassment: A study of a New Method for an Old Behavior
    • Beran, Tanya and Qing Li. 2005. "Cyber-Harassment: A study of a New Method for an Old Behavior." Journal of Educational Computing Research 32: 265 - 277.
    • (2005) Journal of Educational Computing Research , vol.32 , pp. 265-277
    • Beran, T.1    Li, Q.2
  • 5
    • 59849120503 scopus 로고    scopus 로고
    • The Relationship between Cyberbullying and School Bullying
    • Beran T Li Q. 2007. "The Relationship between Cyberbullying and School Bullying." Journal of Student Wellbeing 1: 15 - 33.
    • (2007) Journal of Student Wellbeing , vol.1 , pp. 15-33
    • Beran, T.1    Li, Q.2
  • 7
    • 84899252279 scopus 로고    scopus 로고
    • The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?
    • In:, In: Holt Thomas J., editorsSchell Bernadette H., editors Hershey, PA, IGI Global
    • Bossler, Adam M. and George W. Burruss. 2011. "The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?" Pp. 38 - 67 in Corporate Hacking and Technology Driven Crime: Social Dynamics and Implications, edited by Thomas J. Holt and Bernadette H. Schell. Hershey, PA: IGI Global.
    • (2011) Corporate Hacking and Technology Driven Crime: Social Dynamics and Implications , pp. 38-67
    • Bossler, A.M.1    Burruss, G.W.2
  • 8
    • 80052980820 scopus 로고    scopus 로고
    • On-Line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory
    • Bossler, Adam M. and Thomas J. Holt. 2009. "On-Line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory." International Journal of Cyber Criminology 3: 400 - 420.
    • (2009) International Journal of Cyber Criminology , vol.3 , pp. 400-420
    • Bossler, A.M.1    Holt, T.J.2
  • 9
    • 77953123853 scopus 로고    scopus 로고
    • The Effect of Self Control on Victimization in the Cyberworld
    • Bossler A.M. Holt T.J. 2010. "The Effect of Self Control on Victimization in the Cyberworld." Journal of Criminal Justice 38: 227 - 236.
    • (2010) Journal of Criminal Justice , vol.38 , pp. 227-236
    • Bossler, A.M.1    Holt, T.J.2
  • 11
    • 84873862286 scopus 로고    scopus 로고
    • Predicting Online Harassment among a Juvenile Population
    • Bossler, Adam M., Thomas J. Holt, and David C. May. 2012. "Predicting Online Harassment among a Juvenile Population." Youth and Society 44:500-523.
    • (2012) Youth and Society , vol.44 , pp. 500-523
    • Bossler, A.M.1    Holt, T.J.2    May, D.C.3
  • 13
    • 84859329159 scopus 로고    scopus 로고
    • Terrorism and Technology: Operationalizing Cyberterrorism and Identifying Concepts
    • In: Holt T. J., editors Raleigh, NC, Carolina Academic Press
    • Britz, M. T. 2010. "Terrorism and Technology: Operationalizing Cyberterrorism and Identifying Concepts." Pp. 193 - 220 in Crime On-Line: Correlates, Causes, and Context, edited by T. J. Holt. Raleigh, NC: Carolina Academic Press.
    • (2010) Crime On-Line: Correlates, Causes, and Context , pp. 193-220
    • Britz, M.T.1
  • 15
    • 84887542581 scopus 로고    scopus 로고
    • Assessing the Mediation of a Fuller Social Learning Model on Low Self-Control's Influence on Software Piracy
    • Burruss, George W., Adam M. Bossler, and Thomas J. Holt. 2012. "Assessing the Mediation of a Fuller Social Learning Model on Low Self-Control's Influence on Software Piracy." Crime and Delinquency. doi: 10.1177/0011128712437915.
    • (2012) Crime and Delinquency
    • Burruss, G.W.1    Bossler, A.M.2    Holt, T.J.3
  • 17
    • 40549127737 scopus 로고    scopus 로고
    • Ordering Sex in Cyberspace: A Content Analysis of Escort Websites
    • Castle, Tammy and Jenifer Lee. 2008. "Ordering Sex in Cyberspace: A Content Analysis of Escort Websites." International Journal of Cultural Studies 11: 107 - 121.
    • (2008) International Journal of Cultural Studies , vol.11 , pp. 107-121
    • Castle, T.1    Lee, J.2
  • 18
    • 77949584268 scopus 로고    scopus 로고
    • Computer Crime Victimization and Integrated Theory: An Empirical Assessment
    • Choi, Kyung C. 2008. "Computer Crime Victimization and Integrated Theory: An Empirical Assessment." International Journal of Cyber Criminology 2: 308 - 333.
    • (2008) International Journal of Cyber Criminology , vol.2 , pp. 308-333
    • Choi, K.C.1
  • 19
    • 33750041677 scopus 로고    scopus 로고
    • Race, Gender, and Sex on the Net: Semantic Networks of Selling and Storytelling Sex Tourism
    • Chow-White, Peter A. 2006. "Race, Gender, and Sex on the Net: Semantic Networks of Selling and Storytelling Sex Tourism." Media, Culture, and Society 28: 883 - 905.
    • (2006) Media, Culture, and Society , vol.28 , pp. 883-905
    • Chow-White, P.A.1
  • 21
    • 84868531473 scopus 로고    scopus 로고
    • 'Sexting' and Sex Offender Registration: Do Age, Gender, and Sexual Orientation Matter?
    • Comartin, Erin, Roger Kernsmith, and Poco Kernsmith. 2013. "'Sexting' and Sex Offender Registration: Do Age, Gender, and Sexual Orientation Matter?" Deviant Behavior 34 (1): 38 - 52.
    • (2013) Deviant Behavior , vol.34 , Issue.1 , pp. 38-52
    • Comartin, E.1    Kernsmith, R.2    Kernsmith, P.3
  • 22
    • 79959924444 scopus 로고    scopus 로고
    • Sex for Sale: Online Commerce in the World's Oldest Profession
    • In: Holt Thomas J., editors Raleigh, NC, Carolina Academic Press
    • Cunningham, Scott and Todd Kendall. 2010. "Sex for Sale: Online Commerce in the World's Oldest Profession." Pp. 114 - 140 in Crime On-line: Correlates, Causes, and Context, edited by Thomas J. Holt. Raleigh, NC: Carolina Academic Press.
