Cybercrime: The Psychology of Online Offenders

Cybercrime is a growing problem in the modern world. Despite the many advantages of computers, they have spawned a number of crimes, such as hacking and virus writing, and made other crimes more prevalent and easier to commit, including music piracy, identity theft and child sex offences. Understanding the psychology behind these crimes helps to determine what motivates and characterises offenders and how such crimes can be prevented. This textbook on the psychology of the cybercriminal is the first written for undergraduate and postgraduate students of psychology, criminology, law, forensic science and computer science. It requires no specific background knowledge and covers legal issues, offenders, effects on victims, punishment and preventative measures for a wide range of cybercrimes. Introductory chapters on forensic psychology and the legal issues of cybercrime ease students into the subject, and many pedagogical features in the book and online provide support for the student.

[1]  Emily Finch The problem of stolen identity and the Internet , 2013 .

[2]  M. Yar Teenage kicks or virtual villainy? Internet piracy, moral entrepreneurship and the social construction of a crime problem , 2013 .

[3]  Russell G. Smith Biometric solutions to identity-related cybercrime , 2013 .

[4]  M. Wykes Constructing crime: stalking, celebrity, ‘cyber’ and media , 2013 .

[5]  P. Taylor Maestros or misogynists? Gender and the social construction of hacking , 2012 .

[6]  Janice Joseph Cyberstalking: an international perspective , 2012 .

[7]  Mimi Halper Silbert The Effects on Juveniles of Being Used for Pornography and Prostitution , 2012 .

[8]  Michael Rocque,et al.  Biosocial criminology and modern crime prevention , 2012 .

[9]  Ken H. Guo,et al.  Identity Theft and Fraud: Evaluating and Managing Risk , 2012 .

[10]  Colette Langos,et al.  Cyberbullying: The Challenge to Define , 2012, Cyberpsychology Behav. Soc. Netw..

[11]  B. Loader,et al.  Social media and democracy : innovations in participatory politics , 2012 .

[12]  Kirsten Robertson,et al.  Illegal Downloading, Ethical Concern, and Illegal Behavior , 2012 .

[13]  Sigi Goode,et al.  Exploring software piracy as a factor of video game console adoption , 2012, Behav. Inf. Technol..

[14]  Cheolho Yoon,et al.  Digital piracy intention: a comparison of theoretical models , 2012, Behav. Inf. Technol..

[15]  D. Middleton,et al.  Internet Sex Offenders , 2012 .

[16]  M. Lindsay,et al.  ONLINE HARASSMENT AMONG COLLEGE STUDENTS , 2012 .

[17]  M. Conway,et al.  Exploring the form and function of dissident Irish Republican online discourses , 2012 .

[18]  G. Holden,et al.  Discipline and Punishment , 2012 .

[19]  Mike Boulton,et al.  Predicting Undergraduates' Self-Reported Engagement in Traditional and Cyberbullying from Attitudes , 2012, Cyberpsychology Behav. Soc. Netw..

[20]  Monica T. Whitty,et al.  The Online Romance Scam: A Serious Cybercrime , 2012, Cyberpsychology Behav. Soc. Netw..

[21]  Catherine D. Marcum,et al.  Examining the Role of Peer Influence and Self-Control on Downloading Behavior , 2012 .

[22]  Deborah A. Liptak,et al.  Web of Deceit: Misinformation and Manipulation in the Age of Social Media , 2012 .

[23]  Bonnie S. Fisher,et al.  Stalking in the Twilight Zone: Extent of Cyberstalking Victimization and Offending Among College Students , 2012 .

[24]  Potential Consequences of Accessing Child Pornography Over the Internet and Who is Accessing It , 2012 .

[25]  Ethics and Legal Aspects of Virtual Worlds , 2012 .

[26]  B. Boutwell,et al.  Low Resting Heart Rate and Rational Choice: Integrating Biological Correlates of Crime in Criminological Theories , 2012 .

[27]  J. Smetana,et al.  College students' moral evaluations of illegal music downloading , 2012 .

[28]  Mark M.H. Goode,et al.  DVD Pirating Intentions: Angels, Devils, Chancers and Receivers , 2012 .

[29]  Geoff Dean,et al.  The dark side of social media : review of online terrorism , 2012 .

[30]  Vishal Midha,et al.  It won't happen to me: An assessment of optimism bias in music piracy , 2012, Comput. Hum. Behav..

[31]  Xiao Wang,et al.  The immorality of illegal downloading: The role of anticipated guilt and general emotions , 2012, Comput. Hum. Behav..

[32]  Jennifer Bonds-Raacke,et al.  College Students' Facebook Stalking of Ex-Partners , 2011, Cyberpsychology Behav. Soc. Netw..

[33]  M. Seto,et al.  Examining the Criminal History and Future Offending of Child Pornography Offenders: An Extended Prospective Follow-up Study , 2011, Law and human behavior.

[34]  André Melzer,et al.  Are Cyberbullies Less Empathic? Adolescents' Cyberbullying Behavior and Empathic Responsiveness , 2011, Cyberpsychology Behav. Soc. Netw..

[35]  H. Brooke The Revolution will be Digitised , 2011 .

[36]  Bonnie S. Fisher,et al.  Being Pursued Online , 2011 .

[37]  T. Ward,et al.  Evolutionary behavioural science and crime: Aetiological and intervention implications , 2011 .

[38]  Amy Bruckman,et al.  Domestic violence and information communication technologies , 2011, Interact. Comput..

[39]  Andrew Thatcher,et al.  Modelling Social Cognitive Theory to Explain Software Piracy Intention , 2011, HCI.

[40]  Justin W. Patchin,et al.  Traditional and Nontraditional Bullying Among Youth: A Test of General Strain Theory , 2011 .

[41]  James McGuire,et al.  Are Internet offenders emotionally avoidant? , 2011 .

[42]  Rui Chen,et al.  Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model , 2011, Decis. Support Syst..

[43]  Eric A. Storch,et al.  Has Cyber Technology Produced a New Group of Peer Aggressors? , 2011, Cyberpsychology Behav. Soc. Netw..

