Skip to main content Accessibility help
×
Hostname: page-component-68945f75b7-tmfhh Total loading time: 0 Render date: 2024-08-05T15:07:25.941Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  05 July 2013

Gráinne Kirwan
Affiliation:
Dun Laoghaire Institute of Art, Design and Technology, Dublin
Andrew Power
Affiliation:
Dun Laoghaire Institute of Art, Design and Technology, Dublin
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Cybercrime
The Psychology of Online Offenders
, pp. 224 - 250
Publisher: Cambridge University Press
Print publication year: 2013

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abbott, K. W. and Snidal, D. (2000). Hard and soft law in international governance. International Organization, 54, 421–56.CrossRefGoogle Scholar
Adams, A. A. (2010). Virtual sex with child avatars. In Wankel, C. and Malleck, S. (eds.) Emerging Ethical Issues of Life in Virtual Worlds. Charlotte, NC: Information Age Publishing (pp. 55–72).Google Scholar
Adams, R. E. and Boscarino, J. A. (2006). Predictors of PTSD and delayed PTSD after disaster: the impact of exposure and psychosocial resources. Journal of Nervous and Mental Disease, 194, 485–93.CrossRefGoogle ScholarPubMed
Ainsworth, P. B. (2001). Offender Profiling and Crime Analysis. Cullompton, UK: Willan Publishing.Google Scholar
Ajzen, I. (1988). Attitudes, Personality and Behaviour. Milton Keynes, UK: Open University Press.Google Scholar
Ajzen, I. (1991). The theory of planned behaviour. Organisational Behaviour and Human Decision Processes, 50, 179–211.CrossRefGoogle Scholar
Alexy, E. M., Burgess, A. W., Baker, T. and Smoyak, S. A. (2005). Perceptions of cyberstalking among college students. Brief Treatment and Crisis Intervention, 5, 279–89.CrossRefGoogle Scholar
Alison, L. and Kebbell, M. R. (2006). Offender profiling: limits and potential. In Kebbell, M. R. and Davies, G. M. (eds.), Practical Psychology for Forensic Investigations and Prosecutions. Chichester, UK: John Wiley and Sons (pp. 152–63).Google Scholar
Alison, L. J., Smith, M. D., Eastoman, O. and Rainbow, L. (2003). Toulmin’s philosophy of argument and its relevance to offender profiling. Journal of Psychology, Crime and Law, 9, 173–81.CrossRefGoogle Scholar
Al-Rafee, S. and Rouibah, K. (2010). The fight against digital piracy: an experiment. Telematics and Informatics, 27, 283–92.CrossRefGoogle Scholar
American Psychiatric Association (2000). Diagnostic and Statistical Manual of Mental Disorders: Fourth Edition, Text Revision. Washington, DC: American Psychiatric Association.Google Scholar
American Psychiatric Association (2011). DSM-5: The Future of Psychiatric Diagnosis. Retrieved from .
Amir, M. (1971). Patterns of Forcible Rape. Chicago, IL: University of Chicago Press.Google Scholar
Anti-Phishing Working Group (APWG) (23 December 2011). Phishing Activity Trends Report, 1st Half, 2011. Retrieved from .
Archer, N., Sproule, S., Yuan, Y., Guo, K. and Xiang, J. (2012). Identity Theft and Fraud: Evaluating and Managing Risk. University of Ottawa Press.Google Scholar
Armstrong, T. A. and Boutwell, B. B. (2012). Low resting heart rate and rational choice: integrating biological correlates of crime in criminological theories. Journal of Criminal Justice, 40, 31–9.CrossRefGoogle Scholar
Ashcroft, J. (May 2001). Stalking and Domestic Violence: Report to Congress. Retrieved from .
Babchishin, K. M., Hanson, R. K. and Hermann, C. A. (2011). The characteristics of online sex offenders: a meta-analysis. Sex Abuse, 23, 92–123.CrossRefGoogle ScholarPubMed
Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4 (1–2), 643–56.Google Scholar
Bandura, A. (1965). Influence of models’ reinforcement contingencies on the acquisition of imitative behaviours. Journal of Personality and Social Psychology, 1, 589–95.CrossRefGoogle Scholar
Baron, S. W. (2003). Self-control, social consequences and criminal behaviour: street youth and the general theory of crime. Journal of Research in Crime and Delinquency, 40, 403–25.CrossRefGoogle Scholar
Bates, A. and Metcalf, C. (2007). A psychometric comparison of internet and non-internet sex offenders from a community treatment sample. Journal of Sexual Aggression, 13, 11–20.CrossRefGoogle Scholar
BBC News Online (31 March 2005). ‘Game theft’ led to fatal attack. Retrieved from .
BBC News Online (14 November 2007). ‘Virtual theft’ leads to arrest. Retrieved from .
BBC News Online (30 July 2008). Profile: Gary McKinnon. Retrieved from .
BBC News Online (9 June 2009). Hacker ‘too fragile’ to extradite. Retrieved from .
BBC News Online (28 July 2009). Hacker’s ‘moral crusade’ over UFO. Retrieved from .
BBC News Online (31 July 2009). Hacker loses extradition appeal. Retrieved from .
BBC News Online (10 December 2009). Hacker to appeal over extradition. Retrieved from .
BBC News Online (25 January 2010). $2 million file sharing fine slashed to $54,000. Retrieved from .
BBC News Online (7 June 2010). Hacker explains why he reported ‘Wikileaks source’. Retrieved from .
BBC News Online (24 September 2010). Stuxnet worm hits Iran nuclear plant staff computers. Retrieved from .
BBC News Online (30 September 2010). Lawyers to continue piracy fight. Retrieved from .
BBC News Online (12 October 2010). Irish court rules in favour of ISPs in piracy case. Retrieved from .
BBC News Online (20 June 2011). Soca website taken down after LulzSec ‘DDoS attack’. Retrieved from .
BBC News Online (10 December 2011). ‘More than 800 people’ phone-hacked by News of World. Retrieved from .
BBC News Online (26 December 2011). ‘Anonymous’ hackers hit US security firm Stratfor. Retrieved from .
BBC News Online (26 June 2012). Internet piracy appeal fee challenged by Consumer Focus. Retrieved from .
BBC News Online (20 July 2012). Obama warns US on cyber-threats. Retrieved from .
Becker, J. U. and Clement, M. (2006). Dynamics of illegal participation in peer-to-peer networks: why do people illegally share media files?Journal of Media Economics, 19, 7–32.CrossRefGoogle Scholar
Benkler, Y. (2006). The Wealth of Networks. New Haven, CT, and London: Yale University Press.Google Scholar
Bennett, W. L. (2008). Changing citizenship in the digital age. In Bennett, W. L. (ed.) Civic Life Online: Learning How Digital Media Can Engage Youth. Cambridge, MA: The MIT Press (pp. 1–24).Google Scholar
Bente, G., Rüggenberg, S., Krämer, N. C. and Eschenburg, F. (2008). Avatar-mediated networking: increasing social presence and interpersonal trust in net-based collaborations. Human Communication Research, 34, 287–318.CrossRefGoogle Scholar
Beran, T. and Li, Q. (2005). Cyber-harassment: a study of a new method for an old behaviour. Journal of Educational Computing Research, 32, 265–77.Google Scholar
Berlin, F. S. and Sawyer, D. (2012). Potential consequences of accessing child pornography over the internet and who is accessing it. Sexual Addiction and Compulsivity: the Journal of Treatment and Prevention, 19, 30–40.CrossRefGoogle Scholar
Bhal, K. T. and Leekha, N. D. (2008). Exploring cognitive moral logics using grounded theory: the case of software piracy. Journal of Business Ethics, 81, 635–46.CrossRefGoogle Scholar
Bhat, C. S. (2008). Cyber bullying: overview and strategies for school counsellors, guidance officers, and all school personnel. Australian Journal of Guidance and Counselling, 18 (1), 53–66.CrossRefGoogle Scholar
Bissett, A. and Shipton, G. (1999). Some human dimensions of computer virus creation and infection. International Journal of Human-Computer Studies, 52, 899–913.CrossRefGoogle Scholar
Blackburn, R. (1993). The Psychology of Criminal Conduct: Theory, Research and Practice. Chichester, UK: John Wiley and Sons.Google Scholar
Blackburn, R. (1996). What is forensic psychology?Legal and Criminological Psychology, 1, 3–16.CrossRefGoogle Scholar
Blake, R. H. and Kyper, E. S. (in press). An investigation of the intention to share media files over peer-to-peer networks. Behaviour and Information Technology.
Blanchard, R. (2009). The DSM diagnostic criteria for paedophilia. Archives of Sexual Behaviour, 39, 304–16.CrossRefGoogle Scholar
Blundell, B., Sherry, M., Burke, A. and Sowerbutts, S. (2002). Child pornography and the internet: accessibility and policing. Australian Police Journal, 56 (1): 59–65.Google Scholar
Blumenthal, S., Gudjonsson, G. and Burns, J. (1999). Cognitive distortions and blame attribution in sex offenders against adults and children. Child Abuse and Neglect, 23, 129–43.CrossRefGoogle ScholarPubMed
Bocij, P. (2006). The Dark Side of the Internet: Protecting Yourself and your Family from Online Criminals. Westport, CT: Praeger Publishers.Google Scholar
Bonner, S. and O’Higgins, E. (2010). Music piracy: ethical perspectives. Management Decision, 48, 1,341–54.CrossRefGoogle Scholar
Bottoms, A. E. (2007). Place, space, crime, and disorder. In Maguire, M., Morgan, R. and Reiner, R. (eds.), The Oxford Handbook of Criminology (4th edn). Oxford University Press (pp. 528–74).Google Scholar
Bouchard, S., St-Jacques, J., Robillard, G. and Renaud, P. (2008). Anxiety increases the feeling of presence in virtual reality. Presence Teleoperators and Virtual Environments, August, 376–91.CrossRef
Boulton, M., Lloyd, J., Down, J. and Marx, H. (2012). Predicting undergraduates’ self-reported engagement in traditional and cyberbullying from attitudes. Cyberpsychology, Behavior and Social Networking, 15, 141–7.CrossRefGoogle ScholarPubMed
Bowman-Grieve, L. (2011). The internet and terrorism: pathways towards terrorism and counter-terrorism. In Silke, A. (ed.), The Psychology of Counter-Terrorism. Milton Park, UK: Routledge (pp. 76–88).Google Scholar
Bowman-Grieve, L. and Conway, M. (2012). Exploring the form and function of dissident Irish Republican online discourses. Media, War and Conflict, 5, 71–85.CrossRefGoogle Scholar
Boyle, J. (1997). Foucault in cyberspace: surveillance, sovereignty, and hardwired censors. University of Cincinnati Law Review, 66, 177–205.Google Scholar
Bremmer, L. A., Koehler, D. J., Liberman, V. and Tversky, A. (1996). Overconfidence in probability and frequency judgements: a critical examination. Organisational Behaviour and Human Decision Processes, 65, 212–19.CrossRefGoogle Scholar
Brenner, S. W. (2001). Is there such a thing as ‘virtual crime’? California Criminal Law Review, Volume 4. Retrieved from .
Brenner, S. W. (2006). Defining cybercrime: a review of state and federal law. In Clifford, R. D. (ed.), Cybercrime: the Investigation, Prosecution and Defense of a Computer Related Crime (2nd edn). Durham, NC: Carolina Academic Press (pp. 13–95).Google Scholar
British Psychological Society (2011). Becoming a Forensic Psychologist. Retrieved from .
Britton, P. (1997). The Jigsaw Man. London: Corgi.Google Scholar
Britton, P. (2000). Picking up the Pieces. London: Corgi.Google Scholar
Broidy, L., Cauffman, E., Espelage, D. L., Mazerolle, P. and Piquero, A. (2003). Sex differences in empathy and its relation to juvenile offending. Violence and Victims, 18, 503–16.CrossRefGoogle ScholarPubMed
Brown, D. and Silke, A. (2011). The impact of the media on terrorism and counter-terrorism. In Silke, A. (ed.), The Psychology of Counter-Terrorism. Milton Park, UK: Routledge (pp. 89–110).Google Scholar
Brown, J. M. and Campbell, E. A. (2010). Forensic psychology: a case of multiple identities. In Brown, J. M. and Campbell, E. A. (eds.). The Cambridge Handbook of Forensic Psychology. New York: Cambridge University Press (pp. 1–13).CrossRefGoogle Scholar
Brown, K., Jackson, M. and Cassidy, W. (2006). Cyber-bullying: developing policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educational Administration and Policy, 57. Retrieved from .Google Scholar
Bryant, R. (2008). The challenge of digital crime. In Bryant, R. (ed.), Investigating Digital Crime. Chichester, UK: John Wiley and Sons (pp. 1–26).Google Scholar
Bryant, R. and Marshall, A. (2008). Criminological and motivational perspectives. In Bryant, R. (ed.), Investigating Digital Crime. Chichester, UK: John Wiley and Sons (pp. 231–48).Google Scholar
Bryce, J. (2010). Online sexual exploitation of children and young people. In Jewkes, Y. and Yar, M. (eds.), Handbook of Internet Crime. Cullompton, UK: Willan Publishing (pp. 320–42).Google Scholar
Bryce, J. and Rutter, J. (2005). Fake Nation: a Study into an Everyday Crime. Report for the Organized Crime Task Force – Northern Ireland Office. Retrieved from .Google Scholar
Burgess, A. W. and Hartman, C. (1987). Child abuse aspects of child pornography. Psychiatric Annals, 17 (4), 248–53.CrossRefGoogle Scholar
Burgess-Proctor, A., Patchin, J. W. and Hinduja, S. (2009). Cyberbullying and online harassment: reconceptualizing the victimization of adolescent girls. In Garcia, V. and Clifford, J. (eds.), Female Crime Victims: Reality Reconsidered. Upper Saddle River, NJ: Prentice Hall (pp. 162–76).Google Scholar
Burke, A., Sowerbutts, S., Blundell, B. and Sherry, M. (2002). Child pornography and the internet: policing and treatment issues. Psychiatry, Psychology and Law, 9, 79–84.CrossRefGoogle Scholar
Burke, S. C., Wallen, M., Vail-Smith, K. and Knox, D. (2011). Using technology to control intimate partners: an exploratory study of college undergraduates. Computers in Human Behavior, 27, 1,162–7.CrossRefGoogle Scholar
Calcetas-Santos, O. (2001). Child pornography on the internet. In Arnaldo, C. A. (ed.), Child Abuse on the Internet. Paris: UNESCO (pp. 57–60).Google Scholar
Calcutt, A. (1999). White Noise: an A-Z of the Contradictions in Cyberculture. London: Macmillan.CrossRefGoogle Scholar
Campbell, J., Greenauer, N., Macaluso, K. and End, C. (2007). Unrealistic optimism in internet events. Computers in Human Behaviour, 23, 1,273–84.CrossRefGoogle Scholar
Cannataci, J. and Mifsud-Bonnici, J. (2007). Weaving the mesh: finding remedies in cyberspace. International Review of Law, Computers and Technology, 21, 59–78.CrossRefGoogle Scholar
Canter, D. (1995). Criminal Shadows: Inside the Mind of the Serial Killer. London: HarperCollins Publishers.Google Scholar
Canter, D. (2003). Mapping Murder: Walking in Killers’ Footsteps. London: Virgin Books.Google Scholar
Canter, D. and Youngs, D. (2009). Investigative Psychology: Offender Profiling and the Analysis of Criminal Action. Chichester, UK: Wiley.Google Scholar
Carey, L. (29 July 2009). Can PTSD affect victims of identity theft? Psychologists say yes. Associated Content. Retrieved from .
