The Effect of Self-Control on Victimization in the Cyberworld
暂无分享,去创建一个
[1] T. Holt,et al. Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .
[2] Brian K. Payne,et al. Using Student Samples in Criminological Research , 2008 .
[3] Catherine D. Marcum,et al. Digital Piracy: An Examination of Three Measurements of Self-Control , 2008 .
[4] Justin W. Patchin,et al. Personal information of adolescents on the Internet: A quantitative content analysis of MySpace. , 2008, Journal of adolescence.
[5] Michael D. Reisig,et al. LOW SELF‐CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION* , 2008 .
[6] Justin W. Patchin,et al. Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .
[7] George E. Higgins,et al. Low Self-Control and Social Learning in Understanding Students' Intentions to Pirate Movies in the United States , 2007 .
[8] Alexander T. Vazsonyi,et al. THE FAMILY → LOW SELF-CONTROL → DEVIANCE , 2007 .
[9] T. Holt. subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures , 2007 .
[10] Bonnie S. Fisher,et al. Self-control, Victimization, and their Influence on Risky Lifestyles: A Longitudinal Analysis Using Panel Data , 2006 .
[11] Marc Rogers,et al. Self-reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis , 2006 .
[12] George E. Higgins,et al. Digital Piracy: Assessing the Contributions of an Integrated Self‐Control Theory and Social Learning Theory Using Structural Equation Modeling , 2006 .
[13] Dana L. Haynie,et al. Reconsidering Peers and Delinquency: How do Peers Matter? , 2005 .
[14] M. Yar. The Novelty of ‘Cybercrime’ , 2005 .
[15] John Liederbach,et al. Digital Crime and Digital Terrorism , 2005 .
[16] A. Piquero,et al. Self-Control, Violent Offending, and Homicide Victimization: Assessing the General Theory of Crime , 2005 .
[17] Timothy Buzzell. the effects of sophistication, access and monitoring on use of pornography in three technological contexts , 2005 .
[18] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[19] George E. Higgins. can low self-control help with the understanding of the software piracy problem? , 2004 .
[20] David A. Makin,et al. Self-Control, Deviant Peers, and Software Piracy , 2004, Psychological reports.
[21] Eunice Chang,et al. Self-Control and Social Bonds: A Combined Control Perspective on Deviance , 2004 .
[22] Christopher J. Schreck,et al. Specifying the Influence of Family and Peers on Violent Victimization , 2004, Journal of interpersonal violence.
[23] A. Piquero,et al. Discerning unfairness where others may not: Low self-control and unfair sanction perceptions , 2004 .
[24] J. Finn. A Survey of Online Harassment at a University Campus , 2004, Journal of interpersonal violence.
[25] Steven Stack,et al. Adult Social Bonds and Use of Internet Pornography , 2004 .
[26] Kirk W. Elifson,et al. Integrating the general theory of crime into an explanation of violent victimization among female offenders , 2004 .
[27] Ronald V. Clarke,et al. Superhighway Robbery: Preventing E-commerce Crime , 2003 .
[28] Francis T. Cullen,et al. BEING PURSUED: STALKING VICTIMIZATION IN A NATIONAL STUDY OF COLLEGE WOMEN* , 2002 .
[29] Richard A. Wright,et al. A study of individual and situational antecedents of violent victimization , 2002 .
[30] David S. Wall,et al. Crime and the Internet , 2001 .
[31] John Paul Wright,et al. Low self-control and coworker delinquency: A research note , 2001 .
[32] Sameer Hinduja,et al. Correlates of Internet Software Piracy , 2001 .
[33] Carter Hay,et al. PARENTING, SELF‐CONTROL, AND DELINQUENCY: A TEST OF SELF‐CONTROL THEORY* , 2001 .
[34] Stephen W. Baron,et al. Rough Justice , 2001 .
[35] William F. Wieczorek,et al. Deviant lifestyle and crime victimization , 2001 .
[36] T. Pratt,et al. THE EMPIRICAL STATUS OF GOTTFREDSON AND HIRSCHI'S GENERAL THEORY OF CRIME: A META‐ANALYSIS , 2000 .
[37] C. Leukefeld,et al. Stalking as a Variant of Intimate Violence: Implications From a Young Adult Sample , 2000, Violence and Victims.
[38] Christopher J. Schreck. Criminal victimization and low self-control: An extension and test of a general theory of crime , 1999 .
[39] Susan C. Herring,et al. The Rhetorical Dynamics of Gender Harassment On-Line , 1999, Inf. Soc..
[40] T. Jordan,et al. A Sociology of Hackers , 1998 .
[41] Denise R. Osborn,et al. The Distribution of Household Property Crimes , 1998 .
[42] Nancy Thoennes,et al. Stalking in America : findings from the National Violence Against Women Survey , 1998 .
[43] W. F. Skinner,et al. A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .
[44] Leslie W. Kennedy,et al. Risky lifestyles, routine activities, and the General Theory of Crime , 1997 .
[45] S. Menard. Applied Logistic Regression Analysis , 1996 .
[46] Alex R. Piquero,et al. Specifying the direct and indirect effects of low self-control and situational factors in offenders' decision making: Toward a more complete model of rational offending , 1996 .
[47] Patrick M. O'Malley,et al. Routine activities and individual deviant behavior , 1996 .
[48] Lynn Cherny,et al. Wired Women: Gender and New Realities in Cyberspace , 1996 .
[49] Terance D. Miethe,et al. Crime and its social context : toward an integrated theory of offenders, victims, and situations , 1995 .
[50] Harold G. Grasmick,et al. Low self-control and imprudent behavior , 1993 .
[51] Harold G. Grasmick,et al. Testing the Core Empirical Implications of Gottfredson and Hirschi's General Theory of Crime , 1993 .
[52] Michael R. Gottfredson,et al. A general theory of crime. , 1992 .
[53] Janet L. Lauritsen,et al. Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents , 1992, Violence and Victims.
[54] Janet L. Lauritsen,et al. THE LINK BETWEEN OFFENDING AND VICTIMIZATION AMONG ADOLESCENTS , 1991 .
[55] Robert J. Sampson,et al. Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence , 1990 .
[56] Gary F. Jensen,et al. Gender, Lifestyles, and Victimization: Beyond Routine Activity , 1986, Violence and Victims.
[57] Thomas J. Holt,et al. On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory , 2009 .
[58] D. C. Graves,et al. A Qualitative Analysis of Advance Fee Fraud E-mail Schemes , 2007 .
[59] George E. Higgins. Gender Differences in Software Piracy: The Mediating Roles of Self-Control Theory and Social Learning Theory , 2006 .
[60] Paul Bocij,et al. Cyberstalking: Harassment in the Internet Age and How to Protect Your Family , 2004 .
[61] Steven Furnell,et al. Cybercrime: Vandalizing the Information Society , 2003, ICWE.
[62] D. Wall. Cybercrimes and the Internet , 2001 .
[63] Peter Grabosky,et al. Telecommunications Fraud in the Digital Age: The Convergence of Technologies , 2001 .
[64] Marcus K. Rogers,et al. A social learning theory and moral disengagement analysis of criminal computer behavior: an exploratory study , 2001 .