    • (2010) Crime On-line: Correlates, Causes, and Context , pp. 114-140
    • Cunningham, S.1    Kendall, T.2
  • 23
    • 79959934672 scopus 로고    scopus 로고
    • Men-in-Transit and Prostitution: Using Political Conventions as a Natural Experiment
    • Cunningham S. Kendall T. 2011. "Men-in-Transit and Prostitution: Using Political Conventions as a Natural Experiment." The B. E. Journal of Economic Analysis and Policy 11: 1 - 18.
    • (2011) The B. E. Journal of Economic Analysis and Policy , vol.11 , pp. 1-18
    • Cunningham, S.1    Kendall, T.2
  • 24
    • 34548580204 scopus 로고    scopus 로고
    • A Virtual View of Managing Violence among British Escorts
    • Davies, Kim and Lorraine Evans. 2007. "A Virtual View of Managing Violence among British Escorts." Deviant Behavior 28 (6): 525 - 551.
    • (2007) Deviant Behavior , vol.28 , Issue.6 , pp. 525-551
    • Davies, K.1    Evans, L.2
  • 25
    • 84865416232 scopus 로고    scopus 로고
    • The Social Network of Hackers
    • Decary-Hetu, David and Benoit Dupont. 2012. "The Social Network of Hackers." Global Crime 13: 160 - 175.
    • (2012) Global Crime , vol.13 , pp. 160-175
    • Decary-Hetu, D.1    Dupont, B.2
  • 26
    • 34249034842 scopus 로고    scopus 로고
    • Prostitution, Sex Tourism on the Internet: Whose Voice is Being Heard?
    • DeCurtis, Christina. 2003. "Prostitution, Sex Tourism on the Internet: Whose Voice is Being Heard?" Computers and Society 33: 3 - 11.
    • (2003) Computers and Society , vol.33 , pp. 3-11
    • DeCurtis, C.1
  • 27
    • 84869807463 scopus 로고    scopus 로고
    • Characteristics of Successful Personal Ads in a BDSM On-Line Community
    • Denney, Andrew S. and Richard Tewksbury. 2013. "Characteristics of Successful Personal Ads in a BDSM On-Line Community." Deviant Behavior 34 (2): 153 - 168.
    • (2013) Deviant Behavior , vol.34 , Issue.2 , pp. 153-168
    • Denney, A.S.1    Tewksbury, R.2
  • 28
    • 84925759832 scopus 로고    scopus 로고
    • The Electronic Cloak: Secret Sexual Deviance in Cybersociety
    • In: Jewkes Yvonne, editors Portland, OR, Willan Publishing
    • DiMarco, Heather. 2003. "The Electronic Cloak: Secret Sexual Deviance in Cybersociety." Pp. 53 - 67 in Dot.cons: Crime, Deviance, and Identity on the Internet, edited by Yvonne Jewkes. Portland, OR: Willan Publishing.
    • (2003) Dot.cons: Crime, Deviance, and Identity on the Internet , pp. 53-67
    • DiMarco, H.1
  • 29
    • 84885107426 scopus 로고    scopus 로고
    • Russia Cybercrime Market Doubles in 2011, Says Report
    • Retrieved June 20, 2012 ()
    • Dunn, Jeff E. 2012. "Russia Cybercrime Market Doubles in 2011, Says Report." IT World Today. Retrieved June 20, 2012 (http://www.itworld.com/security/272448/russia-cybercrime-market-doubles-2011-says-report).
    • (2012) IT World Today
    • Dunn, J.E.1
  • 30
    • 34249065822 scopus 로고    scopus 로고
    • Show Me the Money: Cybershrews and On-Line Money Masochists
    • Durkin, Keith F. 2007. "Show Me the Money: Cybershrews and On-Line Money Masochists." Deviant Behavior 28: 355 - 378.
    • (2007) Deviant Behavior , vol.28 , pp. 355-378
    • Durkin, K.F.1
  • 31
    • 0033468743 scopus 로고    scopus 로고
    • Propagandizing Pederasty: A Thematic Analysis of the Online Exculpatory Accounts of Unrepentant Pedophiles
    • Durkin, Keith F. and Clifton D. Bryant. 1999. "Propagandizing Pederasty: A Thematic Analysis of the Online Exculpatory Accounts of Unrepentant Pedophiles." Deviant Behavior 20: 103 - 127.
    • (1999) Deviant Behavior , vol.20 , pp. 103-127
    • Durkin, K.F.1    Bryant, C.D.2
  • 32
    • 33750335787 scopus 로고    scopus 로고
    • Pathological Internet Communities: A New Direction for Sexual Deviance Research in a Post Modern Era
    • Durkin, Keith, Craig J. Forsyth, and James F. Quinn. 2006. "Pathological Internet Communities: A New Direction for Sexual Deviance Research in a Post Modern Era." Sociological Spectrum 26: 595 - 606.
    • (2006) Sociological Spectrum , vol.26 , pp. 595-606
    • Durkin, K.1    Forsyth, C.J.2    Quinn, J.F.3
  • 33
    • 77649242753 scopus 로고    scopus 로고
    • Cyberbullying and its Correlation to Traditional Bullying, Gender and Frequent Risky Usage of Internet-Mediated Communication Tools
    • Erdur-Baker, Odum. 2010. "Cyberbullying and its Correlation to Traditional Bullying, Gender and Frequent Risky Usage of Internet-Mediated Communication Tools." New Media Society 12: 109 - 125.
    • (2010) New Media Society , vol.12 , pp. 109-125
    • Erdur-Baker, O.1
  • 34
    • 0034310320 scopus 로고    scopus 로고
    • Macro and Micro Views of Erotic Tourism
    • Evans, Rhonda D., Craig J. Forsyth, and George Woodell. 2000. "Macro and Micro Views of Erotic Tourism." Deviant Behavior 21 (6): 537 - 550.
    • (2000) Deviant Behavior , vol.21 , Issue.6 , pp. 537-550
    • Evans, R.D.1    Forsyth, C.J.2    Woodell, G.3
  • 35
    • 77950331651 scopus 로고    scopus 로고
    • A Systematic Examination of Terrorist Use of the Internet
    • Freiburger, Tina and Jeffrey S. Crane. 2008. "A Systematic Examination of Terrorist Use of the Internet." International Journal of Cyber Criminology 2 (1): 309 - 319.
