1,277
Views
39
CrossRef citations to date
0
Altmetric
Original Articles

Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On‐Line Data

Pages 466-487 | Published online: 15 Oct 2010

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (14)

Dominique Laferrière & David Décary-Hétu. (2023) Examining the Uncharted Dark Web: Trust Signalling on Single Vendor Shops. Deviant Behavior 44:1, pages 37-56.
Read now
Jin R. Lee, Thomas J. Holt & Olga Smirnova. (2022) An assessment of the state of firearm sales on the Dark Web. Journal of Crime and Justice 0:0, pages 1-15.
Read now
Bruce Arrigo, Brian Sellers, Heith Copes & Jenna Paz. (2022) New Qualitative Methods and Critical Research Directions in Crime, Law, and Justice: Editors’ Introduction. Journal of Criminal Justice Education 33:2, pages 145-150.
Read now
Anthony Quinn, Catherine Shaw, Nick Hardwick, Rosie Meek, Chloe Moore, Helen Ranns & Shannon Sahni. (2020) Prisoner Interpretations and Expectations for the Ethical Governance of HMIP Survey Data. Criminal Justice Ethics 39:3, pages 163-182.
Read now
Thomas J. Holt, Russell Brewer & Andrew Goldsmith. (2019) Digital Drift and the “Sense of Injustice”: Counter-Productive Policing of Youth Cybercrime. Deviant Behavior 40:9, pages 1144-1156.
Read now
Sara Aniello & Stefano Caneppele. (2018) Selling stolen goods on the online markets: an explorative study. Global Crime 19:1, pages 42-62.
Read now
Mitch Macdonald & Richard Frank. (2017) The network structure of malware development, deployment and distribution. Global Crime 18:1, pages 49-69.
Read now
Geoff Dean, Peter Bell & Zarina Vakhitova. (2016) Right-wing extremism in Australia: the rise of the new radical right. Journal of Policing, Intelligence and Counter Terrorism 11:2, pages 121-142.
Read now
Vanessa H. Woodward, Megan E. Webb, O. Hayden Griffin$suffix/text()$suffix/text() & Heith Copes. (2016) The Current State of Criminological Research in the United States: An Examination of Research Methodologies in Criminology and Criminal Justice Journals. Journal of Criminal Justice Education 27:3, pages 340-361.
Read now
Thomas J. Holt, Olga Smirnova & Yi Ting Chua. (2016) Exploring and Estimating the Revenues and Profits of Participants in Stolen Data Markets. Deviant Behavior 37:4, pages 353-367.
Read now
Thomas J. Holt, Olga Smirnova, Yi Ting Chua & Heith Copes. (2015) Examining the risk reduction strategies of actors in online criminal markets. Global Crime 16:2, pages 81-103.
Read now
Vanessa H. Woodward, Marcos Luis Misis & O. Hayden Griffin$suffix/text()$suffix/text(). (2014) Examining the Effects of Social Bonds and Shame on Drug Recovery within an On-Line Support Community. Deviant Behavior 35:11, pages 938-958.
Read now
RobertG. Morris & JamesW. Marquart. (2010) In the Classroom and on the Streets: How to Teach Qualitative Field Research to Criminology/Criminal Justice Graduate Students. Journal of Criminal Justice Education 21:4, pages 526-539.
Read now

Articles from other publishers (25)

