REFERENCES
- Akers , Ronald L. 1998 . Social Learning and Social Structure: A General Theory of Crime and Deviance . Boston : Northeastern University Press .
- Al-Rafee , Sulaiman and Timothy P. Cronan . 2006 . “Digital Piracy: Factors that Influence Attitude Toward Behavior.” Journal of Business Ethics 63 : 237 – 259 .
- Bachman , Michael. 2007 . “Lesson Spurned? Reactions of Online Music Pirates to Legal Prosecutions by the RIAA.” International Journal of Cyber Criminology 1 : 213 – 227 .
- Bainbridge , William S. 2000 . “Religious Ethnography on the World Wide Web.” Pp. 55 – 80 . In Religion and the Social Order: Religion on the Internet , edited by J. K. Hadden and D. E. Cowan .
- Chiou , Jyh-Shen , Chien-yi Huang , and Hsin-hui Lee . 2005 . “The Antecedents of Music Piracy: Attitudes and Intentions.” Journal of Business Ethics 57 : 161 – 174 .
- Cohen , Albert K. 1955 . Delinquent Boys: The Culture of the Gang . New York : Free Press .
- Cooper , Jon and Daniel M. Harrison . 2001 . “The Social Organization of Audio Piracy on the Internet.” Media, Culture, and Society 23 : 71 – 89 .
- Copes , Heith , Andy Hochstetler , and Patrick Williams . 2008 . “We Weren't Like No Regular Dope Fiends: Negotiating Hustler and Crackhead Identities.” Social Problems 55 : 254 – 270 .
- Denzin , Norman K. 1999 . “Cybertalk and the Method of Instances.” Pp. 107 – 25 . In Doing Internet Research: Critical Issues and Methods for Examining the Net , edited by S. Jones . Thousand Oaks , CA : Sage .
- DiMarco , Andrew D. and Heather DiMarco . 2003 . “Investigating Cybersociety: A Consideration of the Ethical and Practical Issues Surrounding Online Research in Chat Rooms.” Pp. 164 – 79 . In Dot.cons: Crime, Deviance, and Identity on the Internet , edited by Y. Jewkes . Portland , OR : Willan Publishing .
- Fine , Gary and Sherryl Kleinman . 1979. “Rethinking Subculture: An Interactionist Analysis.” American Journal of Sociology 85:1–20.
- Furnell , Steven. 2002 . Cybercrime: Vandalizing the Information Society . Boston , MA : Addison-Wesley .
- Glaser , David. 1956 . “Criminality Theories and Behavioral Images.” American Journal of Sociology 61 : 433 – 444 .
- Gross , Elisheva F. 2004 . “Adolescent Internet Use: What We Expect, What Teens Report.” Journal of Applied Developmental Psychology 25 : 633 – 649 .
- Higgins , George E. 2005 . “Can Low Self-Control Help with the Understanding of the Software Piracy Problem?” Deviant Behavior 26 : 1 – 24 .
- Higgins , George E. , Brian D. Fell , and Abby L. Wilson . 2006 . “Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling.” Criminal Justice Studies 19 : 3 – 22 .
- Higgins , George E. and David A. Makin . 2004 . “Self-Control, Deviant Peers, and Software Piracy.” Psychological Reports 95 : 921 – 931 .
- Higgins , George E. , Scott E. Wolfe , and Catherine D. Marcum . 2008 . “Digital Piracy: An Examination of Three Measurements of Self-Control.” Deviant Behavior 29 : 440 – 460 .
- Hinduja , Sameer. 2001 . “Correlates of Internet Software Piracy.” Journal of Contemporary Criminal Justice 17 : 369 – 382 .
- ——— . 2003 . “Trends and Patterns among Software Pirates.” Ethics and Information Technology 5 : 49 – 61 .
- ——— . 2007 . “Neutralization Theory and Online Software Piracy: An Empirical Analysis.” Ethics and Information Technology 9 : 187 – 204 .
