Cybercrime: The Psychology of Online Offenders
暂无分享,去创建一个
[1] Emily Finch. The problem of stolen identity and the Internet , 2013 .
[2] M. Yar. Teenage kicks or virtual villainy? Internet piracy, moral entrepreneurship and the social construction of a crime problem , 2013 .
[3] Russell G. Smith. Biometric solutions to identity-related cybercrime , 2013 .
[4] M. Wykes. Constructing crime: stalking, celebrity, ‘cyber’ and media , 2013 .
[5] P. Taylor. Maestros or misogynists? Gender and the social construction of hacking , 2012 .
[6] Janice Joseph. Cyberstalking: an international perspective , 2012 .
[7] Mimi Halper Silbert. The Effects on Juveniles of Being Used for Pornography and Prostitution , 2012 .
[8] Michael Rocque,et al. Biosocial criminology and modern crime prevention , 2012 .
[9] Ken H. Guo,et al. Identity Theft and Fraud: Evaluating and Managing Risk , 2012 .
[10] Colette Langos,et al. Cyberbullying: The Challenge to Define , 2012, Cyberpsychology Behav. Soc. Netw..
[11] B. Loader,et al. Social media and democracy : innovations in participatory politics , 2012 .
[12] Kirsten Robertson,et al. Illegal Downloading, Ethical Concern, and Illegal Behavior , 2012 .
[13] Sigi Goode,et al. Exploring software piracy as a factor of video game console adoption , 2012, Behav. Inf. Technol..
[14] Cheolho Yoon,et al. Digital piracy intention: a comparison of theoretical models , 2012, Behav. Inf. Technol..
[15] D. Middleton,et al. Internet Sex Offenders , 2012 .
[16] M. Lindsay,et al. ONLINE HARASSMENT AMONG COLLEGE STUDENTS , 2012 .
[17] M. Conway,et al. Exploring the form and function of dissident Irish Republican online discourses , 2012 .
[18] G. Holden,et al. Discipline and Punishment , 2012 .
[19] Mike Boulton,et al. Predicting Undergraduates' Self-Reported Engagement in Traditional and Cyberbullying from Attitudes , 2012, Cyberpsychology Behav. Soc. Netw..
[20] Monica T. Whitty,et al. The Online Romance Scam: A Serious Cybercrime , 2012, Cyberpsychology Behav. Soc. Netw..
[21] Catherine D. Marcum,et al. Examining the Role of Peer Influence and Self-Control on Downloading Behavior , 2012 .
[22] Deborah A. Liptak,et al. Web of Deceit: Misinformation and Manipulation in the Age of Social Media , 2012 .
[23] Bonnie S. Fisher,et al. Stalking in the Twilight Zone: Extent of Cyberstalking Victimization and Offending Among College Students , 2012 .
[24] Potential Consequences of Accessing Child Pornography Over the Internet and Who is Accessing It , 2012 .
[25] Ethics and Legal Aspects of Virtual Worlds , 2012 .
[26] B. Boutwell,et al. Low Resting Heart Rate and Rational Choice: Integrating Biological Correlates of Crime in Criminological Theories , 2012 .
[27] J. Smetana,et al. College students' moral evaluations of illegal music downloading , 2012 .
[28] Mark M.H. Goode,et al. DVD Pirating Intentions: Angels, Devils, Chancers and Receivers , 2012 .
[29] Geoff Dean,et al. The dark side of social media : review of online terrorism , 2012 .
[30] Vishal Midha,et al. It won't happen to me: An assessment of optimism bias in music piracy , 2012, Comput. Hum. Behav..
[31] Xiao Wang,et al. The immorality of illegal downloading: The role of anticipated guilt and general emotions , 2012, Comput. Hum. Behav..
[32] Jennifer Bonds-Raacke,et al. College Students' Facebook Stalking of Ex-Partners , 2011, Cyberpsychology Behav. Soc. Netw..
[33] M. Seto,et al. Examining the Criminal History and Future Offending of Child Pornography Offenders: An Extended Prospective Follow-up Study , 2011, Law and human behavior.
[34] André Melzer,et al. Are Cyberbullies Less Empathic? Adolescents' Cyberbullying Behavior and Empathic Responsiveness , 2011, Cyberpsychology Behav. Soc. Netw..
[35] H. Brooke. The Revolution will be Digitised , 2011 .
[36] Bonnie S. Fisher,et al. Being Pursued Online , 2011 .
[37] T. Ward,et al. Evolutionary behavioural science and crime: Aetiological and intervention implications , 2011 .
[38] Amy Bruckman,et al. Domestic violence and information communication technologies , 2011, Interact. Comput..
[39] Andrew Thatcher,et al. Modelling Social Cognitive Theory to Explain Software Piracy Intention , 2011, HCI.
[40] Justin W. Patchin,et al. Traditional and Nontraditional Bullying Among Youth: A Test of General Strain Theory , 2011 .
[41] James McGuire,et al. Are Internet offenders emotionally avoidant? , 2011 .
[42] Rui Chen,et al. Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model , 2011, Decis. Support Syst..
[43] Eric A. Storch,et al. Has Cyber Technology Produced a New Group of Peer Aggressors? , 2011, Cyberpsychology Behav. Soc. Netw..
[44] Ersilia Menesini,et al. The Measurement of Cyberbullying: Dimensional Structure and Relative Item Severity and Discrimination , 2011, Cyberpsychology Behav. Soc. Netw..
[45] David Knox,et al. Using technology to control intimate partners: An exploratory study of college undergraduates , 2011, Comput. Hum. Behav..
[46] April Kontostathis,et al. Learning to Identify Internet Sexual Predation , 2011, Int. J. Electron. Commer..
[47] Twila Wingrove,et al. Why were millions of people not obeying the law? Motivational influences on non-compliance with the law in the case of music piracy , 2011 .