Carney, M. and Rogers, M. (2004). The trojan made me do it: a first step in statistical based computer forensics event reconstruction. International Journal of Digital Evidence, 2 (4). Retrieved from .Google Scholar
Carrier, B. and Spafford, E. (2003). Getting physical with digital forensics investigation. International Journal of Digital Evidence, 2 (2).Google Scholar
Carrier, B. and Spafford, E. (11–13, August 2004). An event based digital forensic investigation framework. Paper presented at Digital Forensic Research Workshop (DFRWS), Baltimore, Maryland. Retrieved from .
Carroll, E. and Romano, J. (2011). Your Digital Afterlife. Berkeley, CA: New Riders.Google Scholar
Casey, E. (2002). Handbook of Computer Crime Investigation: Forensic Tools and Technology. San Diego, CA: Academic Press.Google Scholar
Chesebro, J. W. and Bonsall, D. G. (1989). Computer-mediated Communication: Human Relationships in a Computerised World. Tuscaloosa, AL: The University of Alabama Press.Google Scholar
Chiesa, R., Ducci, S. and Ciappi, S. (2009). Profiling Hackers: the Science of Criminal Profiling as Applied to the World of Hacking. Boca Raton, FL: CRC Press.Google Scholar
Clarke, A. (2010). Social Media: Political Uses and Implications for Representative Democracy. Ottawa, Canada: Library of Parliament.Google Scholar
Clarke, R. V. and Felson, M. (1993). Routine Activity and Rational Choice. New Brunswick, NJ: Transaction Publishers.Google Scholar
Clough, J. (2010). Principles of Cybercrime. Cambridge University Press.CrossRefGoogle Scholar
Cockrill, A. and Goode, M. M. H. (2012). DVD pirating intentions: angels, devils, chancers and receivers. Journal of Consumer Behaviour, 11, 1–10.CrossRefGoogle Scholar
Colarik, A. M. and Janczewski, L. J. (2008). Introduction to cyber warfare and cyber terrorism. In Janczewski, L. J. and Colarik, A. M. (eds.), Cyber Warfare and Cyber Terrorism. Hershey, PA: Information Science Reference (pp. xiii–xxx).Google Scholar
Coleman, J. (1994). The Criminal Elite: the Sociology of White Collar Crime. New York: St. Martin’s Press.Google Scholar
Collins, J. M. (2006). Investigating Identity Theft: a Guide for Businesses, Law Enforcement, and Victims. Hoboken, NJ: John Wiley and Sons.Google Scholar
Computer Security Institute (2011). Fifteenth annual computer crime and security survey 2010/2011. Retrieved from .
Conner, B. T., Stein, J. A. and Longshore, D. (2008). Examining self-control as a multidimensional predictor of crime and drug use in adolescents with criminal histories. The Journal of Behavioral Health Services and Research, 36, 137–49.CrossRefGoogle ScholarPubMed
Conway, M. (2002). Reality bytes: cyberterrorism and terrorist use of the internet. First Monday, 7, 11.CrossRefGoogle Scholar
Conway, M. (2006). Terrorist ‘use’ of the internet and fighting back. Information and Security: an International Journal, 19, 9–30.Google Scholar
Conway, M. (2007). Cyberterrorism: hype and reality. In Armistead, L. (ed.), Information Warfare: Separating Hype from Reality. Potomac Books, Inc. (pp. 73–93).Google Scholar
Conway, M. (2011). Against cyberterrorism. Communications of the ACM, 54, 26–8.CrossRefGoogle Scholar
Cooney, R. and Lang, A. (2007). Taking uncertainty seriously: adaptive governance and international trade. European Journal of International Law, 18, 523.CrossRefGoogle Scholar
Couldry, N. (2007). Communicative entitlements and democracy: the future of the digital divide debate. In Mansell, R., Avgerou, C., Quah, D. and Silverstone, R. (eds.), The Oxford Handbook of Information and Communication Technologies. Oxford University Press (pp. 363–83).Google Scholar
Council of Europe (2001). Convention on Cybercrime. Retrieved from .
Cox, B. J., MacPherson, P. S. R., Enns, M. W. and McWilliams, L. A. (2004). Neuroticism and self-criticism associated with post-traumatic stress disorder in a nationally representative sample. Behaviour Research and Therapy, 42, 105–44.CrossRefGoogle Scholar
Cronan, T. P., Foltz, C. B. and Jones, T. W. (2006). Information systems misuse and computer crime: an analysis of demographic factors and awareness of university computer usage policies. Communications of the ACM, 49 (6), 84–90.CrossRefGoogle Scholar
Cushing, K. (10 May 2001). Would you turn to the dark side?Computer Weekly, 34.Google Scholar
D’Astous, A., Colbert, F. and Montpetit, D. (2005). Music piracy on the web – how effective are anti-piracy arguments? Evidence from the theory of planned behavior. Journal of Consumer Policy, 28, 289–310.CrossRefGoogle Scholar
Davey, G. (2008). Psychopathology: Research, Assessment and Treatment in Clinical Psychology. Chichester, UK: John Wiley and Sons.Google Scholar
David, M. (2010). Peer to Peer and the Music Industry: the Criminalisation of Sharing. London: Sage Publications.Google Scholar
Davies, G., Hollin, C. and Bull, R. (2008). Forensic Psychology. Chichester, UK: Wiley.Google Scholar
Davinson, N. and Sillence, E. (2010). It won’t happen to me: promoting secure behaviour among internet users. Computers in Human Behaviour, 26, 1,739–47.CrossRefGoogle Scholar
Dean, G., Bell, P. and Newman, J. (2012). The dark side of social media: review of online terrorism. Pakistan Journal of Criminology, 3, 103–22.Google Scholar
Dehue, F., Bolman, C. and Völlink, T. (2008). Cyberbullying: youngsters’ experiences and parental perception. Cyberpsychology and Behaviour, 11, 217–23.CrossRefGoogle ScholarPubMed
De Masi, F. (2007). The paedophile and his inner world: theoretical and clinical considerations on the analysis of a patient. The International Journal of Psychoanalysis, 88, 147–65.CrossRefGoogle ScholarPubMed
DeMore, S. W., Fisher, J. D. and Baron, R. M. (1988). The equity-control model as a predictor of vandalism among college students. Journal of Applied Social Psychology, 18, 80–91.CrossRefGoogle Scholar
Dempsey, A. G., Sulkowski, M. L., Dempsey, J. and Storch, E. A. (2011). Has cyber technology produced a new group of peer aggressors?Cyberpsychology, Behaviour and Social Networking, 14, 297–302.CrossRefGoogle ScholarPubMed
Denning, D. E. (2001). Activism, hacktivism and cyberterrorism: the internet as a tool for influencing foreign policy. In Arquilla, J. and Ronfeldt, D. F. (eds.), Networks and Netwars: the Future of Terror, Crime and Militancy, Issue 1382. Santa Monica, CA: RAND (pp. 239–88).Google Scholar
Denning, D. E. (2007a). Cyberterrorism – testimony before the Special Oversight Panel on Terrorism Committee on Armed Services, US House of Representatives. In Linden, E. V. (ed.), Focus on Terrorism, Volume 9. New York: Nova Science Publishers (pp. 71–6).Google Scholar
Denning, D. E. (2007b). A view of cyberterrorism five years later. In Himma, K. E. (ed.), Internet Security: Hacking, Counterhacking and Society. Sudbury, MA: Jones and Bartlett Publishers (pp. 123–40).Google Scholar
Denning, D. E. (2010). Terror’s web: how the internet is transforming terrorism. In Jewkes, Y. and Yar, M. (eds.), Handbook of Internet Crime. Cullompton, UK: Willan (pp. 194–213).Google Scholar
Dhamija, R., Tygar, J. D. and Hearst, M. (2006). Why Phishing Works. CHI 2006, 22–7 April. Montreal: CHI.Google Scholar
Dibbell, J. (1993). A rape in cyberspace. Retrieved from .
Dibbell, J. (1998). A rape in cyberspace. Retrieved from .
DiMaggio, C. and Galea, S. (2006). The behavioural consequences of terrorism: a meta-analysis. Academy of Emergency Medicine, 13, 559–66.CrossRefGoogle Scholar
Dimond, J. P., Fiesler, C. and Bruckman, A. S. (2011). Domestic violence and information communication technologies. Interacting with Computers, 23, 413–21.CrossRefGoogle Scholar
Dombrowski, S. C., LeMasney, J. W., Ahia, C. E. and Dickson, S. A. (2004). Protecting children from online sexual predators: technological, psychoeducational and legal considerations. Professional Psychology: Research and Practice, 35, 65–73.CrossRefGoogle Scholar
Donato, L. (2009). An introduction to how criminal profiling could be used as a support for computer hacking investigations. Journal of Digital Forensic Practice, 2, 183–95.CrossRefGoogle Scholar
Douglas, J. and Olshaker, M. (1995). Mind Hunter: Inside the FBI’s Elite Serial Crime Unit. New York: Pocket Books.Google Scholar
Douglas, J. and Olshaker, M. (1999). The Anatomy of Motive. London: Simon and Schuster.Google Scholar
Douglas, J. and Olshaker, M. (2000). The Cases that Haunt Us. London: Pocket Books.Google Scholar
Douglas, J. E., Ressler, R., Burgess, A. and Hartman, C. (1986). Criminal profiling from crime scene analysis. Behavioural Sciences and the Law, 4, 401–21.CrossRefGoogle Scholar
Douglas, K. S. and Dutton, D. G. (2001). Assessing the link between stalking and domestic violence. Aggression and Violent Behaviour, 6, 519–46.CrossRefGoogle Scholar
Dunleavy, P., Margetts, H., Bastow, S. and Tinkler, J. (2005). New public management is dead – long live digital-era governance. Journal of Public Administration Research and Theory, 16, 467–94.CrossRefGoogle Scholar
Dunleavy, P., Margetts, H., Bastow, S. and Tinkler, J. (2006). Digital-era Governance. Oxford University Press.CrossRefGoogle Scholar
Eckersley, R. (2007). Soft law, hard politics, and the Climate Change Treaty. In Reus-Smit, C. (ed.), The Politics of International Law. Cambridge University Press (p. 80).Google Scholar
Edelson, E. (2003). The 419 scam: information warfare on the spam front and a proposal for local filtering. Computers and Security, 22, 392–401.CrossRefGoogle Scholar
Edgar-Nevill, D. (2008). Internet grooming and paedophile crimes. In Bryant, R. (ed.), Investigating Digital Crime. Chichester, UK: Wiley (pp. 195–209).Google Scholar
Edgar-Nevill, D. and Stephens, P. (2008). Countering cybercrime. In Bryant, R. (ed.), Investigating Digital Crime. Chichester, UK: Wiley (pp. 79–96).Google Scholar
Edwards, A. (2002). The moderator as an emerging democratic intermediary: the role of the moderator in internet discussions about public issues. Information Polity, 7, 3–20.Google Scholar
Einhorn, H. J. and Hogarth, R. M. (1978). Confidence in judgement: persistence of the illusion of validity. Psychological Review, 85, 395–416.CrossRefGoogle Scholar
Eke, A. W., Seto, M. C. and Williams, J. (2011). Examining the criminal history and future offending of child pornography offenders: an extended prospective follow-up study. Law and Human Behaviour, 35, 466–78.CrossRefGoogle ScholarPubMed
Elliott, I. A., Beech, A. R., Mandeville-Norden, R. and Hayes, E. (2009). Psychological profiles of internet sexual offenders: comparisons with contact sexual offenders. Sexual Abuse: a Journal of Research and Treatment, 21, 76–92.CrossRefGoogle ScholarPubMed
Elliott, M., Browne, K. and Kilcoyne, J. (1995). Child sexual abuse prevention: what offenders tell us. Child Abuse and Neglect, 19, 579–94.CrossRefGoogle ScholarPubMed
Endrass, J., Urbaniok, F., Hammermeister, L. C., Benz, C., Elbert, T., Laubacher, A. and Rossegger, A. (2009). The consumption of internet child pornography and violent and sex offending. BMC Psychiatry, 9, 43.CrossRefGoogle ScholarPubMed
Evangelista, B. (June 2011). Web users have better social lives, study finds. San Francisco Chronicle. Retrieved from .
