-
1
-
-
34247826989
-
Self-control theory as a general theory of crime
-
doi:10.1007/BF01268629
-
Akers, R. L. (1991). Self-control theory as a general theory of crime. Journal of Quantitative Criminology, 7, 201-211. doi:10.1007/BF01268629
-
(1991)
Journal of Quantitative Criminology
, vol.7
, pp. 201-211
-
-
Akers, R.L.1
-
3
-
-
69649088123
-
The empirical status of social learning theory of crime and deviance: The past, present, and future
-
In Cullen, F. T., Wright, J. P., & Blevins, K. R. (Eds.), New Brunswick, NJ: Transaction Publishers
-
Akers, R. L., & Jensen, G. F. (2006). The empirical status of social learning theory of crime and deviance: The past, present, and future. In Cullen, F. T., Wright, J. P., & Blevins, K. R. (Eds.), Taking stock: The status of criminological theory. New Brunswick, NJ: Transaction Publishers.
-
(2006)
Taking Stock: The Status of Criminological Theory
-
-
Akers, R.L.1
Jensen, G.F.2
-
4
-
-
0029896618
-
A longitudinal test of social learning theory: Adolescent smoking
-
Akers, R. L., & Lee, G. (1996). A longitudinal test of social learning theory: Adolescent smoking. Journal of Drug Issues, 26, 317-343.
-
(1996)
Journal of Drug Issues
, vol.26
, pp. 317-343
-
-
Akers, R.L.1
Lee, G.2
-
5
-
-
34250038821
-
Low self-control and imprudent behavior
-
doi:10.1007/BF01064461
-
Arneklev, B. J., Grasmick, H. G., Tittle, C. R., & Bursik, R. J. (1993). Low self-control and imprudent behavior. Journal of Quantitative Criminology, 9, 225-247. doi:10.1007/BF01064461
-
(1993)
Journal of Quantitative Criminology
, vol.9
, pp. 225-247
-
-
Arneklev, B.J.1
Grasmick, H.G.2
Tittle, C.R.3
Bursik, R.J.4
-
6
-
-
0026673759
-
Are whitecollar and common offenders the same? An empirical and theoretical critique of a recently proposed general theory of crime
-
doi:10.1177/0022427892029003001
-
Benson, M. L., & Moore, E. (1992). Are whitecollar and common offenders the same? An empirical and theoretical critique of a recently proposed general theory of crime. Journal of Research in Crime and Delinquency, 29, 251-272. doi:10.1177/0022427892029003001
-
(1992)
Journal of Research in Crime and Delinquency
, vol.29
, pp. 251-272
-
-
Benson, M.L.1
Moore, E.2
-
8
-
-
1642445414
-
A conceptual model of hacker development and motivations
-
Beveren, J. V. (2001). A conceptual model of hacker development and motivations. The Journal of Business, 1, 1-9.
-
(2001)
The Journal of Business
, vol.1
, pp. 1-9
-
-
Beveren, J.V.1
-
10
-
-
0347973105
-
Conventional wisdom on measurement: A structural equation perspective
-
doi:10.1037/0033-2909.110.2.305
-
Bollen, K.A., & Lennox, R. (1991). Conventional wisdom on measurement: a structural equation perspective. Psychological Bulletin, 110, 305-314. doi:10.1037/0033-2909.110.2.305
-
(1991)
Psychological Bulletin
, vol.110
, pp. 305-314
-
-
Bollen, K.A.1
Lennox, R.2
-
11
-
-
0034149798
-
A tetrad test for causal indicators
-
doi:10.1037/1082-989X.5.1.3
-
Bollen, K. A., & Ting, T. (2000). A tetrad test for causal indicators. Psychological Methods, 15, 3-22. doi:10.1037/1082-989X.5.1.3
-
(2000)
Psychological Methods
, vol.15
, pp. 3-22
-
-
Bollen, K.A.1
Ting, T.2
-
12
-
-
80052980820
-
On-line activities, guardianship, and malware infection: An examination of routine activities theory
-
Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3, 400-420.