[44]  Ersilia Menesini,et al.  The Measurement of Cyberbullying: Dimensional Structure and Relative Item Severity and Discrimination , 2011, Cyberpsychology Behav. Soc. Netw..

[45]  David Knox,et al.  Using technology to control intimate partners: An exploratory study of college undergraduates , 2011, Comput. Hum. Behav..

[46]  April Kontostathis,et al.  Learning to Identify Internet Sexual Predation , 2011, Int. J. Electron. Commer..

[47]  Twila Wingrove,et al.  Why were millions of people not obeying the law? Motivational influences on non-compliance with the law in the case of music piracy , 2011 .

[48]  Chantal A. Hermann,et al.  The Characteristics of Online Sex Offenders: A Meta-Analysis , 2011, Sexual abuse : a journal of research and treatment.

[49]  T. Jones,et al.  Sexualized Images of Children on the Internet , 2011, Sexual abuse : a journal of research and treatment.

[50]  Orly Turgeman-Goldschmidt Identity Construction Among Hackers , 2011 .

[51]  Michael L. Pittaro Cyber Stalking: Typology, Etiology, and Victims , 2011 .

[52]  Maura Conway Against cyberterrorism , 2011, CACM.

[53]  Louise Dixon,et al.  Review of Meta-Analyses on the Association Between Child Sexual Abuse and Adult Mental Health Difficulties: A Systematic Approach , 2011, Trauma, violence & abuse.

[54]  Meng-Jia Wu,et al.  Interventions to Prevent and Reduce Cyber Abuse of Youth: A Systematic Review , 2011 .

[55]  Christopher Hadnagy,et al.  Social Engineering: The Art of Human Hacking , 2010 .

[56]  Elizabeth Sillence,et al.  It won't happen to me: Promoting secure behaviour among internet users , 2010, Comput. Hum. Behav..

[57]  Eleanor O'Higgins,et al.  Music piracy: ethical perspectives , 2010 .

[58]  Bradford W. Reyns,et al.  The stalking victim's decision to contact the police: A test of Gottfredson and Gottfredson's theory of criminal justice decision making , 2010 .

[59]  Shona Leitch,et al.  Hacker Taggers: A new type of hackers , 2010, Inf. Syst. Frontiers.

[60]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[61]  Kamel Rouibah,et al.  The fight against digital piracy: An experiment , 2010, Telematics Informatics.

[62]  J. Wolak,et al.  Use of social networking sites in online sex crimes against minors: an examination of national incidence and means of utilization. , 2010, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[63]  Justin W. Patchin,et al.  Bullying, Cyberbullying, and Suicide , 2010, Archives of suicide research : official journal of the International Academy for Suicide Research.

[64]  George E. Higgins,et al.  Criminological theory in the digital age: The case of social learning theory and digital piracy☆ , 2010 .

[65]  J. Clough Principles of Cybercrime , 2010, The Military Law and the Law of War Review.

[66]  M. Leonard “I did what I was directed to do but he didn't touch me”: The impact of being a victim of internet offending , 2010 .

[67]  D. Canter Forensic Psychology: A Very Short Introduction , 2010 .

[68]  Lisa A. Melander College Students' Perceptions of Intimate Partner Cyber Harassment , 2010, Cyberpsychology Behav. Soc. Netw..

[69]  Gavriel Salvendy,et al.  Perception of information security , 2010, Behav. Inf. Technol..

[70]  L. Tam,et al.  The psychology of password management: a tradeoff between security and convenience , 2010, Behav. Inf. Technol..

[71]  The Cambridge Handbook of Forensic Psychology: Forensic psychology: a case of multiple identities , 2010 .

[72]  Ponnurangam Kumaraguru,et al.  Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.

[73]  R. Blanchard The DSM Diagnostic Criteria for Pedophilia , 2010, Archives of sexual behavior.

[74]  Bradford W. Reyns A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers , 2010 .

[75]  D. Sachau,et al.  Secondary Traumatic Stress and Burnout among Law Enforcement Investigators Exposed to Disturbing Media Images , 2010 .

[76]  M. Seto,et al.  Lay Perceptions of Child Pornography Offenders , 2010 .

[77]  Alex R. Piquero,et al.  Low Self-Control and Fraud , 2010 .

[78]  R. Rosner,et al.  Intellectual Quotient of Juveniles Evaluated in a Forensic Psychiatry Clinic After Committing a Violent Crime * , 2010, Journal of forensic sciences.

[79]  Kimberly Twyman,et al.  Comparing Children and Adolescents Engaged in Cyberbullying to Matched Peers , 2009, Cyberpsychology Behav. Soc. Netw..

[80]  Margaret Wilson The Cambridge Handbook of Forensic Psychology: Terrorism research: current issues and debates , 2010 .

[81]  Yu-Ping Liu,et al.  Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior , 2010 .

[82]  Michael Bachmann The Risk Propensity and Rationality of Computer Hackers , 2010 .

[83]  D. Denning Terror's Web: How the Internet is Transforming Terrorism , 2010 .

[84]  Julian C. Bradfield,et al.  A general definition of malware , 2010, Journal in Computer Virology.

[85]  Renee McDonald,et al.  Can virtual reality increase the realism of role plays used to teach college women sexual coercion and rape-resistance skills? , 2009, Behavior therapy.

[86]  H. Nijman,et al.  Demographic and Personality Characteristics of Internet Child Pornography Downloaders in Comparison to Other Offenders , 2009, Journal of child sexual abuse.

[87]  Russell G. Smith Identity theft and fraud , 2009 .

[88]  Steven Furnell,et al.  Hackers, viruses and malicious software , 2009 .

[89]  Public policing and Internet crime , 2009 .

[90]  M. Yar Public perceptions and public opinion about Internet crime , 2009 .

[91]  Online sexual exploitation of children and young people , 2009 .

[92]  R. Maniglio,et al.  The impact of child sexual abuse on health: a systematic review of reviews. , 2009, Clinical psychology review.

[93]  Laura J. Moriarty,et al.  Cyberstalking: Utilizing What We do Know , 2009 .

[94]  Chad M. S. Steel Child pornography in peer-to-peer networks. , 2009, Child abuse & neglect.