Evans, M. (2009). Gordon Brown and public management reform – a project in search of a ‘big idea’. Policy Studies, 30, 1.CrossRefGoogle Scholar
EVElopedia (n.d.). Corporation management guide. Retrieved from .
Eysenck, H. J. (1977). Crime and Personality (3rd edn). London: Routledge.Google Scholar
Eysenck, H. J. (1996). Personality theory and the problem of criminality. In Muncie, J., McLaughlin, E. and Langan, M. (eds.). Criminological Perspectives: a Reader. London: Sage Publications Ltd (pp. 81–98). Reprinted from McGurk, B., Thornton, D. and Williams, M. (eds.), Applying Psychology to Imprisonment (1987). London: HMSO (pp. 30–46).Google Scholar
Eysenck, S. B. G. and Eysenck, H. J. (1970). Crime and personality: an empirical study of the three-factor theory. British Journal of Criminology, 10, 225–39.Google Scholar
Eysenck, S. B. G. and Eysenck, H. J. (1977). Personality differences between prisoners and controls. Psychological Reports, 40, 1,023–8.
Farrell, G. and Pease, K. (2006). Preventing repeat residential burglary victimisation. In Welsh, B. and Farrington, D. (eds.), Preventing Crime: What Works for Children, Offenders, Victims and Places. Dordrecht, The Netherlands: Springer (pp. 161–77).CrossRefGoogle Scholar
Farrington, D. P. (1990). Age, period, cohort and offending. In Gottfredson, D. M. and Clarke, R. V. (eds.), Policy and Theory in Criminal Justice: Contributions in Honour of Leslie T. Wilkins. Aldershot: Avebury (pp. 51–75).Google Scholar
Farrington, D. P., Jolliffe, D., Loeber, R., Stouthamer-Loeber, M. and Kalb, L. M. (2001). The concentration of offenders in families, and family criminality in the prediction of boys’ delinquency. Journal of Adolescence, 24, 579–96.CrossRefGoogle ScholarPubMed
Fauerbach, J. A., Lawrence, J. W., Schmidt, C. W., Munster, A. M. and Costa, P. T. (2000). Personality predictors of injury-related post-traumatic stress disorder. Journal of Nervous and Mental Disease, 188, 510–17.CrossRefGoogle Scholar
Fergusson, D. M., Horwood, L. J. and Nagin, D. S. (2000). Offending trajectories in a New Zealand birth cohort. Criminology, 38, 525–52.CrossRefGoogle Scholar
Festinger, L. (1957). A Theory of Cognitive Dissonance. Stanford, CA: Stanford University Press.Google Scholar
Finch, E. (2007). The problem of stolen identity and the internet. In Jewkes, Y. (ed.), Crime Online. Cullompton, UK: Willan Publishing (pp. 29–43).Google Scholar
Finkelhor, D. (1984). Child Sexual Abuse: New Theory and Research. New York: Free Press.Google Scholar
Finkelhor, D. (1986). A Source Book on Child Sexual Abuse. London: Sage.Google Scholar
Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19, 468–83.CrossRefGoogle Scholar
Finn, J. and Atkinson, T. (2009). Promoting the safe and strategic use of technology for victims of intimate partner violence: evaluation of the technology safety project. Journal of Family Violence, 24, 53–9.CrossRefGoogle Scholar
Finn, J. and Banach, M. (2000). Victimisation online: the down side of seeking human services for women on the internet. Cyberpsychology and Behavior, 3, 243–54.CrossRefGoogle Scholar
Fishbein, M. and Ajzen, I. (1975). Belief, Attitude, Intention and Behaviour: an Introduction to Theory and Research. Boston, MA: Addison-Wesley.Google Scholar
Fötinger, C. S. and Ziegler, W. (2004). Understanding a Hacker’s Mind – a Psychological Insight into the Hijacking of Identities. Danube University Krems, Austria: RSA Security.Google Scholar
Foucault, M. (1965). Madness and Civilization: a History of Insanity in the Age of Reason. New York: Pantheon.Google Scholar
Foucault, M. (1975). Discipline and Punishment. London: Penguin.Google Scholar
Foucault, M. (1978). The History of Sexuality Volume 1: An Introduction. New York: Pantheon.Google Scholar
Frei, A., Erenay, N., Dittmann, V. and Graf, M. (2005). Paedophilia on the internet – a study of 33 convicted offenders in the Canton of Lucerne. Swiss Medical Weekly, 135, 488–94.Google ScholarPubMed
Furnell, S. (2010). Hackers, viruses and malicious software. In Jewkes, Y. and Yar, M. (eds.), Handbook of Internet Crime. Cullompton, UK: Willan Publishing (pp. 173–93).Google Scholar
Gabriel, R., Ferrando, L., Sainz Corton, E., Mingote, C., Garcia-Camba, E., Fernandez-Liria, A. G. and Galea, S. (2007). Psychopathological consequences after a terrorist attack: an epidemiological study among victims, police officers, and the general population. European Psychiatry, 22, 339–46.CrossRefGoogle ScholarPubMed
Garau, M., Slater, M., Vinayagamoorthy, V., Brogni, A., Steed, A. and Sasse, M. A. (2003). The impact of avatar realism and eye gaze control on the perceived quality of communication in a shared immersive virtual environment. Proceedings of the Special Interest Group on Computer–Human Interaction (SIG-CHI) of Association for Computing Machinery (ACM) on Human Factors in Computing Systems, 5–10 Apr., Fort Lauderdale, Florida, pp. 529–36.CrossRef
Garbharran, A. and Thatcher, A. (2011). Modelling social cognitive theory to explain software piracy intention. In Smith, M. J. and Salvendy, G. (eds.), Human Interface and the Management of Information: Interacting with Information: Symposium on Human Interface: HCI International Part 1. Berlin, Germany: Springer-Verlag (pp. 301–10).CrossRefGoogle Scholar
Gasson, M. N. (2010). Human enhancement: could you become infected with a computer virus? IEE International Symposium on Technology and Society, Wollongong, Australia, 7–9 June (pp. 61–8). Retrieved from .
Gleeson, S. (16 July 2008). Freed hacker could work for police. The New Zealand Herald (p. A3).
Goldsmith, J. L. (1998). Against cyberanarchy. University of Chicago Law Review, 65, 1,199.CrossRefGoogle Scholar
Goldstein, A. P. (1996). The Psychology of Vandalism. New York: Plenham Press.CrossRefGoogle Scholar
Goode, S. and Kartas, A. (2012). Exploring software piracy as a factor of video game console adoption. Behaviour and Information Technology, 31, 547–63.CrossRefGoogle Scholar
Gopal, R., Sanders, G. L., Bhattacharjee, S., Agrawal, M. and Wagner, S. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic Commerce, 14, 89–105.CrossRefGoogle Scholar
Gordon, S. (1993). Inside the mind of the dark avenger. Virus News International, January 1993. Abridged version retrieved from .
Gordon, S. (1994). The generic virus writer. Presented at the 4th International Virus Bulletin Conference, Jersey, 8–9 September. Retrieved from .
Gordon, S. (1996). The generic virus writer II. In Proceedings of the 6th International Virus Bulletin Conference, Brighton, UK, 19–20 September. Retrieved from .
Gordon, S. (2000). Virus writers: the end of the innocence? In Proceedings of the 10th International Virus Bulletin Conference, Orlando, FL, 28–29 September. Retrieved from .
Gordon, S. and Ford, R. (2003). Cyberterrorism? Retrieved from the Symantec Security Response White Papers website: .
Gottfredson, M. R. and Hirschi, T. (1990). A General Theory of Crime. Stanford, CA: Stanford University Press.Google Scholar
Greenberg, A. (16 July 2007). The top countries for cybercrime: China overtakes US in hosting web pages that install malicious programs. MSNBC. Retrieved from .
Griffin, D. and Tversky, A. (1992). The weighting of evidence and the determinants of confidence. Cognitive Psychology, 24, 411–35.CrossRefGoogle Scholar
Groth, A. N., Burgess, A. W. and Holmstrom, L. L. (1977). Rape, power, anger and sexuality. American Journal of Psychiatry, 134, 1,239–48.Google ScholarPubMed
Grubb, A. and Harrower, J. (2008). Attribution of blame in cases of rape: an analysis of participant gender, type of rape and perceived similarity to the victim. Aggression and Violent Behaviour, 13, 396–405.CrossRefGoogle Scholar
Gudaitis, T. M. (1998). The missing link in information security: three-dimensional profiling. Cyberpsychology and Behaviour, 1, 321–40.CrossRefGoogle Scholar
Gudjonsson, G. H. and Haward, L. R. C. (1998). Forensic Psychology: A Guide to Practice. New York: Routledge.Google Scholar
Guest, T. (2007). Second Lives: A Journey through Virtual Worlds. London: Random House.Google Scholar
Gunkel, D. J. (2005). Editorial: introduction to hacking and hacktivism. New Media and Society, 7, 595–7.CrossRefGoogle Scholar
Hadnagy, C. (2011). Social Engineering: The Art of Human Hacking. Indianapolis, IN: Wiley Publishing.Google Scholar
Haines, H. H. (1996). Against Capital Punishment: the Anti-death Penalty Movement in America 1972–1994. Oxford University Press.Google Scholar
Häkkänen-Nyholm, H. (2010). Stalking. In Brown, J. M. and Campbell, E. A. (eds.), The Cambridge Handbook of Forensic Psychology. Cambridge University Press (pp. 562–70).CrossRefGoogle Scholar
Hall, G. C. and Hirschman, R. (1991). Towards a Theory of Sexual Aggression: a Quadripartite Model. Journal of Consulting and Clinical Psychology, 59, 662–9.CrossRefGoogle Scholar
Halsey, M. and Young, A. (2002). The meanings of graffiti and municipal administration. The Australian and New Zealand Journal of Criminology, 35, 165–86.CrossRefGoogle Scholar
Hastie, R. (1993). Introduction. In Hastie, R. (ed.), Inside the Juror: the Psychology of Juror Decision Making. Cambridge University Press (3–41).CrossRefGoogle Scholar
Hazler, R. J. (1996). Breaking the Cycle of Violence: Interventions for Bullying and Victimization. Bristol, PA: Accelerated Development.Google Scholar
Henderson, S. and Gilding, M. (2004). ‘I’ve never clicked this much with anyone in my life’: trust and hyperpersonal communication in online friendships. New Media and Society, 6, 487–506.CrossRefGoogle Scholar
Higgins, G. E. (2007). Digital piracy: an examination of low self-control and motivation using short-term longitudinal data. Cyberpsychology and Behavior, 10, 523–9.CrossRefGoogle ScholarPubMed
Higgins, G. E., Fell, B. D. and Wilson, A. L. (2006). Digital piracy: assessing the contributions of an integrated self-control theory and social learning theory. Criminal Justice Studies: a Critical Journal of Crime, Law and Society, 19, 3–22.CrossRefGoogle Scholar
Higgins, G. E., Marcum, C. D., Freiburger, T. L. and Ricketts, M. L. (2012). Examining the role of peer influence and self-control on downloading behaviour. Deviant Behaviour, 33, 412–23.CrossRefGoogle Scholar
Higgins, G. E., Wolfe, S. E. and Marcum, C. D. (2008). Music piracy and neutralization: a preliminary trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, 2, 324–36.Google Scholar
Hill, C. W. (2007). Digital piracy: causes, consequences and strategic responses. Asia Pacific Journal of Management, 24, 9–25.CrossRefGoogle Scholar
Hillberg, T., Hamilton-Giachritsis, C. and Dixon, L. (2011). Review of meta-analysis on the association between child sexual abuse and adult mental health difficulties: a systematic approach. Trauma Violence and Abuse, 12, 38–49.CrossRefGoogle ScholarPubMed
Hinduja, S. (2007). Neutralization theory and online software piracy: an empirical analysis. Ethics and Information Technology, 9, 187–204.CrossRefGoogle Scholar
Hinduja, S. and Patchin, J. W. (2008). Cyberbullying: an exploratory analysis of factors related to offending and victimisation. Deviant Behaviour, 29, 129–56.CrossRefGoogle Scholar
Hinduja, S. and Patchin, J. W. (2009). Bullying beyond the Schoolyard: Preventing and Responding to Cyberbullying. Thousand Oaks, CA: Sage Publications (Corwin Press).Google Scholar
Hinduja, S. and Patchin, J. W. (2010a). Bullying, cyberbullying and suicide. Archives of Suicide Research, 14, 206–21.CrossRefGoogle ScholarPubMed
Hinduja, S. and Patchin, J. W. (2010b). Cyberbullying Fact Sheet: Identification, Prevention, and Response. Cyberbullying Research Center. Retrieved from .
Hines, D. and Finkelhor, D. (2007). Statutory sex crime relationships between juveniles and adults: a review of social scientific research. Aggression and Violent Behaviour, 12, 300–14.CrossRefGoogle Scholar
Hof, R. (2006). Real Threat to Virtual Goods in Second Life. Retrieved from .