-
(2009)
International Journal of Cyber Criminology
, vol.3
, pp. 400-420
-
-
Bossler, A.M.1
Holt, T.J.2
-
13
-
-
33748656935
-
Explaining use of online pornography: A test of self-control theory and opportunities for deviance
-
Buzzell, T., Foss, D., & Middleton, Z. (2006). Explaining use of online pornography: A test of self-control theory and opportunities for deviance. Journal of Criminal Justice and Popular Culture, 13, 96-116.
-
(2006)
Journal of Criminal Justice and Popular Culture
, vol.13
, pp. 96-116
-
-
Buzzell, T.1
Foss, D.2
Middleton, Z.3
-
14
-
-
85055781849
-
-
Boca Raton, FL, Auerbach Publications, doi:10.1201/9781420086942
-
Chisea, R., Ducci, D., & Ciappi, S. (2008). Profiling hackers: The science of criminal profiling as applied to the world of hacking. Boca Raton, FL: Auerbach Publications. doi:10.1201/9781420086942
-
(2008)
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
-
-
Chisea, R.1
Ducci, D.2
Ciappi, S.3
-
15
-
-
0000204509
-
Social change and crime rate trends: A routine activityapproach
-
doi:10.2307/2094589
-
Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activityapproach. American Sociological Review, 44, 588-608. doi:10.2307/2094589
-
(1979)
American Sociological Review
, vol.44
, pp. 588-608
-
-
Cohen, L.E.1
Felson, M.2
-
16
-
-
60949853654
-
Hacker practice: Moral genres and the cultural articulation of liberalism
-
doi:10.1177/1463499608093814
-
Coleman, E. G., & Golub, A. (2008). Hacker practice: Moral genres and the cultural articulation of liberalism. Anthropological Theory, 8, 255-277. doi:10.1177/1463499608093814
-
(2008)
Anthropological Theory
, vol.8
, pp. 255-277
-
-
Coleman, E.G.1
Golub, A.2
-
17
-
-
0002529520
-
A revised definition for suppressor variables: A guide to their identification and interpretation
-
doi:10.1177/001316447403400105
-
Conger, A. J. (1974). A revised definition for suppressor variables: A guide to their identification and interpretation. Educational and Psychological Measurement, 34, 35-46. doi:10.1177/001316447403400105
-
(1974)
Educational and Psychological Measurement
, vol.34
, pp. 35-46
-
-
Conger, A.J.1
-
18
-
-
33745903904
-
Piracy, computer crime, and IS misuse at the university
-
doi:10.1145/1132469.1132472
-
Cronan, T. P., Foltz, C. B., & Jones, T. W. (2006). Piracy, computer crime, and IS misuse at the university. Communications of the ACM, 49, 85-90. doi:10.1145/1132469.1132472
-
(2006)
Communications of the ACM
, vol.49
, pp. 85-90
-
-
Cronan, T.P.1
Foltz, C.B.2
Jones, T.W.3
-
21
-
-
33748994575
-
Nonnormal and categorical data
-
In Hancock, G. R., & Mueller, R. O. (Eds.), Greenwhich, CT: Information Age Publishing
-
Finney, S. J., & DiStefano, C. (2006). Nonnormal and categorical data. In Hancock, G. R., & Mueller, R. O. (Eds.), Structural equation modeling: A second course. Greenwhich, CT: Information Age Publishing.
