Hacking in High School: Cybercrime Perpetration by Juveniles
暂无分享,去创建一个
[1] John J. Gibbs,et al. A Test of Gottfredson and Hirschi's General Theory Using Structural Equation Modeling , 2003 .
[2] Robert G. Morris,et al. Computer Hacking and the Techniques of Neutralization: An Empirical Assessment , 2011 .
[3] Tamara D. Madensen,et al. The Empirical Status of Social Learning Theory: A Meta‐Analysis , 2010 .
[4] W. F. Skinner,et al. A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .
[5] Michael R. Gottfredson,et al. A general theory of crime. , 1992 .
[6] Christopher J. Schreck. Criminal victimization and low self-control: An extension and test of a general theory of crime , 1999 .
[7] Marc Rogers,et al. Self-reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis , 2006 .
[8] Gordon R Meyer,et al. The Social Organization of the Computer Underground , 1989 .
[9] T. Holt,et al. Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .
[10] Michael S. Lewis-Beck,et al. Maintaining Economic Competition: The Causes and Consequences of Antitrust , 1979, The Journal of Politics.
[11] Patrick Webb,et al. Book Review: Digital piracy: An integrated theoretical approach , 2014 .
[12] S. Hinduja,et al. Neutralizing Music Piracy: An Empirical Examination , 2008 .
[13] John D. McCluskey,et al. A general theory of crime and computer crime: An empirical test , 2010 .
[14] Constance L. Chapple,et al. Self‐control, peer relations, and delinquency , 2005 .
[15] Henry W. Altland,et al. Regression Analysis: Statistical Modeling of a Response Variable , 1998, Technometrics.
[16] R. Akers,et al. Social Learning and Social Structure: A General Theory of Crime and Deviance. , 2000 .
[17] John J. Gibbs,et al. Parental Management and Self-Control: An Empirical Test of Gottfredson and Hirschi's General Theory , 1998 .
[18] Matthew R. Lee,et al. The Influence of a Serial Killer on Changes in Fear of Crime and the Use of Protective Measures: A Survey-Based Case Study of Baton Rouge , 2007 .
[19] Orly Turgeman-Goldschmidt. Meanings that Hackers Assign to their Being a Hacker , 2008 .
[20] T. Holt,et al. Predicting Online Harassment Victimization Among a Juvenile Population , 2012 .
[21] Sameer Hinduja,et al. Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft* , 2008 .
[22] George E. Higgins,et al. Low Self-Control and Social Learning in Understanding Students' Intentions to Pirate Movies in the United States , 2007 .
[23] M. Krohn. Social Learning Theory: , 1999 .
[24] George W. Burruss,et al. SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD , 2010 .
[25] T. Holt,et al. Techcrafters and Makecrafters: A Comparison of Two Populations of Hackers , 2008, 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing.
[26] T. Holt. subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures , 2007 .
[27] Douglas Thomas. Hacker Culture , 2002 .
[28] Adam M. Bossler,et al. The General Theory of Crime and Computer Hacking: Low Self-control Hackers? , 2011 .
[29] M. DeLisi,et al. Designed to fail: Self-control and involvement in the criminal justice system , 2001 .
[30] Yvonne Neudorf,et al. A General Theory Of Crime , 2016 .
[31] Kristin L. Sainani,et al. Logistic Regression , 2014, PM & R : the journal of injury, function, and rehabilitation.
[32] T. Pratt,et al. THE EMPIRICAL STATUS OF GOTTFREDSON AND HIRSCHI'S GENERAL THEORY OF CRIME: A META‐ANALYSIS , 2000 .
[33] T. Jordan,et al. A Sociology of Hackers , 1998 .
[34] George E. Higgins,et al. Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software , 2006 .
[35] Catherine D. Marcum,et al. Digital Piracy: An Examination of Three Measurements of Self-Control , 2008 .
[36] George E. Higgins,et al. Explaining Deviant Peer Associations: An Examination of Low Self-Control, Ethical Predispositions, Definitions, and Digital Piracy , 2009 .
[37] Paul A. Taylor,et al. Hackers: Crime in the Digital Sublime , 1999 .
[38] Eunice Chang,et al. Self-Control and Social Bonds: A Combined Control Perspective on Deviance , 2004 .
[39] George E. Higgins,et al. Criminological theory in the digital age: The case of social learning theory and digital piracy☆ , 2010 .