The Effect of Self-Control on Victimization in the Cyberworld

[1]  T. Holt,et al.  Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .

[2]  Brian K. Payne,et al.  Using Student Samples in Criminological Research , 2008 .

[3]  Catherine D. Marcum,et al.  Digital Piracy: An Examination of Three Measurements of Self-Control , 2008 .

[4]  Justin W. Patchin,et al.  Personal information of adolescents on the Internet: A quantitative content analysis of MySpace. , 2008, Journal of adolescence.

[5]  Michael D. Reisig,et al.  LOW SELF‐CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION* , 2008 .

[6]  Justin W. Patchin,et al.  Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .

[7]  George E. Higgins,et al.  Low Self-Control and Social Learning in Understanding Students' Intentions to Pirate Movies in the United States , 2007 .

[8]  Alexander T. Vazsonyi,et al.  THE FAMILY → LOW SELF-CONTROL → DEVIANCE , 2007 .

[9]  T. Holt subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures , 2007 .

[10]  Bonnie S. Fisher,et al.  Self-control, Victimization, and their Influence on Risky Lifestyles: A Longitudinal Analysis Using Panel Data , 2006 .

[11]  Marc Rogers,et al.  Self-reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis , 2006 .

[12]  George E. Higgins,et al.  Digital Piracy: Assessing the Contributions of an Integrated Self‐Control Theory and Social Learning Theory Using Structural Equation Modeling , 2006 .

[13]  Dana L. Haynie,et al.  Reconsidering Peers and Delinquency: How do Peers Matter? , 2005 .

[14]  M. Yar The Novelty of ‘Cybercrime’ , 2005 .

[15]  John Liederbach,et al.  Digital Crime and Digital Terrorism , 2005 .

[16]  A. Piquero,et al.  Self-Control, Violent Offending, and Homicide Victimization: Assessing the General Theory of Crime , 2005 .

[17]  Timothy Buzzell the effects of sophistication, access and monitoring on use of pornography in three technological contexts , 2005 .

[18]  Peter Szor,et al.  The Art of Computer Virus Research and Defense , 2005 .

[19]  George E. Higgins can low self-control help with the understanding of the software piracy problem? , 2004 .

[20]  David A. Makin,et al.  Self-Control, Deviant Peers, and Software Piracy , 2004, Psychological reports.

[21]  Eunice Chang,et al.  Self-Control and Social Bonds: A Combined Control Perspective on Deviance , 2004 .

[22]  Christopher J. Schreck,et al.  Specifying the Influence of Family and Peers on Violent Victimization , 2004, Journal of interpersonal violence.

[23]  A. Piquero,et al.  Discerning unfairness where others may not: Low self-control and unfair sanction perceptions , 2004 .

[24]  J. Finn A Survey of Online Harassment at a University Campus , 2004, Journal of interpersonal violence.

[25]  Steven Stack,et al.  Adult Social Bonds and Use of Internet Pornography , 2004 .

[26]  Kirk W. Elifson,et al.  Integrating the general theory of crime into an explanation of violent victimization among female offenders , 2004 .

[27]  Ronald V. Clarke,et al.  Superhighway Robbery: Preventing E-commerce Crime , 2003 .

[28]  Francis T. Cullen,et al.  BEING PURSUED: STALKING VICTIMIZATION IN A NATIONAL STUDY OF COLLEGE WOMEN* , 2002 .

[29]  Richard A. Wright,et al.  A study of individual and situational antecedents of violent victimization , 2002 .

[30]  David S. Wall,et al.  Crime and the Internet , 2001 .

[31]  John Paul Wright,et al.  Low self-control and coworker delinquency: A research note , 2001 .

[32]  Sameer Hinduja,et al.  Correlates of Internet Software Piracy , 2001 .

[33]  Carter Hay,et al.  PARENTING, SELF‐CONTROL, AND DELINQUENCY: A TEST OF SELF‐CONTROL THEORY* , 2001 .

[34]  Stephen W. Baron,et al.  Rough Justice , 2001 .

[35]  William F. Wieczorek,et al.  Deviant lifestyle and crime victimization , 2001 .

[36]  T. Pratt,et al.  THE EMPIRICAL STATUS OF GOTTFREDSON AND HIRSCHI'S GENERAL THEORY OF CRIME: A META‐ANALYSIS , 2000 .

[37]  C. Leukefeld,et al.  Stalking as a Variant of Intimate Violence: Implications From a Young Adult Sample , 2000, Violence and Victims.

[38]  Christopher J. Schreck Criminal victimization and low self-control: An extension and test of a general theory of crime , 1999 .

[39]  Susan C. Herring,et al.  The Rhetorical Dynamics of Gender Harassment On-Line , 1999, Inf. Soc..

[40]  T. Jordan,et al.  A Sociology of Hackers , 1998 .

[41]  Denise R. Osborn,et al.  The Distribution of Household Property Crimes , 1998 .

[42]  Nancy Thoennes,et al.  Stalking in America : findings from the National Violence Against Women Survey , 1998 .

[43]  W. F. Skinner,et al.  A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .

[44]  Leslie W. Kennedy,et al.  Risky lifestyles, routine activities, and the General Theory of Crime , 1997 .

[45]  S. Menard Applied Logistic Regression Analysis , 1996 .

[46]  Alex R. Piquero,et al.  Specifying the direct and indirect effects of low self-control and situational factors in offenders' decision making: Toward a more complete model of rational offending , 1996 .

[47]  Patrick M. O'Malley,et al.  Routine activities and individual deviant behavior , 1996 .

[48]  Lynn Cherny,et al.  Wired Women: Gender and New Realities in Cyberspace , 1996 .

[49]  Terance D. Miethe,et al.  Crime and its social context : toward an integrated theory of offenders, victims, and situations , 1995 .

[50]  Harold G. Grasmick,et al.  Low self-control and imprudent behavior , 1993 .

[51]  Harold G. Grasmick,et al.  Testing the Core Empirical Implications of Gottfredson and Hirschi's General Theory of Crime , 1993 .

[52]  Michael R. Gottfredson,et al.  A general theory of crime. , 1992 .

[53]  Janet L. Lauritsen,et al.  Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents , 1992, Violence and Victims.

[54]  Janet L. Lauritsen,et al.  THE LINK BETWEEN OFFENDING AND VICTIMIZATION AMONG ADOLESCENTS , 1991 .

[55]  Robert J. Sampson,et al.  Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence , 1990 .

[56]  Gary F. Jensen,et al.  Gender, Lifestyles, and Victimization: Beyond Routine Activity , 1986, Violence and Victims.

[57]  Thomas J. Holt,et al.  On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory , 2009 .

[58]  D. C. Graves,et al.  A Qualitative Analysis of Advance Fee Fraud E-mail Schemes , 2007 .

[59]  George E. Higgins Gender Differences in Software Piracy: The Mediating Roles of Self-Control Theory and Social Learning Theory , 2006 .

[60]  Paul Bocij,et al.  Cyberstalking: Harassment in the Internet Age and How to Protect Your Family , 2004 .

[61]  Steven Furnell,et al.  Cybercrime: Vandalizing the Information Society , 2003, ICWE.

[62]  D. Wall Cybercrimes and the Internet , 2001 .

[63]  Peter Grabosky,et al.  Telecommunications Fraud in the Digital Age: The Convergence of Technologies , 2001 .

[64]  Marcus K. Rogers,et al.  A social learning theory and moral disengagement analysis of criminal computer behavior: an exploratory study , 2001 .