-
(2006)
Structural Equation Modeling: A Second Course
-
-
Finney, S.J.1
Distefano, C.2
-
22
-
-
0037273472
-
Higher order factor structure of a self-control test: Evidence from confirmatory factor analysis with polychoric correlations
-
doi:10.1177/0013164402239320
-
Flora, D. B., Finkel, E. J., & Foshee, V. A. (2003). Higher order factor structure of a self-control test: Evidence from confirmatory factor analysis with polychoric correlations. Educational and Psychological Measurement, 63, 112-127. doi:10.1177/0013164402239320
-
(2003)
Educational and Psychological Measurement
, vol.63
, pp. 112-127
-
-
Flora, D.B.1
Finkel, E.J.2
Foshee, V.A.3
-
24
-
-
0002189123
-
On the absence of self-control as the basis for a general theory of crime: A critique
-
doi:10.1177/1362480600004001002
-
Geis, G. (2000). On the absence of self-control as the basis for a general theory of crime: A critique. Theoretical Criminology, 4, 35-53. doi:10.1177/1362480600004001002
-
(2000)
Theoretical Criminology
, vol.4
, pp. 35-53
-
-
Geis, G.1
-
25
-
-
84946455323
-
Self-control and its manifestations among university students: An empirical test of Gottfredson and Hirschi's general theory
-
doi:10.1080/07418829500092661
-
Gibbs, J. J., & Giever, D. M. (1995). Self-control and its manifestations among university students: An empirical test of Gottfredson and Hirschi's general theory. Justice Quarterly, 12, 231-255. doi:10.1080/07418829500092661
-
(1995)
Justice Quarterly
, vol.12
, pp. 231-255
-
-
Gibbs, J.J.1
Giever, D.M.2
-
26
-
-
0035510792
-
Low self-control and coworker delinquency: A research note
-
doi:10.1016/S0047-2352(01)00111-8
-
Gibson, C., & Wright, J. (2001). Low self-control and coworker delinquency: A research note. Journal of Criminal Justice, 29, 483-492. doi:10.1016/S0047-2352(01)00111-8
-
(2001)
Journal of Criminal Justice
, vol.29
, pp. 483-492
-
-
Gibson, C.1
Wright, J.2
-
31
-
-
0035381384
-
Virtual criminality: Old wine in new bottles?
-
Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10, 243-249.
-
(2001)
Social & Legal Studies
, vol.10
, pp. 243-249
-
-
Grabosky, P.N.1
-
32
-
-
84899351009
-
Testing the core empirical implications of Gottfredson and Hirschi's general theory
-
Grasmick, H. G., Tittle, C. R., Bursik, R. J., & Arneklev, B. J. (1993). Testing the core empirical implications of Gottfredson and Hirschi's general theory. Journal of Research in Crime and Delinquency, 35, 42-72.
-
(1993)
Journal of Research in Crime and Delinquency
, vol.35
, pp. 42-72
-
-
Grasmick, H.G.1
Tittle, C.R.2
Bursik, R.J.3
Arneklev, B.J.4
-
33
-
-
11144230997
-
Can low self-control help with the understanding of the software piracy problem?
-
doi:10.1080/01639620490497947
-
Higgins, G. E. (2005). Can low self-control help with the understanding of the software piracy problem? Deviant Behavior, 26, 1-24. doi:10.1080/01639620490497947
-
(2005)
Deviant Behavior
, vol.26
, pp. 1-24
-
-
Higgins, G.E.1
-
34
-
-
46349099392
-
Gender differences in software piracy: The mediating roles of self-control theory and social learning theory
-
Higgins, G. E. (2006). Gender differences in software piracy: The mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management, 4, 1-30.
-
(2006)
Journal of Economic Crime Management
, vol.4
, pp. 1-30
-
-
Higgins, G.E.1
-
35
-
-
84869092516
-
Digital piracy, self-control theory, and rational choice: An examination of the role of value
-
Higgins, G. E. (2007). Digital piracy, self-control theory, and rational choice: An examination of the role of value. International Journal of Cyber Criminology, 1, 33-55.
