REFERENCES
- Akers, R. 1998. Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston: Northeastern University Press.
- Bossler, A. M. and G. W. Burruss. 2011. “The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?” Pp.38–67 in, Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by T. J. Holt and B. H. Schell. Hershey, PA: IGI Global.
- Chapple, C. L. 2005. “Self-Control, Peer Relations, and Delinquency.” Justice Quarterly 22:89–106.
- DeLisi, M. 2001. “Designed to Fail: Self-Control and Involvement in the Criminal Justice System.” American Journal of Criminal Justice 26:131–148.
- Freund, R. and W. Wilson. 1998. Regression Analysis: Statistical Modeling of a Response Variable. San Diego, CA: Academic Press.
- Gibbs, J. J., D. Giever, and G. E. Higgins. 2003. “A Test of Gottfredson and Hirschi’s General Theory using Structural Equation Modeling.” Criminal Justice and Behavior 30(4):441–458.
- Gibbs, J. J., D. Giever, and J. S. Martin. 1998. “Parental-Management and Self-Control: An Empirical Test of Gottfredson and Hirschi’s General Theory.” Journal of Research in Crime and Delinquency 35(1):42–72.
- Gottfredson, M. and T. Hirschi. 1990. A General Theory of Crime. Stanford, CA: Stanford University Press.
- Higgins, G. E., B. D. Fell, and A. L. Wilson. 2007. “Low Self-Control and Social Learning in Understanding Students’ Intentions to Pirate Movies in the United States.” Social Science Computer Review 25:339–357.
- Higgins, G. and C. D. Marcum. 2011. Digital Piracy: An Integrated Theoretical Approach. Durham, NC: Carolina Academic Press.
- Higgins, G. and A. Wilson. 2006. “Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software.” Security Journal 19:75–92.
- Higgins, G. E., S. E. Wolfe, and C. D. Marcum. 2008. “Digital Piracy: An Examination of Three Measurements of Self-Control.” Deviant Behavior 29:440–460.
- Hinduja, S. and J. R. Ingram. 2008. “Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft.” Western Criminology Review 9:52–72.
- Holt, T. J. 2007. “Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures.” Deviant Behavior 28:171–198.
- Holt, T. J. 2009. “Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers.” Pp. 336–355 in Crimes of the Internet, edited by F. Schmalleger and M. Pittaro. Upper Saddle River, NJ: Pearson Prentice Hall.
- Holt, T. J. and A. M. Bossler. 2009. “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization.” Deviant Behavior 28:1–25.
- Holt, T. J. and M. Kilger. 2008. “Techcrafters and Makecrafters: A Comparison of Two Populations of Hackers.” WOMBAT Workshop on Information Security Threats Data Collection and Sharing: 67–78.
- Holt, T., A. Bossler, and D. May. 2012. “Predicting Online Harassment Victimization among a Juvenile Population.” Youth & Society 44(4):500–523.
- Holt, T. J., G. W. Burruss, and A. M. Bossler. 2010. “Social Learning and Cyber Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World.” Journal of Crime and Justice 33:15–30.
- Ingram, J. R. and S. Hinduja. 2008. “Neutralizing Music Piracy: An Empirical Examination.” Deviant Behavior 29:334–366.
- Jordan, T. and P. Taylor. 1998. “A Sociology of Hackers.” Sociological Review 46:757–780.
- Krohn, M. D. 1999. “Social Learning Theory: The Continuing Development of a Perspective.” Theoretical Criminology 3:462–475.
- Lewis-Beck, Michael S. 1979. “Maintaining Economic Competition: The Causes and Consequences of Antitrust.” Journal of Politics 41:169–191.
- Longshore, D., E. Chang, S. Hsieh, and N. Messina. 2004. “Self-Control and Social Bonds: A Combined Control Perspective on Deviance.” Crime & Delinquency 50:542–564.
- Loper, K. 2000. “The Criminology of Computer Hackers: A Qualitative and Quantitative Analysis.” Ph.D. Dissertation, Michigan State University.
- McDowell, M. 2009. National Cyber Alert System. Cyber Security Tip ST04-014. Avoiding Social Engineering and Phishing Attacks. Retrieved April 30, 2013 from (http://www.us-cert.gov/cas/tips/ST04-014.html).
- Menard, S. 2002. Logistic Regression. Thousand Oaks, CA: Sage.
- Meyer, G. 1989. “The Social Organization of the Computer Underground.” Master’s thesis, Northern Illinois University.
- Moon, B., J. D. McCluskey, and C. P. McCluskey. 2010. “A General Theory of Crime and Computer Crime: An Empirical Test.” Journal of Criminal Justice 38:767–772.
- Morris, R. G. 2011. “Computer Hacking and the Techniques of Neutralization: An Empirical Assessment.” Pp. 1–17 in Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by T. J. Holt and B. Schell. Hershey, PA: IGI-Global Press.
- Morris, R. G. and G. E. Higgins. 2010. “Criminological Theory in the Digital Age: The Case of Social Learning Theory and Digital Piracy.” Journal of Criminal Justice 38:470–480.
- Pratt, T. C. and F. T. Cullen. 2000. “The Empirical Status of Gottfredson and Hirschi's General Theory of Crime: A Meta-Analysis.” Criminology 38:931–964.
- Pratt, T. C., F. T. Cullen, C. S. Sellers, L. T. Winfree, T. Madensen, L. E. Daigle, et al. 2009. “The Empirical Status of Social Learning Theory: A Meta-Analysis.” Justice Quarterly 27:765–802.
- Rogers, M., N. Smoak, and J. Liu. 2005. “Self-Reported Deviant Computer Behavior: A Big-5,Moral Choice, and Manipulative Exploitive Behavior Analysis.” Deviant Behavior 27: 245–268.
- Schreck, C. 1999. “Criminal Victimization and Low Self-Control: An Extension of and Test of General Theory of Crime.” Justice Quarterly 16(3):633–654.
- Segan, S. 2000. “Female Hackers Battle Sexism to Get Ahead.” ABC News. Retrieved May 1, 2012 (http://abcnews.go.com/Technology/story?id=99341&page=1).
- Skinner, W. and A. Fream. 1997. “A Social Learning Theory Analysis of Computer Crime among College Students.” Journal of Research in Crime and Delinquency 34:495–518.
- Stambaugh, H., D. S. Beaupre, D. J. Icove, R. Baker, W. Cassady, and W. P. Williams. 2001. Vol. 186276, Electronic Crime Needs Assessment for State and Local Law Enforcement, NCJ 186276, National Institute of Justice, Washington, DC.
- Taylor, P. 1999. Hackers: Crime in the Digital Sublime. London: Routledge.
- Taylor, R. W., E. J. Fritsch, J. Liederbach, and T. J. Holt. 2010. Digital Crime and Digital Terrorism, 2nd Edition. Upper Saddle River, NJ: Pearson Prentice Hall.
- Thomas, D. 2002. Hacker Culture. Minneapolis, MN: University of Minnesota Press.
- Turgeman-Goldschmidt, O. 2008. “Meanings that Hackers Assign to Their Being a Hacker.” International Journal of Cyber Criminology 2:382–396.
- Wade, H., D. Hylender, and A. Valentine. 2008. Verizon Business 2008 Data Breach Investigation Report. Retrieved September 26, 2013 (http://www.verizonbusiness.com/resources/security/databreachreport.pdfS).
- Wolfe, S. E. and G. E. Higgins. 2009. “Explaining Deviant Peer Associations: An Examination of Low Self-Control, Ethical Predispositions, Definitions, and Digital Piracy.” Western Criminology Review 10:43–55.