Holt, T. J. and Graves, D. C. (2007). A qualitative analysis of advance fee fraud e-mail schemes. International Journal of Cyber Criminology, 1 (1). Retrieved from .Google Scholar
Holtfreter, K., Reisig, M. D., Piquero, N. L. and Piquero, A. R. (2010). Low self-control and fraud: offending, victimization and their overlap. Criminal Justice and Behavior, 37, 188–203.CrossRefGoogle Scholar
Home Office (2005). Fraud and technology crimes: findings from the 2002/03 British Crime Survey and 2003 Offending, Crime and Justice Survey (Home Office Online Report 34/05). Retrieved from .
Hood, C. (1983). The Tools of Government. Basingstoke, UK: Macmillan.CrossRefGoogle Scholar
Hood, S. K. and Carter, M. M. (2008). A preliminary examination of trauma history, locus of control, and PTSD symptom severity in African American Women. The Journal of Black Psychology, 34, 179–91.CrossRefGoogle Scholar
Horgan, J. (2003a). The search for the terrorist personality. In Silke, A. (ed.), Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences. Chichester, UK: John Wiley and Sons.Google Scholar
Horgan, J. (2003b). Leaving terrorism behind: an individual perspective. In Silke, A. (ed.), Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences. Chichester, UK: John Wiley and Sons.Google Scholar
Horgan, J. (2005). The Psychology of Terrorism. Abingdon, UK: Routledge.CrossRefGoogle Scholar
Horgan, J. (2008). From profiles to pathways and roots to routes: perspectives from psychology on radicalization into terrorism. The Annals of the American Academy of Political and Social Science, 618, 80–94.CrossRefGoogle Scholar
Horgan, J. and Taylor, M. (2001). The making of a terrorist. Jane’s Intelligence Review, 13, 16–18.Google Scholar
Howitt, D. (2009). Introduction to Forensic and Criminal Psychology (3rd edn). Harlow, UK: Pearson Education.Google Scholar
Hoyle, C. and Zedner, L. (2007). Victims, victimization, and criminal justice. In Maguire, M., Morgan, R. and Reiner, R. (eds.), The Oxford Handbook of Criminology (4th edn). Oxford University Press (pp. 461–95).Google Scholar
Hsu, J. and Shiue, C. (2008). Consumers’ willingness to pay for non-pirated software. Journal of Business Ethics, 81, 715–32.CrossRefGoogle Scholar
Huang, D., Rau, P. P. and Salvendy, G. (2010). Perception of information security. Behaviour and Information Technology, 29, 221–32.CrossRefGoogle Scholar
Humphreys, S. (2008). Ruling the virtual world – governance in massively multiplayer online games. European Journal of Cultural Studies, May, 11 (2), 149–71.CrossRefGoogle Scholar
Hunter, A. (2009). High-tech rascality: Asperger’s syndrome, hackers, geeks, and personality types in the ICT industry. New Zealand Sociology, 24, 39–61.Google Scholar
Huss, M. T. (2009). Forensic Psychology: Research, Clinical Practice, and Applications. Chichester, UK: Wiley-Blackwell.Google Scholar
Ingram, J. and Hinduja, S. (2008). Neutralizing music piracy: an empirical examination. Deviant Behaviour, 29, 334–66.CrossRefGoogle Scholar
International Telecommunication Union (2011). The World in 2011: ICT Facts and Figures. Retrieved from .
Jagatic, T., Johnson, N., Jakobsson, M. and Menczer, F. (2006). Social phishing. Communications of the Association for Computing Machinery (ACM), 50 (10), 94–100.CrossRefGoogle Scholar
Jahankhani, H. and Al-Nemrat, A. (2010). Examination of cyber-criminal behaviour. International Journal of Information Science and Management, Special Issue. Jan/Jun 2010. Retrieved from .
Jaishkankar, K. (2008). Identity related crime in cyberspace: examining phishing and its impact. International Journal of Cyber Criminology, 2, 10–15.Google Scholar
Jambon, M. M. and Smetana, J. G. (2012). College students’ moral evaluations of illegal music downloading. Journal of Applied Developmental Psychology, 33, 31–9.CrossRefGoogle Scholar
Jamel, J. (2008). Crime and its causes. In Davies, G., Hollin, C. and Bull, R. (eds.), Forensic Psychology. Chichester, UK: John Wiley and Sons Ltd (pp. 3–28).Google Scholar
Jay, E. (2007). Rape in cyberspace. Retrieved from .
Jewkes, Y. (2010). Public policing and internet crime. In Jewkes, Y. and Yar, M. (eds.), Handbook of Internet Crime. Cullompton, UK: Willan Publishing (pp. 525–45).Google Scholar
Jewkes, Y. and Yar, M. (2010). Introduction: the internet, cybercrime and the challenges of the twenty-first century. In Jewkes, Y. and Yar, M. (eds.), Handbook of Internet Crime. Cullompton, UK: Willan Publishing (pp. 1–15).Google Scholar
Johnson, D. and Post, D. (1996). Law and borders – the rise of law in cyberspace. The Stanford Law Review, 48, 1,367–402.CrossRefGoogle Scholar
Johnston, A. C. and Warkentin, M. (2010). Fear appeals and information security behaviours: an empirical study. MIS Quarterly, 34 (3), 549–66.CrossRefGoogle Scholar
Jolliffe, D. and Farrington, D. P. (2004). Empathy and offending: a systematic review and meta-analysis. Aggression and Violent Behaviour, 9, 441–76.CrossRefGoogle Scholar
Jones, T. (2003). Child abuse or computer crime? The proactive approach. In MacVean, A. and Spindler, P. (eds.), Policing Paedophiles on the Internet. Bristol: John Grieve Centre for Policing and Community Safety, The New Police Bookshop.Google Scholar
Joseph, J. (2003). Cyberstalking: an international perspective. In Jewkes, Y. (ed.), Dot.cons: Crime, Deviance and Identity on the Internet. Cullompton, UK: Willan Publishing (pp. 105–25).Google Scholar
Josman, N., Somer, E., Reisberg, A., Weiss, P. L., Garcia-Palacios, A. and Hoffman, H. (2006). Busworld: designing a virtual environment for post-traumatic stress disorder in Israel: a protocol. CyberPsychology and Behavior, 9, 241–4.CrossRefGoogle ScholarPubMed
Jouriles, E. N., McDonald, R., Kullowatz, A., Rosenfield, D., Gomez, G. S. and Cuevas, A. (2009). Can virtual reality increase the realism of role plays used to teach college women sexual coercion and rape-resistance skills?Behaviour Therapy, 40, 337–45.CrossRefGoogle ScholarPubMed
Jung, Y. (2008). Influence of sense of presence on intention to participate in a virtual community. Proceedings of the 41st Hawaii International Conference on System Sciences.CrossRef
Kabay, M. E. (1998). ICSA White Paper on Computer Crime Statistics. Retrieved from .
Kahn, J. (April 2004). The homeless hacker v. the New York Times. Wired. Retrieved from .
Kamphuis, J. H., Emmelkamp, P. M. G. and Bartak, A. (2003). Individual differences in post-traumatic stress following post-intimate stalking: stalking severity and psychosocial variables. British Journal of Clinical Psychology, 42, 145–56.CrossRefGoogle ScholarPubMed
Katsh, E. (2007). Online dispute resolution: some implications for the emergence of law in cyberspace. International Review of Law, Computers and Technology, 21, 97–107.CrossRefGoogle Scholar
Kellen, K. (1982). On Terrorism and Terrorists: a Rand Note N-1942-RC. Santa Monica, CA: Rand Corporation.Google Scholar
Kenny, M. C. and McEachern, A. G. (2000). Racial, ethnic and cultural factors of childhood sexual abuse: a selected review of the literature. Clinical Psychology Review, 20, 905–22.CrossRefGoogle ScholarPubMed
Kilger, M., Arkin, O. and Stutzman, J. (2004). Profiling. In The Honeynet Project (ed.), Know Your Enemy: Learning about Security Threats (2nd edn). Boston, MA: Addison-Wesley Professional (pp. 505–56). Retrieved from .Google Scholar
Killias, M., Scheidegger, D. and Nordenson, P. (2009). Effects of increasing the certainty of punishment: a field experiment on public transportation. European Journal of Criminology, 6, 387–400.CrossRefGoogle Scholar
Kilpatrick, R. (1997). Joy-riding: an addictive behavior. In Hodge, J. E., McMurran, M. and Hollin, C. R. (eds.), Addicted to Crime?Chichester, UK: Wiley (pp. 165–90).Google Scholar
Kirwan, G. H. (June 2006). An identification of demographic and psychological characteristics of computer hackers using triangulation. PhD Thesis, Institute of Criminology, School of Law, College of Business and Law, University College Dublin.
Kirwan, G. H. (2009a). Victim Facilitation and Blaming in Cybercrime Cases. Proceedings of Cyberspace 2009. Brno, Czech Republic. 20–21 November.
Kirwan, G. H. (2009b). Presence and the Victims of Crime in Online Virtual Worlds. Proceedings of Presence 2009 – the 12th Annual International Workshop on Presence, International Society for Presence Research, 11–13 November, Los Angeles, California. Retrieved from PROCEEDINGS ISBN: 978-0-9792217-3-6.
Kline, P. (1987). Psychoanalysis and crime. In McGurk, B. J., Thornton, D. M. and Williams, M. (eds.), Applying Psychology to Imprisonment: Theory and Practice. London: HMSO.Google Scholar
Klinger, D. A. (2001). Suicidal intent in victim-precipitated homicide: insights from the study of ‘suicide-by-cop’. Homicide Studies, 5 (3), 206–26.CrossRefGoogle Scholar
Knight, W. (18 August 2005). Computer characters mugged in virtual crime spree. New Scientist. Retrieved from .Google Scholar
Kohlberg, L. (1969). State and sequence: the cognitive-developmental approach to socialization. In Goslin, D. A. (ed.), Handbook of Socialization Theory and Research. Chicago, IL: Rand McNally.Google Scholar
Kowalski, R. M. and Limber, S. P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41, S22–30.CrossRefGoogle ScholarPubMed
Kramer, S. and Bradfield, J. C. (2010). A general definition of malware. Journal in Computer Virology, 6, 105–14.CrossRefGoogle Scholar
Krone, T. (2004). A Typology of Online Child Pornography Offending. Trends and Issues in Crime and Criminal Justice, No. 279. Canberra: Australian Institute of Criminology. Retrieved from .Google Scholar
Kruglanski, A. W. and Fishman, S. (2006). The psychology of terrorism: ‘syndrome’ versus ‘tool’ perspectives. Terrorism and Political Violence, 18, 193–215.CrossRefGoogle Scholar
Lafrance, Y. (2004). Psychology: a previous security tool. Retrieved from .
Lam, A., Mitchell, J. and Seto, M. C. (2010). Lay perceptions of child pornography offenders. Canadian Journal of Criminology and Criminal Justice, 52, 173–201.CrossRefGoogle Scholar
Langos, C. (2012). Cyberbullying: the challenge to define. Cyberpsychology, Behavior and Social Networking, 15, 285–9.CrossRefGoogle Scholar
Lanning, K. (2001a). Child molesters and cyber paedophiles: a behavioural perspective. In Hazelwood, R. and Burgess, A. W. (eds.), Practical Aspects of Rape Investigation: A Multidisciplinary Approach (3rd edn). Boca Raton, FL: CRC Press (pp. 199–220).Google Scholar
Lanning, K. (2001b). Child Molesters: A Behavioral Analysis (4th edn). Washington, DC: National Center for Missing and Exploited Children. Retrieved from .Google Scholar
LaRose, R. and Kim, J. (2007). Share, steal or buy? A social cognitive perspective of music downloading. Cyberpsychology and Behavior, 10, 267–77.CrossRefGoogle ScholarPubMed
LaRose, R., Lai, Y. J., Lange, R., Love, B. and Wu, Y. (2005). Sharing or piracy? An exploration of downloading behaviour. Journal of Computer-Mediated Communication, 11, 1–21.CrossRefGoogle Scholar
LaRose, R., Rifon, N. J. and Enbody, R. (March 2008). Promoting personal responsibility for internet safety. Communications of the ACM, 51 (3), 71–6.CrossRefGoogle Scholar
Laulik, S., Allam, J. and Sheridan, L. (2007). An investigation into maladaptive personality functioning in Internet sex offenders. Psychology, Crime and Law, 13, 523–35.CrossRefGoogle Scholar
Lawrence, J. W. and Fauerbach, J. A. (2003). Personality, coping, chronic stress, social support and PTSD symptoms among adult burn survivors: a path analysis. Journal of Burn Care and Rehabilitation, 24, 63–72.CrossRefGoogle ScholarPubMed
Lee, D., Larose, R. and Rifon, N. (2008). Keeping our network safe: a model of online protection behaviour. Behaviour and Information Technology, 27, 445–54.CrossRefGoogle Scholar
Lee, Y. and Larson, K. R. (2009). Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software. European Journal of Information Systems, 18, 177–87.CrossRefGoogle Scholar
Leman-Langlois, S. (2008). Introduction: technocrime. In Leman-Langlois, S. (ed.), Technocrime: Technology, Crime and Social Control. Cullompton, UK: Willan.Google Scholar
Lenhart, A. (2007). Pew internet and American life project: cyberbullying and online teens. Retrieved from .