-
(2007)
International Journal of Cyber Criminology
, vol.1
, pp. 33-55
-
-
Higgins, G.E.1
-
36
-
-
85044912937
-
Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling
-
doi:10.1080/14786010600615934
-
Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19, 3-22. doi:10.1080/14786010600615934
-
(2006)
Criminal Justice Studies
, vol.19
, pp. 3-22
-
-
Higgins, G.E.1
Fell, B.D.2
Wilson, A.L.3
-
37
-
-
34548057051
-
Low self-control and social learning in understanding students' intentions to pirate movies in the United States
-
doi:10.1177/0894439307299934
-
Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students' intentions to pirate movies in the United States. Social Science Computer Review, 25, 339-357. doi:10.1177/0894439307299934
-
(2007)
Social Science Computer Review
, vol.25
, pp. 339-357
-
-
Higgins, G.E.1
Fell, B.D.2
Wilson, A.L.3
-
38
-
-
12344305644
-
Selfcontrol, deviant peers, and software piracy
-
doi:10.2466/PR0.95.7.921-931
-
Higgins, G. E., & Makin, D. A. (2004a). Selfcontrol, deviant peers, and software piracy. Psychological Reports, 95, 921-931. doi:10.2466/PR0.95.7.921-931
-
(2004)
Psychological Reports
, vol.95
, pp. 921-931
-
-
Higgins, G.E.1
Makin, D.A.2
-
39
-
-
29444457666
-
Does social learning theory condition the effects of low self-control on college students' software piracy?
-
Higgins, G. E., & Makin, D. A. (2004b). Does social learning theory condition the effects of low self-control on college students' software piracy? Journal of Economic Crime Management, 2, 1-22.
-
(2004)
Journal of Economic Crime Management
, vol.2
, pp. 1-22
-
-
Higgins, G.E.1
Makin, D.A.2
-
40
-
-
36949001461
-
Low selfcontrol, moral beliefs, and social learning theory in university students' intentions to pirate software
-
doi:10.1057/palgrave.sj.8350002
-
Higgins, G. E., & Wilson, A. L. (2006). Low selfcontrol, moral beliefs, and social learning theory in university students' intentions to pirate software. Security Journal, 19, 75-92. doi:10.1057/palgrave.sj.8350002
-
(2006)
Security Journal
, vol.19
, pp. 75-92
-
-
Higgins, G.E.1
Wilson, A.L.2
-
41
-
-
46349084062
-
Digital piracy: An examination of three measurements of self-control
-
doi:10.1080/01639620701598023
-
Higgins, G. E., Wolfe, S. E., & Marcum, C. (2008). Digital piracy: An examination of three measurements of self-control. Deviant Behavior, 29, 440-460. doi:10.1080/01639620701598023
-
(2008)
Deviant Behavior
, vol.29
, pp. 440-460
-
-
Higgins, G.E.1
Wolfe, S.E.2
Marcum, C.3
-
42
-
-
84996223978
-
Correlates of internet software piracy
-
doi:10.1177/1043986201017004006
-
Hinduja, S. (2001). Correlates of Internet software piracy. Journal of Contemporary Criminal Justice, 17(4), 369-382. doi:10.1177/1043986201017004006
-
(2001)
Journal of Contemporary Criminal Justice
, vol.17
, Issue.4
, pp. 369-382
-
-
Hinduja, S.1
-
43
-
-
0001847390
-
The generality of deviance
-
In Hirschi, T., & Gottfredson, M. R. (Eds.), New Brunswick, NJ: Transaction
-
Hirschi, T., & Gottfredson, M. R. (1994). The generality of deviance. In Hirschi, T., & Gottfredson, M. R. (Eds.), Generality of deviance (pp. 1-22). New Brunswick, NJ: Transaction.
-
(1994)
Generality of Deviance
, pp. 1-22
-
-
Hirschi, T.1
Gottfredson, M.R.2
-
44
-
-
0002835735
-
In defense of self-control
-
doi:10.1177/1362480600004001003
-
Hirschi, T., & Gottfredson, M. R. (2000). In defense of self-control. Theoretical Criminology, 4, 55-69. doi:10.1177/1362480600004001003
-
(2000)
Theoretical Criminology
, vol.4
, pp. 55-69
-
-
Hirschi, T.1
Gottfredson, M.R.2
-
45
-
-
0343001536
-
Crime by computer: Correlates of software piracy and unauthorized account access
-
Hollinger, R. C. (1992). Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal, 2, 2-12.