[95]  Marilyn Anne Campbell,et al.  Cyberbullying: The New Face of Workplace Bullying? , 2009, Cyberpsychology Behav. Soc. Netw..

[96]  Gustavo S. Mesch Parental Mediation, Online Activities, and Cyberbullying , 2009, Cyberpsychology Behav. Soc. Netw..

[97]  Martin Killias,et al.  The Effects of Increasing the Certainty of Punishment , 2009 .

[98]  T. Elbert,et al.  The consumption of Internet child pornography and violent and sex offending , 2009, BMC psychiatry.

[99]  Aunshul Rege What's Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud , 2009 .

[100]  George E. Higgins,et al.  Neutralizing Potential and Self-Reported Digital Piracy , 2009 .

[101]  S. Livingstone Children and the internet: great expectations, challenging realities , 2009 .

[102]  Jenessa Malin,et al.  Adolescent self-control and music and movie piracy , 2009, Comput. Hum. Behav..

[103]  Younghwa Lee,et al.  Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..

[104]  J. Post,et al.  The Psychology of Suicide Terrorism , 2009, Psychiatry.

[105]  A. Beech,et al.  Psychological Profiles of Internet Sexual Offenders , 2009, Sexual abuse : a journal of research and treatment.

[106]  Atreyi Kankanhalli,et al.  Studying users' computer security behavior: A health belief perspective , 2009, Decis. Support Syst..

[107]  N. Couldry Communicative entitlements and democracy: The future of the digital divide debate , 2009 .

[108]  D. Middleton,et al.  Does treatment work with internet sex offenders? Emerging findings from the Internet Sex Offender Treatment Programme (i-SOTP) , 2009 .

[109]  S. Jaffee,et al.  Posttraumatic Stress Symptoms and Trajectories in Child Sexual Abuse Victims: An Analysis of Sex Differences Using the National Survey of Child and Adolescent Well-Being , 2009, Journal of abnormal child psychology.

[110]  M. Evans Gordon Brown and public management reform – a project in search of a ‘big idea’? , 2009 .

[111]  Johnny Nhan,et al.  Finding a Pot of Gold at the End of an Internet Rainbow: Further Examination of Fraudulent Email Solicitation , 2009 .

[112]  Alison Hunter High-tech Rascality: Asperger's Syndrome, Hackers, Geeks, and Personality Types in the ICT Industry , 2009 .

[113]  Clay Shirky,et al.  Here Comes Everybody , 2017 .

[114]  Robert Moore,et al.  Neutralizations and Rationalizations of Digital Piracy: A Qualitative Analysis of University Students , 2009 .

[115]  A. Maghaireh Shariah Law and Cyber-Sectarian Conflict: How can Islamic Criminal Law respond to cyber crime? , 2009 .

[116]  Lucas Donato,et al.  An Introduction to How Criminal Profiling Could Be Used as a Support for Computer Hacking Investigations , 2009, J. Digit. Forensic Pract..

[117]  B. Conner,et al.  Examining Self-Control as a Multidimensional Predictor of Crime and Drug Use in Adolescents with Criminal Histories , 2009, The Journal of Behavioral Health Services & Research.

[118]  F. Lösel,et al.  Does sexual offender treatment work? A systematic review of outcome evaluations. , 2008, Psicothema.

[119]  Raoul Chiesa,et al.  Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking , 2008 .

[120]  Amy E. Grubb,et al.  Attribution of blame in cases of rape: An analysis of participant gender, type of rape and perceived similarity to the victim. , 2008 .

[121]  Marc G. Gertz,et al.  Sex Crimes, Children, and Pornography , 2008 .

[122]  A. Raine From Genes to Brain to Antisocial Behavior , 2008 .

[123]  G. Davey,et al.  Psychopathology: Research, Assessment and Treatment in Clinical Psychology , 2008 .

[124]  M. Huss Forensic Psychology : Research, Clinical Practice, and Applications , 2008 .

[125]  K. Bhal,et al.  Exploring Cognitive Moral Logics Using Grounded Theory: The Case of Software Piracy , 2008 .

[126]  Gunter Ollmann The evolution of commercial malware development kits and colour-by-numbers custom malware , 2008 .

[127]  Robert LaRose,et al.  Keeping our network safe: a model of online protection behaviour , 2008, Behav. Inf. Technol..

[128]  Catherine D. Marcum,et al.  Deterrence and Digital Piracy , 2008 .

[129]  B. King,et al.  Asperger's syndrome: diagnosis and treatment. , 2008, The American journal of psychiatry.

[130]  Justin W. Patchin,et al.  Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying , 2008 .

[131]  John Winterdyk,et al.  Student and Non-Student Perceptions and Awareness of Identity Theft , 2008 .

[132]  J. Horgan,et al.  From Profiles to Pathways and Roots to Routes: Perspectives from Psychology on Radicalization into Terrorism , 2008 .

[133]  S. Moskalenko,et al.  Mechanisms of Political Radicalization: Pathways Toward Terrorism , 2008 .

[134]  Catherine D. Marcum,et al.  Music Piracy and Neutralization: A Preliminary Trajectory Analysis from Short-Term Longitudinal Data , 2008 .

[135]  C. Bhat Cyber Bullying: Overview and Strategies for School Counsellors, Guidance Officers, and All School Personnel , 2008, Australian Journal of Guidance and Counselling.

[136]  Janis Wolak,et al.  Is Talking Online to Unknown People Always Risky? Distinguishing Online Interaction Styles in a National Sample of Youth Internet Users , 2008, Cyberpsychology Behav. Soc. Netw..

[137]  Daithí Mac Síthigh The mass age of internet law , 2008 .

[138]  A. Silke Becoming a Terrorist , 2008 .

[139]  J. Horgan Leaving Terrorism Behind: An Individual Perspective , 2008 .

[140]  John Horgan,et al.  The search for the terrorist personality. , 2008 .

[141]  L. Moriarty,et al.  Cyberstalking: Utilizing Newspaper Accounts to Establish Victimization Patterns , 2008 .

[142]  M. Carter,et al.  A Preliminary Examination of Trauma History, Locus of Control, and PTSD Symptom Severity in African American Women , 2008 .