Leonard, M. M. (2010). ‘I did what I was directed to do but he didn’t touch me’: the impact of being a victim of internet offending. Journal of Sexual Aggression, 16, 249–56.CrossRefGoogle Scholar
Lessig, L. (2000). Code and Other Laws of Cyberspace. Princeton, NJ: Princeton University Press.Google Scholar
Levi, M. (2001). ‘Between the risk and the reality falls the shadow’: evidence and urban legends in computer fraud (with apologies to T. S. Eliot). In Wall, D. (ed.), Crime and the Internet. London, New York: Routledge (pp. 44–58).Google Scholar
Levine, S. Z. (2008). Using intelligence to predict subsequent contacts with the criminal justice system for sex offences. Personality and Individual Differences, 44, 453–63.CrossRefGoogle Scholar
Levy, S. (1984). Hackers: Heroes of the Computer Revolution. London: Penguin Books.Google Scholar
Li, Q. (2007). New bottle but old wine: a research of cyberbullying in schools. Computers in Human Behavior, 23, 1,777–91.CrossRefGoogle Scholar
Liao, C., Lin, H. N. and Liu, Y. P. (2010). Predicting the use of pirated software: a contingency model integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91, 237–52.CrossRefGoogle Scholar
Liebowitz, S. J. (2006). File sharing: creative destruction or just plain destruction?The Journal of Law and Economics, 49, 1–28.CrossRefGoogle Scholar
Lindsay, M. and Krysik, J. (2012). Online harassment among college students. Information, Communication and Technology, 15, 703–19.Google Scholar
Lininger, R. and Vines, R. D. (2005). Phishing: Cutting the Identity Theft Line. Indianapolis, IN: Wiley Publishing Inc.Google Scholar
Livingstone, S. (2009). Children and the Internet: Great Expectations, Challenging Realities. Cambridge, UK: Polity.Google Scholar
Locicero, A. and Sinclair, S. J. (2008). Terrorism and terrorist leaders: insights from developmental and ecological psychology. Studies in Conflict and Terrorism, 31, 227–50.CrossRefGoogle Scholar
Lombroso, C. and Ferrero, W. (1895). The Female Offender. London: Fisher Unwin.CrossRefGoogle Scholar
Lopez-Leon, M. and Rosner, R. (2010). Intellectual quotient of juveniles evaluated in a forensic psychiatry clinic after committing a violent crime. Journal of Forensic Sciences, 55, 229–31.CrossRefGoogle Scholar
Lyndon, A., Bonds-Raacke, J. and Cratty, A. D. (2011). College students’ Facebook stalking of ex-partners. Cyberpsychology, Behaviour and Social Networking, 14, 711–16.CrossRefGoogle ScholarPubMed
Lynn, R. (2007). Virtual rape is traumatic, but is it a crime? Retrieved from .
MacKinnon, R. C. (1997). Punishing the persona: correctional strategies for the virtual offender. In Jones, S. (ed.), Virtual Culture: Identity and Communication in Cybersociety. London: Sage (pp. 206–35).Google Scholar
Macmillan Dictionary (n.d.). ‘Cybercrime’ definition. Retrieved from .
MacSíthigh, D. (2008). The mass age of internet law. Information and Communication Technology Law, 17, 79–94.CrossRefGoogle Scholar
Maghaireh, A. (2008). Shariah law and cyber-sectarian conflict: how can Islamic criminal law respond to cyber crime?International Journal of Cyber-Criminology, 2, 337–45.Google Scholar
Maguire, M., Morgan, R. and Reiner, R. (2007). The Oxford Handbook of Criminology (4th edn.). Oxford University Press.Google Scholar
Maikovich, A. K., Koenen, K. C. and Jaffee, S. R. (2009). Posttraumatic stress symptoms and trajectories in child sexual abuse victims: an analysis of sex differences using the national survey of child and adolescent well-being. Journal of Abnormal Child Psychology, 37, 727–37.CrossRefGoogle ScholarPubMed
MaleskyJr, L. A. (2007). Predatory online behaviour: modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the internet. Journal of Child Sexual Abuse, 16, 23–32.CrossRefGoogle Scholar
Malin, J. and Fowers, B. J. (2009). Adolescent self-control and music and movie piracy. Computers in Human Behaviour, 25, 718–22.CrossRefGoogle Scholar
Mancheno, C. (11 April 2010). With new vest, players feel the game. The Daily Pennsylvanian. Retrieved from .Google Scholar
Maniglio, R. (2009). The impact of child sexual abuse on health: a systematic review of reviews. Clinical Psychology Review, 29, 647–57.CrossRefGoogle ScholarPubMed
Marmar, C. R., Metzler, T. J., Otte, C., McCaslin, S., Inslicht, S. and Haase, C. H. (2007). The peritraumatic dissociative experiences questionnaire: an international perspective. In Wilson, J. P. and So-kum Tang, C. (eds.), Cross-cultural Assessment of Psychological Trauma and PTSD. New York: Springer (pp. 197–217).CrossRefGoogle Scholar
Marshall, A. and Stephens, P. (2008). Identity and identity theft. In Bryant, R. (ed.), Investigating Digital Crime. Chichester, UK: John Wiley and Sons (pp. 179–93).Google Scholar
Martin, G., Richardson, A., Bergen, H., Roeger, L. and Allison, S. (2003). Family and individual characteristics of a community sample of adolescents who graffiti. Presented at the Graffiti and Disorder Conference, Brisbane, Australia, 18–19 August. Retrieved from .Google Scholar
Maruna, S. and Mann, R. E. (2006). A fundamental attribution error? Rethinking cognitive distortions. Legal and Criminological Psychology, 11, 155–77.CrossRefGoogle Scholar
Massimi, M., Odom, W., Kirk, D. and Banks, R. (2010). HCI at the end of life: understanding death, dying and the digital. Proceedings of CHI (Computer Human Interaction) Conference on Human Factors in Computing Systems, Atlanta, GA, 10–15 Apr. (pp. 4,477–80).CrossRef
Mazzarella, S. R. (2005). Girl Wide Web: Girls, the Internet, and the Negotiation of Identity. New York: Peter Lang.Google Scholar
McAfee–NCSA (2007). McAfee-NCSA Online Safety Study – Newsworthy Analysis, October 2007. Retrieved from .
McArthur, S. (2008). Global governance and the rise of NGOs. Asian Journal of Public Affairs, 2 (1), 54–67.Google Scholar
McCauley, C. and Moskalenko, S. (2008). Mechanisms of political radicalisation: pathways toward terrorism. Terrorism and Political Violence, 20, 415–33.CrossRefGoogle Scholar
McDonald, H. (2 August 2009). MP calls on YouTube to remove Real IRA propaganda videos: ‘Cyber-terrorism’ films of dissident republicans could be banned from site. The Observer Supplement. The Guardian Newspaper. Retrieved from .Google Scholar
McFarlane, L. and Bocij, P. (2003). An exploration of predatory behaviour in cyberspace: towards a typology of cyber stalkers. First Monday, 8 (9). Retrieved from .CrossRefGoogle Scholar
McGhee, I., Bayzick, J., Kontostathis, A., Edwards, L., McBride, A. and Jakubowski, E. (2011). Learning to identify internet sexual predation. International Journal of Electronic Commerce, 15, 103–22.CrossRefGoogle Scholar
McGuire, J. (1997). ‘Irrational’ shoplifting and models of addiction. In Hodge, J. E., McMurran, M. and Hollin, C. R. (eds), Addicted to Crime?Chichester, UK: Wiley (pp. 207–31).Google Scholar
McKinnon, R. C. (1997). Punishing the persona: correctional strategies for the virtual offender. In Jones, S. (ed.), Virtual Culture: Identity and Communication in Cybersociety. Thousand Oaks, CA: Sage (pp. 206–35).Google Scholar
McQuade, S. C. (III) (2006). Understanding and Managing Cybercrime. Boston, MA: Allyn and Bacon.Google Scholar
Meadows, M. S. (2008). I, Avatar: the Culture and Consequences of Having a Second Life. Berkeley, CA: New Riders.Google Scholar
Mears, D. P., Mancini, C., Gertz, M. and Bratton, J. (2008). Sex crimes, children and pornography: public views and public policy. Crime and Delinquency, 54, 532–59.CrossRefGoogle Scholar
Meier, M. H., Slutske, W. S., Arndt, S. and Cadoret, R. J. (2008). Impulsive and callous traits are more strongly associated with delinquent behavior in higher risk neighborhoods among boys and girls. Journal of Abnormal Psychology, 117, 377–85.CrossRefGoogle ScholarPubMed
Meinel, C. P. (1998). How hackers break in. . . and how they are caught. Scientific American, 279, 98–105.CrossRefGoogle Scholar
Melander, L. A. (2010). College students’ perceptions of intimate partner cyber harassment. Cyberpsychology, Behavior and Social Networking, 13, 263–8.CrossRefGoogle ScholarPubMed
Meloy, J. R. (1998). The psychology of stalking. In Meloy, J. R. (ed.), The Psychology of Stalking: Clinical and Forensic Perspectives. London: Academic Press (pp. 1–23).Google Scholar
Meloy, J. R. (2000). Stalking (obsessional following). In Meloy, J. R. (ed.). Violence, Risk and Threat Assessment. San Diego, CA: Specialised Training Services (pp. 167–91).Google Scholar
Menesini, E., Nocentini, A. and Calussi, P. (2011). The measurement of cyberbullying: dimensional structure and relative item severity and discrimination. Cyberpsychology, Behavior and Social Networking, 14, 267–74.CrossRefGoogle ScholarPubMed
Merari, A. (2007). Psychological aspects of suicide terrorism. In Bongar, B., Brown, L. M., Beutler, L. E., Brecenridge, J. N. and Zimbardo, P. B. (eds.), Psychology of Terrorism. New York: Oxford University Press (pp. 101–15).Google Scholar
Mesch, G. S. (2009). Parental mediation, online activities and cyberbullying. Cyberpsychology and Behaviour, 12, 387–93.CrossRefGoogle ScholarPubMed
Microsoft (10 February 2009). 29% of European teenagers are victims of online bullying. Retrieved from .
Middleton, D. (2004). Current treatment approaches. In Calder, M. (ed.), Child Sexual Abuse and the Internet: Tackling the New Frontier. Lyme Regis, UK: Russell House Publishing (pp. 99–112).Google Scholar
Middleton, D. (2008). From research to practice: the development of the internet sex offender treatment programme (i-SOTP). Irish Probation Journal, 5, 49–64.Google Scholar
Middleton, D. (2009). Internet sex offenders. In Beech, A. R., Craig, L. and Browne, K. D. (eds.), Assessment and Treatment of Sex Offenders: a Handbook. Chichester, UK: Wiley (pp. 199–215).Google Scholar
Middleton, D., Elliott, I. A., Mandeville-Norden, R. and Beech, A. R. (2006). An investigation into the applicability of the Ward and Siegert pathways model of child sexual abuse with internet offenders. Psychology, Crime and Law, 12, 589–603.CrossRefGoogle Scholar
Middleton, D., Mandeville-Norden, R. and Hayes, E. (2009). Does treatment work with internet sex offenders? Emerging findings from the internet sex offender treatment programme (i-SOTP). Journal of Sexual Aggression, 15, 5–19.CrossRefGoogle Scholar
Mintz, A. (2012). Web of Deceit: Misinformation and Manipulation in the Age of Social Media. Medford, NJ: Information Today.Google Scholar
Mishna, F., Cook, C., Saini, M., Wu, M. and MacFadden, R. (2011). Interventions to prevent and reduce cyber abuse of youth: a systematic review. Research on Social Work Practice, 21, 5–14.CrossRefGoogle Scholar
Mishra, A. and Mishra, D. (2008). Cyber stalking: a challenge for web security. In Janczewski, L. J. and Colarik, A. M. (eds.), Cyber Warfare and Cyber Terrorism. Hershey, PA: Information Science Reference (pp. 216–25).Google Scholar
Mitchell, K. J., Finkelhor, D., Jones, L. M. and Wolak, J. (2010). Use of social networking sites in online sex crimes against minors: an examination of national incidence and means of utilization. Journal of Adolescent Health, 47 (2), 183–90.CrossRefGoogle ScholarPubMed
Mitchell, K. J., Finkelhor, D. and Wolak, J. (2007). Youth internet users at risk for the most serious online sexual solicitations. American Journal of Preventative Medicine, 32, 532–7.CrossRefGoogle ScholarPubMed
Mitchell, K. J., Wolak, J. and Finkelhor, D. (2005). Police posing as juveniles online to catch sex offenders: is it working?Sexual Abuse: A Journal of Research and Treatment, 17, 241–67.CrossRefGoogle ScholarPubMed
Mitnick, K. D. and Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. Indianapolis, IN: Wiley Publishing Inc.Google Scholar
Mitnick, K. D. and Simon, W. L. (2005). The Art of Intrusion: the Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. Indianapolis, IN: Wiley Publishing Inc.Google Scholar
Mizrach, S. (n.d.). Is there a hacker ethic for 90s hackers? Retrieved from .
