-
3
-
-
69649088123
-
The Empirical Status of Social Learning Theory of Crime and Deviance: The Past, Present, and Future
-
Cullen F.T., Wright J.P., Blevins K.R., (eds), New Brunswick, NJ: Transaction Publishers, and,. Edited by
-
Akers, R. L., and Jensen, G. F., 2006. “The Empirical Status of Social Learning Theory of Crime and Deviance: The Past, Present, and Future.”. In Taking Stock: The Status of Criminological Theory., Edited by: Cullen, F. T., Wright, J. P., and Blevins, K. R., New Brunswick, NJ: Transaction Publishers.
-
(2006)
Taking Stock: The Status of Criminological Theory.
-
-
Akers, R.L.1
Jensen, G.F.2
-
4
-
-
0029896618
-
A Longitudinal Test of Social Learning Theory: Adolescent Smoking
-
Akers, R. L., and Lee, G., 1996. “A Longitudinal Test of Social Learning Theory: Adolescent Smoking.”. Journal of Drug Issues, 26 (2): 317–343.
-
(1996)
Journal of Drug Issues
, vol.26
, Issue.2
, pp. 317-343
-
-
Akers, R.L.1
Lee, G.2
-
5
-
-
84935502124
-
Social Contexts and Sexual Learning in Sexual Coercion and Aggression: Assessing the Contribution of Fraternity Membership
-
Boeringer, S., Shehan, C. L., and Akers, R. L., 1991. “Social Contexts and Sexual Learning in Sexual Coercion and Aggression: Assessing the Contribution of Fraternity Membership.”. Family Relations, 40: 558–564.
-
(1991)
Family Relations
, vol.40
, pp. 558-564
-
-
Boeringer, S.1
Shehan, C.L.2
Akers, R.L.3
-
7
-
-
29244442707
-
Mediator Effects in the Social Development Model: An Examination of Constituent Theories
-
Brown, E. C., Catalano, R. F., Fleming, C. B., Haggerty, K. P., Abbott, R. D., Cortes, R. R., and Park, J., 2005. “Mediator Effects in the Social Development Model: An Examination of Constituent Theories.”. Criminal Behaviour and Mental Health, 15: 221–235.
-
(2005)
Criminal Behaviour and Mental Health
, vol.15
, pp. 221-235
-
-
Brown, E.C.1
Catalano, R.F.2
Fleming, C.B.3
Haggerty, K.P.4
Abbott, R.D.5
Cortes, R.R.6
Park, J.7
-
8
-
-
1342347364
-
Applying Social Learning Theory to Police Misconduct
-
Chappell, A. T., and Piquero, A. R., 2004. “Applying Social Learning Theory to Police Misconduct.”. Deviant Behavior, 25: 89–108.
-
(2004)
Deviant Behavior
, vol.25
, pp. 89-108
-
-
Chappell, A.T.1
Piquero, A.R.2
-
9
-
-
0347178887
-
-
Retrieved November 21, 2008 from
-
Computer Security Institute. 2007. Computer crime and security survey. Retrieved November 21, 2008 from http://www.cybercrime.gov/FBI2006.pdf
-
(2007)
Computer crime and security survey.
-
-
-
10
-
-
23044524781
-
The Social Organization of Audio Piracy on the Internet
-
Cooper, J, and Harrison, D. M., 2001. “The Social Organization of Audio Piracy on the Internet.”. Media, Culture, and Society, 23: 71–89.
-
(2001)
Media, Culture, and Society
, vol.23
, pp. 71-89
-
-
Cooper, J.1
Harrison, D.M.2
-
11
-
-
33745903904
-
Piracy, Computer Crime, and IS Misuse at the University
-
Cronan, T. P., Foltz, C. B., and Jones, T. W., 2006. “Piracy, Computer Crime, and IS Misuse at the University.”. Communications of the ACM, 49: 85–90.
-
(2006)
Communications of the ACM
, vol.49
, pp. 85-90
-
-
Cronan, T.P.1
Foltz, C.B.2
Jones, T.W.3
-
12
-
-
27844534378
-
College Students and Binge Drinking: An Evaluation of Social Learning Theory
-
Durkin, K. F., Wolfe, T. W., and Clark, G. A., 2005. “College Students and Binge Drinking: An Evaluation of Social Learning Theory.”. Sociological Spectrum, 25: 255–272.
-
(2005)
Sociological Spectrum
, vol.25
, pp. 255-272
-
-
Durkin, K.F.1
Wolfe, T.W.2
Clark, G.A.3
-
13
-
-
33748994575
-
Nonnormal and Categorical Data
-
Hancock G.R., Mueller R.O., (eds), Greenwhich, CT: Information Age Publishing, and,. Edited by
-
Finney, S. J., and DiStefano, C., 2006. “Nonnormal and Categorical Data.”. In Structural equation modeling: A second course., Edited by: Hancock, G. R., and Mueller, R. O., Greenwhich, CT: Information Age Publishing.