[143]  S. Humphreys Ruling the virtual world , 2008 .

[144]  R. Cadoret,et al.  Impulsive and callous traits are more strongly associated with delinquent behavior in higher risk neighborhoods among boys and girls. , 2008, Journal of abnormal psychology.

[145]  Francine Dehue,et al.  Cyberbullying: Youngsters' Experiences and Parental Perception , 2008, Cyberpsychology Behav. Soc. Netw..

[146]  S. Hinduja,et al.  Neutralizing Music Piracy: An Empirical Examination , 2008 .

[147]  G. Bente,et al.  Avatar-Mediated Networking: Increasing Social Presence and Interpersonal Trust in Net-Based Collaborations , 2008 .

[148]  Robert LaRose,et al.  Promoting personal responsibility for internet safety , 2008, CACM.

[149]  S. J. Sinclair,et al.  Terrorism and Terrorist Leaders: Insights from Developmental and Ecological Psychology , 2008 .

[150]  Michele L. Ybarra,et al.  Online "predators" and their victims: myths, realities, and implications for prevention and treatment. , 2008, The American psychologist.

[151]  C. Wilson Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress , 2008 .

[152]  Justin W. Patchin,et al.  Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .

[153]  A. Marshall,et al.  Identity and identity theft , 2008 .

[154]  Andrew Silke,et al.  Research on Terrorism , 2008 .

[155]  P. Stephens IPR and technological protection measures , 2008 .

[156]  D. Edgar-Nevill Internet grooming and paedophile crimes , 2008 .

[157]  D. Middleton From Research to Practice: The Development of the Internet Sex Offender Treatment Programme (i-SOTP) , 2008 .

[158]  S. Levine Using intelligence to predict subsequent contacts with the criminal justice system for sex offences , 2008 .

[159]  M. Rogers,et al.  Self-Reported Online Child Pornography Behavior: A Psychological Analysis , 2008 .

[160]  Lynne D. Roberts,et al.  Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An Analysis on Cyber Stalking , 2008 .

[161]  W. Bennett Changing Citizenship in the Digital Age , 2008 .

[162]  J. Finn,et al.  Promoting the Safe and Strategic Use of Technology for Victims of Intimate Partner Violence: Evaluation of the Technology Safety Project , 2009, Journal of Family Violence.

[163]  Andrew J. Park,et al.  The Use of Virtual and Mixed Reality Environments for Urban Behavioural Studies , 2008, PsychNology J..

[164]  Jane L. Hsu,et al.  Consumers’ Willingness to Pay for Non-pirated Software , 2008 .

[165]  M. Meadows,et al.  I, Avatar: The Culture and Consequences of Having a Second Life , 2007 .

[166]  L. Sheridan,et al.  Is cyberstalking different? , 2007 .

[167]  J. Wolak,et al.  Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[168]  Robin M. Kowalski,et al.  Electronic bullying among middle school students. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[169]  L. Webb,et al.  Characteristics of Internet Child Pornography Offenders: A Comparison with Child Molesters , 2007, Sexual abuse : a journal of research and treatment.

[170]  Brendesha M. Tynes,et al.  Internet Safety Gone Wild? , 2007 .

[171]  Lixuan Zhang,et al.  Hacking into the Minds of Hackers , 2007, Inf. Syst. Manag..

[172]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[173]  Malcolm Shore,et al.  An Advanced Model of Hacking , 2007 .

[174]  M. Williams,et al.  Policing diversity in the digital age , 2007 .

[175]  D. Wall Cybercrime: The Transformation of Crime in the Information Age , 2007 .

[176]  Dennis Howitt,et al.  Sex Offenders and the Internet , 2007 .

[177]  Lorraine Sheridan,et al.  An investigation into maladaptive personality functioning in Internet sex offenders , 2007 .

[178]  Stephen D. Webster,et al.  The Construction and Preliminary Validation of the Internet Behaviours and Attitudes Questionnaire (IBAQ) , 2007, Sexual abuse : a journal of research and treatment.

[179]  Sandro Galea,et al.  Psychopathological consequences after a terrorist attack: An epidemiological study among victims, the general population, and police officers☆ , 2007, European Psychiatry.

[180]  Joseph B. Walther,et al.  Selective self-presentation in computer-mediated communication: Hyperpersonal dimensions of technology, language, and cognition , 2007, Comput. Hum. Behav..

[181]  GEORGE E. HIGGINS Digital Piracy: An Examination of Low Self-Control and Motivation Using Short-Term Longitudinal Data , 2007, Cyberpsychology Behav. Soc. Netw..

[182]  David P. Farrington,et al.  Preventing Crime: What Works for Children, Offenders, Victims and Places , 2007 .

[183]  N. Willard Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress , 2007 .

[184]  L Alvin Malesky,et al.  Predatory Online Behavior: Modus Operandi of Convicted Sex Offenders in Identifying Potential Victims and Contacting Minors Over the Internet , 2007, Journal of child sexual abuse.

[185]  Ethan Katsh Online Dispute Resolution: Some Implications for the Emergence of Law in Cyberspace1 , 2007 .

[186]  Michael L. Pittaro Cyber stalking: An Analysis of Online Harassment and Intimidation , 2007 .

[187]  Qing Li,et al.  New bottle but old wine: A research of cyberbullying in schools , 2007, Comput. Hum. Behav..

[188]  Sameer Hinduja,et al.  Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.

[189]  R. Cooney,et al.  Taking Uncertainty Seriously: Adaptive Governance and International Trade , 2007 .

[190]  J. Wolak,et al.  Youth Internet users at risk for the most serious online sexual solicitations. , 2007, American journal of preventive medicine.

[191]  Robert LaRose,et al.  Share, Steal, or Buy? A Social Cognitive Perspective of Music Downloading , 2007, Cyberpsychology Behav. Soc. Netw..

[192]  Steve Pettifer,et al.  Absorption, dissociation, locus of control and presence in virtual reality , 2007, Comput. Hum. Behav..

[193]  Christian End,et al.  Unrealistic optimism in internet events , 2007, Comput. Hum. Behav..

[194]  Juliana Raskauskas,et al.  Involvement in traditional and electronic bullying among adolescents. , 2007, Developmental psychology.

