Digital drift and the criminal interaction order
暂无分享,去创建一个
[1] R. Ackland,et al. Online collective identity: The case of the environmental movement , 2011, Soc. Networks.
[2] K. Durkin,et al. propagandizing pederasty: a thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles , 1999 .
[3] Philip R. Kavanaugh,et al. Deviant Identity in Online Contexts: New Directives in the Study of a Classic Concept , 2012 .
[4] Louise Barkhuus,et al. Empowerment through seamfulness: smart phones in everyday life , 2011, Personal and Ubiquitous Computing.
[5] P. Klerks. The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .
[6] Paul Dourish,et al. Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision , 2007, Personal and Ubiquitous Computing.
[7] Jo Bryce. The Technological Transformation of Leisure , 2001 .
[8] David Matza. Delinquency and Drift , 1966 .
[9] E. Goffman. Behavior in Public Places , 1963 .
[10] B. Wellman,et al. Relationships, Community, and Networked Individuals , 2013 .
[11] J. Meyrowitz,et al. No Sense of Place: The Impact of Electronic Media on Social Behavior. , 1987 .
[12] Steffen Blaschke,et al. Organizations as Networks of Communication Episodes: Turning the Network Perspective Inside Out , 2012 .
[13] Zeynep Tufekci. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .
[14] E. Goffman. The Interaction Order: American Sociological Association, 1982 Presidential Address , 1983 .
[15] Michael J. Hindelang. The Commitment of Delinquents to their Misdeeds: Do Delinquents Drift? , 1970 .
[16] R. Rettie. Mobile Phone Communication: Extending Goffman to Mediated Interaction , 2009 .
[17] G. Weimann,et al. The Strength of Weak Terrorist Ties , 2011 .
[18] Steve Uhlig,et al. Demystifying porn 2.0: a look into a major adult video streaming website , 2013, Internet Measurement Conference.
[19] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .
[20] Lilly U. Nguyen,et al. BIRDS OF THE INTERNET , 2011 .
[21] M. Yar. The Novelty of ‘Cybercrime’ , 2005 .
[22] E. Quayle,et al. child pornography and the internet: perpetuating a cycle of abuse , 2002 .
[23] I. Munro,et al. The territorial organization: History, divergence and possibilities , 2013 .
[24] G. Riva,et al. Outline for a Social Psychology of Cyberspace , 2001 .
[25] Barry Wellman,et al. The Social Affordances of the Internet for Networked Individualism , 2006, J. Comput. Mediat. Commun..
[26] Joshua Meyrowitz,et al. Shifting Worlds of Strangers: Medium Theory and Changes in “Them” Versus “Us”* , 1997 .
[27] C. Forsyth,et al. describing sexual behavior in the era of the internet: a typology for empirical research , 2005 .
[28] David Matza,et al. Delinquency and Drift , 1966 .
[29] Mimi Sheller,et al. Mobile Publics: Beyond the Network Perspective , 2004 .
[30] Noella Edelmann,et al. Reviewing the Definitions of "Lurkers" and Some Implications for Online Research , 2013, Cyberpsychology Behav. Soc. Netw..
[31] S. Passini. A binge-consuming culture: The effect of consumerism on social interactions in western societies , 2013 .
[32] Susan W. Brenner. Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships , 2003 .
[33] Eric Schmidt,et al. The New Digital Age: Reshaping the Future of People, Nations and Business , 2001 .
[34] R. Clarke. Technology, Criminology and Crime Science , 2002 .
[35] L. Qvortrup. Understanding New Digital Media , 2006 .
[36] P. Jenkins.. Beyond Tolerance: Child Pornography on the Internet , 2001 .
[37] Ramon Spaaij,et al. The Enigma of Lone Wolf Terrorism: An Assessment , 2010 .
[38] Yang-chih Fu,et al. Weak ties and contact initiation in everyday life: Exploring contextual variations from contact diaries , 2013, Soc. Networks.
[39] D. Mann,et al. NETCRIME More Change in the Organization of Thieving , 1998 .