Moore, R. and McMullan, E. C. (2009). Neutralizations and rationalizations of digital piracy: a qualitative analysis of university students. International Journal of Cyber Criminology, 3, 441–51.Google Scholar
Moriarty, L. J. and Freiberger, K. (2008). Cyberstalking: utilising newspaper accounts to establish victimization patterns. Victims and Offenders, 3, 131–41.CrossRefGoogle Scholar
Morison, J. and Newman, D. (2001). On-line citizenship: consultation and participation in New Labour’s Britain and beyond. International Review of Law, Computers and Technology, 15, 171–94.CrossRefGoogle Scholar
Morris, R. G. and Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: a multi-theoretical exploration among college undergraduates. Criminal Justice Review, 34, 173–95.CrossRefGoogle Scholar
Morris, R. G. and Higgins, G. E. (2010). Criminological theory in the digital age: the case of social learning theory and digital piracy. Journal of Criminal Justice. Retrieved from .CrossRefGoogle Scholar
Mullen, P. E., Pathé, M., Purcell, R. and Stuart, G. W. (1999). Study of stalkers. American Journal of Psychiatry, 156, 1,244–9.Google ScholarPubMed
Muncie, J., McLaughlin, E. and Langan, M. (1996). Criminological Perspectives: a Reader. London: Sage Publications Ltd.Google Scholar
Murphy, C. (June 2004). Inside the mind of the hacker. Accountancy Ireland, 36, 12.Google Scholar
Murray, C. D., Fox, J. and Pettifer, S. (2007). Absorption, dissociation, locus of control and presence in virtual reality. Computers in Human Behavior, 23, 1,347–54.CrossRefGoogle Scholar
Nandedkar, A. and Midha, V. (2012). It won’t happen to me: an assessment of optimism bias in music piracy. Computers in Human Behavior, 28, 41–8.CrossRefGoogle Scholar
Nathanson, H. S. (1995). Strengthening the criminal jury: long overdue. Criminal Law Quarterly, 38, 217–48.Google Scholar
National Fraud Authority (March 2012). Annual fraud indicator. Retrieved from .
Nelson, B., Choi, R., Iacobucci, M., Mitchell, M. and Gagnon, G. (August 1999). Cyberterror: Prospects and Implications. Monterey, CA: Naval Postgraduate School, Center for the Study of Terrorism and Irregular Warfare.CrossRefGoogle Scholar
New World Encyclopedia (n.d.). ‘Cybercrime’ definition. Retrieved from .
Ng, B. Y., Kankanhalli, A. and Xu, Y. C. (2009). Studying users’ computer security behaviour: a health belief perspective. Decision Support Systems, 46, 815–25.CrossRefGoogle Scholar
Ng, B. Y. and Rahim, M. A. (2005). A Socio-Behavioral Study of Home Computer Users’ Intention to Practice Security. The Ninth Pacific Asia Conference on Information Systems, 7–10 July, Bangkok, Thailand.Google Scholar
Nhan, J., Kinkade, P. and Burns, R. (2009). Finding a pot of gold at the end of an internet rainbow: further examination of fraudulent email solicitation. International Journal of Cyber Criminology, 3, 452–75.Google Scholar
Nuñez, J. (2003). Outpatient treatment of the sexually compulsive hebophile. Sexual Addiction and Compulsivity, 10, 23–51.Google Scholar
Nykodym, N., Taylor, R. and Vilela, J. (2005). Criminal profiling and insider cybercrime. Computer Law and Security Report, 21, 408–14.CrossRefGoogle Scholar
Oberholzer-Gee, F. and Strumpf, K. S. (2007). The effect of file sharing on record sales: an empirical analysis. Journal of Political Economy, 115, 1–42.CrossRefGoogle Scholar
O’Brien, M. D. and Webster, S. D. (2007). The construction and preliminary validation of the Internet Behaviours and Attitudes Questionnaire (IBAQ). Sex Abuse, 19, 237–56.CrossRefGoogle Scholar
O’Connell, M. (2002). The portrayal of crime in the media: does it matter? In O’Mahony, P. (ed.), Criminal Justice in Ireland. Dublin: IPA (pp. 245–67).Google Scholar
O’Connell, R. (2003). A Typology of Child Cyberexploitation and Online Grooming Practices. Lancashire: Cyberspace Research Unit, University of Central Lancashire.Google Scholar
Ollmann, G. (2008). The evolution of commercial malware development kits and colour-by-numbers custom malware. Computer Fraud and Security, 9, 4–7.CrossRefGoogle Scholar
O’Sullivan, P. B. and Flanagin, A. J. (2003). Reconceptualising ‘flaming’ and other problematic messages. New Media and Society, 5, 69–94.CrossRefGoogle Scholar
Palmer, E. J. and Hollin, C. R. (1998). Comparison of patterns of moral development in young offenders and non-offenders. Legal and Criminological Psychology, 3, 225–35.CrossRefGoogle Scholar
Park, A. J., Calvert, T. W., Brantingham, P. L and Brantingham, P. J. (2008). The use of virtual and mixed reality environments for urban behavioural studies. PsychNology Journal, 6, 119–30.Google Scholar
Parsons-Pollard, N. and Moriarty, L. J. (2009). Cyberstalking: utilising what we do know. Victims and Offenders, 4, 435–41.CrossRefGoogle Scholar
Patchin, J. W. and Hinduja, S. (2006). Bullies move beyond the schoolyard: a preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4, 148–69.CrossRefGoogle Scholar
Patchin, J. W. and Hinduja, S. (2011). Traditional and nontraditional bullying among youth: a test of general strain theory. Youth Society, 43, 727–51.CrossRefGoogle Scholar
Payne, J. W. (1980). Information processing theory: some concepts and methods applied to decision research. In Wallsten, T. S. (ed.), Cognitive Processes in Choice and Decision Behaviour. Hillsdale, NJ: Erlbaum.Google Scholar
PC Magazine Encyclopedia (n.d.). ‘Cybercrime’ definition. Retrieved from .
Pearce, C. (2006). Seeing and being seen: presence and play in online virtual worlds. In Online, Offline and the Concept of Presence when Games and VR Collide. Los Angeles, CA: USC Institute for Creative Technologies.Google Scholar
Peitz, M. and Waelbroeck, P. (2006). Why the music industry may gain from free downloading – the role of sampling. International Journal of Industrial Organisation, 24, 907–13.CrossRefGoogle Scholar
Perez, L. M., Jones, J., Englert, D. R. and Sachau, D. (2010). Secondary traumatic stress and burnout among law enforcement investigators exposed to disturbing media images. Journal of Police and Criminal Psychology, 25, 113–24.CrossRefGoogle Scholar
Philips, F. and Morrissey, G. (2004). Cyberstalking and cyberpredators: a threat to safe sexuality on the internet. Convergence, 10, 66–79.CrossRefGoogle Scholar
Piquero, A. R., Moffitt, T. E. and Wright, B. E. (2007). Self control and criminal career dimensions. Journal of Contemporary Criminal Justice, 23, 72–89.CrossRefGoogle Scholar
Piquero, N. L. (2005). Causes and prevention of intellectual property crime. Trends in Organised Crime, 8, 40–61.CrossRefGoogle Scholar
Pittaro, M. L. (2007). Cyber stalking: an analysis of online harassment and intimidation. International Journal of Cyber Criminology, 1, 180–97.Google Scholar
Pittaro, M. L. (2011). Cyber stalking: typology, etiology, and victims. In Jaishankar, K. (ed.), Cyber Criminology: Exploring Internet Crimes and Criminal Behavior. Boca Raton, FL: CRC Press (pp. 277–97).CrossRefGoogle Scholar
Platt, C. (November 1994, Issue 2). Hackers: threat or menace? Wired, 82–8. Retrieved from .
Pollitt, M. M. (October 1997). Cyberterrorism: fact or fancy? Proceedings of the 20th National Information Systems Security Conference, pp. 285–9.
Post, D. (1996). Governing cyberspace. The Wayne Law Review, 43, 155–71.Google Scholar
Post, J. M. (1984). Notes on a psychodynamic theory of terrorist behaviour. Terrorism, 7, 241–56.CrossRefGoogle Scholar
Post, J. M., Ali, F., Henderson, S. W., Shanfield, S., Victoroff, J. and Weine, S. (2009). The psychology of suicide terrorism. Psychiatry: Interpersonal and Biological Processes, 72, 13–31.CrossRefGoogle ScholarPubMed
Post, J. M., Sprinzak, E. and Denny, L. M. (2003). The terrorists in their own words: interviews with thirty-five incarcerated Middle Eastern terrorists. Terrorism and Political Violence, 15, 171–84.CrossRefGoogle Scholar
Power, A. (2010). The online public or cybercitizen. SCRIPTed: a Journal of Law, Technology and Society, 7 (1), 185–95. Retrieved from .Google Scholar
Power, A. and Kirwan, G. (2011). Ethics and legal aspects of virtual worlds. In Dudley, A., Braman, J. and Vincenti, G. (eds.), Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices. Hershey, PA: Information Science Reference (pp. 117–31).Google Scholar
Preuß, J., Furnell, S. M. and Papadaki, M. (2007). Considering the potential of criminal profiling to combat hacking. Journal in Computer Virology, 3, 135–41.CrossRefGoogle Scholar
Princeton University (n.d.). ‘Cybercrime’ definition. Retrieved from .
Privitera, C. and Campbell, M. A. (2009). Cyberbullying: the new face of workplace bullying?CyberPsychology and Behavior, 12, 395–400.CrossRefGoogle ScholarPubMed
Protalinski, E. (2012). Facebook has over 845 million users. ZDNet. Retrieved from .Google Scholar
Quayle, E. and Jones, T. (2011). Sexualised images of children on the internet. Sexual Abuse: a Journal of Research and Treatment, 23, 7–21.CrossRefGoogle Scholar
Quayle, E. and Taylor, M. (2002). Child pornography and the internet: perpetuating a cycle of abuse. Deviant Behaviour: an Interdisciplinary Journal, 23, 365–95.CrossRefGoogle Scholar
Quayle, E., Vaughan, M. and Taylor, M. (2006). Sex offenders, internet child abuse images and emotional avoidance: the importance of values. Aggression and Violent Behavior, 11, 1–11.CrossRefGoogle Scholar
Raine, A. (2008). From genes to brain to antisocial behaviour. Current Directions in Psychological Science, 17, 323–8.CrossRefGoogle Scholar
Rantala, R. R. (2008). Cybercrime against businesses 2005, NCJ 221943. US Department of Justice, Bureau of Justice Statistics. Retrieved from .
Raskauskas, J. and Stoltz, A. D. (2007). Involvement in traditional and electronic bullying among adolescents. Developmental Psychology, 43, 564–75.CrossRefGoogle ScholarPubMed
Rege, A. (2009). What’s love got to do with it? Exploring online dating scams and identity fraud. International Journal of Cyber Criminology, 3, 494–512.Google Scholar
Reijnen, L., Bulten, E. and Nijman, H. (2009). Demographic and personality characteristics of internet child pornography downloaders in comparison to other offenders. Journal of Child Sexual Abuse, 18, 611–22.CrossRefGoogle ScholarPubMed
Rennie, L. and Shore, M. (2007). An advanced model of hacking. Security Journal, 20, 236–251.CrossRefGoogle Scholar
Reyns, B. W. (2010). A situational crime prevention approach to cyberstalking victimization: preventive tactics for internet users and online place managers. Crime Prevention and Community Safety, 12, 99–118.CrossRefGoogle Scholar
Reyns, B. W. and Englebrecht, C. M. (2010). The stalking victim’s decision to contact the police: a test of Gottfredson and Gottfredson’s theory of criminal justice decision making. Journal of Criminal Justice, 38, 998–1,005.CrossRefGoogle Scholar
Reyns, B. W., Henson, B. and Fisher, B. S. (2011). Being pursued online: applying cyberlifestyle routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38, 1,149–69.CrossRefGoogle Scholar
Reyns, B. W., Henson, B. and Fisher, B. S. (2012). Stalking in the twilight zone: extent of cyberstalking victimization and offending among college students. Deviant Behaviour, 33, 1–25.CrossRefGoogle Scholar
Riegel, D. L. (2004). Effects on boy-attracted pedosexual males of viewing boy erotica. Arch. Sex. Behav, 33, 321–3.CrossRefGoogle ScholarPubMed
Riva, G., Mantovani, F., Capideville, C. S., Preziosa, A., Morganti, F., Villani, D., Gaggioli, A., Botella, C. and Alcaniz, M. (2007). Affective interactions using virtual reality: the link between presence and emotions. Cyberpsychology and Behaviour, 10, 45–56.CrossRefGoogle ScholarPubMed
Roberts, L. (2008). Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: an analysis on cyber stalking. International Journal of Cyber Criminology, 2 (1). Retrieved from .Google Scholar
Robertson, K., McNeill, L., Green, J. and Roberts, C. (2012). Illegal downloading, ethical concern and illegal behaviour. Journal of Business Ethics, 108, 215–27.CrossRefGoogle Scholar
Robins, L. N., West, P. A. and Herjanic, B. L. (1975). Arrests and delinquency in two generations: a study of black urban families and their children. Journal of Child Psychology and Psychiatry, 16, 125–40.CrossRefGoogle ScholarPubMed
Rock, P. (2007). Sociological theories of crime. In Maguire, M., Morgan, R. and Reiner, R. (eds.), The Oxford Handbook of Criminology (4th edn). Oxford University Press (pp. 3–42).Google Scholar
Rocque, M., Welsh, B. C. and Raine, A. (2012). Biosocial criminology and modern crime prevention. Journal of Criminal Justice, 40, 306–12.CrossRefGoogle Scholar
Rogers, M. (2000). A New Hacker Taxonomy. Canada: University of Manitoba. Retrieved from .Google Scholar
Rogers, M. (2003). The role of criminal profiling in the computer forensic process. Computers and Security, 22, 292–8.CrossRefGoogle Scholar
Rogers, M. K., Siegfried, K. and Tidke, K. (2006). Self-reported computer criminal behaviour: a psychological analysis. Digital Investigation, 3S, S116–20.CrossRefGoogle Scholar
Rogers, M. K., Smoak, N. and Liu, J. (2006). Self-reported criminal computer behaviour: a big-5, moral choice and manipulative exploitive behaviour analysis. Deviant Behaviour, 27, 1–24.CrossRefGoogle Scholar
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91, 93–114.CrossRefGoogle Scholar
Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation. In Cacioppo, J. and Petty, R. (eds.), Social Psychophysiology. New York: Guildford Press (pp. 153–76).Google Scholar
Rollins, J. and Wilson, C. (2007). Terrorist capabilities for cyberattack: overview and policy issues. In Linden, E. V. (ed.), Focus on Terrorism, Vol. 9. New York: Nova Science Publishers Inc. (pp. 43–63).Google Scholar
Rosenstock, I. M. (1966). Why people use health services. Millbank Memorial Fund Quarterly, 44, 94–124.CrossRefGoogle ScholarPubMed
Rusch, J. J. (21 June 2002). The social psychology of computer viruses and worms. Paper presented at INET 2002, Crystal City, Virginia. Retrieved from .