    • (2008) International Journal of Cyber Criminology , vol.2 , Issue.1 , pp. 309-319
    • Freiburger, T.1    Crane, J.S.2
  • 40
    • 0035381384 scopus 로고    scopus 로고
    • Virtual Criminality: Old Wine in New Bottles?
    • Grabosky, Peter N. 2001. "Virtual Criminality: Old Wine in New Bottles?" Social and Legal Studies 10: 243 - 249.
    • (2001) Social and Legal Studies , vol.10 , pp. 243-249
    • Grabosky, P.N.1
  • 42
    • 22744434146 scopus 로고    scopus 로고
    • Make Me Your Death Slave: Men Who Have Sex with Men and Use the Internet to Intentionally Spread HIV
    • Grov, Christian. 2004. "Make Me Your Death Slave: Men Who Have Sex with Men and Use the Internet to Intentionally Spread HIV." Deviant Behavior 25: 329 - 349.
    • (2004) Deviant Behavior , vol.25 , pp. 329-349
    • Grov, C.1
  • 43
    • 77956978565 scopus 로고    scopus 로고
    • Traditional Bullying, Cyber Bullying, and Deviance: A General Strain Theory Approach
    • Hay, Carter, Ryan C. Meldrum, and Karen Mann. 2010. "Traditional Bullying, Cyber Bullying, and Deviance: A General Strain Theory Approach." Journal of Contemporary Criminal Justice 26: 130 - 147.
    • (2010) Journal of Contemporary Criminal Justice , vol.26 , pp. 130-147
    • Hay, C.1    Meldrum, R.C.2    Mann, K.3
  • 44
    • 11144230997 scopus 로고    scopus 로고
    • Can Low Self-Control Help with the Understanding of the Software Piracy Problem?
    • Higgins, George E. 2005. "Can Low Self-Control Help with the Understanding of the Software Piracy Problem?" Deviant Behavior 26: 1 - 24.
    • (2005) Deviant Behavior , vol.26 , pp. 1-24
    • Higgins, G.E.1
  • 46
    • 85044912937 scopus 로고    scopus 로고
    • Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling
    • Higgins, George E., Brian D. Fell, and Abby L. Wilson. 2006. "Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling." Criminal Justice Studies 19: 3 - 22.
    • (2006) Criminal Justice Studies , vol.19 , pp. 3-22
    • Higgins, G.E.1    Fell, B.D.2    Wilson, A.L.3
  • 47
    • 84859192168 scopus 로고    scopus 로고
    • Examining the Role of Peer Influence and Self-Control on Downloading Behavior
    • Higgins, George E., Catherine D. Marcum, Tina L. Freiburger, and Melissa L. Ricketts. 2012. "Examining the Role of Peer Influence and Self-Control on Downloading Behavior." Deviant Behavior 33 (5): 412 - 423.
    • (2012) Deviant Behavior , vol.33 , Issue.5 , pp. 412-423
    • Higgins, G.E.1    Marcum, C.D.2    Freiburger, T.L.3    Ricketts, M.L.4
  • 48
    • 12744275983 scopus 로고    scopus 로고
    • Trends and Patterns among Software Pirates
    • Hinduja, Sameer. 2003. "Trends and Patterns among Software Pirates." Ethics and Information Technology 5: 49 - 61.
    • (2003) Ethics and Information Technology , vol.5 , pp. 49-61
    • Hinduja, S.1
  • 49
    • 8844253975 scopus 로고    scopus 로고
    • Perceptions of Local and State Law Enforcement Concerning the Role of Computer Crime Investigative Teams
    • Hinduja Sameer. 2004. "Perceptions of Local and State Law Enforcement Concerning the Role of Computer Crime Investigative Teams." Policing: An International Journal of Police Strategies and Management 27: 341 - 357.
    • (2004) Policing: An International Journal of Police Strategies and Management , vol.27 , pp. 341-357
    • Hinduja, S.1
  • 50
    • 59249093066 scopus 로고    scopus 로고
    • Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft
    • Hinduja, Sameer and Jason R. Ingram. 2008. "Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft." Western Criminology Review 9: 52 - 72.
    • (2008) Western Criminology Review , vol.9 , pp. 52-72
    • Hinduja, S.1    Ingram, J.R.2
  • 53
    • 33847270657 scopus 로고    scopus 로고
    • Subcultural Evolution? Examining the Influence of On-and Off-Line Experiences on Deviant Subcultures
    • Holt, Thomas J. 2007. "Subcultural Evolution? Examining the Influence of On-and Off-Line Experiences on Deviant Subcultures." Deviant Behavior 28: 171 - 198.
    • (2007) Deviant Behavior , vol.28 , pp. 171-198
    • Holt, T.J.1
  • 54
    • 55149123066 scopus 로고    scopus 로고
    • Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers
    • Upper Saddle River, NJ, Pearson Prentice Hall
    • Smalleger F. Pittaro M. 2009. "Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers." Pp. 336 - 355 in Crimes of the Internet, edited by Frank Smalleger and Michael Pittaro. Upper Saddle River, NJ: Pearson Prentice Hall.
    • (2009) Crimes of the Internet , pp. 336-355
    • Smalleger, F.1    Pittaro, M.2
  • 55
    • 77958509140 scopus 로고    scopus 로고
    • Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-Line Data
    • Smalleger F. Pittaro M. 2010. "Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-Line Data." Journal of Criminal Justice Education 21: 300 - 321.
    • (2010) Journal of Criminal Justice Education , vol.21 , pp. 300-321
    • Smalleger, F.1    Pittaro, M.2
  • 56
    • 57649120953 scopus 로고    scopus 로고
    • Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization
    • Holt, Thomas J. and Adam M. Bossler. 2009. "Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization." Deviant Behavior 30: 1 - 25.
    • (2009) Deviant Behavior , vol.30 , pp. 1-25
    • Holt, T.J.1    Bossler, A.M.2
  • 58
    • 77949555353 scopus 로고    scopus 로고
    • Exploring Stolen Data Markets On-Line: Products and Market Forces
    • Holt, Thomas J. and Eric Lampke. 2010. "Exploring Stolen Data Markets On-Line: Products and Market Forces." Criminal Justice Studies 23: 33 - 50.