-
(2006)
Structural equation modeling: A second course.
-
-
Finney, S.J.1
DiStefano, C.2
-
16
-
-
84973831295
-
Gender and Delinquency in White-collar Families: A Power Control Perspective
-
Hagan, J., and Kay, F., 1990. “Gender and Delinquency in White-collar Families: A Power Control Perspective.”. Crime and Delinquency, 36: 391–407.
-
(1990)
Crime and Delinquency
, vol.36
, pp. 391-407
-
-
Hagan, J.1
Kay, F.2
-
17
-
-
46349099392
-
Gender Differences in Software Piracy: The Mediating Roles of Self-control Theory and Social Learning Theory
-
Higgins, G. E., 2006. “Gender Differences in Software Piracy: The Mediating Roles of Self-control Theory and Social Learning Theory.”. Journal of Economic Crime Management, 4: 1–30.
-
(2006)
Journal of Economic Crime Management
, vol.4
, pp. 1-30
-
-
Higgins, G.E.1
-
18
-
-
85044912937
-
Digital Piracy: Assessing the Contributions of an Integrated Self-control Theory and Social Learning Theory Using Structural Equation Modeling
-
Higgins, G. E., Fell, B. D., and Wilson, A. L., 2006. “Digital Piracy: Assessing the Contributions of an Integrated Self-control Theory and Social Learning Theory Using Structural Equation Modeling.”. Criminal Justice Studies, 19: 3–22.
-
(2006)
Criminal Justice Studies
, vol.19
, pp. 3-22
-
-
Higgins, G.E.1
Fell, B.D.2
Wilson, A.L.3
-
19
-
-
34548057051
-
Low Self-control and Social Learning in Understanding Students’ Intentions to Pirate Movies in the United States
-
Higgins, G. E., Fell, B. D., and Wilson, A. L., 2007. “Low Self-control and Social Learning in Understanding Students’ Intentions to Pirate Movies in the United States.”. Social Science Computer Review, 25: 339–357.
-
(2007)
Social Science Computer Review
, vol.25
, pp. 339-357
-
-
Higgins, G.E.1
Fell, B.D.2
Wilson, A.L.3
-
20
-
-
12344305644
-
Self-control, Deviant peers, and Software Piracy
-
Higgins, G. E., and Makin, D. A., 2004a. “Self-control, Deviant peers, and Software Piracy.”. Psychological Reports, 95: 921–931.
-
(2004)
Psychological Reports
, vol.95
, pp. 921-931
-
-
Higgins, G.E.1
Makin, D.A.2
-
21
-
-
29444457666
-
Does Social Learning Theory Condition the Effects of Low Self-control on College Students’ Software Piracy?
-
Higgins, G. E., and Makin, D. A., 2004b. “Does Social Learning Theory Condition the Effects of Low Self-control on College Students’ Software Piracy?”. Journal of Economic Crime Management, 2: 1–22.
-
(2004)
Journal of Economic Crime Management
, vol.2
, pp. 1-22
-
-
Higgins, G.E.1
Makin, D.A.2
-
22
-
-
36949001461
-
Low Self-control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software
-
Higgins, G. E., and Wilson, A. L., 2006. “Low Self-control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software.”. Security Journal, 19: 75–92.
-
(2006)
Security Journal
, vol.19
, pp. 75-92
-
-
Higgins, G.E.1
Wilson, A.L.2
-
24
-
-
12744275983
-
Trends and Patterns among Online Software Pirates
-
Hinduja, S., 2003. “Trends and Patterns among Online Software Pirates.”. Ethics and Information Technology, 5: 49–61.
-
(2003)
Ethics and Information Technology
, vol.5
, pp. 49-61
-
-
Hinduja, S.1
-
25
-
-
0343001536
-
Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access
-
Hollinger, R. C., 1992. “Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access.”. Security Journal, 2: 2–12.
-
(1992)
Security Journal
, vol.2
, pp. 2-12
-
-
Hollinger, R.C.1
-
26
-
-
33847270657
-
Subcultural Evolution? Examining the Influence of On- and Off-line Experiences on Deviant Subcultures
-
Holt, T. J., 2007. “Subcultural Evolution? Examining the Influence of On- and Off-line Experiences on Deviant Subcultures.”. Deviant Behavior, 28: 171–198.
-
(2007)
Deviant Behavior
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
27
-
-
55149123066
-
Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers
-
Schmalleger F., Pittaro M., (eds), Upper Saddle River, NJ: Pearson Prentice Hall,. Edited by
-
Holt, T. J., 2008. “Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers.”. In Crimes of the Internet., Edited by: Schmalleger, F., and Pittaro, M. Upper Saddle River, NJ: Pearson Prentice Hall.