[48] Chantal A. Hermann,et al. The Characteristics of Online Sex Offenders: A Meta-Analysis , 2011, Sexual abuse : a journal of research and treatment.
[49] T. Jones,et al. Sexualized Images of Children on the Internet , 2011, Sexual abuse : a journal of research and treatment.
[50] Orly Turgeman-Goldschmidt. Identity Construction Among Hackers , 2011 .
[51] Michael L. Pittaro. Cyber Stalking: Typology, Etiology, and Victims , 2011 .
[52] Maura Conway. Against cyberterrorism , 2011, CACM.
[53] Louise Dixon,et al. Review of Meta-Analyses on the Association Between Child Sexual Abuse and Adult Mental Health Difficulties: A Systematic Approach , 2011, Trauma, violence & abuse.
[54] Meng-Jia Wu,et al. Interventions to Prevent and Reduce Cyber Abuse of Youth: A Systematic Review , 2011 .
[55] Christopher Hadnagy,et al. Social Engineering: The Art of Human Hacking , 2010 .
[56] Elizabeth Sillence,et al. It won't happen to me: Promoting secure behaviour among internet users , 2010, Comput. Hum. Behav..
[57] Eleanor O'Higgins,et al. Music piracy: ethical perspectives , 2010 .
[58] Bradford W. Reyns,et al. The stalking victim's decision to contact the police: A test of Gottfredson and Gottfredson's theory of criminal justice decision making , 2010 .
[59] Shona Leitch,et al. Hacker Taggers: A new type of hackers , 2010, Inf. Syst. Frontiers.
[60] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[61] Kamel Rouibah,et al. The fight against digital piracy: An experiment , 2010, Telematics Informatics.
[62] J. Wolak,et al. Use of social networking sites in online sex crimes against minors: an examination of national incidence and means of utilization. , 2010, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[63] Justin W. Patchin,et al. Bullying, Cyberbullying, and Suicide , 2010, Archives of suicide research : official journal of the International Academy for Suicide Research.
[64] George E. Higgins,et al. Criminological theory in the digital age: The case of social learning theory and digital piracy☆ , 2010 .
[65] J. Clough. Principles of Cybercrime , 2010, The Military Law and the Law of War Review.
[66] M. Leonard. “I did what I was directed to do but he didn't touch me”: The impact of being a victim of internet offending , 2010 .
[67] D. Canter. Forensic Psychology: A Very Short Introduction , 2010 .
[68] Lisa A. Melander. College Students' Perceptions of Intimate Partner Cyber Harassment , 2010, Cyberpsychology Behav. Soc. Netw..
[69] Gavriel Salvendy,et al. Perception of information security , 2010, Behav. Inf. Technol..
[70] L. Tam,et al. The psychology of password management: a tradeoff between security and convenience , 2010, Behav. Inf. Technol..
[71] The Cambridge Handbook of Forensic Psychology: Forensic psychology: a case of multiple identities , 2010 .
[72] Ponnurangam Kumaraguru,et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.
[73] R. Blanchard. The DSM Diagnostic Criteria for Pedophilia , 2010, Archives of sexual behavior.
[74] Bradford W. Reyns. A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers , 2010 .
[75] D. Sachau,et al. Secondary Traumatic Stress and Burnout among Law Enforcement Investigators Exposed to Disturbing Media Images , 2010 .
[76] M. Seto,et al. Lay Perceptions of Child Pornography Offenders , 2010 .
[77] Alex R. Piquero,et al. Low Self-Control and Fraud , 2010 .
[78] R. Rosner,et al. Intellectual Quotient of Juveniles Evaluated in a Forensic Psychiatry Clinic After Committing a Violent Crime * , 2010, Journal of forensic sciences.
[79] Kimberly Twyman,et al. Comparing Children and Adolescents Engaged in Cyberbullying to Matched Peers , 2009, Cyberpsychology Behav. Soc. Netw..
[80] Margaret Wilson. The Cambridge Handbook of Forensic Psychology: Terrorism research: current issues and debates , 2010 .
[81] Yu-Ping Liu,et al. Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior , 2010 .
[82] Michael Bachmann. The Risk Propensity and Rationality of Computer Hackers , 2010 .
[83] D. Denning. Terror's Web: How the Internet is Transforming Terrorism , 2010 .
[84] Julian C. Bradfield,et al. A general definition of malware , 2010, Journal in Computer Virology.
[85] Renee McDonald,et al. Can virtual reality increase the realism of role plays used to teach college women sexual coercion and rape-resistance skills? , 2009, Behavior therapy.
[86] H. Nijman,et al. Demographic and Personality Characteristics of Internet Child Pornography Downloaders in Comparison to Other Offenders , 2009, Journal of child sexual abuse.
[87] Russell G. Smith. Identity theft and fraud , 2009 .
[88] Steven Furnell,et al. Hackers, viruses and malicious software , 2009 .
[89] Public policing and Internet crime , 2009 .
[90] M. Yar. Public perceptions and public opinion about Internet crime , 2009 .
[91] Online sexual exploitation of children and young people , 2009 .
[92] R. Maniglio,et al. The impact of child sexual abuse on health: a systematic review of reviews. , 2009, Clinical psychology review.
[93] Laura J. Moriarty,et al. Cyberstalking: Utilizing What We do Know , 2009 .
[94] Chad M. S. Steel. Child pornography in peer-to-peer networks. , 2009, Child abuse & neglect.
[95] Marilyn Anne Campbell,et al. Cyberbullying: The New Face of Workplace Bullying? , 2009, Cyberpsychology Behav. Soc. Netw..
[96] Gustavo S. Mesch. Parental Mediation, Online Activities, and Cyberbullying , 2009, Cyberpsychology Behav. Soc. Netw..
[97] Martin Killias,et al. The Effects of Increasing the Certainty of Punishment , 2009 .
[98] T. Elbert,et al. The consumption of Internet child pornography and violent and sex offending , 2009, BMC psychiatry.
