1,464
Views
15
CrossRef citations to date
0
Altmetric
Articles

Criminal Careers in Cyberspace: Examining Website Failure within Child Exploitation Networks

References

  • Akdeniz, Y. (2013). Internet child pornography and the law: National and international responses. Farnham: Ashgate.
  • Armstrong, H. L., & Forde, P. J. (2003). Internet anonymity practices in computer crime. Information Management & Computer Security, 11, 209–215.
  • Babchishin, K. M., Hanson, R. K., & Hermann, C. A. (2011). The characteristics of online sex offenders: A meta-analysis. Sex Abuse, 23, 92–123.
  • Beech, A. R., Elliott, I. A., Birgden, A., & Findlater, D. (2008). The Internet and child sexual offending: A criminological review. Aggression and Violent Behavior, 13, 216–228.10.1016/j.avb.2008.03.007
  • Bergman, M. K. (2001). The deep web: Surfacing hidden value [White paper]. Journal of Electronic Publishing, 7(1), 1–17. doi:10.3998/3336451.0007.104
  • Blumstein, A., & Cohen, J. (1979). Estimation of individual crime rates from arrest records. The Journal of Criminal Law and Criminology, 70, 561–585.10.2307/1142642
  • Blumstein, A., Cohen, J., Roth, J. A., & Visher, C. A. (1986). Criminal careers and “career criminals”. Washington DC: National Academy Press.
  • Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers? In T. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime (pp. 38–67). Hershey, PA: IGI Global.10.4018/978-1-61692-805-6
  • Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3, 400–420.
  • Bossler, A. M., & Holt, T. J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38, 227–236.10.1016/j.jcrimjus.2010.03.001
  • Bouchard, M. (2007). A capture–recapture model to estimate the size of criminal populations and the risks of detection in a marijuana cultivation industry. Journal of Quantitative Criminology, 23, 221–241.10.1007/s10940-007-9027-1
  • Bouchard, M., & Ouellet, F. (2011). Is small beautiful? The link between risks and size in illegal drug markets. Global Crime, 12, 70–86.10.1080/17440572.2011.548956
  • Burris, V., Smith, E., & Strahm, A. (2000). White supremacist networks on the Internet. Sociological Focus, 33, 215–235.10.1080/00380237.2000.10571166
  • Cain, K. C., Harlow, S. D., Little, R. J., Nan, B., Yosef, M., Taffe, J. R., & Elliott, M. R. (2011). Bias due to left truncation and left censoring in longitudinal studies of developmental and disease processes. American Journal of Epidemiology, 173, 1078–1084.10.1093/aje/kwq481
  • Criminal Code, R. S. C. (1985). c. C46 s.163.
  • Choi, K. C. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2, 308–333.
  • Clarke, R. V. G. (1997). Situational crime prevention. Monsey, NY: Criminal Justice Press.
  • Cleves, M., Gould, W., Gutierrez, R., & Marchenko, Y. (2010). An introduction to survival analysis using Stata (3rd ed.). College Station, TX: Stata Press.
  • Cohen, J. (1986). Research on criminal careers: Individual frequency rates and offense seriousness. In A. Blumstein, J. Cohen, J. A. Roth, & C. Visher (Eds.), Criminal careers and “career” criminals (Vol. 1, pp. 292–418). Washington, DC: National Academy Press.
  • Cox, D. R., & Snell, E. J. (1968). A general definition of residuals. Journal of the Royal Statistical Society, 30, 248–275.
  • Decary-Hetu, D., & Dupont, B. (2012). The social network of hackers. Global Crime, 13, 160–175.10.1080/17440572.2012.702523
  • Decary-Hetu, D., & Dupont, B. (2013). Reputation in a dark network of online criminals. Global Crime, 14, 175–196.10.1080/17440572.2013.801015
  • Decary-Hetu, D., Morselli, C., & Leman-Langlois, S. (2012). Welcome to the scene: A study of social organization and recognition among Warez hackers. Journal of Research in Crime and Delinquency, 49, 359–382.10.1177/0022427811420876
  • DeLisi, M., & Piquero, A. R. (2011). New frontiers in criminal careers research, 2000–2011: A state-of-the-art review. Journal of Criminal Justice, 39, 289–301.10.1016/j.jcrimjus.2011.05.001
  • Elliott, I. A., Beech, A. R., & Mandeville-Norden, R. (2013). The psychological profiles of internet, contact, and mixed internet/contact sex offenders. Sexual Abuse: A Journal of Research and Treatment, 25, 3–20.10.1177/1079063212439426
  • Frank, R., Westlake, B. G., & Bouchard, M. (2010). The structure and content of online child exploitation. In Proceedings of the 16th ACM SIGKDD Workshop on Intelligence and Security Informatics (ISI-KDD 2010), Washington, DC, Article 3.
