791
Views
19
CrossRef citations to date
0
Altmetric
Original Articles

Bridging the Gap Between Research and Practice: How Neutralization Theory Can Inform Reid Interrogations of Identity Thieves

Pages 444-459 | Published online: 06 Nov 2007

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (5)

Kellie Alexander & Tara Opsal. (2021) “That’s Just What You Do”: Applying the Techniques of Neutralization to College Hazing. Deviant Behavior 42:10, pages 1295-1312.
Read now
Veronyka James & Jennifer Gossett. (2018) Of Monsters and Men: Exploring Serial Murderers’ Discourses of Neutralization. Deviant Behavior 39:9, pages 1120-1139.
Read now
Jason D. Spraitz, Kendra N. Bowen & Shavonne Arthurs. (2017) Neutralisation and sexual abuse: a study of monks from one Benedictine Abbey. Journal of Sexual Aggression 23:2, pages 195-206.
Read now
PaulM. Klenowski, Heith Copes & ChristopherW. Mullins. (2011) Gender, Identity, and Accounts: How White Collar Offenders Do Gender When Making Sense of Their Crimes. Justice Quarterly 28:1, pages 46-69.
Read now
David Mazeika, Brad Bartholomew, Michael Distler, Kyle Thomas, Sarah Greenman & Stephanie Pratt. (2010) Trends in police research: a cross‐sectional analysis of the 2000–2007 literature. Police Practice and Research 11:6, pages 520-547.
Read now

Articles from other publishers (14)

Katelyn A. Golladay. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 981 999 .
Katelyn A. Golladay. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 19 .
. 2016. Change and Reform in Law Enforcement. Change and Reform in Law Enforcement 245 256 .
Jason D. Spraitz & Kendra N. Bowen. (2016) Techniques of Neutralization and Persistent Sexual Abuse by Clergy. Journal of Interpersonal Violence 31:15, pages 2515-2538.
Crossref
Chandan Maheshkar. 2016. Bridging the Scholar-Practitioner Gap in Human Resources Development. Bridging the Scholar-Practitioner Gap in Human Resources Development 20 46 .
Joel H. Anderson. 2016. Procrastination, Health, and Well-Being. Procrastination, Health, and Well-Being 43 63 .
Chris Rush BurkeyTusty ten Bensel. (2015) An Examination and Comparison of Rationalizations Employed by Solo and Co-Offending Female Sex Offenders. Violence and Gender 2:3, pages 168-178.
Crossref
Heith Copes, Lynne M. Vieraitis, Stephanie M. Cardwell & Arthur Vasquez. (2013) Accounting for Identity Theft. Journal of Contemporary Criminal Justice 29:3, pages 351-368.
Crossref
Paul M. Klenowski. (2012) “Learning the Good With the Bad”. Criminal Justice Review 37:4, pages 461-477.
Crossref
Lynne M. Vieraitis, Nicole Leeper Piquero, Alex R. Piquero, Stephen G. Tibbetts & Michael Blankenship. (2012) Do Women and Men Differ in Their Neutralizations of Corporate Crime?. Criminal Justice Review 37:4, pages 478-493.
Crossref
Robert G. Morris & Heith Copes. (2012) Exploring the Temporal Dynamics of the Neutralization/Delinquency Relationship. Criminal Justice Review 37:4, pages 442-460.
Crossref
Heith Copes & Lynne M. Vieraitis. 2011. The Oxford Handbook of Crime and Public Policy. The Oxford Handbook of Crime and Public Policy 247 270 .
Heith Copes, Kent R. Kerley, Rodney Huff & John Kane. (2010) Differentiating identity theft: An exploratory study of victims using a national victimization survey. Journal of Criminal Justice 38:5, pages 1045-1052.
Crossref
Heith Copes & Lynne M. Vieraitis. (2009) Bounded rationality of identity thieves: Using offender‐based research to inform policy*. Criminology & Public Policy 8:2, pages 237-262.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.