[99] Aunshul Rege. What's Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud , 2009 .
[100] George E. Higgins,et al. Neutralizing Potential and Self-Reported Digital Piracy , 2009 .
[101] S. Livingstone. Children and the internet: great expectations, challenging realities , 2009 .
[102] Jenessa Malin,et al. Adolescent self-control and music and movie piracy , 2009, Comput. Hum. Behav..
[103] Younghwa Lee,et al. Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..
[104] J. Post,et al. The Psychology of Suicide Terrorism , 2009, Psychiatry.
[105] A. Beech,et al. Psychological Profiles of Internet Sexual Offenders , 2009, Sexual abuse : a journal of research and treatment.
[106] Atreyi Kankanhalli,et al. Studying users' computer security behavior: A health belief perspective , 2009, Decis. Support Syst..
[107] N. Couldry. Communicative entitlements and democracy: The future of the digital divide debate , 2009 .
[108] D. Middleton,et al. Does treatment work with internet sex offenders? Emerging findings from the Internet Sex Offender Treatment Programme (i-SOTP) , 2009 .
[109] S. Jaffee,et al. Posttraumatic Stress Symptoms and Trajectories in Child Sexual Abuse Victims: An Analysis of Sex Differences Using the National Survey of Child and Adolescent Well-Being , 2009, Journal of abnormal child psychology.
[110] M. Evans. Gordon Brown and public management reform – a project in search of a ‘big idea’? , 2009 .
[111] Johnny Nhan,et al. Finding a Pot of Gold at the End of an Internet Rainbow: Further Examination of Fraudulent Email Solicitation , 2009 .
[112] Alison Hunter. High-tech Rascality: Asperger's Syndrome, Hackers, Geeks, and Personality Types in the ICT Industry , 2009 .
[113] Clay Shirky,et al. Here Comes Everybody , 2017 .
[114] Robert Moore,et al. Neutralizations and Rationalizations of Digital Piracy: A Qualitative Analysis of University Students , 2009 .
[115] A. Maghaireh. Shariah Law and Cyber-Sectarian Conflict: How can Islamic Criminal Law respond to cyber crime? , 2009 .
[116] Lucas Donato,et al. An Introduction to How Criminal Profiling Could Be Used as a Support for Computer Hacking Investigations , 2009, J. Digit. Forensic Pract..
[117] B. Conner,et al. Examining Self-Control as a Multidimensional Predictor of Crime and Drug Use in Adolescents with Criminal Histories , 2009, The Journal of Behavioral Health Services & Research.
[118] F. Lösel,et al. Does sexual offender treatment work? A systematic review of outcome evaluations. , 2008, Psicothema.
[119] Raoul Chiesa,et al. Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking , 2008 .
[120] Amy E. Grubb,et al. Attribution of blame in cases of rape: An analysis of participant gender, type of rape and perceived similarity to the victim. , 2008 .
[121] Marc G. Gertz,et al. Sex Crimes, Children, and Pornography , 2008 .
[122] A. Raine. From Genes to Brain to Antisocial Behavior , 2008 .
[123] G. Davey,et al. Psychopathology: Research, Assessment and Treatment in Clinical Psychology , 2008 .
[124] M. Huss. Forensic Psychology : Research, Clinical Practice, and Applications , 2008 .
[125] K. Bhal,et al. Exploring Cognitive Moral Logics Using Grounded Theory: The Case of Software Piracy , 2008 .
[126] Gunter Ollmann. The evolution of commercial malware development kits and colour-by-numbers custom malware , 2008 .
[127] Robert LaRose,et al. Keeping our network safe: a model of online protection behaviour , 2008, Behav. Inf. Technol..
[128] Catherine D. Marcum,et al. Deterrence and Digital Piracy , 2008 .
[129] B. King,et al. Asperger's syndrome: diagnosis and treatment. , 2008, The American journal of psychiatry.
[130] Justin W. Patchin,et al. Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying , 2008 .
[131] John Winterdyk,et al. Student and Non-Student Perceptions and Awareness of Identity Theft , 2008 .
[132] J. Horgan,et al. From Profiles to Pathways and Roots to Routes: Perspectives from Psychology on Radicalization into Terrorism , 2008 .
[133] S. Moskalenko,et al. Mechanisms of Political Radicalization: Pathways Toward Terrorism , 2008 .
[134] Catherine D. Marcum,et al. Music Piracy and Neutralization: A Preliminary Trajectory Analysis from Short-Term Longitudinal Data , 2008 .
[135] C. Bhat. Cyber Bullying: Overview and Strategies for School Counsellors, Guidance Officers, and All School Personnel , 2008, Australian Journal of Guidance and Counselling.
[136] Janis Wolak,et al. Is Talking Online to Unknown People Always Risky? Distinguishing Online Interaction Styles in a National Sample of Youth Internet Users , 2008, Cyberpsychology Behav. Soc. Netw..
[137] Daithí Mac Síthigh. The mass age of internet law , 2008 .
[138] A. Silke. Becoming a Terrorist , 2008 .
[139] J. Horgan. Leaving Terrorism Behind: An Individual Perspective , 2008 .
[140] John Horgan,et al. The search for the terrorist personality. , 2008 .
[141] L. Moriarty,et al. Cyberstalking: Utilizing Newspaper Accounts to Establish Victimization Patterns , 2008 .
[142] M. Carter,et al. A Preliminary Examination of Trauma History, Locus of Control, and PTSD Symptom Severity in African American Women , 2008 .
[143] S. Humphreys. Ruling the virtual world , 2008 .
[144] R. Cadoret,et al. Impulsive and callous traits are more strongly associated with delinquent behavior in higher risk neighborhoods among boys and girls. , 2008, Journal of abnormal psychology.
[145] Francine Dehue,et al. Cyberbullying: Youngsters' Experiences and Parental Perception , 2008, Cyberpsychology Behav. Soc. Netw..
