-
2
-
-
13444309534
-
Sexual harassment on the Internet
-
Barak, A. 2005. Sexual harassment on the Internet. Social Science Computer Review, 23: 77-92.
-
(2005)
Social Science Computer Review
, vol.23
, pp. 77-92
-
-
Barak, A.1
-
3
-
-
80052980820
-
On-line activities, guardianship, and malware infection: An examination of routine activities theory
-
Bossler, A. M., and, Holt, T. J. 2009. On-line activities, guardianship, and malware infection: an examination of routine activities theory. International Journal of Cyber Criminology, 3: 400-420.
-
(2009)
International Journal of Cyber Criminology
, vol.3
, pp. 400-420
-
-
Bossler, A.M.1
Holt, T.J.2
-
4
-
-
77953123853
-
The effect of self-control on victimization in the cyberworld
-
Bossler, A. M., and, Holt, T. J. 2010. The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38: 227-236.
-
(2010)
Journal of Criminal Justice
, vol.38
, pp. 227-236
-
-
Bossler, A.M.1
Holt, T.J.2
-
5
-
-
84926280114
-
Odum's concept of the technicways: Some reflections on an underdeveloped sociological notion
-
Bryant, C. D. 1984. Odum's concept of the technicways: some reflections on an underdeveloped sociological notion. Sociological Spectrum, 4: 115-142.
-
(1984)
Sociological Spectrum
, vol.4
, pp. 115-142
-
-
Bryant, C.D.1
-
6
-
-
77949584268
-
Computer crime victimization and integrated theory: An empirical assessment
-
Choi, K. 2008. Computer crime victimization and integrated theory: an empirical assessment. International Journal of Cyber Criminology, 2: 308-333.
-
(2008)
International Journal of Cyber Criminology
, vol.2
, pp. 308-333
-
-
Choi, K.1
-
8
-
-
58149476761
-
Response rate and measurement differences in mixed-mode surveys using mail, telephone, interactive voice response (IVR) and the Internet
-
Dillman, D. A. 2009. Response rate and measurement differences in mixed-mode surveys using mail, telephone, interactive voice response (IVR) and the Internet. Social Science Research, 38: 1-18.
-
(2009)
Social Science Research
, vol.38
, pp. 1-18
-
-
Dillman, D.A.1
-
9
-
-
84859801124
-
Stemming sexting: Sensible legal approaches to teenagers exchange of self-produced pornography
-
Eraker, E. C. 2010. Stemming sexting: sensible legal approaches to teenagers exchange of self-produced pornography. Berkeley Technology Law Journal, 25: 555-596.
-
(2010)
Berkeley Technology Law Journal
, vol.25
, pp. 555-596
-
-
Eraker, E.C.1
-
10
-
-
0041022109
-
Crime in the ivory tower: Level and sources of student victimization
-
Fisher, B. S., Sloan, J. J., Cullen, F. T., and, Lu, C. 1998. Crime in the ivory tower: level and sources of student victimization. Criminology, 36: 671-710.
-
(1998)
Criminology
, vol.36
, pp. 671-710
-
-
Fisher, B.S.1
Sloan, J.J.2
Cullen, F.T.3
Lu, C.4
-
12
-
-
0027476181
-
Testing the core empirical implications of Gottfredson and Hirschi's general theory of crime
-
Grasmick, H. G. 1993. Testing the core empirical implications of Gottfredson and Hirschi's general theory of crime. Journal of Research in Crime and Delinquency, 30: 5-29.
-
(1993)
Journal of Research in Crime and Delinquency
, vol.30
, pp. 5-29
-
-
Grasmick, H.G.1
-
13
-
-
77956949585
-
Gender, adolescent lifestyles, and violent victimization: Implications for routine activity theory
-
Henson, B. 2010. Gender, adolescent lifestyles, and violent victimization: implications for routine activity theory. Victims and Offenders, 5: 303-328.
-
(2010)
Victims and Offenders
, vol.5
, pp. 303-328
-
-
Henson, B.1
-
15
-
-
0003987757
-
-
Cambridge, MA: Ballinger.
-
Hindelang, M. J., Gottfredson, M. R., and, Garofalo, J. 1978. Victims of personal crime: an empirical foundation for a theory of personal victimization, Cambridge, MA: Ballinger.
-
(1978)
Victims of Personal Crime: An Empirical Foundation for A Theory of Personal Victimization
-
-
Hindelang, M.J.1
Gottfredson, M.R.2
Garofalo, J.3
-
17
-
-
57649120953
-
Examining the applicability of lifestyle-routine activities theory for cybercrime victimization
-
Holt, T. J., and, Bossler, A. M. 2009. Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30: 1-25.