    • (2010) Criminal Justice Studies , vol.23 , pp. 33-50
    • Holt, T.J.1    Lampke, E.2
  • 59
    • 77956038407 scopus 로고    scopus 로고
    • Transferring Subcultural Knowledge On-line: Practices and Beliefs of Persistent Digital Pirates
    • Holt, Thomas J. and Heith Copes. 2010. "Transferring Subcultural Knowledge On-line: Practices and Beliefs of Persistent Digital Pirates." Deviant Behavior 31: 625 - 654.
    • (2010) Deviant Behavior , vol.31 , pp. 625-654
    • Holt, T.J.1    Copes, H.2
  • 60
    • 34249054920 scopus 로고    scopus 로고
    • Examining Sex Work from the Client's Perspective: Assessing Johns Using Online Data
    • Holt, Thomas J. and Kristie R. Blevins. 2007. "Examining Sex Work from the Client's Perspective: Assessing Johns Using Online Data." Deviant Behavior 28: 333 - 354.
    • (2007) Deviant Behavior , vol.28 , pp. 333-354
    • Holt, T.J.1    Blevins, K.R.2
  • 62
    • 84867092978 scopus 로고    scopus 로고
    • Examining Willingness to Attack Critical Infrastructure On and Off-Line
    • Holt T.J. Kilger M. 2012. "Examining Willingness to Attack Critical Infrastructure On and Off-Line." Crime and Delinquency 58 (5): 798 - 822.
    • (2012) Crime and Delinquency , vol.58 , Issue.5 , pp. 798-822
    • Holt, T.J.1    Kilger, M.2
  • 63
    • 84858179302 scopus 로고    scopus 로고
    • Examining Risks and Protective Factors of On Line Identity Theft
    • Holt, Thomas J. and Michael G. Turner. 2012. "Examining Risks and Protective Factors of On Line Identity Theft." Deviant Behavior 33:308-323.
    • (2012) Deviant Behavior , vol.33 , pp. 308-323
    • Holt, T.J.1    Turner, M.G.2
  • 64
    • 84865612809 scopus 로고    scopus 로고
    • Low Self-Control Deviant Peer Associations and Juvenile Cyberdeviance
    • Holt, Thomas J., Adam M. Bossler, and David C. May. 2012. "Low Self-Control Deviant Peer Associations and Juvenile Cyberdeviance." American Journal of Criminal Justice 37 (3): 378 - 395.
    • (2012) American Journal of Criminal Justice , vol.37 , Issue.3 , pp. 378-395
    • Holt, T.J.1    Bossler, A.M.2    May, D.C.3
  • 65
    • 84886364329 scopus 로고    scopus 로고
    • Social Learning and Cyber Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World
    • Holt, Thomas J., George W. Burruss, and Adam M. Bossler. 2010a. "Social Learning and Cyber Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World." Journal of Crime and Justice 33: 15 - 30.
    • (2010) Journal of Crime and Justice , vol.33 , pp. 15-30
    • Holt, T.J.1    Burruss, G.W.2    Bossler, A.M.3
  • 66
    • 55649120692 scopus 로고    scopus 로고
    • Examining the Displacement Practices of Johns with On-Line Data
    • Holt, Thomas J., Kristie R. Blevins, and Joseph B. Kuhns. 2008. "Examining the Displacement Practices of Johns with On-Line Data." Journal of Criminal Justice 36: 522 - 528.
    • (2008) Journal of Criminal Justice , vol.36 , pp. 522-528
    • Holt, T.J.1    Blevins, K.R.2    Kuhns, J.B.3
  • 68
    • 41649096818 scopus 로고    scopus 로고
    • Low Self-Control, Routine Activities, and Fraud Victimization
    • Holtfreter, Kristy, Michael D. Reisig, and Travis C. Pratt. 2008. "Low Self-Control, Routine Activities, and Fraud Victimization." Criminology 46: 189 - 220.
    • (2008) Criminology , vol.46 , pp. 189-220
    • Holtfreter, K.1    Reisig, M.D.2    Pratt, T.C.3
  • 69
    • 84959213751 scopus 로고    scopus 로고
    • Social Engineering Exploitations in Online Communications Examining Persuasions Used in Fraudulent Emails
    • In: Holt Thomas J., editors Durham, NC, Carolina Academic Press
    • Huang, Wilson and Andrea Brockman. 2010. "Social Engineering Exploitations in Online Communications Examining Persuasions Used in Fraudulent Emails." Pp. 87 - 111 in Crime On-Line: Correlates, Causes and Context, edited by Thomas J. Holt. Durham, NC: Carolina Academic Press.
    • (2010) Crime On-Line: Correlates, Causes and Context , pp. 87-111
    • Huang, W.1    Brockman, A.2
  • 70
    • 45949086382 scopus 로고    scopus 로고
    • Neutralizing Music Piracy: An Empirical Examination
    • Ingram, Jason R. and Sameer Hinduja. 2008. "Neutralizing Music Piracy: An Empirical Examination." Deviant Behavior 29: 334 - 366.
    • (2008) Deviant Behavior , vol.29 , pp. 334-366
    • Ingram, J.R.1    Hinduja, S.2
  • 71
    • 84885163425 scopus 로고    scopus 로고
    • Internet Crime Complaint Center (IC3), Retrieved April 5, 2013 ()
    • Internet Crime Complaint Center (IC3). 2012. "2011 Internet Crime Report." Retrieved April 5, 2013 (http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf)
    • (2012) 2011 Internet Crime Report
  • 72
    • 84875249347 scopus 로고    scopus 로고
    • Space Transition Theory of Cyber Crimes
    • In:, In: Schmalleger Frank, editorsPittaro Michael, editors Upper Saddle River, NJ, Prentice Hall
    • Jaishankar, K. 2008. "Space Transition Theory of Cyber Crimes." Pp. 283 - 301 in Crimes of the Internet, edited by Frank Schmalleger and Michael Pittaro. Upper Saddle River, NJ: Prentice Hall.