[146] S. Hinduja,et al. Neutralizing Music Piracy: An Empirical Examination , 2008 .
[147] G. Bente,et al. Avatar-Mediated Networking: Increasing Social Presence and Interpersonal Trust in Net-Based Collaborations , 2008 .
[148] Robert LaRose,et al. Promoting personal responsibility for internet safety , 2008, CACM.
[149] S. J. Sinclair,et al. Terrorism and Terrorist Leaders: Insights from Developmental and Ecological Psychology , 2008 .
[150] Michele L. Ybarra,et al. Online "predators" and their victims: myths, realities, and implications for prevention and treatment. , 2008, The American psychologist.
[151] C. Wilson. Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress , 2008 .
[152] Justin W. Patchin,et al. Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .
[153] A. Marshall,et al. Identity and identity theft , 2008 .
[154] Andrew Silke,et al. Research on Terrorism , 2008 .
[155] P. Stephens. IPR and technological protection measures , 2008 .
[156] D. Edgar-Nevill. Internet grooming and paedophile crimes , 2008 .
[157] D. Middleton. From Research to Practice: The Development of the Internet Sex Offender Treatment Programme (i-SOTP) , 2008 .
[158] S. Levine. Using intelligence to predict subsequent contacts with the criminal justice system for sex offences , 2008 .
[159] M. Rogers,et al. Self-Reported Online Child Pornography Behavior: A Psychological Analysis , 2008 .
[160] Lynne D. Roberts,et al. Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An Analysis on Cyber Stalking , 2008 .
[161] W. Bennett. Changing Citizenship in the Digital Age , 2008 .
[162] J. Finn,et al. Promoting the Safe and Strategic Use of Technology for Victims of Intimate Partner Violence: Evaluation of the Technology Safety Project , 2009, Journal of Family Violence.
[163] Andrew J. Park,et al. The Use of Virtual and Mixed Reality Environments for Urban Behavioural Studies , 2008, PsychNology J..
[164] Jane L. Hsu,et al. Consumers’ Willingness to Pay for Non-pirated Software , 2008 .
[165] M. Meadows,et al. I, Avatar: The Culture and Consequences of Having a Second Life , 2007 .
[166] L. Sheridan,et al. Is cyberstalking different? , 2007 .
[167] J. Wolak,et al. Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[168] Robin M. Kowalski,et al. Electronic bullying among middle school students. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[169] L. Webb,et al. Characteristics of Internet Child Pornography Offenders: A Comparison with Child Molesters , 2007, Sexual abuse : a journal of research and treatment.
[170] Brendesha M. Tynes,et al. Internet Safety Gone Wild? , 2007 .
[171] Lixuan Zhang,et al. Hacking into the Minds of Hackers , 2007, Inf. Syst. Manag..
[172] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[173] Malcolm Shore,et al. An Advanced Model of Hacking , 2007 .
[174] M. Williams,et al. Policing diversity in the digital age , 2007 .
[175] D. Wall. Cybercrime: The Transformation of Crime in the Information Age , 2007 .
[176] Dennis Howitt,et al. Sex Offenders and the Internet , 2007 .
[177] Lorraine Sheridan,et al. An investigation into maladaptive personality functioning in Internet sex offenders , 2007 .
[178] Stephen D. Webster,et al. The Construction and Preliminary Validation of the Internet Behaviours and Attitudes Questionnaire (IBAQ) , 2007, Sexual abuse : a journal of research and treatment.
[179] Sandro Galea,et al. Psychopathological consequences after a terrorist attack: An epidemiological study among victims, the general population, and police officers☆ , 2007, European Psychiatry.
[180] Joseph B. Walther,et al. Selective self-presentation in computer-mediated communication: Hyperpersonal dimensions of technology, language, and cognition , 2007, Comput. Hum. Behav..
[181] GEORGE E. HIGGINS. Digital Piracy: An Examination of Low Self-Control and Motivation Using Short-Term Longitudinal Data , 2007, Cyberpsychology Behav. Soc. Netw..
[182] David P. Farrington,et al. Preventing Crime: What Works for Children, Offenders, Victims and Places , 2007 .
[183] N. Willard. Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress , 2007 .
[184] L Alvin Malesky,et al. Predatory Online Behavior: Modus Operandi of Convicted Sex Offenders in Identifying Potential Victims and Contacting Minors Over the Internet , 2007, Journal of child sexual abuse.
[185] Ethan Katsh. Online Dispute Resolution: Some Implications for the Emergence of Law in Cyberspace1 , 2007 .
[186] Michael L. Pittaro. Cyber stalking: An Analysis of Online Harassment and Intimidation , 2007 .
[187] Qing Li,et al. New bottle but old wine: A research of cyberbullying in schools , 2007, Comput. Hum. Behav..
[188] Sameer Hinduja,et al. Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.
[189] R. Cooney,et al. Taking Uncertainty Seriously: Adaptive Governance and International Trade , 2007 .
[190] J. Wolak,et al. Youth Internet users at risk for the most serious online sexual solicitations. , 2007, American journal of preventive medicine.
[191] Robert LaRose,et al. Share, Steal, or Buy? A Social Cognitive Perspective of Music Downloading , 2007, Cyberpsychology Behav. Soc. Netw..
[192] Steve Pettifer,et al. Absorption, dissociation, locus of control and presence in virtual reality , 2007, Comput. Hum. Behav..
[193] Christian End,et al. Unrealistic optimism in internet events , 2007, Comput. Hum. Behav..
[194] Juliana Raskauskas,et al. Involvement in traditional and electronic bullying among adolescents. , 2007, Developmental psychology.
[195] D. Finkelhor,et al. Statutory sex crime relationships between juveniles and adults : A review of social scientific research , 2007 .
[196] Maria Papadaki,et al. Considering the potential of criminal profiling to combat hacking , 2007, Journal in Computer Virology.
