Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders
暂无分享,去创建一个
[1] K. J. Craik,et al. The nature of explanation , 1944 .
[2] R. Abelson. Script processing in attitude formation and decision making. , 1976 .
[3] Roger C. Schank,et al. Scripts, plans, goals and understanding: an inquiry into human knowledge structures , 1978 .
[4] D. Walsh. Shoplifting: Controlling a Major Crime , 1978 .
[5] Patricia L. Brantingham,et al. A Topological Technique for Regionalization , 1978 .
[6] R. Abelson. Psychological status of the script concept. , 1981 .
[7] Crime control in Britain : a review of policy research , 1985 .
[8] R. Clarke,et al. Modeling Offenders' Decisions: A Framework for Research and Policy , 1985, Crime and Justice.
[9] R. Clarke,et al. UNDERSTANDING CRIME DISPLACEMENT: AN APPLICATION OF RATIONAL CHOICE THEORY , 1987 .
[10] G. Gudjonsson. The reasoning criminal. Rational choice perspectives on offending : D.B. Cornish and R.V. Clarke (eds): Springer Verlag, Berlin (1986). Pages xiv-246. DM 98 , 1988 .
[11] D. Cornish. THE PROCEDURAL ANALYSIS OF OFFENDING AND ITS RELEVANCE FOR SITUATIONAL PREVENTION , 1994 .
[12] P. Tremblay,et al. Body Switching and Related Adaptations in the Resale of Stolen Vehicles. Script Elaborations and Aggregate Crime Learning Curves , 2001 .
[13] Ronnie Cohen,et al. Internet Law and Policy , 2002 .
[14] D. Cornish. OPPORTUNITIES, PRECIPITATORS AND CRIMINAL DECISIONS: A REPLY TO WORTLEY'S CRITIQUE OF SITUATIONAL CRIME PREVENTION , 2003 .
[15] Hilde van der Togt,et al. Publisher's Note , 2003, J. Netw. Comput. Appl..
[16] Ronald V. Clarke,et al. Become a Problem-Solving Crime Analyst , 2003 .
[17] Zhao Yuxin. On Computer Crimes , 2004 .
[18] T. Flew. Internet Law and Policy , 2005 .
[19] M. Yar. The Novelty of ‘Cybercrime’ , 2005 .
[20] Werner J. Einstadter,et al. Criminological Theory: An Analysis of its Underlying Assumptions , 2006 .
[21] C. Nee,et al. Expert Decision Making in Burglars , 2006 .
[22] Eric Beauregard,et al. Script Analysis of the Hunting Process of Serial Sex Offenders , 2007 .
[23] Michael L. Pittaro. Cyber stalking: An Analysis of Online Harassment and Intimidation , 2007 .
[24] A. Sidebottom,et al. What Do You Mean, ‘Is It Secure?’ Redesigning Language to be Fit for the Task of Assessing the Security of Domestic and Personal Electronic Goods , 2007 .
[25] Richard Keith Wortley,et al. Environmental criminology and crime analysis , 2008 .
[26] L. Porter,et al. Using archival data and multidimensional scaling to explore leadership: Examples from group crime , 2008 .
[27] J. B. Kelly,et al. DIFFERENTIATION AMONG TYPES OF INTIMATE PARTNER VIOLENCE: RESEARCH UPDATE AND IMPLICATIONS FOR INTERVENTIONS , 2008 .
[28] Mikko T. Siponen,et al. Overcoming the insider: reducing employee computer crime through Situational Crime Prevention , 2009, CACM.
[29] Nadine Deslauriers-Varin,et al. Victims’ Routine Activities and Sex Offenders’ Target Selection Scripts: A Latent Class Analysis , 2010, Sexual abuse : a journal of research and treatment.
[30] R. Wortley,et al. Investigating mobility patterns for repetitive sexual contact in adult child sex offending , 2010 .
[31] C. Draucker,et al. The role of electronic communication technology in adolescent dating violence. , 2010, Journal of child and adolescent psychiatric nursing : official publication of the Association of Child and Adolescent Psychiatric Nurses, Inc.