  • Gallupe, O., & Bouchard, M. (2015). The influence of positional and experienced social benefits on the relationship between peers and alcohol use. Rationality and Society, 27, 40–69.
  • Gillespie, A. A. (2011). Child pornography: Law and policy. New York, NY: Routledge.
  • Grabosky, P., Smith, R. G., & Dempsey, G. (2001). Electronic theft: Unlawful acquisition in cyberspace. Cambridge: Cambridge University Press.
  • Grambsch, P. M., & Therneau, T. M. (1994). Proportional hazards tests and diagnostics based on weighted residuals. Biometrika, 81, 515–526.10.1093/biomet/81.3.515
  • Hardy, R. L., & Kreston, S. S. (2004). Geeks with guns, or how I stopped worrying and learned to love computer evidence. Paper presented at the South African Professional Society on the Abuse of Children National Conference, Pretoria, South Africa. Retrieved from http://www.sapsac.co.za/geeks.pdf
  • Harrell, F. E., Lee, K. L., & Mark, D. B. (1996). Multivariable prognostic models: Issues in developing models, evaluating assumptions and adequacy, and measuring and reducing errors. Statistics in Medicine, 15, 361–387.10.1002/(SICI)1097-0258(19960229)15:4<361::AID-SIM168>3.0.CO;2-4
  • Harris, D. A., Smallbone, S., Dennison, S., & Knight, R. A. (2009). Specialization and versatility in sexual offenders referred for civil commitment. Journal of Criminal Justice, 37, 37–44.10.1016/j.jcrimjus.2008.12.002
  • Haynie, D. L. (2001). Delinquent peers revisited: Does network structure matter? American Journal of Sociology, 106, 1013–1057.10.1086/ajs.2001.106.issue-4
  • Haynie, D. L. (2002). Friendship networks and delinquency: The relative nature of peer delinquency. Journal of Quantitative Criminology, 18, 99–134.10.1023/A:1015227414929
  • Heckathorn, D. D. (2007). Extensions of respondent-driven sampling: Analyzing continuous variables and controlling for differential recruitment. Sociological Methodology, 37, 151–207.10.1111/some.2007.37.issue-1
  • Hertz-Picciotto, I., & Rockhill, B. (1997). Validity and efficiency of approximation methods for tied survival times in Cox regression. Biometrics, 53, 1151–1156.10.2307/2533573
  • Higgins, G. E., & Marcum, C. D. (2011). Digital piracy: An integrated theoretical approach. Raleigh, NC: Carolina Academic Press.
  • Hoechle, D. (2007). Robust standard errors for panel regressions with cross-sectional dependence. Stata Journal, 7, 281–312.
  • Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.10.1080/01639620601131065
  • Holt, T. J. (2012). Exploring the intersections of technology, crime, and terror. Terrorism and Political Violence, 24, 337–354.10.1080/09546553.2011.648350
  • Holt, T. J. (2013). Examining the forces shaping cybercrime markets online. Social Science Computer Review, 31, 165–177.10.1177/0894439312452998
  • Holt, T. J., Blevins, K. R., & Burkert, N. (2010). Considering the pedophile subculture on-line. Sexual Abuse: Journal of Research and Treatment, 22, 3–24.
  • Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35, 20–40.10.1080/01639625.2013.822209
  • Holt, T. J., Strumsky, D., Smirnova, O., & Kilger, M. (2012). Examining the social networks of malware writers and hackers. International Journal of Cyber Criminology, 6, 891–903.
  • Hsu, C., & Lin, J. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45, 65–74.
  • Jordan, T., & Taylor, P. (1998). A sociology of hackers. Sociological Review, 46, 757–780.10.1111/sore.1998.46.issue-4
  • Kumar, R. A., & Kaliyaperumal, G. (2012). Optimal fingerprint scheme for video on demand using block designs. Multimedia Tools and Applications, 61, 389–418.10.1007/s11042-011-0843-9
  • Latapy, M., Magnien, C., & Fournier, R. (2013). Quantifying paedophile activity in a large P2P system. Information Processing & Management, 49, 248–263.