[197] Caroline Metcalf,et al. A psychometric comparison of internet and non-internet sex offenders from a community treatment sample , 2007 .
[198] Jeanne Pia Mifsud-Bonnici,et al. Weaving the Mesh: Finding Remedies in Cyberspace , 2007 .
[199] Mariano Alcañiz Raya,et al. Affective Interactions Using Virtual Reality: The Link between Presence and Emotions , 2007, Cyberpsychology Behav. Soc. Netw..
[200] Alex R. Piquero,et al. Self-Control and Criminal Career Dimensions , 2007 .
[201] F. Masi. The paedophile and his inner world: Theoretical and clinical considerations on the analysis of a patient1 , 2007 .
[202] Felix Oberholzer-Gee,et al. The Effect of File Sharing on Record Sales: An Empirical Analysis , 2007, Journal of Political Economy.
[203] C. Hill. Digital piracy: Causes, consequences, and strategic responses , 2007 .
[204] C. Sunstein. Republic.com 2.0 , 2007 .
[205] C. Marmar,et al. The Peritraumatic Dissociative Experiences Questionnaire An International Perspective , 2007 .
[206] A. Fernandez-liria,et al. Psychopathological consequences after a terrorist attack: An epidemiological study among victims, police officers, and the general population , 2007 .
[207] D. C. Graves,et al. A Qualitative Analysis of Advance Fee Fraud E-mail Schemes , 2007 .
[208] M. Conway. Cyberterrorism: hype and reality , 2007 .
[209] Herman T. Tavani. Ethics and technology - ethical issues in an age of information and communication technology (2. ed.) , 2007 .
[210] Alok Mishra,et al. Cyber Stalking: A Challenge for Web Security , 2007 .
[211] Y. Benkler,et al. The Wealth of Networks , 2008 .
[212] Michael Stohl. Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? , 2007 .
[213] K. Brown,et al. Cyber-Bullying: Developing Policy to Direct Responses that are Equitable and Effective in Addressing This Special Form of Bullying. , 2006 .
[214] A. Beech,et al. An investigation into the applicability of the Ward and Siegert Pathways Model of child sexual abuse with Internet offenders , 2006 .
[215] Patrick Dunleavy,et al. Digital Era Governance , 2006 .
[216] S. Wright. Government-run Online Discussion Fora: Moderation, Censorship and the Shadow of Control1 , 2006 .
[217] Soft Law and the Elusive Quest for Sustainable Global Governance , 2006, Leiden Journal of International Law.
[218] Sandra Walklate,et al. Imagining the Victim of Crime , 2006 .
[219] Paul Bocij. The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals , 2006 .
[220] A. Merari. Psychological Aspects of Suicide Terrorism , 2006 .
[221] Shadd Maruna,et al. A fundamental attribution error? Rethinking cognitive distortions † , 2006 .
[222] Marcus K. Rogers,et al. Self-reported computer criminal behavior: A psychological analysis , 2006, Digit. Investig..
[223] M. Williams,et al. Virtually Criminal: Crime, Deviance and Regulation Online , 2006 .
[224] Marc Rogers,et al. Self-reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis , 2006 .
[225] A. Kruglanski,et al. The Psychology of Terrorism: “Syndrome” Versus “Tool” Perspectives , 2006 .
[226] J. Boscarino,et al. Predictors of PTSD and Delayed PTSD After Disaster: The Impact of Exposure and Psychosocial Resources , 2006, The Journal of nervous and mental disease.
[227] Timothy Paul Cronan,et al. Piracy, computer crime, and IS misuse at the university , 2006, Commun. ACM.
[228] S. Galea,et al. The behavioral consequences of terrorism: a meta-analysis. , 2006, Academic emergency medicine : official journal of the Society for Academic Emergency Medicine.
[229] Azucena García-Palacios,et al. BusWorld: Designing a Virtual Environment for Post-Traumatic Stress Disorder in Israel: A Protocol , 2006, Cyberpsychology Behav. Soc. Netw..
[230] Justin W. Patchin,et al. Bullies Move Beyond the Schoolyard , 2006 .
[231] A. Scarpa,et al. Community Violence Victimization and Symptoms of Posttraumatic Stress Disorder , 2006, Journal of interpersonal violence.
[232] S. Liebowitz. File Sharing: Creative Destruction or Just Plain Destruction?* , 2006, The Journal of Law and Economics.
[233] Judith M. Collins,et al. Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims , 2006 .
[234] George E. Higgins,et al. Digital Piracy: Assessing the Contributions of an Integrated Self‐Control Theory and Social Learning Theory Using Structural Equation Modeling , 2006 .
[235] Armin Schäfer. Resolving Deadlock: Why International Organisations Introduce Soft Law , 2006 .
[236] Wenjie Wang,et al. A contextual framework for combating identity theft , 2006, IEEE Security & Privacy.
[237] Holly A. Miller,et al. Perceptions of the Validity and Utility of Criminal Profiling Among Forensic Psychologists and Psychiatrists , 2006 .
[238] Jan U. Becker,et al. Dynamics of Illegal Participation in Peer-to-Peer Networks—Why Do People Illegally Share Media Files? , 2006 .
[239] M. Yar,et al. Book Review: Cybercrime and Society , 2006 .
[240] Laurence Alison,et al. Offender Profiling: Limits and Potential , 2006 .
[241] E. Quayle,et al. Sex offenders, internet child abuse images and emotional avoidance: The importance of values. , 2006 .
[242] M. Conway. TERRORIST 'USE' OF THE INTERNET AND FIGHTING BACK , 2006 .
[243] Dorothy E. Denning. A View of Cyberterrorism Five Years Later , 2006 .
[244] R. Wortley,et al. Child pornography on the Internet , 2006 .
[245] Sharon R. Mazzarella,et al. Book Review: Girl Wide Web: Girls, the Internet and the Negotiation of Identity , 2006, New Media Soc..