    • (2008) Crimes of the Internet , pp. 283-301
    • Jaishankar, K.1
  • 73
  • 75
    • 84856111153 scopus 로고    scopus 로고
    • Trends in Youth Internet Victimization: Findings from Three Youth Internet Safety Surveys 2000-2010
    • Jones, Lisa M., Kimberly J. Mitchell, and David Finkelhor. 2012. "Trends in Youth Internet Victimization: Findings from Three Youth Internet Safety Surveys 2000-2010." Journal of Adolescent Health 50: 179 - 186.
    • (2012) Journal of Adolescent Health , vol.50 , pp. 179-186
    • Jones, L.M.1    Mitchell, K.J.2    Finkelhor, D.3
  • 78
    • 17844377362 scopus 로고    scopus 로고
    • School Bullying and Suicidal Risk in Korean Middle School Students
    • Kim, Young Shin, Yun-Joo Koh, and Bennett Leventhal. 2005. "School Bullying and Suicidal Risk in Korean Middle School Students." Pediatrics 115: 357 - 363.
    • (2005) Pediatrics , vol.115 , pp. 357-363
    • Kim, Y.S.1    Koh, Y.-J.2    Leventhal, B.3
  • 79
    • 77958477015 scopus 로고    scopus 로고
    • You Can't Cheat an Honest Man: Making ($$$s and) Sense of the Nigerian E-Mail Scams
    • In:, In: Schmalleger Frank, editorsPittaro Michael, editors Saddle River, NJ, Prentice Hall
    • King, Adam and Jim Thomas. 2009. "You Can't Cheat an Honest Man: Making ($$$s and) Sense of the Nigerian E-Mail Scams." Pp. 206 - 224 in Crimes of the Internet, edited by Frank Schmalleger and Michael Pittaro. Saddle River, NJ: Prentice Hall.
    • (2009) Crimes of the Internet , pp. 206-224
    • King, A.1    Thomas, J.2
  • 81
    • 84871672947 scopus 로고    scopus 로고
    • Effectiveness of Cyber Bullying Prevention Strategies: A Study on Students' Perspectives
    • Kraft, Ellen M. and Jinchang Wang. 2009. "Effectiveness of Cyber Bullying Prevention Strategies: A Study on Students' Perspectives." International Journal of Cyber Criminology 3 (2): 513 - 535.
    • (2009) International Journal of Cyber Criminology , vol.3 , Issue.2 , pp. 513-535
    • Kraft, E.M.1    Wang, J.2
  • 82
    • 70449492764 scopus 로고    scopus 로고
    • Laid to Order: Male Escorts Advertising on the Internet
    • Lee-Gonyea, Jenifer A., Tammy Castle, and Nathan E. Gonyea. 2009. "Laid to Order: Male Escorts Advertising on the Internet." Deviant Behavior 30: 321 - 348.
    • (2009) Deviant Behavior , vol.30 , pp. 321-348
    • Lee-Gonyea, J.A.1    Castle, T.2    Gonyea, N.E.3
  • 83
    • 84858047531 scopus 로고    scopus 로고
    • Screwing the Pooch: Legitimizing Accounts in a Zoophilia On-Line Community
    • Maratea, Richard J. 2011. "Screwing the Pooch: Legitimizing Accounts in a Zoophilia On-Line Community." Deviant Behavior 32 (10): 918 - 943.
    • (2011) Deviant Behavior , vol.32 , Issue.10 , pp. 918-943
    • Maratea, R.J.1
  • 84
    • 84875313062 scopus 로고    scopus 로고
    • Examining Cyberstalking and Bullying: Causes, Context, and Control
    • In: Holt Thomas J., editors Raleigh, NC, Carolina Academic Press
    • Marcum, Catherine D. 2010. "Examining Cyberstalking and Bullying: Causes, Context, and Control." Pp. 175 - 192 in Crime On-Line: Correlates, Causes, and Context, edited by Thomas J. Holt. Raleigh, NC: Carolina Academic Press.
    • (2010) Crime On-Line: Correlates, Causes, and Context , pp. 175-192
    • Marcum, C.D.1
  • 85
    • 84866011421 scopus 로고    scopus 로고
    • The Hobbyist and the Girlfriend Experience: Behaviors and Preferences of Male Customers of Internet Sexual Service Providers
    • Milrod, Christine and Martin A. Monto. 2012. "The Hobbyist and the Girlfriend Experience: Behaviors and Preferences of Male Customers of Internet Sexual Service Providers." Deviant Behaviors 33 (10): 792 - 810.
    • (2012) Deviant Behaviors , vol.33 , Issue.10 , pp. 792-810
    • Milrod, C.1    Monto, M.A.2
  • 86
    • 84869026928 scopus 로고    scopus 로고
    • The Intimacy Prism: Emotion Management among the Clients of Escorts
    • Milrod, Christine and Ronald Weitzer. 2012. "The Intimacy Prism: Emotion Management among the Clients of Escorts." Men and Masculinities 15 (5): 447 - 467.
    • (2012) Men and Masculinities , vol.15 , Issue.5 , pp. 447-467
    • Milrod, C.1    Weitzer, R.2
  • 87
    • 84886368928 scopus 로고    scopus 로고
    • Parental Regulation and Online Activities: Examining Factors That Influence a Youth's Potential to Become a Victim of Online Harassment
    • Moore, Robert, Naga Tarun Guntupalli, and Tina Lee. 2010. "Parental Regulation and Online Activities: Examining Factors That Influence a Youth's Potential to Become a Victim of Online Harassment." International Journal of Cyber Criminology 4: 685 - 698.
    • (2010) International Journal of Cyber Criminology , vol.4 , pp. 685-698
    • Moore, R.1    Guntupalli, N.T.2    Lee, T.3
  • 89
    • 84885150856 scopus 로고    scopus 로고
    • Advance Fee Fraud: New Twists on an Old Scam
    • National White Collar Crime Center (NWC3), September 2010. Retrieved April 6, 2013 ()
    • National White Collar Crime Center (NWC3). 2010. "Advance Fee Fraud: New Twists on an Old Scam." NW3C Research Brief, September 2010. Retrieved April 6, 2013 (http://www.nw3c.org/docs/whitepapers/advance_fee_fraud_september_201002E40E1D11A1.pdf?sfvrsn=9)
    • (2010) NW3C Research Brief
  • 91
    • 84873443277 scopus 로고    scopus 로고
    • Cybercrime Victimization: An Examination of Individual- and Situational-Level Factors
    • Ngo, Fawn T. and Raymond Paternoster. 2011. "Cybercrime Victimization: An Examination of Individual- and Situational-Level Factors." International Journal of Cyber Criminology 5: 773 - 793.
