REFERENCES
- Bjerregaard , Beth. 2000 . “ An Empirical Study of Stalking Victimization. ” Violence and Victims 15 : 389 – 406 .
- Bocij , Paul. 2004 . Cyberstalking: Harassment in the Internet Age and How to Protect Your Family . Westport , CT : Praeger .
- Cohen , Lawrence E. and Marcus Felson. 1979 . “ Social Change and Crime Rate Trends: A Routine Activity Approach. ” American Sociological Review 44 : 588 – 608 .
- Computer Security Institute . 2007 . “Computer Crime and Security Survey.” Retrieved June 3, 2007, from (http://www.cybercrime.gov/FBI2006.pdf) .
- Daly , Kathleen and Lisa Maher. 1998 . Criminology at the Crossroads: Feminist Readings in Crime and Justice . Oxford : Oxford University Press .
- Finkelhor , David , Kimberly J. Mitchell , and Janice Wolak . 2000 . Online Victimization: A Report on the Nation's Youth . Washington , DC : National Center for Missing and Exploited Children .
- Finn , Jerry. 2004 . “ A Survey of Online Harassment at a University Campus. ” Journal of Interpersonal Violence 19 ( 4 ): 468 – 483 .
- Fisher , Bonnie S. , Francis T. Cullen , and Michael G. Turner . 2002 . “ Being Pursued: Stalking Victimization in a National Study of College Women. ” Criminology and Public Policy 1 ( 2 ): 257 – 308 .
- Furnell , Steven. 2002. Cybercrime: Vandalizing the Information Society . Boston , MA : Addison-Wesley.
- Gilboa , N. 1996 . “Elites, Lamers, Narcs and Whores: Exploring the Computer Underground.” Pp. 98 – 113 . In Wired Women: Gender and New Realities in Cyberspace , edited by L. Cherny and E. R. Weise. Seattle , WA : Seal Press .
- Grabosky , Peter N. 2001 . “ Virtual Criminality: Old Wine in New Bottles? ” Social and Legal Studies 10 : 243 – 249 .
- Grabosky P. N. and Smith R. 2001 . “Telecommunication Fraud in the Digital Age: The Convergence of Technologies.” Pp. 29 – 43 . In Crime and the Interneti> , edited by D. Wall . New York : Routledge .
- Herring , S. C. 1999 . “ The Rhetorical Dynamics of Gender Harassment Online. ” The Information Society 15 ( 3 ): 151 – 167 .
- Higgins , George E. 2005 . “ Can Low Self-Control Help with the Understanding of the Software Piracy Problem? ” Deviant Behavior 26 ( 1 ): 1 – 24 .
- Holt , Thomas J. 2007 . “ Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures. ” Deviant Behavior 28 ( 2 ): 171 – 198 .
- Internet Crime Complaint Center . 2007 . “Internet Crime Report.” Retrieved on April 25, 2007 from(www.ic3.gov/media/annualreport/2006_IC3Report.pdf) .
- Jensen , Gary F. and David Brownfield. 1986 . “ Gender, Lifestyles, and Victimization: Beyond Routine Activity. ” Violence and Victims 1 : 85 – 99 .
- Jordan , Tim and Paul Taylor. 1998 . “ A Sociology of Hackers. ” The Sociological Review 46 ( 4 ): 757 – 780 .
- Lauritsen , Janet L. , John H. Laub , and Robert J. Sampson . 1992 . “ Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents. ” Violence and Victims 7 : 91 – 108 .
- Logan , T. K. , Carl Leukefeld , and Robert Walker . 2000 . “ Stalking as a Variant of Intimate Violence: Implications from a Young Adult Sample. ” Violence and Victims 15 : 91 – 111 .
- Miethe , Terance D. and Robert F. Meier. 1994 . Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations . Albany : SUNY Press .
- Mustaine , Elizabeth Ehrhardt , and Richard Tewksbury. 1998 . “ Predicting Risk of Larceny Theft Victimization: A Routine Activity Analysis Using Refined Lifestyle Measures. ” Criminology 36 : 829 – 857 .
- Newman , Grame and Ronald Clarke. 2003 . Superhighway Robbery: Preventing E-Commerce Crime . Cullompton , UK : Willan Press.
- Osgood , D. Wayne , Janet K. , Wilson , Patrick M. O'Malley , Jerald G. Bachman , and Lloyd D. Johnston . 1996 . “ Routine Activities and Individual Deviant Behavior. ” American Sociological Review 61 ( 4 ): 635 – 655 .
- Patchin , Justin and Sameer Hinduja. 2007. “What Kids Do on MySpace.” Technology and Learning 27(7):7.
- Pease , K. 2001 . “Crime Futures and Foresight: Challenging Criminal Behavior in the Information Age.” Pp. 18 – 28 . In Crime and the Internet , edited by D. Wall . New York : Routledge .
- Rogers , Marcus K. 2001 . A Social Learning Theory and Moral Disengagement Analysis of Criminal Computer Behavior: An Exploratory Study. Unpublished doctoral dissertation. Manitoba University, Canada .
- Sampson , Robert J. and Janet L. Lauritsen. 1990 . “ Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence. ” Journal of Research in Crime and Delinquency 27 : 110 – 139 .
- Schwartz , Martin D. and Victoria L. Pitts. 1995 . “ Exploring a Feminist Routine Activities Approach to Explaining Sexual Assault. ” Justice Quarterly 12 : 9 – 31 .
- Skinner , William F. and Anne M. Fream. 1997 . “ A Social Learning Theory Analysis of Computer Crime among College Students. ” Journal of Research in Crime and Delinquency 34 ( 4 ): 495 – 518 .
- Taylor , Paul A. 2003 . “Maestros or Misogynists? Gender and the Social Construction of Hacking.” Pp. 126 – 146 . In Dot.cons: Crime, Deviance and Identity on the Internet , edited by Y. Jewkes . Portland , OR : Willan Publishing .
- Taylor , Robert W. , Tory J. Caeti , D. Kall Loper , Eric J. Fritsch , and John Lieder bach . 2006 . Digital Crime and Digital Terrorism . Upper Saddle River , NJ : Pearson Prentice Hall .
- Tjaden , Patricia and Nancy Thoenees. 1998 . Stalking in America: Findings from the National Violence Against Women Survey . US Department of Justice , Office of Justice Programs. Washington, DC : US Government Printing Office .
- Wall , D. S. 2001 . “Cybercrimes and the Internet.” Pp. 1 – 17 . In Crime and the Internet , edited by D. S. Wall . New York : Routledge .
- Yar , Majid. 2005 . “ The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory. ” European Journal of Criminology 2 ( 4 ): 407 – 427 .
- Zhang , Lening, , John W. Welte , and William F. Wiecxorek. 2001. “Deviant Lifestyle and Crime Victimization.” Journal of Criminal Justice 29:133–143.