[246] N. L. Piquero,et al. Causes and Prevention of Intellectual Property Crime , 2005 .
[247] R. Strom,et al. When Teens Turn Cyberbullies. , 2005 .
[248] Nick Nykodym,et al. Criminal profiling and insider cyber crime , 2005, Digit. Investig..
[249] James J.F. Forest,et al. The Making of a Terrorist , 2005 .
[250] Robert LaRose,et al. Sharing or Piracy? An Exploration of Downloading Behavior , 2005, J. Comput. Mediat. Commun..
[251] C. Wilson,et al. Terrorist Capabilities for Cyberattack: Overview and Policy Issues , 2005 .
[252] M. Peitz,et al. Why the Music Industry May Gain from Free Downloading - the Role of Sampling , 2005 .
[253] David J. Gunkel. Editorial: introduction to hacking and hacktivism , 2005, New Media Soc..
[254] Patrick Dunleavy,et al. New public management is dead. Long live digital-era governance , 2005 .
[255] A. d’Astous,et al. Music Piracy on the Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour , 2005 .
[256] John Horgan,et al. A psychology of terrorism? , 2005, Forensic Update.
[257] Andreas Frei,et al. Paedophilia on the Internet--a study of 33 convicted offenders in the Canton of Lucerne. , 2005, Swiss medical weekly.
[258] Roger Thompson,et al. Why spyware poses multiple threats to security , 2005, CACM.
[259] S. Smoyak,et al. Perceptions of Cyberstalking Among College Students , 2005 .
[260] Janis Wolak,et al. Police Posing as Juveniles Online to Catch Sex Offenders: Is It Working? , 2005, Sexual abuse : a journal of research and treatment.
[261] Elephants and Mice Revisited: Law and Choice of Law on the Internet , 2005 .
[262] Russell Dean Vines,et al. Phishing: Cutting the Identity Theft Line , 2005 .
[263] T. Li. Cyber-Harassment: A Study of a New Method for an Old Behavior , 2005 .
[264] M. Seto,et al. The Criminal Histories and Later Offending of Child Pornography Offenders , 2005, Sexual abuse : a journal of research and treatment.
[265] J. Victoroff. The Mind of the Terrorist , 2005 .
[266] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[267] J. Rutter,et al. Fake Nation?: A Study into an Everyday Crime , 2005 .
[268] Brenda K. Wiederhold,et al. Virtual reality therapy for anxiety disorders: Advances in evaluation and treatment. , 2005 .
[269] D. Canter. Mapping murder : walking in killers' footsteps , 2005 .
[270] S. Shariff. Cyber-dilemmas in the new millennium: School obligations to provide student safety in a virtual school environment , 2005 .
[271] Mohammad Rahim,et al. A Socio-Behavioral Study of Home Computer Users' Intention to Practice Security , 2005, PACIS.
[272] J. Wolak,et al. Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings From the National Juvenile Online Victimization Study. , 2005 .
[273] L. Loeb. The Mind of the Paedophile: Psychoanalytic Perspectives , 2004 .
[274] C. Walker. The Criminal Courts Online , 2004 .
[275] Jo-Anne M. Wemmers,et al. Victims' Perspectives on Restorative Justice: How Much Involvement Are Victims Looking For? , 2004 .
[276] J. Wolak,et al. Internet-initiated sex crimes against minors: implications for prevention based on findings from a national study. , 2004, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[277] Michele L. Ybarra,et al. Journal of Child Psychology and Psychiatry 45:7 (2004), pp 1308–1316 10.1111/j.1469-7610.2004.00328.x Online aggressor/targets, aggressors, and targets: a comparison of associated youth characteristics , 2022 .
[278] Linda Senden,et al. Soft Law in European Community Law , 2004 .
[279] D. Farrington,et al. Empathy and offending: a systematic review and meta-analysis , 2004 .
[280] Michael Gilding,et al. ‘I’ve Never Clicked this Much with Anyone in My Life’: Trust and Hyperpersonal Communication in Online Friendships , 2004, New Media Soc..
[281] David L. Riegel. Letter to the Editor: Effects on Boy-Attracted Pedosexual Males of Viewing Boy Erotica , 2004, Archives of sexual behavior.
[282] David P. Farrington,et al. SURVEILLANCE FOR CRIME PREVENTION IN PUBLIC SPACE: RESULTS AND POLICY CHOICES IN BRITAIN AND AMERICA , 2004 .
[283] D. Whittaker. Terrorists and terrorism in the contemporary world , 2004 .
[284] Sudip Bhattacharjee,et al. A Behavioral Model of Digital Music Piracy , 2004, J. Organ. Comput. Electron. Commer..
[285] J. Finn. A Survey of Online Harassment at a University Campus , 2004, Journal of interpersonal violence.
[286] Anne-Marie Slaughter,et al. A New World Order , 2004 .
[287] Francesca Philips,et al. Cyberstalking and Cyberpredators: A Threat to Safe Sexuality on the Internet , 2004 .
[288] Joseph R. Dominick,et al. Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages , 2004 .
[289] John W. LeMasney,et al. Protecting Children From Online Sexual Predators: Technological, Psychoeducational, and Legal Considerations. , 2004 .
[290] M. Felson,et al. Routine activity and rational choice , 2004 .
[291] R. Eckersley. Soft law, hard politics, and the Climate Change Treaty , 2004 .
[292] John Kane,et al. Exploring the psychological and somatic impact of identity theft. , 2004, Journal of forensic sciences.
[293] L. McWilliams,et al. Neuroticism and self-criticism associated with posttraumatic stress disorder in a nationally representative sample. , 2004, Behaviour research and therapy.
[294] M. Conner,et al. The Theory of Planned Behaviour , 2004 .
[295] Megan Carney,et al. The Trojan Made Me Do It: A First Step in Statistical Based Computer Forensics Event Reconstruction , 2004, Int. J. Digit. EVid..
