Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory
暂无分享,去创建一个
[1] Kenneth C. Land,et al. Property Crime Rates in the United States: A Macrodynamic Analysis, 1947-1977; With Ex Ante Forecasts for the Mid-1980s , 1980, American Journal of Sociology.
[2] Trevor F. Cox. An Introduction to Multivariate Data Analysis , 2005 .
[3] Niki Harré,et al. Factors associated with distressing electronic harassment and cyberbullying , 2013, Comput. Hum. Behav..
[5] Michael R. Gottfredson,et al. A general theory of crime. , 1992 .
[6] Stacey Nofziger,et al. Violent Lives: A Lifestyle Model Linking Exposure to Violence to Juvenile Violent Offending , 2005 .
[7] Fawn T. Ngo,et al. Cybercrime Victimization: An Examination of Individual and Situational Level Factors , 2011 .
[8] Michael D. Reisig,et al. LOW SELF‐CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION* , 2008 .
[9] Brian H. Spitzberg,et al. Cyber-harassment victimization in Portugal: Prevalence, fear and help-seeking among adolescents , 2016, Comput. Hum. Behav..
[10] Rebecca Dredge,et al. Cyberbullying in social networking sites: An adolescent victim's perspective , 2014, Comput. Hum. Behav..
[11] Michael D. Reisig,et al. Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .
[12] T. Holt,et al. Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .
[13] Bradford W Reyns,et al. Guardians of the Cyber Galaxy , 2016 .
[14] Dong-Hee Shin,et al. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..
[15] Brian H. Spitzberg,et al. Cyberstalking and the technologies of interpersonal terrorism , 2002, New Media Soc..
[16] Michael R. Gottfredson,et al. Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization , 1977 .
[17] Xiaojin Chen. The Link Between Juvenile Offending and Victimization The Influence of Risky Lifestyles, Social Bonding, and Individual Characteristics , 2009 .
[18] M. Yar. The Novelty of ‘Cybercrime’ , 2005 .
[19] Desmond Upton Patton,et al. Social media as a vector for youth violence: A review of the literature , 2014, Comput. Hum. Behav..
[20] L. Pauwels,et al. Is a Risky Lifestyle Always “Risky”? The Interaction Between Individual Propensity and Lifestyle Risk in Adolescent Offending: A Test in Two Urban Samples , 2010 .
[21] Joel Miller,et al. Individual Offending, Routine Activities, and Activity Settings: Revisiting the Routine Activity Theory of General Deviance , 2013 .
[22] L. Pauwels,et al. Exploring the Relationship Between Offending and Victimization: What is the Role of Risky Lifestyles and Low Self-Control? A Test in Two Urban Samples , 2011 .
[23] Bradford W Reyns,et al. Online Routines and Identity Theft Victimization , 2013 .
[24] James R. Kluegel,et al. Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory , 1981 .
[25] Wesley G. Jennings,et al. Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy , 2014, Comput. Hum. Behav..
[26] Christopher E. Beaudoin,et al. Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors , 2017, Comput. Hum. Behav..
[27] Kyung-shick Choi. Computer Crime Victimization and Integrated Theory: An Empirical Assessment , 2008 .
[28] Terance D. Miethe,et al. Crime and its social context : toward an integrated theory of offenders, victims, and situations , 1995 .
[29] Patrick M. O'Malley,et al. Routine activities and individual deviant behavior , 1996 .
[30] Aaron Smith,et al. 72% of online adults are social networking site users , 2013 .
[31] Bonnie S. Fisher,et al. Security in the 21st Century , 2011 .