Being Pursued Online
暂无分享,去创建一个
[1] Pamela Wilcox,et al. Gender, Adolescent Lifestyles, and Violent Victimization: Implications for Routine Activity Theory , 2010 .
[2] Janet L. Lauritsen,et al. Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents , 1992, Violence and Victims.
[3] Catherine D. Marcum,et al. Potential Factors of Online Victimization of Youth: An Examination of Adolescent Online Behaviors Utilizing Routine Activity Theory , 2010 .
[4] Michael R. Gottfredson,et al. Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization , 1977 .
[5] Johnny Nhan,et al. Finding a Pot of Gold at the End of an Internet Rainbow: Further Examination of Fraudulent Email Solicitation , 2009 .
[6] Richard Tewksbury,et al. Sexual Assault of College Women: A Feminist Interpretation of a Routine Activities Analysis , 2002 .
[7] Brian H. Spitzberg,et al. Cyberstalking and the technologies of interpersonal terrorism , 2002, New Media Soc..
[8] J. M. Miller,et al. 21st century criminology : a reference handbook , 2009 .
[9] Joshua D. Freilich,et al. An assessment of the empirical validity and conceptualization of individual level multivariate studies of lifestyle/routine activities theory published from 1995 to 2005 , 2009 .
[10] Mackenzie Lambine. Unsafe in the Ivory Tower: The sexual victimization of college women , 2012 .
[11] Robert J. Sampson,et al. Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence , 1990 .
[12] Thomas J. Holt,et al. On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory , 2009 .
[13] Kathleen C. Basile,et al. Stalking in the United States: recent national prevalence estimates. , 2006, American journal of preventive medicine.
[14] Michael L. Pittaro. Cyber stalking: An Analysis of Online Harassment and Intimidation , 2007 .
[15] P. Brantingham,et al. Criminality of place , 1995 .
[16] Stalking Victimization Among College Women and Subsequent Help-Seeking Behaviors , 2009, Journal of American college health : J of ACH.
[17] Bonnie S. Fisher,et al. Stalking in the Twilight Zone: Extent of Cyberstalking Victimization and Offending Among College Students , 2012 .
[18] Francis T. Cullen,et al. BEING PURSUED: STALKING VICTIMIZATION IN A NATIONAL STUDY OF COLLEGE WOMEN* , 2002 .
[19] Richard Tewksbury,et al. A Routine Activity Theory Explanation for Women's Stalking Victimizations , 1999, Violence against Women.
[20] H. D. McKay,et al. Juvenile Delinquency and Urban Areas , 1943 .
[21] R. Tewksbury,et al. College Students' Lifestyles and Self-Protective Behaviors , 2003 .
[22] J. Finn. A Survey of Online Harassment at a University Campus , 2004, Journal of interpersonal violence.
[23] Nancy Thoennes,et al. Stalking in America : findings from the National Violence Against Women Survey , 1998 .
[24] Oscar Newman,et al. Creating defensible space , 1996 .
[25] Laura J. Moriarty,et al. Cyberstalking: Utilizing What We do Know , 2009 .
[26] Amy I. Cass. Routine Activities and Sexual Assault: An Analysis of Individual- and School-Level Factors , 2007, Violence and Victims.
[27] Lynne D. Roberts,et al. Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An Analysis on Cyber Stalking , 2008 .
[28] M. Felson,et al. Crime and Everyday Life , 1998 .
[29] Michael D. Reisig,et al. LOW SELF‐CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION* , 2008 .
[30] R. Clarke. Hot Products : understanding , anticipating and reducing demand for stolen goods , 1999 .
[31] Carly M. Hilinski. Fear of Crime among College Students: A Test of the Shadow of Sexual Assault Hypothesis , 2009 .
[32] Janis Wolak,et al. Online victimization: A report on the nation’s youth. , 2000 .
[33] Matt R. Nobles,et al. Look who's stalking: Obsessive pursuit and attachment theory , 2010 .
[34] B. Fisher,et al. Unsafe in the Ivory Tower: The Sexual Victimization of College Women , 2009 .