[40] Bill McCarthy,et al. When Crime Pays: Capital, Competence, and Criminal Success , 2001 .
[41] Matthias Hofer,et al. Perceived bridging and bonding social capital on Twitter: Differentiating between followers and followees , 2013, Comput. Hum. Behav..
[42] Giuseppe Riva,et al. Actors, Artifacts and Inter-Actions. Outline for a Social Psychology of Cyberspace , 2001 .
[43] Aram Sinnreich,et al. The end of forgetting: Strategic agency beyond the panopticon , 2013, New Media Soc..
[44] Michael Yip,et al. Drifting on and off-line: humanising the cyber criminal , 2012 .
[45] A. Cohen. THE CONCEPT OF CRIMINAL ORGANISATION , 1977 .
[46] J. Meyrowitz,et al. No sense of place : the impact of electronic media on social behavior , 1988 .
[47] Christian Licoppe,et al. 'Timid encounters': a case study in the use of proximity-based mobile technologies , 2012, CHI.
[48] Yaman Akdeniz. Anonymity, Democracy, and Cyberspace , 2015 .
[49] Carlo Morselli,et al. Inside Criminal Networks , 2008 .
[50] Robin Teigland,et al. The Immersive Internet: Reflections on the Entangling of the Virtual with Society, Politics and the Economy , 2013 .
[51] Carlo Morselli,et al. Welcome to the Scene , 2012 .
[52] K. Durkin. Misuse of the Internet by Pedophiles: Implications for Law Enforcement and Probation Practice , 2002 .
[53] M. Feldman. Comparative Lone Wolf Terrorism: Toward a Heuristic Definition , 2013 .
[54] S. Shaw,et al. Playing with violence: Gamers’ social construction of violent video game play as tolerable deviance , 2006 .
[55] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[56] S. Lyng. Crime, Edgework and Corporeal Transaction , 2004 .
[57] Julie Wuthnow. Strange Encounters: Embodied Others in Post- Coloniality , 2002 .
[58] Edmund Chattoe,et al. It's not who you know - it's what you know about people you don't know that counts: extending the analysis of crime groups as social networks , 2005 .
[59] H. Becker. Notes on the Concept of Commitment , 1960, American Journal of Sociology.
[60] Mark Andrejevic,et al. The Discipline of Watching: Detection, Risk, and Lateral Surveillance , 2006 .
[61] J. Katz,et al. Seductions of Crime: Moral and Sensual Attractions in Doing Evil. , 1990 .
[62] M. Felson. Crime and nature , 2006 .
[63] Jaron Lanier,et al. Who Owns the Future , 2013 .
[64] I. Sarason. Deviance and Identity. , 1970 .
[65] G. Weimann. Lone Wolves in Cyberspace , 2012 .
[66] M. Kebbell,et al. DRAFT COPY : Porter & Kebbell 1 RUNNING HEAD : Examining Australia ’ s Convicted Terrorists Radicalization in Australia : Examining Australia ’ s Convicted Terrorists , 2012 .
[67] L. Webb,et al. Characteristics of Internet Child Pornography Offenders: A Comparison with Child Molesters , 2007, Sexual abuse : a journal of research and treatment.
[68] Heith Copes,et al. "How Edge Are You?" Constructing Authentic Identities and Subcultural Boundaries in a Straightedge Internet Forum , 2005 .
[69] Jason-Leigh Striegher. Early detection of the lone wolf: advancement of counter-terrorism investigations with an absence or abundance of information and intelligence , 2013 .
[70] Dennis Waskul,et al. Now the Orgy Is Over , 2010 .
[71] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[72] Garry Robins,et al. Understanding individual behaviors within covert networks: the interplay of individual qualities, psychological predispositions, and network effects , 2009 .
[73] K. Crawford. Listening, not Lurking: The Neglected Form of Participation , 2011 .
[74] T. Holt,et al. Considering the Pedophile Subculture Online , 2010, Sexual abuse : a journal of research and treatment.
[75] M. Castells. Materials for an exploratory theory of the network society , 2000 .