[195]  D. Finkelhor,et al.  Statutory sex crime relationships between juveniles and adults : A review of social scientific research , 2007 .

[196]  Maria Papadaki,et al.  Considering the potential of criminal profiling to combat hacking , 2007, Journal in Computer Virology.

[197]  Caroline Metcalf,et al.  A psychometric comparison of internet and non-internet sex offenders from a community treatment sample , 2007 .

[198]  Jeanne Pia Mifsud-Bonnici,et al.  Weaving the Mesh: Finding Remedies in Cyberspace , 2007 .

[199]  Mariano Alcañiz Raya,et al.  Affective Interactions Using Virtual Reality: The Link between Presence and Emotions , 2007, Cyberpsychology Behav. Soc. Netw..

[200]  Alex R. Piquero,et al.  Self-Control and Criminal Career Dimensions , 2007 .

[201]  F. Masi The paedophile and his inner world: Theoretical and clinical considerations on the analysis of a patient1 , 2007 .

[202]  Felix Oberholzer-Gee,et al.  The Effect of File Sharing on Record Sales: An Empirical Analysis , 2007, Journal of Political Economy.

[203]  C. Hill Digital piracy: Causes, consequences, and strategic responses , 2007 .

[204]  C. Sunstein Republic.com 2.0 , 2007 .

[205]  C. Marmar,et al.  The Peritraumatic Dissociative Experiences Questionnaire An International Perspective , 2007 .

[206]  A. Fernandez-liria,et al.  Psychopathological consequences after a terrorist attack: An epidemiological study among victims, police officers, and the general population , 2007 .

[207]  D. C. Graves,et al.  A Qualitative Analysis of Advance Fee Fraud E-mail Schemes , 2007 .

[208]  M. Conway Cyberterrorism: hype and reality , 2007 .

[209]  Herman T. Tavani Ethics and technology - ethical issues in an age of information and communication technology (2. ed.) , 2007 .

[210]  Alok Mishra,et al.  Cyber Stalking: A Challenge for Web Security , 2007 .

[211]  Y. Benkler,et al.  The Wealth of Networks , 2008 .

[212]  Michael Stohl Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? , 2007 .

[213]  K. Brown,et al.  Cyber-Bullying: Developing Policy to Direct Responses that are Equitable and Effective in Addressing This Special Form of Bullying. , 2006 .

[214]  A. Beech,et al.  An investigation into the applicability of the Ward and Siegert Pathways Model of child sexual abuse with Internet offenders , 2006 .

[215]  Patrick Dunleavy,et al.  Digital Era Governance , 2006 .

[216]  S. Wright Government-run Online Discussion Fora: Moderation, Censorship and the Shadow of Control1 , 2006 .

[217]  Soft Law and the Elusive Quest for Sustainable Global Governance , 2006, Leiden Journal of International Law.

[218]  Sandra Walklate,et al.  Imagining the Victim of Crime , 2006 .

[219]  Paul Bocij The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals , 2006 .

[220]  A. Merari Psychological Aspects of Suicide Terrorism , 2006 .

[221]  Shadd Maruna,et al.  A fundamental attribution error? Rethinking cognitive distortions † , 2006 .

[222]  Marcus K. Rogers,et al.  Self-reported computer criminal behavior: A psychological analysis , 2006, Digit. Investig..

[223]  M. Williams,et al.  Virtually Criminal: Crime, Deviance and Regulation Online , 2006 .

[224]  Marc Rogers,et al.  Self-reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis , 2006 .

[225]  A. Kruglanski,et al.  The Psychology of Terrorism: “Syndrome” Versus “Tool” Perspectives , 2006 .

[226]  J. Boscarino,et al.  Predictors of PTSD and Delayed PTSD After Disaster: The Impact of Exposure and Psychosocial Resources , 2006, The Journal of nervous and mental disease.

[227]  Timothy Paul Cronan,et al.  Piracy, computer crime, and IS misuse at the university , 2006, Commun. ACM.

[228]  S. Galea,et al.  The behavioral consequences of terrorism: a meta-analysis. , 2006, Academic emergency medicine : official journal of the Society for Academic Emergency Medicine.

[229]  Azucena García-Palacios,et al.  BusWorld: Designing a Virtual Environment for Post-Traumatic Stress Disorder in Israel: A Protocol , 2006, Cyberpsychology Behav. Soc. Netw..

[230]  Justin W. Patchin,et al.  Bullies Move Beyond the Schoolyard , 2006 .

[231]  A. Scarpa,et al.  Community Violence Victimization and Symptoms of Posttraumatic Stress Disorder , 2006, Journal of interpersonal violence.

[232]  S. Liebowitz File Sharing: Creative Destruction or Just Plain Destruction?* , 2006, The Journal of Law and Economics.

[233]  Judith M. Collins,et al.  Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims , 2006 .

[234]  George E. Higgins,et al.  Digital Piracy: Assessing the Contributions of an Integrated Self‐Control Theory and Social Learning Theory Using Structural Equation Modeling , 2006 .

[235]  Armin Schäfer Resolving Deadlock: Why International Organisations Introduce Soft Law , 2006 .

[236]  Wenjie Wang,et al.  A contextual framework for combating identity theft , 2006, IEEE Security & Privacy.

[237]  Holly A. Miller,et al.  Perceptions of the Validity and Utility of Criminal Profiling Among Forensic Psychologists and Psychiatrists , 2006 .

[238]  Jan U. Becker,et al.  Dynamics of Illegal Participation in Peer-to-Peer Networks—Why Do People Illegally Share Media Files? , 2006 .

[239]  M. Yar,et al.  Book Review: Cybercrime and Society , 2006 .

[240]  Laurence Alison,et al.  Offender Profiling: Limits and Potential , 2006 .

[241]  E. Quayle,et al.  Sex offenders, internet child abuse images and emotional avoidance: The importance of values. , 2006 .

[242]  M. Conway TERRORIST 'USE' OF THE INTERNET AND FIGHTING BACK , 2006 .

[243]  Dorothy E. Denning A View of Cyberterrorism Five Years Later , 2006 .

[244]  R. Wortley,et al.  Child pornography on the Internet , 2006 .