    • (2011) International Journal of Cyber Criminology , vol.5 , pp. 773-793
    • Ngo, F.T.1    Paternoster, R.2
  • 92
    • 84885113128 scopus 로고    scopus 로고
    • The Evolution of Online Piracy: Challenge and Response
    • In: Holt Thomas J., editors 2nd ed, Raleigh, NC, Carolina Academic Press
    • Nhan, Johnny. 2013. "The Evolution of Online Piracy: Challenge and Response." Pp. 61 - 80 in Crime On-Line: Causes, Correlates, and Context, 2nd ed., edited by Thomas J. Holt. Raleigh, NC: Carolina Academic Press.
    • (2013) Crime On-Line: Causes, Correlates, and Context , pp. 61-80
    • Nhan, J.1
  • 93
    • 68149146473 scopus 로고    scopus 로고
    • PandaLabs, Retrieved February 20, 2008 ()
    • PandaLabs. 2007. "Malware Infections in Protected Systems." Retrieved February 20, 2008 (http://research.pandasecurity.com/blogs/images/wp_pb_malware_infections_in_protected_systems.pdf).
    • (2007) Malware Infections in Protected Systems
  • 94
    • 79958740734 scopus 로고    scopus 로고
    • Traditional and Nontraditional Bullying among Youth: A Test of General Strain Theory
    • Patchin, Justin W. and Sameer Hinduja. 2011. "Traditional and Nontraditional Bullying among Youth: A Test of General Strain Theory." Youth and Society 43: 727 - 751.
    • (2011) Youth and Society , vol.43 , pp. 727-751
    • Patchin, J.W.1    Hinduja, S.2
  • 95
    • 84868575663 scopus 로고    scopus 로고
    • Keyboard Gangsters: Analysis of Incidence and Correlates of Cyberbullying in a Large Urban Student Population
    • Pelfrey, Jr., William V. and Nicole L. Weber. 2013. "Keyboard Gangsters: Analysis of Incidence and Correlates of Cyberbullying in a Large Urban Student Population." Deviant Behavior 34 (1): 68 - 84.
    • (2013) Deviant Behavior , vol.34 , Issue.1 , pp. 68-84
    • Pelfrey Jr., W.V.1    Weber, N.L.2
  • 96
    • 35048877207 scopus 로고    scopus 로고
    • Pew Internet and American Life, Retrieved November 7, 2007 ()
    • Pew Internet and American Life. 2005. "Pew Internet and American Life Project." Retrieved November 7, 2007 (http://www.pewinternet.org/Reports/2009/10_Home_Broadband_Adoption-2009.aspx).
    • (2005) Pew Internet and American Life Project
  • 97
    • 0039842473 scopus 로고    scopus 로고
    • The Empirical Status of Gottfredson and Hirschi's General Theory of Crime: A Meta-Analysis
    • Pratt, Travis C. and Francis T. Cullen. 2000. "The Empirical Status of Gottfredson and Hirschi's General Theory of Crime: A Meta-Analysis." Criminology 38: 931 - 964.
    • (2000) Criminology , vol.38 , pp. 931-964
    • Pratt, T.C.1    Cullen, F.T.2
  • 98
    • 77954936505 scopus 로고    scopus 로고
    • Routine On-line Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory
    • Pratt, Travis C., Kristie Holtfreter, and Matthew D. Reisig. 2010. "Routine On-line Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory." Journal of Research in Crime and Delinquency 47: 267 - 296.
    • (2010) Journal of Research in Crime and Delinquency , vol.47 , pp. 267-296
    • Pratt, T.C.1    Holtfreter, K.2    Reisig, M.D.3
  • 100
    • 78650403578 scopus 로고    scopus 로고
    • Escort Advertisements and Male Patronage of Prostitutes
    • Pruitt, Matthew and Amy Krull. 2011. "Escort Advertisements and Male Patronage of Prostitutes." Deviant Behavior 32: 38 - 63.
    • (2011) Deviant Behavior , vol.32 , pp. 38-63
    • Pruitt, M.1    Krull, A.2
  • 101
    • 0036660265 scopus 로고    scopus 로고
    • Child Pornography and the Internet: Perpetuating a Cycle of Abuse
    • Quayle, Ethel and Max Taylor. 2002. "Child Pornography and the Internet: Perpetuating a Cycle of Abuse." Deviant Behavior 23: 331 - 361.
    • (2002) Deviant Behavior , vol.23 , pp. 331-361
    • Quayle, E.1    Taylor, M.2
  • 102
    • 18444388003 scopus 로고    scopus 로고
    • Describing Sexual Behavior in the Era of the Internet: A Typology for Empirical Research
    • Quinn, James F. and Craig J. Forsyth. 2005. "Describing Sexual Behavior in the Era of the Internet: A Typology for Empirical Research." Deviant Behavior 26: 191 - 207.
    • (2005) Deviant Behavior , vol.26 , pp. 191-207
    • Quinn, J.F.1    Forsyth, C.J.2
  • 103
    • 84875957116 scopus 로고    scopus 로고
    • Red Light Districts on Blue Screens: A Typology for Understanding the Evolution of Deviant Communities on the Internet
    • Quinn J.F. Forsyth C.J. 2013. "Red Light Districts on Blue Screens: A Typology for Understanding the Evolution of Deviant Communities on the Internet." Deviant Behavior 34: 579 - 585.
    • (2013) Deviant Behavior , vol.34 , pp. 579-585
    • Quinn, J.F.1    Forsyth, C.J.2
  • 104
    • 84885099418 scopus 로고    scopus 로고
    • Industrial Control Systems and Cybercrime
    • In: Holt Thomas J., editors 2nd ed., Raleigh, NC, Carolina Academic Press
    • Rege, Aunshul. 2013. "Industrial Control Systems and Cybercrime." Pp. 191 - 218 in Crime On-line: Causes, Correlates, and Context, 2nd ed., edited by Thomas J. Holt. Raleigh, NC: Carolina Academic Press.