-
(2008)
Crimes of the Internet.
-
-
Holt, T.J.1
-
28
-
-
57649120953
-
Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization
-
Holt, T. J., and Bossier, A. M., 2009. “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization.”. Deviant Behavior, 30: 1–25.
-
(2009)
Deviant Behavior
, vol.30
, pp. 1-25
-
-
Holt, T.J.1
Bossier, A.M.2
-
29
-
-
67650706330
-
Cutoff Criteria for Fixed Indexes in Covariance Structure Analysis: Conventional Criteria Versus New Alternatives
-
Hu, L. A., and Bentler, P. M., 1999. “Cutoff Criteria for Fixed Indexes in Covariance Structure Analysis: Conventional Criteria Versus New Alternatives.”. Structural Equation Modeling, 6: 1–55.
-
(1999)
Structural Equation Modeling
, vol.6
, pp. 1-55
-
-
Hu, L.A.1
Bentler, P.M.2
-
32
-
-
3042616646
-
Social Learning and Structural Factors in Adolescent Substance Use
-
Lee, G., Akers, R. L., and Bor, M. J., 2004. “Social Learning and Structural Factors in Adolescent Substance Use.”. Western Criminology Review, 5: 17–34.
-
(2004)
Western Criminology Review
, vol.5
, pp. 17-34
-
-
Lee, G.1
Akers, R.L.2
Bor, M.J.3
-
33
-
-
33847237284
-
Mediation Analysis
-
MacKinnon, D. P., Fairchild, A. J., and Fritz, M. S., 2007. “Mediation Analysis.”. Annual Review of Psychology, 58: 593–614.
-
(2007)
Annual Review of Psychology
, vol.58
, pp. 593-614
-
-
MacKinnon, D.P.1
Fairchild, A.J.2
Fritz, M.S.3
-
34
-
-
0039593329
-
-
Unpublished Masters Thesis, Retrieved December 29, 2003 from
-
Meyer, G. R., 1989. “The Social Organization of the Computer Underground Unpublished Masters Thesis, Retrieved December 29, 2003 from http://csrc.nist.gov/secpubs/hacker.txt
-
(1989)
The Social Organization of the Computer Underground
-
-
Meyer, G.R.1
-
37
-
-
33750036117
-
Do Adolescents Engage in Delinquency to Attract the Social Attention of Peers: An Extension and Longitudinal Test of the Social Reinforcement Hypothesis
-
Rebellon, C. J., 2006. “Do Adolescents Engage in Delinquency to Attract the Social Attention of Peers: An Extension and Longitudinal Test of the Social Reinforcement Hypothesis.”. Journal of Research in Crime and Delinquency, 43: 387–411.
-
(2006)
Journal of Research in Crime and Delinquency
, vol.43
, pp. 387-411
-
-
Rebellon, C.J.1
-
39
-
-
21644486242
-
Social Learning Theory and Partner Violence: A Research Note
-
Sellers, C. S., Cochran, J. K., and Branch, K. A., 2005. “Social Learning Theory and Partner Violence: A Research Note.”. Deviant Behavior, 26: 379–395.
-
(2005)
Deviant Behavior
, vol.26
, pp. 379-395
-
-
Sellers, C.S.1
Cochran, J.K.2
Branch, K.A.3
-
40
-
-
0030215265
-
Toward a Profile of Student Software Pirates
-
Sims, R. R., Cheng, H. K., and Teegan, H., 1996. “Toward a Profile of Student Software Pirates.”. Journal of Business Ethics, 15: 839–849.
-
(1996)
Journal of Business Ethics
, vol.15
, pp. 839-849
-
-
Sims, R.R.1
Cheng, H.K.2
Teegan, H.3
-
41
-
-
0030668250
-
A Social Learning Theory Analysis of Computer Crime among College Students
-
Skinner, W. F., and Fream, A. M., 1997. “A Social Learning Theory Analysis of Computer Crime among College Students.”. Journal of Research in Crime and Delinquency, 34: 495–518.
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
42
-
-
0024263227
-
Social Learning Variables and the Risk of Habitual Smoking among Adolescents: The Muscatine Study
-
Spear, S., and Akers, R. L., 1988. “Social Learning Variables and the Risk of Habitual Smoking among Adolescents: The Muscatine Study.”. American Journal of Preventative Medicine, 4: 336–348.
-
(1988)
American Journal of Preventative Medicine
, vol.4
, pp. 336-348
-
-
Spear, S.1
Akers, R.L.2
-
45
-
-
33846041841
-
Cybercrimes and the Internet
-
Wall D.S., (ed), New York: Routledge,. Edited by
-
Wall, D. S., 2001. “Cybercrimes and the Internet.”. In Crime and the Internet., Edited by: Wall, D. S., New York: Routledge.
-
(2001)
Crime and the Internet.
-
-
Wall, D.S.1
|