[245]  Sharon R. Mazzarella,et al.  Book Review: Girl Wide Web: Girls, the Internet and the Negotiation of Identity , 2006, New Media Soc..

[246]  N. L. Piquero,et al.  Causes and Prevention of Intellectual Property Crime , 2005 .

[247]  R. Strom,et al.  When Teens Turn Cyberbullies. , 2005 .

[248]  Nick Nykodym,et al.  Criminal profiling and insider cyber crime , 2005, Digit. Investig..

[249]  James J.F. Forest,et al.  The Making of a Terrorist , 2005 .

[250]  Robert LaRose,et al.  Sharing or Piracy? An Exploration of Downloading Behavior , 2005, J. Comput. Mediat. Commun..

[251]  C. Wilson,et al.  Terrorist Capabilities for Cyberattack: Overview and Policy Issues , 2005 .

[252]  M. Peitz,et al.  Why the Music Industry May Gain from Free Downloading - the Role of Sampling , 2005 .

[253]  David J. Gunkel Editorial: introduction to hacking and hacktivism , 2005, New Media Soc..

[254]  Patrick Dunleavy,et al.  New public management is dead. Long live digital-era governance , 2005 .

[255]  A. d’Astous,et al.  Music Piracy on the Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour , 2005 .

[256]  John Horgan,et al.  A psychology of terrorism? , 2005, Forensic Update.

[257]  Andreas Frei,et al.  Paedophilia on the Internet--a study of 33 convicted offenders in the Canton of Lucerne. , 2005, Swiss medical weekly.

[258]  Roger Thompson,et al.  Why spyware poses multiple threats to security , 2005, CACM.

[259]  S. Smoyak,et al.  Perceptions of Cyberstalking Among College Students , 2005 .

[260]  Janis Wolak,et al.  Police Posing as Juveniles Online to Catch Sex Offenders: Is It Working? , 2005, Sexual abuse : a journal of research and treatment.

[261]  Elephants and Mice Revisited: Law and Choice of Law on the Internet , 2005 .

[262]  Russell Dean Vines,et al.  Phishing: Cutting the Identity Theft Line , 2005 .

[263]  T. Li Cyber-Harassment: A Study of a New Method for an Old Behavior , 2005 .

[264]  M. Seto,et al.  The Criminal Histories and Later Offending of Child Pornography Offenders , 2005, Sexual abuse : a journal of research and treatment.

[265]  J. Victoroff The Mind of the Terrorist , 2005 .

[266]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[267]  J. Rutter,et al.  Fake Nation?: A Study into an Everyday Crime , 2005 .

[268]  Brenda K. Wiederhold,et al.  Virtual reality therapy for anxiety disorders: Advances in evaluation and treatment. , 2005 .

[269]  D. Canter Mapping murder : walking in killers' footsteps , 2005 .

[270]  S. Shariff Cyber-dilemmas in the new millennium: School obligations to provide student safety in a virtual school environment , 2005 .

[271]  Mohammad Rahim,et al.  A Socio-Behavioral Study of Home Computer Users' Intention to Practice Security , 2005, PACIS.

[272]  J. Wolak,et al.  Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings From the National Juvenile Online Victimization Study. , 2005 .

[273]  L. Loeb The Mind of the Paedophile: Psychoanalytic Perspectives , 2004 .

[274]  C. Walker The Criminal Courts Online , 2004 .

[275]  Jo-Anne M. Wemmers,et al.  Victims' Perspectives on Restorative Justice: How Much Involvement Are Victims Looking For? , 2004 .

[276]  J. Wolak,et al.  Internet-initiated sex crimes against minors: implications for prevention based on findings from a national study. , 2004, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[277]  Michele L. Ybarra,et al.  Journal of Child Psychology and Psychiatry 45:7 (2004), pp 1308–1316 10.1111/j.1469-7610.2004.00328.x Online aggressor/targets, aggressors, and targets: a comparison of associated youth characteristics , 2022 .

[278]  Linda Senden,et al.  Soft Law in European Community Law , 2004 .

[279]  D. Farrington,et al.  Empathy and offending: a systematic review and meta-analysis , 2004 .

[280]  Michael Gilding,et al.  ‘I’ve Never Clicked this Much with Anyone in My Life’: Trust and Hyperpersonal Communication in Online Friendships , 2004, New Media Soc..

[281]  David L. Riegel Letter to the Editor: Effects on Boy-Attracted Pedosexual Males of Viewing Boy Erotica , 2004, Archives of sexual behavior.

[282]  David P. Farrington,et al.  SURVEILLANCE FOR CRIME PREVENTION IN PUBLIC SPACE: RESULTS AND POLICY CHOICES IN BRITAIN AND AMERICA , 2004 .

[283]  D. Whittaker Terrorists and terrorism in the contemporary world , 2004 .

[284]  Sudip Bhattacharjee,et al.  A Behavioral Model of Digital Music Piracy , 2004, J. Organ. Comput. Electron. Commer..

[285]  J. Finn A Survey of Online Harassment at a University Campus , 2004, Journal of interpersonal violence.

[286]  Anne-Marie Slaughter,et al.  A New World Order , 2004 .

[287]  Francesca Philips,et al.  Cyberstalking and Cyberpredators: A Threat to Safe Sexuality on the Internet , 2004 .

[288]  Joseph R. Dominick,et al.  Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages , 2004 .

[289]  John W. LeMasney,et al.  Protecting Children From Online Sexual Predators: Technological, Psychoeducational, and Legal Considerations. , 2004 .

[290]  M. Felson,et al.  Routine activity and rational choice , 2004 .

[291]  R. Eckersley Soft law, hard politics, and the Climate Change Treaty , 2004 .

[292]  John Kane,et al.  Exploring the psychological and somatic impact of identity theft. , 2004, Journal of forensic sciences.

[293]  L. McWilliams,et al.  Neuroticism and self-criticism associated with posttraumatic stress disorder in a nationally representative sample. , 2004, Behaviour research and therapy.

[294]  M. Conner,et al.  The Theory of Planned Behaviour , 2004 .