Sageman, M. (2004). Understanding Terror Networks. Philadelphia, PA: University of Pennsylvania Press.CrossRefGoogle Scholar
Sageman, M. (2008). Leaderless Jihad. Philadelphia, PA: University of Pennsylvania Press.CrossRefGoogle Scholar
Sanders-Reach, C. (6 May 2005). Beware pharming and other new hacker scams. Law Technology News. Retrieved from .
Scarpa, A., Haden, S. C. and Hurley, J. (2006). Community violence victimization and symptoms of post-traumatic stress disorder. Journal of Interpersonal Violence, 21, 446–69.CrossRefGoogle Scholar
Schäfer, A. (2006). Resolving deadlock: why international organisations introduce soft law. European Law Journal, 12, 194–208.CrossRefGoogle Scholar
Schmucker, M. and Lösel, F. (2008). Does sexual offender treatment work? A systematic review of outcome evaluations. Psicothema, 20, 10–19.Google Scholar
Schneider, J. P. (2000). Effects of cybersex addiction on the family: results of a survey. In Cooper, A. (ed.), Cybersex: the Dark Side of the Force. New York: Brunner/Mazel.Google Scholar
Schneier, B. (November/December 2003). IEEE Security and Privacy, 1, 6.
Scully, D. and Marolla, J. (1993). ‘Riding the bull at Gilley’s’: convicted rapists describe the rewards of rape. In Bart, P. and Moran, E. G. (eds.), Violence against Women: the Bloody Footprints. Thousand Oaks, CA: Sage (pp. 26–46).Google Scholar
Senden, L. (2004). Soft Law in European Community Law. Portland, OR: Hart Publishing.Google Scholar
Sentencing Guidelines Council (2007). Sexual Offences Act 2003: Definitive Guideline. April 2007. Retrieved from .
Seto, M. C. and Eke, A. W. (2005). The criminal histories and later offending of child pornography offenders. Sexual Abuse: a Journal of Research and Treatment, 17, 201–10.CrossRefGoogle ScholarPubMed
Shariff, S. (2005). Cyber-dilemmas in the new millennium: school obligations to provide student safety in a virtual school environment. McGill Journal of Education, 40 (3) 457–77.Google Scholar
Shariff, S. and Gouin, R. (2005). Cyber-dilemmas: Gendered Hierarchies, Free Expression and Cyber-safety in Schools. Paper presented at the Oxford Internet Institute (OII), Oxford University Conference on 8 September 2005. Retrieved from .
Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J. and Hutton, S. (2004). Exploring the psychological and somatic impact of identity theft. Journal of Forensic Science, 49, 131–6.Google ScholarPubMed
Sheldon, K. and Howitt, D. (2007). Sex Offenders and the Internet. Chichester, UK: Wiley.Google Scholar
Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. and Downs, J. (2010). Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. Computer Human Interaction (CHI), 10–15 April, Atlanta, Georgia.Google Scholar
Sheridan, L. P. and Davies, G. (2004). Stalking. In Adler, J. R. (ed.), Forensic Psychology: Concepts, Debates and Practice. Cullompton, UK: Willan Publishing (pp. 197–215).Google Scholar
Sheridan, L. P. and Grant, T. (2007). Is cyberstalking different?Psychology, Crime and Law, 13, 627–40.CrossRefGoogle Scholar
Shernoff, D. J., Csikszentmihalyi, M., Schneider, B. and Shernoff, E. S. (2003). Student engagement in high school classrooms from the perspective of flow theory. School Psychology Quarterly, 18, 158–76.CrossRefGoogle Scholar
Shiels, M. (9 April 2009). Spies ‘infiltrate US power grid’. BBC News. Retrieved from .Google Scholar
Shirky, C. (2009). Here Comes Everybody. London: Penguin.Google Scholar
Shirky, C. (2010). Cognitive Surplus. London: Penguin.Google Scholar
Siegfried, K. C., Lovely, R. W. and Rogers, M. K. (2008). Self-reported online child pornography behaviour: a psychological analysis. International Journal of Cyber Criminology, 2, 286–97.Google Scholar
Silbert, M. (1989). The effects on juveniles of being used for pornography and prostitution. In Zillmann, D. and Bryant, J. (eds.), Pornography: Research Advances and Policy Considerations. Hillsdale, NJ: Lawrence Erlbaum.Google Scholar
Silke, A. (1998). Cheshire-cat logic: the recurring theme of terrorist abnormality in psychological research. Psychology, Crime and Law, 4, 51–69.CrossRefGoogle Scholar
Silke, A. (2003). Becoming a terrorist. In Silke, A. (ed.), Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences. Chichester, UK: John Wiley and Sons.CrossRefGoogle Scholar
Silke, A. (2008). Research on terrorism: a review of the impact of 9/11 and the global war on terrorism. Terrorism Informatics, 18, 27–50.CrossRefGoogle Scholar
Sindico, F. (2006). Soft law and the elusive quest for sustainable global governance. Leiden Journal of International Law, 19, 829–46.CrossRefGoogle Scholar
Siponen, M., Vance, A. and Willison, R. (January 2010). New insights for an old problem: explaining software piracy through neutralisation theory. Proceedings of the 43rd Hawaii International Conference on System Sciences, US, 1–10.Google Scholar
Sipress, A. (2007). Does Virtual Reality Need a Sheriff? Retrieved from .
Slaughter, A. (2004). A New World Order. Princeton University Press.Google Scholar
Smith, F. and Bace, R. (2003). A Guide to Forensic Testimony: the Art and Practice of Presenting Testimony as an Expert Technical Witness. Boston: MA: Addison Wesley.Google Scholar
Smith, P., Mahdavi, J., Carvalho, M. and Tippet, N. (July 2006). An investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyberbullying. Retrieved from .
Smith, R. G. (2004). Cyber Crime Sentencing. The Effectiveness of Criminal Justice Responses. Crime in Australia: International Connections. Australian Institute of Criminology International Conference, Hilton on the Park, Melbourne, Australia, 29–30 November 2004.Google Scholar
Smith, R. G. (2007). Biometric solutions to identity-related cybercrime. In Jewkes, Y. (ed.), Crime Online. Cullompton, UK: Willan Publishing (pp. 44–59).Google Scholar
Smith, R. G. (2010). Identity theft and fraud. In Jewkes, Y. and Yar, M. (eds.), Handbook of Internet Crime. Cullompton, UK: Willan Publishing (pp. 173–301).Google Scholar
Socarides, C. W. (2004). The Mind of the Paedophile: Psychoanalytic Perspectives. London: H. Karnac Ltd.Google Scholar
Spinello, R. (2000). Information integrity. In Langford, D. (ed.), Internet Ethics. London: Macmillan Press (pp. 158–80).Google Scholar
Spiro, P. J. (1998). Review: non-state actors in global politics. The American Journal of International Law, 92, 808–11.CrossRefGoogle Scholar
Spitzberg, B. and Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media and Society, 4, 71–92.CrossRefGoogle Scholar
Spitzner, L. (2003). Honeypots: Tracking Hackers. Boston, MA: Addison-Wesley Inc.Google Scholar
Steel, C. M. S. (2009). Child pornography in peer-to-peer networks. Child Abuse and Neglect, 33, 560–8.CrossRefGoogle ScholarPubMed
Steffgen, G., König, A., Pfetsch, J. and Melzer, A. (2011). Are cyberbullies less empathic? Adolescents’ cyberbullying behaviour and empathic responsiveness. Cyberpsychology, Behavior and Social Networking, 14, 643–8.CrossRefGoogle ScholarPubMed
Stephens, P. (2008). IPR and technological protection measures. In Bryant, R. (ed.), Investigating Digital Crime. Chichester, UK: Wiley (pp. 121–31).Google Scholar
Sterling, B. (1992). The Hacker Crackdown: Law and Disorder on the Electronic Frontier. New York: Penguin.Google Scholar
Stohl, M. (2006). Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games?Crime, Law and Social Change, 46, 223–38.CrossRefGoogle Scholar
Strom, P. S. and Strom, R. D. (2005). When teens turn cyberbullies. The Education Digest, 71, 35–41.Google Scholar
Sue, D., Sue, D. W. and Sue, S. (2005). Essentials of Understanding Abnormal Behaviour. Boston: Houghton Mifflin.Google Scholar
Sunstein, C. R. (2007). Republic.com 2.0. Princeton University Press.Google Scholar
Svenson, S. and Maule, A. (1993). Time Pressure and Stress in Human Judgement and Decision Making. New York: Plenum.CrossRefGoogle Scholar
Swire, P. (2005). Elephants and mice revisited: law and choice of law on the Internet. University of Pennsylvania Law Review, 153, 1,975–2,001.CrossRefGoogle Scholar
Sykes, G. and Matza, D. (1957). Techniques of neutralization: a theory of delinquency. American Sociological Review, 22, 664–70.CrossRefGoogle Scholar
Symantec (n.d.). What is Cybercrime? Retrieved from .
Symantec (2011a). Symantec Intelligence Quarterly: Apr.–Jun. 2011. Retrieved from .Google Scholar
Symantec (2011b). Symantec Internet Security Threat Report: Trends for 2010 (Vol. 16, April). Retrieved from .Google Scholar
Talbert, F. S., Braswell, L. C., Albrecht, I. W., Hyer, L. A. and Boudewyns, P. A. (1993). NEO-PI profiles in PTSD as a function of trauma level. Journal of Clinical Psychology, 49, 663–9.3.0.CO;2-A>CrossRefGoogle ScholarPubMed
Tam, L., Glassman, M. and Vandenwauver, M. (2009). The psychology of password management: a tradeoff between security and convenience. Behaviour and Information Technology, 29, 233–44.CrossRefGoogle Scholar
Tapscott, D. (2009). Grown Up Digital. New York: McGraw-Hill.Google Scholar
Tavani, H. T. (2011). Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology (3rd edn). Hoboken, NJ: Wiley.Google Scholar
Taylor, M. (2012). Terrorism. In Davies, G. and Beech, A. (eds.), Forensic Psychology: Crime, Justice, Law, Interventions (2nd edn). Chichester, UK: BPS Blackwell (pp. 207–25).Google Scholar
Taylor, M. and Quayle, E. (1994). Terrorist Lives. London: Brassey’s.Google Scholar
Taylor, M. and Quayle, E. (2003). Child Pornography: an Internet Crime. Hove: Brunner-Routledge.Google Scholar
Taylor, M., Quayle, E. and Holland, G. (2001). Child pornography, the internet and offending, ISUMA. The Canadian Journal of Policy Research, 2, 94–100.Google Scholar
Taylor, P. (1999). Hackers. London: Routledge.CrossRefGoogle Scholar
Taylor, P. A. (2001). Hacktivism: in search of lost ethics? In Wall, D. S. (ed.), Crime and the Internet. London: Routledge (pp. 59–73).Google Scholar
Taylor, P. A. (2003). Maestros or misogynists? Gender and the social construction of hacking. In Jewkes, Y. (ed.), Dot.cons: Crime, Deviance and Identity on the Internet. Cullompton, UK: Willan Publishing (pp. 126–46).Google Scholar
Thompson, C. (8 February 2004). The virus underground. The New York Times Magazine (pp. 30–3, 72, 79–81). Retrieved at .Google Scholar
Thompson, R. (2005). Why spyware poses multiple threats to society. Communications of the ACM, 48, 41–3.CrossRefGoogle Scholar
Torres, A. N., Boccaccini, M. T. and Miller, H. A. (2006). Perceptions of the validity and utility of criminal profiling among forensic psychologists and psychiatrists. Professional Psychology Research and Practice, 37, 51–8.CrossRefGoogle Scholar
Toth, K. and King, B. H. (2008). Asperger’s Syndrome: diagnosis and treatment. American Journal of Psychiatry, 165, 958–63.CrossRefGoogle ScholarPubMed
Trevethan, S. D. and Walker, L. J. (1989). Hypothetical versus real-life moral reasoning among psychopathic and delinquent youth. Development and Psychopathology, 1, 91–103.CrossRefGoogle Scholar
Turgeman-Goldschmidt, O. (2011). Identity construction among hackers. In Jaishankar, K. (ed.), Cyber Criminology: Exploring Internet Crimes and Criminal Behaviour (pp. 31–51). Boca Raton, FL: CRC Press.CrossRefGoogle Scholar
Turkle, S. (1984). The Second Self: Computers and the Human Spirit. New York: Simon and Schuster Inc.Google Scholar
Twyman, K., Saylor, C., Taylor, L. A. and Comeaux, C. (2009). Comparing children and adolescents engaged in cyberbullying to matched peers. Cyberpsychology and Behaviour, 12, 1–5.Google Scholar
Tversky, A. and Kahneman, D. (1974). Judgement under uncertainty: heuristics and biases. Science, 211, 453–8.CrossRefGoogle Scholar
Tynes, B. M. (2007). Internet safety gone wild? Sacrificing the educational and psychosocial benefits of online social environments. Journal of Adolescent Research, 22, 575–84.CrossRefGoogle Scholar
UN News Service (2010). Robust Demand for Mobile Phone Services will Continue, UN agency predicts. Retrieved from .Google Scholar
United Press International (9 April 2008). Survey: Cyber-bullying Affects US Teens. Retrieved from .