[296] Stephen W. Baron,et al. Self-Control, Social Consequences, and Criminal Behavior: Street Youth and the General Theory of Crime , 2003 .
[297] C. Wilson. Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress , 2003 .
[298] A. Piquero,et al. Sex Differences in Empathy and Its Relation to Juvenile Offending , 2003, Violence and Victims.
[299] P. Taylor. Hacktivism : In search of lost ethics? , 2003 .
[300] Leroy McFarlane,et al. An exploration of predatory behaviour in cyberspace: Towards a typology of cyberstalkers , 2003, First Monday.
[301] Eve Edelson. The 419 scam: information warfare on the spam front and a proposal for local filtering , 2003, Comput. Secur..
[302] Matthew D. Smith,et al. Toulmin's philosophy of argument and its relevance to offender profiling , 2003 .
[303] P. Emmelkamp,et al. Individual differences in post-traumatic stress following post-intimate stalking: stalking severity and psychosocial variables. , 2003, The British journal of clinical psychology.
[304] Marcus K. Rogers. The role of criminal profiling in the computer forensics process , 2003, Comput. Secur..
[305] Hyung-Jin Woo. The hacker mentality : exploring the relationship between psychological variables and hacking activities , 2003 .
[306] E. Quayle,et al. Child Pornography: An Internet Crime , 2003 .
[307] Olga V. Smyslova,et al. Flow-Based Model of Computer Hackers' Motivation , 2003, Cyberpsychology Behav. Soc. Netw..
[308] J. Post,et al. The terrorists in their own words: Interviews with 35 incarcerated Middle Eastern terrorists**This research was conducted with the support of the Smith Richardson Foundation. , 2003 .
[309] Andrew J. Flanagin,et al. Reconceptualizing ‘flaming’ and other problematic messages , 2003, New Media Soc..
[310] David J. Shernoff,et al. Student engagement in high school classrooms from the perspective of flow theory. , 2003 .
[311] L. Roeger,et al. Family and individual characteristics of a community sample of adolescents who graffiti , 2003 .
[312] J. Lawrence,et al. Personality, coping, chronic stress, social support and PTSD symptoms among adult burn survivors: a path analysis. , 2003, The Journal of burn care & rehabilitation.
[313] Richard J. Siegert,et al. Toward a comprehensive theory of child sexual abuse: A theory knitting perspective , 2002 .
[314] Maura Conway,et al. Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet , 2002, First Monday.
[315] Rebecca Gurley Bace,et al. A Guide to Forensic Testimony - The Art and Practice of Presenting Testimony As An Expert Technical Witness , 2002 .
[316] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[317] Mark Halsey,et al. The Meanings of Graffiti and Municipal Administration , 2002 .
[318] E. Quayle,et al. child pornography and the internet: perpetuating a cycle of abuse , 2002 .
[319] P. Rock,et al. Sociological theories of crime , 2002 .
[320] Anne Burke,et al. Child Pornography and the Internet: Policing and Treatment Issues , 2002 .
[321] Brian H. Spitzberg,et al. Cyberstalking and the technologies of interpersonal terrorism , 2002, New Media Soc..
[322] Arthur R. Edwards,et al. The moderator as an emerging democratic intermediary: The role of the moderator in Internet discussions about public issues , 2002, Inf. Polity.
[323] D. Dutton,et al. Assessing the link between stalking and domestic violence , 2001 .
[324] D P Farrington,et al. The concentration of offenders in families, and family criminality in the prediction of boys' delinquency. , 2001, Journal of adolescence.
[325] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[326] D. Klinger. Suicidal Intent in Victim-Precipitated Homicide , 2001 .
[327] John Morison,et al. On-line Citizenship: Consultation and Participation in New Labour's Britain and Beyond , 2001 .
[328] Michael Levi. 'Between the risk and the reality falls the shadow': evidence and urban legends in computer fraud , 2001 .
[329] Eoghan Casey,et al. Handbook of Computer Crime Investigation: Forensic Tools and Technology , 2001 .
[330] D. Denning. Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy , 2001 .
[331] M. Kenny,et al. Racial, ethnic, and cultural factors of childhood sexual abuse: a selected review of the literature. , 2000, Clinical psychology review.
[332] P. Costa,et al. Personality predictors of injury-related posttraumatic stress disorder. , 2000, The Journal of nervous and mental disease.
[333] Kenneth W. Abbott,et al. Hard and Soft Law in International Governance , 2000, International Organization.
[334] Daniel S. Nagin,et al. OFFENDING TRAJECTORIES IN A NEW ZEALAND BIRTH COHORT , 2000 .
[335] Andy K. Bissett,et al. Some human dimensions of computer virus creation and infection , 2000, Int. J. Hum. Comput. Stud..
[336] Jerry Finn,et al. Victimization Online: The Down Side of Seeking Human Services for Women on the Internet , 2000, Cyberpsychology Behav. Soc. Netw..
[337] J. Schneider,et al. Effects of cybersex addiction on the family: Results of a survey , 2000 .
[338] Paul Britton,et al. Picking Up the Pieces , 2010 .
[339] Peter B. Ainsworth,et al. Offender profiling and crime analysis , 2000 .
[340] B. Nelson,et al. Cyberterror: Prospects and Implications , 1999 .
[341] R. Purcell,et al. Study of stalkers. , 1999, The American journal of psychiatry.
[342] G. Gudjonsson,et al. Cognitive distortions and blame attribution in sex offenders against adults and children. , 1999, Child abuse & neglect.
[343] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[344] Andrew Calcutt. White Noise: An A-Z of the Contradictions in Cyberculture , 1998 .
[345] Peter J. Spiro,et al. Nonstate actors in global politics , 1998 .
[346] Carolyn P. Meinel. How Hackers Break In. . . and how they are Caught , 1998 .
[347] C. Hollin,et al. A comparison of patterns of moral development in young offenders and non‐offenders , 1998 .