    • (2013) Crime On-line: Causes, Correlates, and Context , pp. 191-218
    • Rege, A.1
  • 105
    • 80053022445 scopus 로고    scopus 로고
    • Stalking in the Twilight Zone: Extent of Cyberstalking Victimization and Offending among College Students
    • Reyns, Bradford W., Billy Henson, and Bonnie S. Fisher. 2012. "Stalking in the Twilight Zone: Extent of Cyberstalking Victimization and Offending among College Students." Deviant Behavior 33: 1 - 25.
    • (2012) Deviant Behavior , vol.33 , pp. 1-25
    • Reyns, B.W.1    Henson, B.2    Fisher, B.S.3
  • 106
    • 84866018228 scopus 로고    scopus 로고
    • Social Control in a Sexually Deviant Cybercommunity: A Cappers' Code of Conduct
    • Roberts, Joshua W. and Scott A. Hunt. 2012. "Social Control in a Sexually Deviant Cybercommunity: A Cappers' Code of Conduct." Deviant Behavior 33 (10): 757 - 773.
    • (2012) Deviant Behavior , vol.33 , Issue.10 , pp. 757-773
    • Roberts, J.W.1    Hunt, S.A.2
  • 107
    • 84871555760 scopus 로고    scopus 로고
    • Displacing the Dominant 'Down Low' Discourse: Deviance, Same-Sex Desire, and Craigslist.org
    • Robinson, Brandon Andrew and Salvador Vidal-Ortiz. 2013. "Displacing the Dominant 'Down Low' Discourse: Deviance, Same-Sex Desire, and Craigslist.org." Deviant Behavior 34 (3): 224 - 241.
    • (2013) Deviant Behavior , vol.34 , Issue.3 , pp. 224-241
    • Robinson, B.A.1    Vidal-Ortiz, S.2
  • 108
    • 33745740196 scopus 로고    scopus 로고
    • Self-Reported Deviant Computer Behavior: A Big-5 Moral Choice, and Manipulative Exploitive Behavior Analysis
    • Rogers, Marcus, Natalie D. Smoak, and Jia Liu. 2006. "Self-Reported Deviant Computer Behavior: A Big-5 Moral Choice, and Manipulative Exploitive Behavior Analysis." Deviant Behavior 27: 245 - 268.
    • (2006) Deviant Behavior , vol.27 , pp. 245-268
    • Rogers, M.1    Smoak, N.D.2    Liu, J.3
  • 109
    • 33751333476 scopus 로고    scopus 로고
    • Forced Online: Pushed Factors of Internet Sexuality: A Preliminary Study of Paraphilic Empowerment
    • Rosenmann, Amir and Marylin P. Safir. 2006. "Forced Online: Pushed Factors of Internet Sexuality: A Preliminary Study of Paraphilic Empowerment." Journal of Homosexuality 51: 71 - 92.
    • (2006) Journal of Homosexuality , vol.51 , pp. 71-92
    • Rosenmann, A.1    Safir, M.P.2
  • 111
    • 76149098346 scopus 로고    scopus 로고
    • Self-Reported Online Child Pornography Behavior: A Psychological Analysis
    • Seigfried, Katherine C., Richard W. Lovely, and Marcus K. Rogers. 2008. "Self-Reported Online Child Pornography Behavior: A Psychological Analysis." International Journal of Cyber Criminology 2 (1): 286 - 297.
    • (2008) International Journal of Cyber Criminology , vol.2 , Issue.1 , pp. 286-297
    • Seigfried, K.C.1    Lovely, R.W.2    Rogers, M.K.3
  • 112
    • 79955910993 scopus 로고    scopus 로고
    • An Analysis of Computer-Related Crime: Comparing Police Officer Perceptions with Empirical Data
    • Senjo, Scott R. 2004. "An Analysis of Computer-Related Crime: Comparing Police Officer Perceptions with Empirical Data." Security Journal 17: 55 - 71.
    • (2004) Security Journal , vol.17 , pp. 55-71
    • Senjo, S.R.1
  • 113
    • 17444421751 scopus 로고    scopus 로고
    • Cyberpunters and Cyberwhores: Prostitution on the Internet
    • In: Jewkes Yvonne, editors Portland, OR, Willan Publishing
    • Sharp, Keith and Sarah Earle. 2003. "Cyberpunters and Cyberwhores: Prostitution on the Internet." Pp. 33 - 89 in Dot Cons. Crime, Deviance and Identity on the Internet, edited by Yvonne Jewkes. Portland, OR: Willan Publishing.
    • (2003) Dot Cons. Crime, Deviance and Identity on the Internet , pp. 33-89
    • Sharp, K.1    Earle, S.2
  • 114
    • 77953831052 scopus 로고    scopus 로고
    • The True Cost of Sound Recording Piracy to the U.S. Economy
    • Retrieved April 1, 2013
    • Siwek, Stephen E. 2007. "The True Cost of Sound Recording Piracy to the U.S. Economy." Institute for Policy Innovation Policy Report 188. Retrieved April 1, 2013 (http://ipi.org/IPI/IPIPublications.nsf/PublicationLookupFullTextPDF/51CC65A1D4779E408625733E00529174/$File/SoundRecordingPiracy.pdf?OpenElement).
    • (2007) Institute for Policy Innovation Policy Report 188
    • Siwek, S.E.1
  • 115
    • 0030668250 scopus 로고    scopus 로고
    • A Social Learning Theory Analysis of Computer Crime among College Students
    • Skinner, William F. and Anne F. Fream. 1997. "A Social Learning Theory Analysis of Computer Crime among College Students." Journal of Research in Crime and Delinquency 34: 495 - 518.
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , pp. 495-518
    • Skinner, W.F.1    Fream, A.F.2
  • 117
    • 84885129358 scopus 로고    scopus 로고
    • Socialbakers,. Retrieved June 1, 2011 ()
    • Socialbakers. 2011. United States Facebook Statistics. Retrieved June 1, 2011 (http://www.socialbakers.com/facebook-statistics/united-states).