- Holt , Thomas J. 2007 . “Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures.” Deviant Behavior 28 : 171 – 198 .
- ———. In Press . “Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-line Data.” Journal of Criminal Justice Education .
- Ingram , Jason and Sameer Hinduja . 2008 . “Neutralizing Music Piracy: An Empirical Examination.” Deviant Behavior 29 : 334 – 366 .
- Jordan , Tim and Paul Taylor . 1998 . “A Sociology of Hackers.” The Sociological Review 46 : 757 – 780 .
- Levy , Steven. 1984 . Hackers: Heroes of the Computer Revolution . New York : Dell .
- Mann , David and Mike Sutton . 1998 . “Netcrime: More Changes in the Organisation of Thieving.” British Journal of Criminology 38 : 201 – 229 .
- Maruna , Shadd and Heith Copes . 2005 . “What Have We Learned from Fifty Years of Neutralization Research?” Crime and Justice: A Review of Research 32 : 221 – 320 .
- McCarthy , Bill. 1996. “The Attitudes and Actions of Others: Tutelage and Sutherland's Theory of Differential Association.” British Journal of Criminology 36:135–147.
- Menchik , Daniel and Xiaoli Tian . 2008 . “Putting Social Context Into Text: The Semiotics of E-Mail Interaction.” American Journal of Sociology 114 : 332 – 370 .
- Morris , Robert G. and George E. Higgins . 2009 . “Neutralizing Potential and Self-Reported Digital Piracy: A Multitheoretical Exploration among College Undergraduates.” Criminal Justice Review 34 : 173 – 195 .
- Morselli , Carlo , Pierre Tremblay , and Bill McCarthy . 2006 . “Mentors and Criminal Achievement.” Criminology 44 : 17 – 43 .
- Quinn , James F. and Craig J. Forsyth . 2005 . “Describing Sexual Behavior in the Era of the Internet: A Typology for Empirical Research.” Deviant Behavior 26 : 191 – 207 .
- Rosecrance , John. 1986 . “The Stooper: A Professional Thief in the Sutherland Manner.” Criminology 24 : 29 – 40 .
- Simms , Ronald R. , Hsing K. Cheng , and Hildy Teegen . 1996 . “Toward a Profile of Student Software Pirates.” Journal of Business Ethics 15 : 839 – 849 .
- Skinner , William F. and Anne M. Fream . 1997 . “A Social Learning Theory Analysis of Computer Crime among College Students.” Journal of Research in Crime and Delinquency 34 : 495 – 518 .
- Steffensmeier , Darrell J. and Jeffery T. Ulmer . 2005 . Confessions of a Dying Thief: Understanding Criminal Careers and Illegal Enterprise . New Brunswick , NJ : Aldine Transaction .
- Sutherland , Edwin. 1937 . The Professional Thief . Chicago : University of Chicago Press .
- ——— . 1947 . Principles of Criminology . Philadelphia : Lippincott .
- Sykes , Gresham and David Matza . 1957 . “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22 : 664 – 670 .
- Szor , Peter. 2005 . The Art of Computer Virus Research and Defense . Upper Saddle River , NJ : Addison Wesley .
- Taylor , Robert W. , Tory J. Caeti , D. Kall Loper , Eric J. Fritsch , and John Liederbach . 2006 . Digital Crime and Digital Terrorism . Upper Saddle River , NJ : Pearson Prentice Hall .
- Warr , Mark. 2002 . Companions in Crime: The Social Aspects of Criminal Conduct . New York : Cambridge University Press .
- Williams , Patrick and Heith Copes . 2005 . “How Edge are You? Constructing Authentic Identities and Subcultural Boundaries in a Straightedge Internet Forum.” Symbolic Interaction 28 : 67 – 89 .
- Wolfe , Scott , George Higgins , and Catherine Marcum . 2008 . “Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses.” Social Science Computer Review 26 : 1 – 17 .