Online Routines and Identity Theft Victimization
暂无分享,去创建一个
[1] Tamara D. Madensen. Eck, John E. , 2014 .
[2] Emily Finch. The problem of stolen identity and the Internet , 2013 .
[3] Johan van Wilsem,et al. ‘Bought it, but Never Got it’ Assessing Risk Factors for Online Consumer Fraud Victimization , 2013 .
[4] Emily Finch,et al. What a tangled web we weave: identity theft and the Internet , 2012 .
[5] P. V. Schijndel. Identity Theft and Fraud , 2011 .
[6] Pamela Wilcox,et al. Gender, Adolescent Lifestyles, and Violent Victimization: Implications for Routine Activity Theory , 2010 .
[7] Michael D. Reisig,et al. Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .
[8] Catherine D. Marcum,et al. Potential Factors of Online Victimization of Youth: An Examination of Adolescent Online Behaviors Utilizing Routine Activity Theory , 2010 .
[9] Bradford W. Reyns. A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers , 2010 .
[10] John E. Eck,et al. Super controllers and crime prevention: A routine activity explanation of crime prevention success and failure , 2010 .
[11] Alex R. Piquero,et al. Low Self-Control and Fraud , 2010 .
[12] B. Fisher,et al. What Distinguishes Single from Recurrent Sexual Victims? The Role of Lifestyle‐Routine Activities and First‐Incident Characteristics , 2010 .
[13] Alex R. Piquero,et al. Low Self-Control and FraudOffending, Victimization, and Their Overlap , 2010 .
[14] Joshua D. Freilich,et al. An assessment of the empirical validity and conceptualization of individual level multivariate studies of lifestyle/routine activities theory published from 1995 to 2005 , 2009 .
[15] Michael D. Reisig,et al. Perceived Risk of Internet Theft Victimization , 2009 .
[16] T. Holt,et al. Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .
[17] Michael D. Reisig,et al. LOW SELF‐CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION* , 2008 .
[18] M. Levi. Combating identity and other forms of payment fraud in the UK: an analytical history , 2008 .
[19] Kyung-shick Choi. Computer Crime Victimization and Integrated Theory: An Empirical Assessment , 2008 .
[20] Bert-Jaap Koops,et al. Identity theft, identity fraud and/or identity-related crime , 2006, Datenschutz und Datensicherheit - DuD.
[21] Kristy Holtfreter,et al. Sociolegal change in consumer fraud: From victim-offender interactions to global networks , 2005 .
[22] Ronald V. Clarke,et al. Superhighway Robbery: Preventing E-commerce Crime , 2003 .
[23] D. Cornish. OPPORTUNITIES, PRECIPITATORS AND CRIMINAL DECISIONS: A REPLY TO WORTLEY'S CRITIQUE OF SITUATIONAL CRIME PREVENTION , 2003 .
[24] Richard A. Wright,et al. A study of individual and situational antecedents of violent victimization , 2002 .
[25] R. Clarke. Technology, Criminology and Crime Science , 2002 .
[26] Mark Warr,et al. Fear of Crime in the United States: Avenues for Research and Policy , 2000 .
[27] Christopher J. Schreck. Criminal victimization and low self-control: An extension and test of a general theory of crime , 1999 .
[28] Richard Tewksbury,et al. A Routine Activity Theory Explanation for Women's Stalking Victimizations , 1999, Violence against Women.
[29] Richard Tewksbury,et al. PREDICTING RISKS OF LARCENY THEFT VICTIMIZATION: A ROUTINE ACTIVITY ANALYSIS USING REFINED LIFESTYLE MEASURES , 1998 .
[30] Francis T. Cullen,et al. CRIME IN THE IVORY TOWER: THE LEVEL AND SOURCES OF STUDENT VICTIMIZATION* , 1998 .
[31] D. Mann,et al. NETCRIME More Change in the Organization of Thieving , 1998 .
[32] John M. Boyle,et al. Victimization of Persons by Fraud , 1995 .
[33] Kenneth C. Land,et al. MACRO‐MICRO INTEGRATION IN THE STUDY OF VICTIMIZATION: A HIERARCHICAL LOGISTIC MODEL ANALYSIS ACROSS SEATTLE NEIGHBORHOODS* , 1994 .
[34] Terance D. Miethe,et al. Opportunity, Choice, and Criminal Victimization: A Test of a Theoretical Model , 1990 .
[35] Robert J. Sampson,et al. Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence , 1990 .
[36] Leslie W. Kennedy,et al. ROUTINE ACTIVITIES AND CRIME: AN ANALYSIS OF VICTIMIZATION IN CANADA * , 1990 .
[37] Robert J. Sampson,et al. Linking the micro- and macro-level dimensions of lifestyle-routine activity and opportunity models of predatory victimization , 1987 .
[38] M. Maxfield. Household composition, routine activity, and victimization: A comparative analysis , 1987 .
[39] Judith R. Blau,et al. Routine Leisure Activities and Rates of Crime: A Macro-Level Analysis , 1987 .
[40] Kenneth C. Land,et al. Age structure and crime: symmetry versus asymmetry and the projection of crime rates through the 1990s , 1987 .
[41] Steven F. Messner,et al. THE SOCIAL ECOLOGY OF URBAN HOMICIDE: AN APPLICATION OF THE “ROUTINE ACTIVITIES” APPROACH , 1985 .
[42] James R. Kluegel,et al. Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory , 1981 .
[43] Lawrence E. Cohen,et al. The Determinants of Larceny: an Empirical and Theoretical Study , 1980 .
[44] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[45] Michael R. Gottfredson,et al. Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization , 1977 .