-
(1992)
Security Journal
, vol.2
, pp. 2-12
-
-
Hollinger, R.C.1
-
46
-
-
33847270657
-
Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures
-
doi:10.1080/01639620601131065
-
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171-198. doi:10.1080/01639620601131065
-
(2007)
Deviant Behavior
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
47
-
-
55149123066
-
Lone hacks or group: Examining the social organization of computer hackers
-
In Schmalleger, F. J., & Pittaro, M. (Eds.), Upper Saddle River, NJ, Prentice Hall
-
Holt, T. J. (2009). Lone hacks or group: Examining the social organization of computer hackers. In Schmalleger, F. J., & Pittaro, M. (Eds.), Crimes of the Internet. Upper Saddle River, NJ: Prentice Hall.
-
(2009)
Crimes of the Internet
-
-
Holt, T.J.1
-
48
-
-
57649120953
-
Examining the applicability of lifestyle-routine activities theory for cybercrime victimization
-
doi:10.1080/01639620701876577
-
Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1-25. doi:10.1080/01639620701876577
-
(2009)
Deviant Behavior
, vol.30
, pp. 1-25
-
-
Holt, T.J.1
Bossler, A.M.2
-
50
-
-
67650706330
-
Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives
-
doi:10.1080/10705519909540118
-
Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling, 6, 1-55. doi:10.1080/10705519909540118
-
(1999)
Structural Equation Modeling
, vol.6
, pp. 1-55
-
-
Hu, L.1
Bentler, P.M.2
-
51
-
-
0042855099
-
A sociology of hackers
-
doi:10.1111/1467-954X.00139
-
Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46, 757-780. doi:10.1111/1467-954X.00139
-
(1998)
The Sociological Review
, vol.46
, pp. 757-780
-
-
Jordan, T.1
Taylor, P.2
-
54
-
-
33746850571
-
An empirical test of the relationship between employee theft and self-control
-
doi:10.1080/01639620600781548
-
Langton, L., Piquero, N. L., & Hollinger, R. C. (2006). An empirical test of the relationship between employee theft and self-control. Deviant Behavior, 27, 537-565. doi:10.1080/01639620600781548
-
(2006)
Deviant Behavior
, vol.27
, pp. 537-565
-
-
Langton, L.1
Piquero, N.L.2
Hollinger, R.C.3
-
55
-
-
3042616646
-
Social learning and structural factors in adolescent substance use
-
Lee, G., Akers, R. L., & Borg, M. J. (2004). Social learning and structural factors in adolescent substance use. Western Criminology Review, 5, 17-34.