-
(2009)
Deviant Behavior
, vol.30
, pp. 1-25
-
-
Holt, T.J.1
Bossler, A.M.2
-
19
-
-
0022732592
-
Gender, lifestyles, and victimization: Beyond routine activity
-
Jensen, G. F., and, Brownfield, D. 1986. Gender, lifestyles, and victimization: beyond routine activity. Violence and Victims, 1: 85-99.
-
(1986)
Violence and Victims
, vol.1
, pp. 85-99
-
-
Jensen, G.F.1
Brownfield, D.2
-
20
-
-
0026440771
-
Conventional and delinquent activities: Implications for the prevention of violent victimization among adolescents
-
Lauritsen, J. L., Laub, J. H., and, Sampson, R. J. 1992. Conventional and delinquent activities: implications for the prevention of violent victimization among adolescents. Violence and Victims, 7: 91-108.
-
(1992)
Violence and Victims
, vol.7
, pp. 91-108
-
-
Lauritsen, J.L.1
Laub, J.H.2
Sampson, R.J.3
-
21
-
-
84984289483
-
The link between offending and victimization among adolescents
-
Lauritsen, J. L., Sampson, R. J., and, Laub, J. H. 1991. The link between offending and victimization among adolescents. Criminology, 29: 265-292.
-
(1991)
Criminology
, vol.29
, pp. 265-292
-
-
Lauritsen, J.L.1
Sampson, R.J.2
Laub, J.H.3
-
23
-
-
43549095569
-
Control, emancipation, and status: The mobile telephone in teen's parental and peer group control relationships
-
Edited by: Kraut, R. Brynin, M. and Kiesler, S. Oxford: Oxford University Press.
-
Ling, R., and, Yttri, B. 2005. " Control, emancipation, and status: the mobile telephone in teen's parental and peer group control relationships ". In New information technologies at home: the domestic impact of computing and telecommunications, Edited by: Kraut, R., Brynin, M. and Kiesler, S. 219-235. Oxford: Oxford University Press.
-
(2005)
New Information Technologies at Home: The Domestic Impact of Computing and Telecommunications
, pp. 219-235
-
-
Ling, R.1
Yttri, B.2
-
24
-
-
78650111985
-
Assessing sex experiences of online victimization: Examination of adolescent online behaviors using routine activity theory
-
Marcum, C. D., Ricketts, M. L., and, Higgins, G. E. 2010. Assessing sex experiences of online victimization: examination of adolescent online behaviors using routine activity theory. Criminal Justice Review, 35: 412-437.
-
(2010)
Criminal Justice Review
, vol.35
, pp. 412-437
-
-
Marcum, C.D.1
Ricketts, M.L.2
Higgins, G.E.3
-
25
-
-
84897832088
-
-
598 F.3d 139 (3rd Cir. 2010)
-
Miller v., Mitchell. 598 F.3d 139 (3rd Cir. 2010)
-
-
-
Miller, V.M.1
-
26
-
-
84886368928
-
Parental regulation and online activities: Examining factors that influence a youth's potential to become a victim of online harassment
-
Moore, R., Guntupalli, N. T., and, Lee, T. 2010. Parental regulation and online activities: examining factors that influence a youth's potential to become a victim of online harassment. International Journal of Cyber Criminology, 4: 685-698.
-
(2010)
International Journal of Cyber Criminology
, vol.4
, pp. 685-698
-
-
Moore, R.1
Guntupalli, N.T.2
Lee, T.3
-
27
-
-
0040676527
-
Predicting risks of larceny theft victimization: A routine activity analysis using refined lifestyles measures
-
Mustaine, E. E., and, Tewksbury, R. 1998. Predicting risks of larceny theft victimization: a routine activity analysis using refined lifestyles measures. Criminology, 36: 829-858.
-
(1998)
Criminology
, vol.36
, pp. 829-858
-
-
Mustaine, E.E.1
Tewksbury, R.2
-
28
-
-
79955486500
-
-
National Campaign to Prevent Teen and Unplanned Pregnancy and CosmoGirl.com. Washington, DC: National Campaign to Prevent Teen and Unplanned Pregnancy.
-
National Campaign to Prevent Teen and Unplanned Pregnancy and CosmoGirl.com. 2008. Sex and tech: results from a survey of teens and young adults, Washington, DC: National Campaign to Prevent Teen and Unplanned Pregnancy.
-
(2008)
Sex and Tech: Results from A Survey of Teens and Young Adults
-
-
-
29
-
-
0011466221
-
Notes on the technicways in contemporary society
-
Odum, H. W. 1937. Notes on the technicways in contemporary society. American Sociological Review, 2: 336-346.