    • (2011) United States Facebook Statistics
  • 119
    • 84868557794 scopus 로고    scopus 로고
    • Under the Pixelated Jolly Roger: A Study of On-Line Pirates
    • Steinmetz, Kevin F. and Kenneth D. Tunnell. 2013. "Under the Pixelated Jolly Roger: A Study of On-Line Pirates." Deviant Behavior 34: 53 - 67.
    • (2013) Deviant Behavior , vol.34 , pp. 53-67
    • Steinmetz, K.F.1    Tunnell, K.D.2
  • 123
    • 33744980670 scopus 로고    scopus 로고
    • Click Here for HIV: An Analysis of Internet-Based Bug Chasers and Bug Givers
    • Tewksbury, Richard. 2006. "Click Here for HIV: An Analysis of Internet-Based Bug Chasers and Bug Givers." Deviant Behavior 27: 379 - 395.
    • (2006) Deviant Behavior , vol.27 , pp. 379-395
    • Tewksbury, R.1
  • 124
    • 84885090512 scopus 로고    scopus 로고
    • Studios Struggle for Focus on Film Pirates' Booty
    • April 5, 2013. Retrieved April 13, 2013 ()
    • The Numbers Guy. 2013. "Studios Struggle for Focus on Film Pirates' Booty." The Wall Street Journal, April 5, 2013. Retrieved April 13, 2013 (http://on-line.wsj.com/article/SB10001424127887324600704578402850894445768.html).
    • (2013) The Wall Street Journal
    • Guy, T.N.1
  • 125
    • 84940686841 scopus 로고    scopus 로고
    • Understanding On-line Work-At-Home Scams through an Analysis of Electronic Mail and Websites
    • In: Holt Thomas J., editors 2nd ed., Raleigh, NC, Carolina Academic Press
    • Turner, Sarah, Heith Copes, Kent R. Kerley, and Gary Warner. 2013. "Understanding On-line Work-At-Home Scams through an Analysis of Electronic Mail and Websites." Pp. 81 - 108 in Crime On-Line: Causes, Correlates, and Context, 2nd ed., edited by Thomas J. Holt. Raleigh, NC: Carolina Academic Press.
    • (2013) Crime On-Line: Causes, Correlates, and Context , pp. 81-108
    • Turner, S.1    Copes, H.2    Kerley, K.R.3    Warner, G.4
  • 126
    • 84885155959 scopus 로고    scopus 로고
    • The Great Cyberheist
    • November 14, 2010. Retrieved November 15, 2010 ()
    • Verini, James. 2010. "The Great Cyberheist." The New York Times, November 14, 2010. Retrieved November 15, 2010 (http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?_r=1).
    • (2010) The New York Times
    • Verini, J.1
  • 127
    • 84885091138 scopus 로고    scopus 로고
    • Verison, Retrieved August 10, 2012 ()
    • Verison. 2012. "2012 Data Breach Investigations Report and Executive Summary." Retrieved August 10, 2012 (http://www.verisionbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf)
    • (2012) 2012 Data Breach Investigations Report and Executive Summary
  • 128
    • 85140528371 scopus 로고    scopus 로고
    • Cybercrimes and the Internet
    • In: Wall David S., editors New York, Routledge
    • Wall, David S. 2001. "Cybercrimes and the Internet." Pp. 1 - 17 in Crime and the Internet, edited by David S. Wall. New York: Routledge.
    • (2001) Crime and the Internet , pp. 1-17
    • Wall, D.S.1
  • 131
    • 84869765081 scopus 로고    scopus 로고
    • Identifying Sexual Grooming Themes Used by Internet Sex Offenders
    • Williams, Rebecca, Ian A. Elliott, and Anthony R. Beech. 2013. "Identifying Sexual Grooming Themes Used by Internet Sex Offenders." Deviant Behavior 34: 135 - 152.
    • (2013) Deviant Behavior , vol.34 , pp. 135-152
    • Williams, R.1    Elliott, I.A.2    Beech, A.R.3
  • 132
    • 5644270277 scopus 로고    scopus 로고
    • Internet-Initiated Sex Crimes against Minors: Implications for Prevention Based on Findings from a National Study
    • Wolak, Janice, David Finkelhor, and Kimberly Mitchell. 2004. "Internet-Initiated Sex Crimes against Minors: Implications for Prevention Based on Findings from a National Study." Journal of Adolescent Health 35: 424.e11 - 424.20.
    • (2004) Journal of Adolescent Health , vol.35 , pp. 424-442
    • Wolak, J.1    Finkelhor, D.2    Mitchell, K.3
  • 134
    • 47249099793 scopus 로고    scopus 로고
    • Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses
    • Wolfe, Scott E., George E. Higgins, and Catherine D. Marcum. 2007. "Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses." Social Science Computer Review 26: 317 - 333.
    • (2007) Social Science Computer Review , vol.26 , pp. 317-333
    • Wolfe, S.E.1    Higgins, G.E.2    Marcum, C.D.3
  • 135
    • 49649085285 scopus 로고    scopus 로고
    • School Bullying among Hong Kong Chinese Primary Schoolchildren
    • Wong, Dennis S. W., David P. P. Lok, T. Wing Lo, and Stephen K. Ma. 2008. "School Bullying among Hong Kong Chinese Primary Schoolchildren." Youth and Society 40: 35 - 54.
    • (2008) Youth and Society , vol.40 , pp. 35-54
    • Wong, D.S.W.1    Lok, D.P.P.2    Wing, L.T.3    Ma, S.K.4
  • 136
    • 34247657469 scopus 로고    scopus 로고
    • The Novelty of Cybercrime
    • Yar, Majid. 2005. "The Novelty of Cybercrime." European Journal of Criminology 2: 407 - 427.
    • (2005) European Journal of Criminology , vol.2 , pp. 407-427
    • Yar, M.1
  • 138
    • 84886368307 scopus 로고    scopus 로고
    • Understanding Sexually Deviant Online Behavior from an Addiction Perspective
    • Young, Kimberly. 2008. "Understanding Sexually Deviant Online Behavior from an Addiction Perspective." International Journal of Cyber Criminology 2 (1): 298 - 307.
    • (2008) International Journal of Cyber Criminology , vol.2 , Issue.1 , pp. 298-307
    • Young, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.