[35] Kenneth C. Land,et al. Burglary Victimization, Perceptions of Crime Risk, and Routine Activities: A Multilevel Analysis Across Seattle Neighborhoods and Census Tracts , 1996 .
[36] Marcus Felson,et al. THOSE WHO DISCOURAGE CRIME , 2006 .
[37] Robert D. Tortora,et al. Response rate and measurement differences in mixed-mode surveys using mail, telephone, interactive voice response (IVR) and the Internet , 2009 .
[38] Robert J. Sampson,et al. Linking the micro- and macro-level dimensions of lifestyle-routine activity and opportunity models of predatory victimization , 1987 .
[39] Richard A. Wright,et al. A study of individual and situational antecedents of violent victimization , 2002 .
[40] Terance D. Miethe,et al. Opportunity, Choice, and Criminal Victimization: A Test of a Theoretical Model , 1990 .
[41] B. Fisher. Crime and Fear on Campus , 1995 .
[42] L. Sheridan,et al. Is cyberstalking different? , 2007 .
[43] T. Holt,et al. Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .
[44] Kyung-shick Choi. Computer Crime Victimization and Integrated Theory: An Empirical Assessment , 2008 .
[45] Matt R. Nobles,et al. Career Dimensions of Stalking Victimization and Perpetration , 2009 .
[46] P. Grabosky. Virtual Criminality: Old Wine in New Bottles? , 2001 .
[47] J. Wolak,et al. Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[48] S. Smoyak,et al. Perceptions of Cyberstalking Among College Students , 2005 .
[49] James R. Kluegel,et al. Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory , 1981 .
[50] L. Edward Wells,et al. Crime and Place , 2012 .
[51] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[52] Francis T. Cullen,et al. CRIME IN THE IVORY TOWER: THE LEVEL AND SOURCES OF STUDENT VICTIMIZATION* , 1998 .
[53] M. Rand,et al. National Crime Victimization Survey: Stalking Victimization in the United States , 2009 .
[54] Patrick R. Gartin,et al. Hot Spots of Predatory Crime: Routine Activities and the Criminology of Place , 1989 .
[55] P. Wilcox,et al. Stalking acknowledgement and reporting among college women experiencing intrusive behaviors: Implications for the emergence of a “classic stalking case” , 2007 .
[56] M. Couper. A REVIEW OF ISSUES AND APPROACHES , 2000 .
[57] Gary F. Jensen,et al. Gender, Lifestyles, and Victimization: Beyond Routine Activity , 1986, Violence and Victims.
[58] Janet L. Lauritsen,et al. THE LINK BETWEEN OFFENDING AND VICTIMIZATION AMONG ADOLESCENTS , 1991 .
[59] Kenneth C. Land,et al. Property Crime Rates in the United States: A Macrodynamic Analysis, 1947-1977; With Ex Ante Forecasts for the Mid-1980s , 1980, American Journal of Sociology.
[60] Richard Tewksbury,et al. PREDICTING RISKS OF LARCENY THEFT VICTIMIZATION: A ROUTINE ACTIVITY ANALYSIS USING REFINED LIFESTYLE MEASURES , 1998 .
[61] V. Pitts,et al. Exploring a feminist routine activities approach to explaining sexual assault , 1995 .
[62] Kenneth C. Land,et al. MACRO‐MICRO INTEGRATION IN THE STUDY OF VICTIMIZATION: A HIERARCHICAL LOGISTIC MODEL ANALYSIS ACROSS SEATTLE NEIGHBORHOODS* , 1994 .
[63] S. Menard. Logistic Regression: From Introductory to Advanced Concepts and Applications , 2009 .
[64] Christopher J. Schreck,et al. Specifying the Influence of Family and Peers on Violent Victimization , 2004, Journal of interpersonal violence.
[65] L. Eby. Book Review: Survey Research Methods, 3rd ed., by Floyd J. Fowler Jr. (2002). Thousand Oaks, Ca: Sage. , 2003 .
[66] P. Chisnall. Mail and Internet Surveys: The Tailored Design Method , 2007, Journal of Advertising Research.
[67] Michael D. Reisig,et al. Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .
[68] Bradford W. Reyns. A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers , 2010 .