-
(1937)
American Sociological Review
, vol.2
, pp. 336-346
-
-
Odum, H.W.1
-
30
-
-
0039842473
-
The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis
-
Pratt, T. C., and, Cullen, F. T. 2000. The empirical status of Gottfredson and Hirschi's general theory of crime: a meta-analysis. Criminology, 38: 931-964.
-
(2000)
Criminology
, vol.38
, pp. 931-964
-
-
Pratt, T.C.1
Cullen, F.T.2
-
32
-
-
77949590385
-
A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers
-
Reyns, B. W. 2010b. A situational crime prevention approach to cyberstalking victimization: preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety, 12: 99-118.
-
(2010)
Crime Prevention and Community Safety
, vol.12
, pp. 99-118
-
-
Reyns, B.W.1
-
33
-
-
80053010912
-
Being pursued online: Applying cyberlifestyle-routine activities theory to cyberstalking victimization
-
Reyns, B. W., Henson, B., and, Fisher, B. S. 2011. Being pursued online: applying cyberlifestyle-routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38: 1149-1169.
-
(2011)
Criminal Justice and Behavior
, vol.38
, pp. 1149-1169
-
-
Reyns, B.W.1
Henson, B.2
Fisher, B.S.3
-
34
-
-
26844555441
-
Criminal victimization and low self-control: An extension and test of a general theory of crime
-
Schreck, C. J. 1999. Criminal victimization and low self-control: an extension and test of a general theory of crime. Justice Quarterly, 16: 633-654.
-
(1999)
Justice Quarterly
, vol.16
, pp. 633-654
-
-
Schreck, C.J.1
-
35
-
-
57349112274
-
A reappraisal of the overlap of violent offenders and victims
-
Schreck, C. J., Stewart, E. A., and, Osgood, D. W. 2008. A reappraisal of the overlap of violent offenders and victims. Criminology, 46: 871-906.
-
(2008)
Criminology
, vol.46
, pp. 871-906
-
-
Schreck, C.J.1
Stewart, E.A.2
Osgood, D.W.3
-
37
-
-
48349139009
-
-
Washington, DC: US Department of Justice.
-
Truman, J. L., and, Rand, M. J. 2010. Criminal victimization, 2009, Washington, DC: US Department of Justice.
-
(2010)
Criminal Victimization, 2009
-
-
Truman, J.L.1
Rand, M.J.2
-
38
-
-
79952582307
-
Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization
-
van Wilsem, J. 2011. Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8: 115-127.
-
(2011)
European Journal of Criminology
, vol.8
, pp. 115-127
-
-
Van Wilsem, J.1
-
39
-
-
34247967403
-
Howard Odum's technicways: A neglected lead in American sociology
-
Vance, R. B. 1972. Howard Odum's technicways: a neglected lead in American sociology. Social Forces, 50: 456-461.
-
(1972)
Social Forces
, vol.50
, pp. 456-461
-
-
Vance, R.B.1
-
40
-
-
79952731005
-
Child's play or child pornography: The need for better laws regarding sexting
-
Walker, J. T., and, Moak, S. C. 2010. Child's play or child pornography: the need for better laws regarding sexting. ACJS Today, 35: 1-9.
-
(2010)
ACJS Today
, vol.35
, pp. 1-9
-
-
Walker, J.T.1
Moak, S.C.2
-
41
-
-
82355166337
-
The harm in sexting?: Analyzing the constitutionality of child pornography statutes that prohibit the voluntary production, possession, and dissemination of sexually explicit images by teenagers
-
Wastler, S. 2010. The harm in sexting?: analyzing the constitutionality of child pornography statutes that prohibit the voluntary production, possession, and dissemination of sexually explicit images by teenagers. Harvard Journal of Law and Gender, 33: 687-702.
-
(2010)
Harvard Journal of Law and Gender
, vol.33
, pp. 687-702
-
-
Wastler, S.1
-
42
-
-
33846444464
-
-
Washington, DC: National Center for Missing and Exploited Children.
-
Wolak, J., Mitchell, K., and, Finkelhor, D. 2006. Online victimization of youth: five years later, Washington, DC: National Center for Missing and Exploited Children.
-
(2006)
Online Victimization of Youth: Five Years Later
-
-
Wolak, J.1
Mitchell, K.2
Finkelhor, D.3
-
44
-
-
38849154633
-
How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs
-
Ybarra, M. L., and, Mitchell, K. J. 2008. How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs. Pediatrics, 120: 350-357.
-
(2008)
Pediatrics
, vol.120
, pp. 350-357
-
-
Ybarra, M.L.1
Mitchell, K.J.2
|