[32] Lisa A. Melander. College Students' Perceptions of Intimate Partner Cyber Harassment , 2010, Cyberpsychology Behav. Soc. Netw..
[33] A. Powell. Configuring Consent: Emerging Technologies, Unauthorized Sexual Images and Sexual Assault , 2010 .
[34] G. Laycock,et al. The Value of Crime Scripting: Deconstructing Internal Child Sex Trafficking , 2011 .
[35] S. Chainey,et al. Profiling Illegal Waste Activity: Using Crime Scripts as a Data Collection and Analytical Strategy , 2011 .
[36] Richard Keith Wortley,et al. Getting into the Script of Adult Child Sex Offenders and Mapping out Situational Prevention Measures , 2011 .
[37] M. Townsley,et al. Crime Script Analysis of Drug Manufacturing In Clandestine Laboratories Implications for Prevention , 2011 .
[38] K. Crawford,et al. Sexting, consent and young people's ethics: Beyond Megan's Story , 2012 .
[39] M. Felson. Routine activity approach , 2013 .
[40] R Wortley,et al. Rational choice and offender decision making: lessons from the cognitive sciences , 2013 .
[41] Michelle Drouin,et al. Let's talk about sexting, baby: Computer-mediated sexual behaviors among young adults , 2013, Comput. Hum. Behav..
[42] A. Slane. Sexting and the law in Canada , 2013 .
[43] Hervé Borrion. Quality assurance in crime scripting , 2013 .
[44] R. Wortley,et al. Cognition and crime: Offender decision-making and script analyses. , 2013 .
[45] P. Ornstein,et al. When Does Intimate Partner Violence Continue After Separation? , 2013, Violence against women.
[46] M. D. Vries. From the Instrument of Delivery to the Actual Agent of Harm: Fighting the Criminal Purchase of Ammunition , 2013 .
[47] R. Wortley,et al. The Reasoning Criminal: twenty-five years on , 2013 .
[48] R. Clarke,et al. The Rational Choice Perspective 1 , 2013 .
[49] B. Fileborn,et al. The role of emerging communication technologies in experiences of sexual violence: A new legal frontier? , 2013 .
[50] Benoit Leclerc. New developments in script analysis for situational crime prevention: Moving beyond offender scripts , 2013 .
[51] A. Lavorgna. Transit crimes in the Internet age: How new online criminal opportunities affect the organization of offline transit crimes , 2013 .
[52] Gisela Bichler,et al. Bad actors and faulty props: unlocking legal and illicit art trade , 2013 .
[53] Eric Beauregard,et al. Where and when? Examining spatiotemporal aspects of sexual assault events , 2013 .
[54] Kim-Kwang Raymond Choo,et al. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users , 2014, Behav. Inf. Technol..
[55] R. Clarke,et al. The Reasoning Criminal , 2014 .
[56] Scott R. Stroud. The Dark Side of the Online Self: A Pragmatist Critique of the Growing Plague of Revenge Porn , 2014 .
[57] S. Jore,et al. Troublesome trade-offs: balancing urban activities and values when securing a city-centre governmental quarter , 2015, City, Territory and Architecture.
[58] A. Myhill. Measuring Coercive Control , 2015, Violence against women.
[59] E. Savona,et al. Human trafficking for sexual exploitation in Italy , 2015 .
[60] M. Salter,et al. Responding to revenge porn : challenges to online legal impunity , 2015 .
[61] N. Baym. Social Media and the Struggle for Society , 2015 .
[62] Graham Farrell,et al. Police performance measurement: an annotated bibliography , 2015 .
[63] A. Lavorgna. The online trade in counterfeit pharmaceuticals: New criminal opportunities, trends and challenges , 2015 .
[64] Xingan Li. PHENOMENAL EXPLORATION INTO IMPACT OF ANONYMITY ON LAW AND ORDER IN CYBERSPACE , 2015 .