Thomas J. Holt, Jin R. Lee & Olga Smirnova. (2022) Exploring Risk Avoidance Practices Among On-Demand Cybercrime-as-Service Operations. Crime & Delinquency 69:2, pages 415-438.
Crossref
Zarina I. Vakhitova, Alisa Go & Clair L. Alston-Knox. (2021) Guardians Against Cyber Abuse: Who are They and Why do They Intervene?. American Journal of Criminal Justice 48:1, pages 96-122.
Crossref
L. M. J. Bekkers, E. R. Leukfeldt & T. J. Holt. (2023) Online Communities for Child-Attracted Persons as Informal Mental Health Care: Exploring Self-Reported Wellbeing Outcomes. Sexual Abuse, pages 107906322311548.
Crossref
Benoît Dupont & Jonathan Lusthaus. (2021) Countering Distrust in Illicit Online Networks: The Dispute Resolution Strategies of Cybercriminals. Social Science Computer Review 40:4, pages 892-913.
Crossref
Rajeev V. Gundur, Mark Berry & Dean Taodang. 2021. Researching Cybercrimes. Researching Cybercrimes 145 167 .
Lisa Sugiura. 2021. Researching Cybercrimes. Researching Cybercrimes 473 492 .
Maria Bada, Yi Ting Chua, Ben Collier & Ildiko Pete. 2021. Cybercrime in Context. Cybercrime in Context 237 257 .
Amy Farrell & Ieke de Vries. 2020. The Palgrave International Handbook of Human Trafficking. The Palgrave International Handbook of Human Trafficking 147 162 .
Thomas J. Holt & Jay P. Kennedy. 2019. The Handbook of White‐Collar Crime. The Handbook of White‐Collar Crime 449 468 .
Giorgia Macilotti. (2019) Violence et humiliation à l’ère numérique : une étude en milieu scolaire. Déviance et Société Vol. 43:3, pages 299-328.
Crossref
Thomas J. Holt & Benoit Dupont. (2018) Exploring the Factors Associated With Rejection From a Closed Cybercrime Community. International Journal of Offender Therapy and Comparative Criminology 63:8, pages 1127-1147.
Crossref
Amy Farrell & Ieke de Vries. 2019. The Palgrave International Handbook of Human Trafficking. The Palgrave International Handbook of Human Trafficking 1 16 .
Shuki J. CohenThomas J. HoltSteven M. ChermakJoshua D. Freilich. (2018) Invisible Empire of Hate: Gender Differences in the Ku Klux Klan's Online Justifications for Violence. Violence and Gender 5:4, pages 209-225.
Crossref
Zarina Vakhitova, Julianne Webster, Clair Alston-Knox, Danielle Reynald & Michael Townsley. (2018) Offender–victim relationship and offender motivation in the context of indirect cyber abuse. International Review of Victimology 24:3, pages 347-366.
Crossref
Olga Smirnova & Thomas J. Holt. (2017) Examining the Geographic Distribution of Victim Nations in Stolen Data Markets. American Behavioral Scientist 61:11, pages 1403-1426.
Crossref
Meltem Odabaş, Thomas J. Holt & Ronald L. Breiger. (2017) Markets as Governance Environments for Organizations at the Edge of Illegality: Insights From Social Network Analysis. American Behavioral Scientist 61:11, pages 1267-1288.
Crossref
Thomas J. Holt, Olga Smirnova & Alice Hutchings. (2016) Examining signals of trust in criminal markets online. Journal of Cybersecurity, pages tyw007.
Crossref
Bilel Benbouzid & Daniel Ventre. (2016) Pour une sociologie du crime en ligne. Réseaux n° 197-198:3, pages 9-30.
Crossref
Thomas J. Holt. 2016. The Handbook of Measurement Issues in Criminology and Criminal Justice. The Handbook of Measurement Issues in Criminology and Criminal Justice 29 48 .
Alejandro R. Diaz, Jongeun Choi, Thomas J. Holt, Steven Chermak & Joshua D. Freilich. (2016) Data-driven system identification of the social network dynamics in online postings of an extremist group. Data-driven system identification of the social network dynamics in online postings of an extremist group.
Xiong Zhang, Alex Tsang, Wei T. Yue & Michael Chau. (2015) The classification of hackers by knowledge exchange behaviors. Information Systems Frontiers 17:6, pages 1239-1251.
Crossref
Alice Hutchings & Thomas J. Holt. (2015) A Crime Script Analysis of the Online Stolen Data Market: Table 1. British Journal of Criminology 55:3, pages 596-614.
Crossref
David Décary-Hétu, Benoit Dupont & Francis Fortin. 2014. Networks and Network Analysis for Defence and Security. Networks and Network Analysis for Defence and Security 63 82 .
Thomas J. Holt, Yi-Ting Chua & Olga Smirnova. (2013) An exploration of the factors affecting the advertised price for stolen data. An exploration of the factors affecting the advertised price for stolen data.
Kathleen J. Hanrahan, Mathew T. Smith & Judith E. Sturges. 2012. Online Research Methods in Urban and Planning Studies. Online Research Methods in Urban and Planning Studies 53 69 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.