-
(2004)
Western Criminology Review
, vol.5
, pp. 17-34
-
-
Lee, G.1
Akers, R.L.2
Borg, M.J.3
-
56
-
-
4744366792
-
Self-control and social bonds: A combined control perspective on deviance
-
doi:10.1177/0011128703260684
-
Longshore, D., Chang, E., Hsieh, S. C., & Messina, N. (2004). Self-control and social bonds: A combined control perspective on deviance. Crime and Delinquency, 50, 542-564. doi:10.1177/0011128703260684
-
(2004)
Crime and Delinquency
, vol.50
, pp. 542-564
-
-
Longshore, D.1
Chang, E.2
Hsieh, S.C.3
Messina, N.4
-
59
-
-
57849145161
-
Mutual suppression: Comment on Paulhus et al
-
(2004), doi:10.1080/00273170802490640
-
Nickerson, C. (2008). Mutual Suppression: Comment on Paulhus et al. (2004). Multivariate Behavioral Research, 43, 556-563. doi:10.1080/00273170802490640
-
(2008)
Multivariate Behavioral Research
, vol.43
, pp. 556-563
-
-
Nickerson, C.1
-
60
-
-
4544319811
-
Two replicable suppressor situations in personality research
-
doi:10.1207/s15327906mbr3902_7
-
Paulhus, D. L., Robins, R. W., Trzesniewski, K. H., & Tracy, J. L. (2004). Two replicable suppressor situations in personality research. Multivariate Behavioral Research, 39, 303-328. doi:10.1207/s15327906mbr3902_7
-
(2004)
Multivariate Behavioral Research
, vol.39
, pp. 303-328
-
-
Paulhus, D.L.1
Robins, R.W.2
Trzesniewski, K.H.3
Tracy, J.L.4
-
61
-
-
47949109234
-
Using student samples in criminological. research
-
doi:10.1080/10511250802137226
-
Payne, B. K., & Chappell, A. T. (2008). Using student samples in criminological. research. Journal of Criminal Justice Education, 19, 177-194. doi:10.1080/10511250802137226
-
(2008)
Journal of Criminal Justice Education
, vol.19
, pp. 177-194
-
-
Payne, B.K.1
Chappell, A.T.2
-
62
-
-
0000392842
-
Specifying the direct and indirect effects of low self control and situational factors in offenders' decision making: Toward a more complete model of rational offending
-
doi:10.1080/07418829600093061
-
Piquero, A., & Tibbetts, S. (1996). Specifying the direct and indirect effects of low self control and situational factors in offenders' decision making: Toward a more complete model of rational offending. Justice Quarterly, 13, 481-510. doi:10.1080/07418829600093061
-
(1996)
Justice Quarterly
, vol.13
, pp. 481-510
-
-
Piquero, A.1
Tibbetts, S.2
-
63
-
-
0041029300
-
Does self-control affect survey response? Applying exploratory, confirmatory, and item response theory analysis to Grasmick et al.'s self-control scale
-
doi:10.1111/j.1745-9125.2000.tb00910.x
-
Piquero, A. R., MacIntosh, R., & Hickman, M. (2000). Does self-control affect survey response? Applying exploratory, confirmatory, and item response theory analysis to Grasmick et al.'s self-control scale. Criminology, 38, 897-929. doi:10.1111/j.1745-9125.2000.tb00910.x
-
(2000)
Criminology
, vol.38
, pp. 897-929
-
-
Piquero, A.R.1
Macintosh, R.2
Hickman, M.3
-
64
-
-
84937188382
-
The reliability and validity of grasmick et al. 's self-control scale. A comment on Longshore et al
-
doi:10.1111/j.1745-9125.1998.tb01244.x
-
Piquero, A. R., & Rosay, A. B. (1998). The reliability and validity of Grasmick et al. 's self-control scale. A comment on Longshore et al. Criminology, 36, 157-174. doi:10.1111/j.1745-9125.1998.tb01244.x
-
(1998)
Criminology
, vol.36
, pp. 157-174
-
-
Piquero, A.R.1
Rosay, A.B.2
-
65
-
-
0039842473
-
The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis
-
doi:10.1111/j.1745-9125.2000.tb00911.x
-
Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis. Criminology, 38, 931-964. doi:10.1111/j.1745-9125.2000.tb00911.x
-
(2000)
Criminology
, vol.38
, pp. 931-964
-
-
Pratt, T.C.1
Cullen, F.T.2
-
67
-
-
0040304844
-
Organizational offending and neoclassical criminology: Challenging the reach of a general theory of crime
-
doi:10.1111/j.1745-9125.1996.tb01211.x
-
Reed, G. E., & Yeager, P. C. (1996). Organizational offending and neoclassical criminology: Challenging the reach of A General Theory of Crime. Criminology, 34, 357-382. doi:10.1111/j.1745-9125.1996.tb01211.x
-
(1996)
Criminology
, vol.34
, pp. 357-382
-
-
Reed, G.E.1
Yeager, P.C.2
-
68
-
-
0347178887
-
-
Retrieved December 16, 2009, from
-
Richardson, R. (2008). CSI computer crime and security survey. Retrieved December 16, 2009, from http://www.cse.msstate.edu/~cse2v3/readings/CSIsurvey2008.pdf
-
(2008)
CSI Computer Crime and Security Survey
-
-
Richardson, R.1
-
69
-
-
33745740196
-
Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis
-
doi:10.1080/01639620600605333
-
Rogers, M., Smoak, N. D., & Liu, J. (2006). Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior, 27, 245-268. doi:10.1080/01639620600605333
-
(2006)
Deviant Behavior
, vol.27
, pp. 245-268
-
-
Rogers, M.1
Smoak, N.D.2
Liu, J.3
-
71
-
-
21244489423
-
-
Westport, CT: Quorum Books
-
Schell, B. H., Dodge, J. L., & Moutsatsos, S. S. (2002). The hacking of America: Who's doing it, why, and how. Westport, CT: Quorum Books.