[65] J. Li. Adolescent Compensated Dating in Hong Kong , 2015, International journal of offender therapy and comparative criminology.
[66] C. Barmore. Criminalization in Context: Involuntariness, Obscenity, and the First Amendment , 2015 .
[67] An application of CRAVED to the choice of victim in sexual homicide: a routine activity approach , 2015 .
[68] M. Levi,et al. Organizing the finances for and the finances from transnational corporate bribery , 2017 .
[69] M. Berg,et al. Cognition and Crime: Offender Decision Making and Script Analyses , 2016 .
[70] J. Hardesty,et al. “He Could Scare Me Without Laying a Hand on Me” , 2016, Violence against women.
[71] M. Gill,et al. Rewriting the Script: Cross-Disciplinary Exploration and Conceptual Consolidation of the Procedural Analysis of Crime , 2016 .
[72] M. Townsley,et al. SITUATING THE THEORY , ANALYTIC APPROACH AND APPLICATION , 2016 .
[73] A. Velonis. “He Never Did Anything You Typically Think of as Abuse” , 2016, Violence against women.
[74] Harald Haelterman,et al. Crime Script Analysis: Preventing Crimes Against Business , 2016 .
[75] Lauren A. Reed,et al. Snooping and Sexting , 2016, Violence against women.
[76] Torna Pitman. Living with Coercive Control: Trapped within a Complex Web of Double Standards, Double Binds and Boundary Violations , 2016 .
[77] S. Bloom. No Vengeance for 'Revenge Porn' Victims: Unraveling Why this Latest Female-Centric, Intimate-Partner Offense is Still Legal, and Why We Should Criminalize It , 2016 .
[78] Taylor E. Gissell. Felony Count 1: Indecent Disclosure , 2016 .
[79] Walter S. DeKeseredy,et al. Thinking Sociologically About Image-Based Sexual Abuse , 2016 .
[80] David M. Douglas,et al. Doxing: a conceptual analysis , 2016, Ethics and Information Technology.
[81] D. Woodlock. The Abuse of Technology in Domestic Violence and Stalking , 2017, Violence against women.
[82] C. McGlynn,et al. Image-based sexual abuse. , 2017 .
[83] Benoit Leclerc,et al. An Examination of Sexual Offenses Against Women by Acquaintances: The Utility of a Script Framework for Prevention Purposes , 2017 .
[84] N. Henry,et al. Beyond ‘Revenge Pornography’ , 2017 .
[85] C. McGlynn,et al. Beyond ‘Revenge Porn’: The Continuum of Image-Based Sexual Abuse , 2017 .
[86] S. Bates. Revenge Porn and Mental Health , 2017 .
[87] Ganaele Langlois,et al. Economies of reputation: the case of revenge porn , 2017 .
[88] D. Woodlock,et al. Technology facilitated coercive control: domestic violence and the competing roles of digital media platforms , 2018 .
[89] R. Wortley,et al. Learning About Situational Crime Prevention From Offenders: Using a Script Framework to Compare the Commission of Completed and Disrupted Sexual Offenses , 2018, Criminal Justice Review.
[90] Katlin J. Rhyner,et al. An examination of nonconsensual pornography websites , 2018 .
[91] H. Borrion,et al. Crime scripting: A systematic review , 2019, European Journal of Criminology.
[92] L. Vitis. Private, Hidden and Obscured: Image-Based Sexual Abuse in Singapore , 2020, Asian Journal of Criminology.
[93] Asher Flynn,et al. Image-based sexual abuse: The extent, nature, and predictors of perpetration in a community sample of Australian residents , 2019, Comput. Hum. Behav..
[94] J. Hearn,et al. Revenge pornography and manhood acts: a discourse analysis of perpetrators’ accounts , 2019 .
[95] A. Eaton,et al. Nonconsensual pornography among U.S. adults: A sexual scripts framework on victimization, perpetration, and health correlates for women and men. , 2020, Psychology of Violence.
[96] CYBER CRIME AND INFORMATION WARFARE , .