[295]  Megan Carney,et al.  The Trojan Made Me Do It: A First Step in Statistical Based Computer Forensics Event Reconstruction , 2004, Int. J. Digit. EVid..

[296]  Stephen W. Baron,et al.  Self-Control, Social Consequences, and Criminal Behavior: Street Youth and the General Theory of Crime , 2003 .

[297]  C. Wilson Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress , 2003 .

[298]  A. Piquero,et al.  Sex Differences in Empathy and Its Relation to Juvenile Offending , 2003, Violence and Victims.

[299]  P. Taylor Hacktivism : In search of lost ethics? , 2003 .

[300]  Leroy McFarlane,et al.  An exploration of predatory behaviour in cyberspace: Towards a typology of cyberstalkers , 2003, First Monday.

[301]  Eve Edelson The 419 scam: information warfare on the spam front and a proposal for local filtering , 2003, Comput. Secur..

[302]  Matthew D. Smith,et al.  Toulmin's philosophy of argument and its relevance to offender profiling , 2003 .

[303]  P. Emmelkamp,et al.  Individual differences in post-traumatic stress following post-intimate stalking: stalking severity and psychosocial variables. , 2003, The British journal of clinical psychology.

[304]  Marcus K. Rogers The role of criminal profiling in the computer forensics process , 2003, Comput. Secur..

[305]  Hyung-Jin Woo The hacker mentality : exploring the relationship between psychological variables and hacking activities , 2003 .

[306]  E. Quayle,et al.  Child Pornography: An Internet Crime , 2003 .

[307]  Olga V. Smyslova,et al.  Flow-Based Model of Computer Hackers' Motivation , 2003, Cyberpsychology Behav. Soc. Netw..

[308]  J. Post,et al.  The terrorists in their own words: Interviews with 35 incarcerated Middle Eastern terrorists**This research was conducted with the support of the Smith Richardson Foundation. , 2003 .

[309]  Andrew J. Flanagin,et al.  Reconceptualizing ‘flaming’ and other problematic messages , 2003, New Media Soc..

[310]  David J. Shernoff,et al.  Student engagement in high school classrooms from the perspective of flow theory. , 2003 .

[311]  L. Roeger,et al.  Family and individual characteristics of a community sample of adolescents who graffiti , 2003 .

[312]  J. Lawrence,et al.  Personality, coping, chronic stress, social support and PTSD symptoms among adult burn survivors: a path analysis. , 2003, The Journal of burn care & rehabilitation.

[313]  Richard J. Siegert,et al.  Toward a comprehensive theory of child sexual abuse: A theory knitting perspective , 2002 .

[314]  Maura Conway,et al.  Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet , 2002, First Monday.

[315]  Rebecca Gurley Bace,et al.  A Guide to Forensic Testimony - The Art and Practice of Presenting Testimony As An Expert Technical Witness , 2002 .

[316]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[317]  Mark Halsey,et al.  The Meanings of Graffiti and Municipal Administration , 2002 .

[318]  E. Quayle,et al.  child pornography and the internet: perpetuating a cycle of abuse , 2002 .

[319]  P. Rock,et al.  Sociological theories of crime , 2002 .

[320]  Anne Burke,et al.  Child Pornography and the Internet: Policing and Treatment Issues , 2002 .

[321]  Brian H. Spitzberg,et al.  Cyberstalking and the technologies of interpersonal terrorism , 2002, New Media Soc..

[322]  Arthur R. Edwards,et al.  The moderator as an emerging democratic intermediary: The role of the moderator in Internet discussions about public issues , 2002, Inf. Polity.

[323]  D. Dutton,et al.  Assessing the link between stalking and domestic violence , 2001 .

[324]  D P Farrington,et al.  The concentration of offenders in families, and family criminality in the prediction of boys' delinquency. , 2001, Journal of adolescence.

[325]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .

[326]  D. Klinger Suicidal Intent in Victim-Precipitated Homicide , 2001 .

[327]  John Morison,et al.  On-line Citizenship: Consultation and Participation in New Labour's Britain and Beyond , 2001 .

[328]  Michael Levi 'Between the risk and the reality falls the shadow': evidence and urban legends in computer fraud , 2001 .

[329]  Eoghan Casey,et al.  Handbook of Computer Crime Investigation: Forensic Tools and Technology , 2001 .

[330]  D. Denning Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy , 2001 .

[331]  M. Kenny,et al.  Racial, ethnic, and cultural factors of childhood sexual abuse: a selected review of the literature. , 2000, Clinical psychology review.

[332]  P. Costa,et al.  Personality predictors of injury-related posttraumatic stress disorder. , 2000, The Journal of nervous and mental disease.

[333]  Kenneth W. Abbott,et al.  Hard and Soft Law in International Governance , 2000, International Organization.

[334]  Daniel S. Nagin,et al.  OFFENDING TRAJECTORIES IN A NEW ZEALAND BIRTH COHORT , 2000 .

[335]  Andy K. Bissett,et al.  Some human dimensions of computer virus creation and infection , 2000, Int. J. Hum. Comput. Stud..

[336]  Jerry Finn,et al.  Victimization Online: The Down Side of Seeking Human Services for Women on the Internet , 2000, Cyberpsychology Behav. Soc. Netw..

[337]  J. Schneider,et al.  Effects of cybersex addiction on the family: Results of a survey , 2000 .

[338]  Paul Britton,et al.  Picking Up the Pieces , 2010 .

[339]  Peter B. Ainsworth,et al.  Offender profiling and crime analysis , 2000 .

[340]  B. Nelson,et al.  Cyberterror: Prospects and Implications , 1999 .

[341]  R. Purcell,et al.  Study of stalkers. , 1999, The American journal of psychiatry.

[342]  G. Gudjonsson,et al.  Cognitive distortions and blame attribution in sex offenders against adults and children. , 1999, Child abuse & neglect.

[343]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[344]  Andrew Calcutt White Noise: An A-Z of the Contradictions in Cyberculture , 1998 .

[345]  Peter J. Spiro,et al.  Nonstate actors in global politics , 1998 .

[346]  Carolyn P. Meinel How Hackers Break In. . . and how they are Caught , 1998 .

[347]  C. Hollin,et al.  A comparison of patterns of moral development in young offenders and non‐offenders , 1998 .