-
(2002)
The Hacking of America: Who's Doing It, Why, and How
-
-
Schell, B.H.1
Dodge, J.L.2
Moutsatsos, S.S.3
-
72
-
-
61449213998
-
On the use, misuse, and the very limited usefulness of Cronbach's alpha
-
doi:10.1007/s11336-008-9101-0
-
Sijtsma, K. (2009). On the use, misuse, and the very limited usefulness of Cronbach's alpha. Psychometrika, 1, 107-120. doi:10.1007/s11336-008-9101-0
-
(2009)
Psychometrika
, vol.1
, pp. 107-120
-
-
Sijtsma, K.1
-
73
-
-
0036939060
-
Low self-control, organizational theory, and corporate crime
-
doi:10.2307/1512161
-
Simpson, S. S., & Piquero, N. L. (2002). Low self-control, organizational theory, and corporate crime. Law & Society Review, 36, 509-548. doi:10.2307/1512161
-
(2002)
Law & Society Review
, vol.36
, pp. 509-548
-
-
Simpson, S.S.1
Piquero, N.L.2
-
74
-
-
0030668250
-
A social learning theory analysis of computer crime among college students
-
doi:10.1177/0022427897034004005
-
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495-518. doi:10.1177/0022427897034004005
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
75
-
-
0038500642
-
The fruits of good work: Early work experiences and adolescent deviance
-
doi:10.1177/0022427803253799
-
Staff, J., & Uggen, C. (2003). The fruits of good work: Early work experiences and adolescent deviance. Journal of Research in Crime and Delinquency, 40, 263-290. doi:10.1177/0022427803253799
-
(2003)
Journal of Research in Crime and Delinquency
, vol.40
, pp. 263-290
-
-
Staff, J.1
Uggen, C.2
-
77
-
-
33846043733
-
-
Upper Saddle River, NJ, Pearson
-
Taylor, R. W., Caeti, T. J., Loper, D. K., Fritsch, E. J., & Liederbach, J. (2006). Digital crime and digital terrorism. Upper Saddle River, NJ: Pearson.
-
(2006)
Digital Crime and Digital Terrorism
-
-
Taylor, R.W.1
Caeti, T.J.2
Loper, D.K.3
Fritsch, E.J.4
Liederbach, J.5
-
78
-
-
0345257994
-
-
Minneapolis, MN, University of Minnesota Press
-
Thomas, D. (2002). Hacker culture. Minneapolis, MN: University of Minnesota Press.