[348] Andrew Silke,et al. Cheshire-cat logic: The recurring theme of terrorist abnormality in psychological research , 1998 .
[349] J. Reid Meloy,et al. The Psychology of Stalking , 1998 .
[350] Terry M. Gudaitis,et al. The Missing Link in Information Security: Three Dimensional Profiling , 1998, Cyberpsychology Behav. Soc. Netw..
[351] Robert Reiner,et al. The Oxford Handbook of Criminology , 2012 .
[352] J. Boyle. Foucault in Cyberspace: Surveillance, Sovereignty, and Hard-Wired Censors , 1997 .
[353] Richard C. MacKinnon. Punishing the persona: correctional strategies for the virtual offender , 1997 .
[354] Richard J. Hazler. Breaking The Cycle Of Violence: Interventions For Bullying And Victimization , 1996 .
[355] David G. Post,et al. Law and Borders - the Rise of Law in Cyberspace , 1996, First Monday.
[356] Christopher E. Smith,et al. Against Capital Punishment: The Anti-Death Penalty Movement in America, 1972-1994. , 1996 .
[357] Lyle Brenner,et al. Overconfidence in Probability and Frequency Judgments: A Critical Examination , 1996 .
[358] J. Walther,et al. Computer-mediated communication , 2011 .
[359] R. Blackburn. What is forensic psychology , 1996 .
[360] Arnold P. Goldstein,et al. The psychology of vandalism , 1996 .
[361] J. Muncie,et al. Criminological perspectives : a reader , 1996 .
[362] K. Browne,et al. Child sexual abuse prevention: what offenders tell us. , 1995, Child abuse & neglect.
[363] David V. Canter,et al. Criminal Shadows: Inside the Mind of the Serial Killer , 1994 .
[364] Leon A. Hyer,et al. NEO-PI profiles in PTSD as a function of trauma level. , 1993, Journal of clinical psychology.
[365] M A Zona,et al. A comparative study of erotomanic and obsessional subjects in a forensic sample. , 1993, Journal of forensic sciences.
[366] R. Blackburn. The Psychology of Criminal Conduct: Theory, Research and Practice , 1993 .
[367] Bruce Sterling,et al. The Hacker Crackdown: Law and Disorder on the Electronic Frontier , 1992 .
[368] A. Tversky,et al. The weighing of evidence and the determinants of confidence , 1992, Cognitive Psychology.
[369] I. Ajzen. The theory of planned behavior , 1991 .
[370] R. Hirschman,et al. Toward a theory of sexual aggression: a quadripartite model. , 1991, Journal of consulting and clinical psychology.
[371] M. Foucault,et al. The History of Sexuality, Volume 1: An Introduction , 1990 .
[372] L. J. Walker,et al. Hypothetical versus real-life moral reasoning among psychopathic and delinquent youth , 1989, Development and Psychopathology.
[373] R. Baron,et al. The Equity‐Control Model as a Predictor of Vandalism Among College Students1 , 1988 .
[374] J. R. Minor. Current Treatment Approaches , 1987 .
[375] Ann Wolbert Burgess,et al. Child Abuse Aspects of Child Pornography , 1987 .
[376] Ann Wolbert Burgess,et al. Criminal profiling from crime scene analysis , 1986 .
[377] Joseph A. Marolla,et al. “Riding the Bull at Gilley's”: Convicted Rapists Describe the Rewards of Rape , 1985 .
[378] James William Coleman,et al. The criminal elite : the sociology of white collar crime , 1985 .
[379] Michael R. Gottfredson,et al. A General Theory of Crime , 1990 .
[380] D. Finkelhor. Child Sexual Abuse: New Theory and Research , 1984 .
[381] Jerrold M. Post,et al. Notes on a Psychodynamic Theory of Terrorist Behavior , 1984 .
[382] Sherry Turkle,et al. The second self: computers and the human spirit , 1984 .
[383] Steven Levy,et al. Hackers: Heroes of the Computer Revolution , 1984 .
[384] C. Hood. The Tools of Government , 1983 .
[385] R. Rogers. Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .
[386] A. Tversky,et al. The framing of decisions and the psychology of choice. , 1981, Science.
[387] G. Gudjonsson,et al. Forensic Psychology: A Guide to Practice , 1981 .
[388] N. Weinstein. Unrealistic optimism about future life events , 1980 .
[389] H. Eysenck,et al. Crime and Personality , 1979, The Medico-legal journal.
[390] R. Hogarth,et al. Confidence in judgment: Persistence of the illusion of validity. , 1978 .
[391] A. Groth,et al. Rape: power, anger, and sexuality. , 1977, The American journal of psychiatry.
[392] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[393] David P. Farrington,et al. The Delinquent Way Of Life , 1977 .
[394] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[395] L. Robins,et al. Arrests and delinquency in two generations: A study of black urban families and their children. , 1975, Journal of child psychology and psychiatry, and allied disciplines.
[396] A. Tversky,et al. Judgment under Uncertainty: Heuristics and Biases , 1974, Science.
[397] S. B. G. Eysenck,et al. Crime and Personality: An Empirical Study of the Three-Factor Theory , 1970 .
[398] L. Kohlberg. Stage and sequence: The cognitive-developmental approach to socialization , 1969 .
[399] I. Rosenstock. Why people use health services. , 1966, The Milbank Memorial Fund quarterly.
[400] M. Foucault,et al. Madness and civilization : a history of insanity in the age of reason , 1966 .
[401] A. Bandura,et al. INFLUENCE OF MODEL'S REINFORCEMENT CONTINGENCIES ON THE ACQUISITION OF IMITATIVE RESPONSES. , 1965, Journal of personality and social psychology.
[402] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .
[403] L. Festinger,et al. A Theory of Cognitive Dissonance , 2017 .
[404] C. Lombroso,et al. The Female Offender , 1895, The Indian Medical Gazette.
[405] W. Morrison. Crime and Its Causes , 1891 .