[348]  Andrew Silke,et al.  Cheshire-cat logic: The recurring theme of terrorist abnormality in psychological research , 1998 .

[349]  J. Reid Meloy,et al.  The Psychology of Stalking , 1998 .

[350]  Terry M. Gudaitis,et al.  The Missing Link in Information Security: Three Dimensional Profiling , 1998, Cyberpsychology Behav. Soc. Netw..

[351]  Robert Reiner,et al.  The Oxford Handbook of Criminology , 2012 .

[352]  J. Boyle Foucault in Cyberspace: Surveillance, Sovereignty, and Hard-Wired Censors , 1997 .

[353]  Richard C. MacKinnon Punishing the persona: correctional strategies for the virtual offender , 1997 .

[354]  Richard J. Hazler Breaking The Cycle Of Violence: Interventions For Bullying And Victimization , 1996 .

[355]  David G. Post,et al.  Law and Borders - the Rise of Law in Cyberspace , 1996, First Monday.

[356]  Christopher E. Smith,et al.  Against Capital Punishment: The Anti-Death Penalty Movement in America, 1972-1994. , 1996 .

[357]  Lyle Brenner,et al.  Overconfidence in Probability and Frequency Judgments: A Critical Examination , 1996 .

[358]  J. Walther,et al.  Computer-mediated communication , 2011 .

[359]  R. Blackburn What is forensic psychology , 1996 .

[360]  Arnold P. Goldstein,et al.  The psychology of vandalism , 1996 .

[361]  J. Muncie,et al.  Criminological perspectives : a reader , 1996 .

[362]  K. Browne,et al.  Child sexual abuse prevention: what offenders tell us. , 1995, Child abuse & neglect.

[363]  David V. Canter,et al.  Criminal Shadows: Inside the Mind of the Serial Killer , 1994 .

[364]  Leon A. Hyer,et al.  NEO-PI profiles in PTSD as a function of trauma level. , 1993, Journal of clinical psychology.

[365]  M A Zona,et al.  A comparative study of erotomanic and obsessional subjects in a forensic sample. , 1993, Journal of forensic sciences.

[366]  R. Blackburn The Psychology of Criminal Conduct: Theory, Research and Practice , 1993 .

[367]  Bruce Sterling,et al.  The Hacker Crackdown: Law and Disorder on the Electronic Frontier , 1992 .

[368]  A. Tversky,et al.  The weighing of evidence and the determinants of confidence , 1992, Cognitive Psychology.

[369]  I. Ajzen The theory of planned behavior , 1991 .

[370]  R. Hirschman,et al.  Toward a theory of sexual aggression: a quadripartite model. , 1991, Journal of consulting and clinical psychology.

[371]  M. Foucault,et al.  The History of Sexuality, Volume 1: An Introduction , 1990 .

[372]  L. J. Walker,et al.  Hypothetical versus real-life moral reasoning among psychopathic and delinquent youth , 1989, Development and Psychopathology.

[373]  R. Baron,et al.  The Equity‐Control Model as a Predictor of Vandalism Among College Students1 , 1988 .

[374]  J. R. Minor Current Treatment Approaches , 1987 .

[375]  Ann Wolbert Burgess,et al.  Child Abuse Aspects of Child Pornography , 1987 .

[376]  Ann Wolbert Burgess,et al.  Criminal profiling from crime scene analysis , 1986 .

[377]  Joseph A. Marolla,et al.  “Riding the Bull at Gilley's”: Convicted Rapists Describe the Rewards of Rape , 1985 .

[378]  James William Coleman,et al.  The criminal elite : the sociology of white collar crime , 1985 .

[379]  Michael R. Gottfredson,et al.  A General Theory of Crime , 1990 .

[380]  D. Finkelhor Child Sexual Abuse: New Theory and Research , 1984 .

[381]  Jerrold M. Post,et al.  Notes on a Psychodynamic Theory of Terrorist Behavior , 1984 .

[382]  Sherry Turkle,et al.  The second self: computers and the human spirit , 1984 .

[383]  Steven Levy,et al.  Hackers: Heroes of the Computer Revolution , 1984 .

[384]  C. Hood The Tools of Government , 1983 .

[385]  R. Rogers Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .

[386]  A. Tversky,et al.  The framing of decisions and the psychology of choice. , 1981, Science.

[387]  G. Gudjonsson,et al.  Forensic Psychology: A Guide to Practice , 1981 .

[388]  N. Weinstein Unrealistic optimism about future life events , 1980 .

[389]  H. Eysenck,et al.  Crime and Personality , 1979, The Medico-legal journal.

[390]  R. Hogarth,et al.  Confidence in judgment: Persistence of the illusion of validity. , 1978 .

[391]  A. Groth,et al.  Rape: power, anger, and sexuality. , 1977, The American journal of psychiatry.

[392]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[393]  David P. Farrington,et al.  The Delinquent Way Of Life , 1977 .

[394]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[395]  L. Robins,et al.  Arrests and delinquency in two generations: A study of black urban families and their children. , 1975, Journal of child psychology and psychiatry, and allied disciplines.

[396]  A. Tversky,et al.  Judgment under Uncertainty: Heuristics and Biases , 1974, Science.

[397]  S. B. G. Eysenck,et al.  Crime and Personality: An Empirical Study of the Three-Factor Theory , 1970 .

[398]  L. Kohlberg Stage and sequence: The cognitive-developmental approach to socialization , 1969 .

[399]  I. Rosenstock Why people use health services. , 1966, The Milbank Memorial Fund quarterly.

[400]  M. Foucault,et al.  Madness and civilization : a history of insanity in the age of reason , 1966 .

[401]  A. Bandura,et al.  INFLUENCE OF MODEL'S REINFORCEMENT CONTINGENCIES ON THE ACQUISITION OF IMITATIVE RESPONSES. , 1965, Journal of personality and social psychology.

[402]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .

[403]  L. Festinger,et al.  A Theory of Cognitive Dissonance , 2017 .

[404]  C. Lombroso,et al.  The Female Offender , 1895, The Indian Medical Gazette.

[405]  W. Morrison Crime and Its Causes , 1891 .