-
(2002)
Hacker Culture
-
-
Thomas, D.1
-
79
-
-
3542999954
-
Self-control and crime/deviance: Cognitive vs. behavioral measures
-
doi:10.1023/B:JOQC.0000005439.45614.24
-
Tittle, C. R., Ward, D. A., & Grasmick, H. G. (2003). Self-control and crime/deviance: Cognitive vs. behavioral measures. Journal of Quantitative Criminology, 19, 333-365. doi:10.1023/B:JOQC.0000005439.45614.24
-
(2003)
Journal of Quantitative Criminology
, vol.19
, pp. 333-365
-
-
Tittle, C.R.1
Ward, D.A.2
Grasmick, H.G.3
-
80
-
-
13444293285
-
Hacker's accounts: Hacking as a social entertainment
-
doi:10.1177/0894439304271529
-
Turgeman-Goldschmidt, O. (2005). Hacker's accounts: Hacking as a social entertainment. Social Science Computer Review, 23, 8-23. doi:10.1177/0894439304271529
-
(2005)
Social Science Computer Review
, vol.23
, pp. 8-23
-
-
Turgeman-Goldschmidt, O.1
-
81
-
-
84970396607
-
Relationships between variables in three variable linear regression and the concept of suppressor
-
doi:10.1177/001316447803800213
-
Tzelgov, J., & Stern, I. (1978). Relationships between variables in three variable linear regression and the concept of suppressor. Educational and Psychological Measurement, 38, 325-335. doi:10.1177/001316447803800213
-
(1978)
Educational and Psychological Measurement
, vol.38
, pp. 325-335
-
-
Tzelgov, J.1
Stern, I.2
-
82
-
-
84949564522
-
The internet as a conduit for criminal activity
-
In Pattavina, A. (Ed.), Thousand Oaks, CA: Sage
-
Wall, D. S. (2005). The Internet as a conduit for criminal activity. In Pattavina, A. (Ed.), Information technology and the criminal justice system (pp. 78-94). Thousand Oaks, CA: Sage.
-
(2005)
Information Technology and the Criminal Justice System
, pp. 78-94
-
-
Wall, D.S.1
-
83
-
-
51949085108
-
Cybercrime, media, and insecurity: The shaping of public perceptions of cybercrime
-
doi:10.1080/13600860801924907
-
Wall, D. S. (2008). Cybercrime, media, and insecurity: The shaping of public perceptions of cybercrime. International Review of Law Computers & Technology, 22, 45-63. doi:10.1080/13600860801924907
-
(2008)
International Review of Law Computers & Technology
, vol.22
, pp. 45-63
-
-
Wall, D.S.1
-
85
-
-
14544293551
-
Rave and straightedge, the virtual and the real: Exploring online and offline experiences in Canadian youth subcultures
-
doi:10.1177/0044118X03260498
-
Wilson, B., & Atkinson, M. (2005). Rave and straightedge, the virtual and the real: Exploring online and offline experiences in Canadian youth subcultures. Youth & Society, 36, 276-311. doi:10.1177/0044118X03260498
-
(2005)
Youth & Society
, vol.36
, pp. 276-311
-
-
Wilson, B.1
Atkinson, M.2
-
86
-
-
33344475682
-
Employment, peers, and life-course transitions
-
doi:10.1080/07418820400095781
-
Wright, J. P., & Cullen, F. T. (2004). Employment, peers, and life-course transitions. Justice Quarterly, 21, 183-205. doi:10.1080/07418820400095781
-
(2004)
Justice Quarterly
, vol.21
, pp. 183-205
-
-
Wright, J.P.1
Cullen, F.T.2
-
87
-
-
85045160218
-
Computer hacking: Just another case of juvenile delinquency?
-
doi:10.1111/j.14682311.2005.00383.x
-
Yar, M. (2005a). Computer hacking: Just another case of juvenile delinquency? The Howard Journal, 44, 387-399. doi:10.1111/j.14682311.2005.00383.x
-
(2005)
The Howard Journal
, vol.44
, pp. 387-399
-
-
Yar, M.1
-
88
-
-
34247657469
-
The novelty of "cybercrime": An assessment in light of routine activity theory
-
doi:10.1177/147737080556056
-
Yar, M. (2005b). The novelty of "cybercrime": An assessment in light of routine activity theory. European Journal of Criminology, 2, 407-427. doi:10.1177/147737080556056
-
(2005)
European Journal of Criminology
, vol.2
, pp. 407-427
-
-
Yar, M.1
|