US Department of Homeland Security (2003). National Strategy to Secure Cyberspace. Retrieved from .
US Department of Justice (9 August 1999). Kevin Mitnick sentenced to nearly four years in prison; computer hacker ordered to pay restitution to victim companies whose systems were compromised. Retrieved from .
Veerasamy, N. (2010). Motivation for Cyberterrorism. 9th Annual Information Security South Africa (ISSA) – Towards New Security Paradigms. Sandton Convention Centre, 2–4 August 2010 (p. 6).Google Scholar
Verone (n.d.). Piracy Guide. EVElopedia. Retrieved from .
Victoroff, J. (2005). The mind of the terrorist: a review and critique of psychological approaches. Journal of Conflict Resolution, 49, 3–42.CrossRefGoogle Scholar
Vinyagamoorthy, V., Brogni, A., Gillies, M., Slater, M. and Steed, A. (2004). An investigation of presence response across variations in visual realism. Proceedings of Presence 2004: The 7th Annual International Workshop on Presence, Valencia, Spain, 13–15 Oct.
Vishwanath, A., Herath, T., Chen, R., Wang, J. and Rao, H. R. (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51 (3), 576–86.CrossRefGoogle Scholar
Voiskounsky, A. E. and Smyslova, O. V. (2003). Flow-based model of computer hacker’s motivation. CyberPsychology and Behaviour, 6, 171–80.CrossRefGoogle Scholar
Von Hirsch, A., Bottoms, A. E., Burney, E. and Wickstrom, P. O. (1999). Criminal Deterrence and Sentence Severity. Oxford: Hart.Google Scholar
Walker, C. (2001). The criminal courts online. In Wall, D. S. (ed.), Crime and the Internet. London: Routledge (pp. 195–214).Google Scholar
Walklate, S. (2006). Imagining the Victim of Crime. UK: Open University Press.Google Scholar
Wall, D. S. (2007). Cybercrime: the Transformation of Crime in the Information Age. Cambridge, UK: Polity Press.Google Scholar
Wall, D. S. and Williams, M. (2007). Policing diversity in the digital age: maintaining order in virtual communities. Criminology and Criminal Justice, 7, 391–415.CrossRefGoogle Scholar
Wall, D. S. and Yar, M. (2010). Intellectual property crime and the Internet: cyber-piracy and ‘stealing’ information intangibles. In Jewkes, Y. and Yar, M. (eds.), Handbook of Internet Crime. Cullompton, UK: Willan Publishing (pp. 255–72).Google Scholar
Wall, G. K., Pearce, E. and McGuire, J. (2011). Are internet offenders emotionally avoidant?Psychology, Crime and Law, 17, 381–401.CrossRefGoogle Scholar
Walther, J. B. (1996). Computer-mediated communication: impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23, 3–43.CrossRefGoogle Scholar
Walther, J. B. (2007). Selective self-presentation in computer-mediated communication: hyperpersonal dimensions of technology, language and cognition. Computers in Human Behavior, 23, 2,538–57.CrossRefGoogle Scholar
Wang, W., Yuan, Y. and Archer, N. (2006). A contextual framework for combating identity theft. IEEE Security and Privacy, 4, 30–8.CrossRefGoogle Scholar
Wang, X. and McClung, S. R. (2012). The immorality of illegal downloading: the role of anticipated guilt and general emotions. Computers in Human Behaviour, 28, 153–9.CrossRefGoogle Scholar
Ward, T. (2001). Hall and Hirschman’s quadripartite model of child sexual abuse: a critique. Psychology, Crime and Law, 7, 363–74.Google Scholar
Ward, T. and Durrant, R. (2011). Evolutionary behavioral science and crime: aetiological and intervention implications. Legal and Criminological Psychology, 16, 193–210.CrossRefGoogle Scholar
Ward, T., Polaschek, D. and Beech, A. R. (2006). Theories of Sexual Offending. Chichester, UK: Wiley.Google Scholar
Ward, T. and Siegert, R. (2002). Toward a comprehensive theory of child sexual abuse: a theory of knitting perspective. Psychology, Crime and Law, 8, 319–51.CrossRefGoogle Scholar
Warren, M. and Leitch, S. (2009). Hacker taggers: a new type of hackers. Information Systems Frontiers, 12 (4), 425–31.Google Scholar
Wash, R. (2010). Folk models of home computer security. Symposium on Usable Privacy and Security (SOUPS), Redmond, WA, 14–16 July. Retrieved from .CrossRef
Webb, L., Craissati, J. and Keen, S. (2007). Characteristics of internet child pornography offenders: a comparison with child molesters. Sexual Abuse: a Journal of Research and Treatment, 19, 449–65.CrossRefGoogle ScholarPubMed
Weimann, G. (2004).: How Modern Terrorism Uses the Internet. Washington, DC: United States Institute of Peace. Retrieved from , 5–11.Google Scholar
Weinstein, N. D. (1980). Unrealistic optimism about future life events. Journal of Personality and Social Psychology, 39, 806–20.CrossRefGoogle Scholar
Welsh, B. C. and Farrington, D. P. (2004). Surveillance for crime prevention in public space: results and policy choices in Britain and America. Criminology and Public Policy, 3, 497–525.CrossRefGoogle Scholar
Welsh, B. C. and Farrington, D. P. (2006). Preventing Crime: What Works for Children, Offenders, Victims and Places. Dordrecht, The Netherlands: Springer.CrossRefGoogle Scholar
Wemmers, J. A. and Cyr, K. (2006). Victims’ perspectives on restorative justice: how much involvement are victims looking for?International Review of Victimology, 11, 259–74.CrossRefGoogle Scholar
West, D. J. and Farrington, D. P. (1977). The Delinquent Way of Life. London: Heinemann.Google Scholar
Whitney, L. (26 March 2010). Symantec finds China top source of malware. CNET Security. Retrieved from .Google Scholar
Whitson, J. and Doyle, A. (2008). Second life and governing deviance in virtual worlds. In Leman-Langlois, S. (ed.), Technocrime: Technology, Crime and Social Control. Cullompton, UK: Willan (pp. 88–111).Google Scholar
Whittaker, D. J. (2004). Terrorists and Terrorism in the Contemporary World. London: Routledge.Google Scholar
Whitty, M. T. and Buchanan, T. (2012). The online romance scam: a serious cybercrime. Cyberpsychology, Behaviour and Social Networking, 15, 181–3.CrossRefGoogle ScholarPubMed
Wiederhold, B. K. and Wiederhold, M. D. (2005). Virtual Reality Therapy for Anxiety Disorders: Advances in Evaluation and Treatment. Washington, DC: American Psychological Association.CrossRefGoogle Scholar
Willard, N. E. (2007). Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress. Champaign, IL: Research Press.Google Scholar
Williams, M. (2006). Virtually Criminal: Crime, Deviance and Regulation Online. Abingdon, Oxon, UK: Routledge.Google Scholar
Wilson, C. (2005). Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Washington, DC: Congressional Research Service: The Library of Congress. Retrieved from .Google Scholar
Wilson, C. (2007). Botnets, Cybercrime and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Washington, DC: Congressional Research Service: The Library of Congress. Retrieved from .Google Scholar
Wilson, M. (2010). Terrorism research: current issues and debates. In Brown, J. M. and Campbell, E. A. (eds.), The Cambridge Handbook of Forensic Psychology. Cambridge University Press (pp. 571–8).CrossRefGoogle Scholar
Wingrove, T., Korpas, A. L. and Weisz, V. (2011). Why were millions of people not obeying the law? Motivational influences on non-compliance with the law in the case of music piracy. Psychology, Crime and Law, 17, 261–76.CrossRefGoogle Scholar
Winterdyk, J. and Thompson, N. (2008). Student and non-student perceptions and awareness of identity theft. Canadian Journal of Criminology and Criminal Justice, 50, 153–86.CrossRefGoogle Scholar
Wolak, J., Finkelhor, D. and Mitchell, K. (2004). Internet-initiated sex crimes against minors: implications for prevention based on findings from a national study. Journal of Adolescent Health, 35, 424–4.CrossRefGoogle ScholarPubMed
Wolak, J., Finkelhor, D. and Mitchell, K. (2005). Child-pornography Possessors Arrested in Internet-related Crimes: Findings from the National Juvenile Online Victimization Study. Alexandria, VA: National Center for Missing and Exploited Children.Google Scholar
Wolak, J., Finkelhor, D. and Mitchell, K. (2008). Is talking online to unknown people always risky? Distinguishing online interaction styles in a national sample of youth internet users. Cyberpsychology and Behaviour, 11, 340–3.CrossRefGoogle Scholar
Wolak, J., Finkelhor, D., Mitchell, K. and Ybarra, M. (2008). Online ‘predators’ and their victims: myths, realities, and implications for prevention and treatment. American Psychologist, 63, 111–28.CrossRefGoogle ScholarPubMed
Wolak, J., Mitchell, K. and Finkelhor, D. (2006). Online Victimization of Youth: Five Years Later. National Center for Missing and Exploited Children Bulletin – #07-06-025. Retrieved from .Google Scholar
Wolak, J., Mitchell, K. and Finkelhor, D. (2007). Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. Journal of Adolescent Health, 41, S51–8.CrossRefGoogle ScholarPubMed
Wolfe, S. E., Higgins, G. E. and Marcum, C. D. (2008). Deterrence and digital piracy: a preliminary examination of the role of viruses. Social Science Computer Review, 26, 317–33.CrossRefGoogle Scholar
Woo, H. J. (2003). The hacker mentality: exploring the relationship between psychological variables and hacking activities. Dissertation Abstracts International, 64, 2A, 325.Google Scholar
Woo, J. J., Kim, Y. and Dominick, J. (2004). Hackers: militants or merry pranksters? A content analysis of defaced web pages. Media Psychology, 6, 63–82.CrossRefGoogle Scholar
Working Group on Internet Governance (2005). Report of the Working Group on Internet Governance. Retrieved from ,
Working to Halt Online Abuse (WHOA) (2012). Online harassment/cyberstalking statistics. Retrieved from .
World Bank (1994). Governance: the World Bank’s Experience, Washington, DC: World Bank.Google Scholar
World Summit on the Information Society (2010). Home. Retrieved from .
Wortley, R. and Smallbone, S. (2006). Child Pornography on the Internet. Retrieved from .
Wright, S. (2006). Government-run online discussion forums: moderation, censorship and the shadow of control. British Journal of Politics and International Relations, 8, 550–68.CrossRefGoogle Scholar
Wrightsman, L. S. (2001). Forensic Psychology. Stamford, CT: Wadsworth.Google Scholar
Wykes, M. (2007). Constructing crime: stalking, celebrity, ‘cyber’ and media. In Jewkes, Y. (ed.), Crime Online. Cullompton, UK: Willan Publishing (pp. 128–43).Google Scholar
Wykes, M. and Harcus, D. (2010). Cyber-terror: construction, criminalization and control. In Jewkes, Y. and Yar, M. (eds.), Handbook of Internet Crime. Cullompton, UK: Willan (pp. 214–29).Google Scholar
Yang, G. (2006). Activists beyond virtual borders: internet-mediated networks and informational politics in China. Command Lines: the Emergence of Governance in Global Cyberspace, First Monday. Retrieved from .
Yar, M. (2006). Cybercrime and Society. London: Sage.Google Scholar
Yar, M. (2007). Teenage kicks or virtual villainy? Internet piracy, moral entrepreneurship and the social construction of a crime problem. In Jewkes, Y. (ed.), Crime Online. Cullompton, UK: Willan Publishing (pp. 95–108).Google Scholar
Yar, M. (2010). Public perceptions and public opinion about internet crime. In Jewkes, Y. and Yar, M. (eds.), Handbook of Internet Crime. Cullompton, UK: Willan (pp. 104–19).Google Scholar
Ybarra, M. L. and Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and targets: a comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry and Allied Disciplines, 45 (7), 1,308–16.CrossRefGoogle ScholarPubMed
Yoon, C. (2012). Digital piracy intention: a comparison of theoretical models. Behaviour and Information Technology, 31, 565–76.CrossRefGoogle Scholar
Young, R., Zhang, L. and Prybutok, V. R. (2007). Hacking into the minds of hackers. Information Systems Management, 24, 281–7.CrossRefGoogle Scholar
Zentner, A. (2004). Measuring the effect of online music piracy on music sales. Retrieved from .
Zona, M. A., Sharma, K. K. and Lane, J. (1993). A comparative study of erotomanic and obsessional subjects in a forensic sample. Journal of Forensic Sciences, 38, 894–903.CrossRefGoogle Scholar
Zuckerman, M. (2002). Genetics of sensation seeking. In Benjamin, J., Ebstein, R. P. and Belmaker, R. (eds.), Molecular Genetics and the Human Personality. Washington, DC: American Psychiatric Publishing (pp. 193–210).Google Scholar
Zuckoff, M. (2006). The perfect mark: how a Massachusetts psychotherapist fell for a Nigerian e-mail scam. The New Yorker, 15 May, pp. 36–42.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×