  • Laub, J. H., & Sampson, R. J. (2003). Shared beginnings, divergent lives: Delinquent boys to age 70. Cambridge, MA: Harvard University Press.
  • LeBlanc, M., & Loeber, R. (1998). Developmental criminology update. Crime and Justice, 23, 115–198.
  • LeGrand, B., Guillaume, J., Latapy, M., & Magnien, C. (2009). Technical report on Dynamics of Paedophile Keywords in eDonkey Queries. Measurement and analysis of P2P activity against paedophile content project. Retrieved from: http://antipaedo.lib6.fr/
  • Lijoi, A., & Nipoti, B. (2014). A class of hazard rate mixtures for combining survival data from different experiments. Journal of the American Statistical Association, 109, 802–814.10.1080/01621459.2013.869499
  • Lussier, P. (2005). The criminal activity of sexual offenders in adulthood: Revisiting the specialization debate. Sexual Abuse: A Journal of Research and Treatment, 17, 269–292.
  • Lussier, P., & LeBlanc, M., & Proulx, J. (2005). The generality of criminal behavior: A confirmatory factor analysis of the criminal activity of sex offenders in adulthood. Journal of Criminal Justice, 33, 177–189.10.1016/j.jcrimjus.2004.12.009
  • Lussier, P., Tzoumakis, S., Cale, J., & Amirault, J. (2010). Criminal trajectories of adult sex offenders and the age effect: Examining the dynamic aspect of offending in adulthood. International Criminal Justice Review, 20, 147–168.10.1177/1057567710368360
  • Maimon, D., Alper, M., Sobesto, B., & Cukier, M. (2014). Restrictive deterrent effects of a warning banner in an attacked computer system. Criminology, 52, 33–59.10.1111/crim.2014.52.issue-1
  • McGloin, J. M., & Nguyen, H. (2014). The importance of studying co-offending networks for criminological theory and policy. In C. Morselli (Ed.), Crime and networks (pp. 13–27). New York, NY: Routledge.
  • McGloin, J. M., & Piquero, A. R. (2010). On the relationship between co-offending network redundancy and offending versatility. Journal of Research in Crime and Delinquency, 47, 63–90.10.1177/0022427809348905
  • Miethe, T. D., Olson, J., & Mitchell, O. (2006). Specialization and persistence in the arrest histories of sex offenders: A comparative analysis of alternative measures and offense types. Journal of Research in Crime and Delinquency, 43, 204–229.10.1177/0022427806286564
  • Miranda González, F. J., & Bañegil Palacios, T. M. (2004). Quantitative evaluation of commercial web sites. International Journal of Information Management, 24, 313–328.10.1016/j.ijinfomgt.2004.04.009
  • Mitchell, K. J., Wolak, J., Finkelhor, D., & Jones, L. (2011). Investigators using the Internet to apprehend sex offenders: Findings from the Second National Juvenile Online Victimization Study. Police Practice and Research: An International Journal, 13, 267–281.
  • Morselli, C., & Roy, J. (2008). Brokerage qualifications in ringing operations. Criminology, 46, 71–98.10.1111/j.1745-9125.2008.00103.x
  • Moule, R. K., Pyrooz, D. C., & Decker, S. H. (2014). Internet adoption and online behaviour among American street gangs. British Journal of Criminology, 54, 1186–1206.
  • Newman, G. R., & Clark, R. V. (2003). Superhighway robbery. New York, NY: Routledge.
  • O’Halloran, E., & Quayle, E. (2010). A content analysis of a “boy love” support forum: Revisiting Durkin and Bryant. Journal of Sexual Aggression, 16, 71–85.10.1080/13552600903395319
  • Patchin, J. W., & Hinduja, S. (2011). Traditional and nontraditional bullying among youth: A Test of General Strain Theory. Youth and Society, 43, 727–751.10.1177/0044118X10366951
  • Piquero, A. R., Farrington, D. P., & Blumstein, A. (2003). The criminal career paradigm. Crime and Justice, 30, 359–506.
  • Prichard, J., Watters, P. A., & Spiranovic, C. (2011). Internet subcultures and pathways to the use of child pornography. Computer Law & Security Review, 27, 585–600.
  • Pyrooz, D. C., Decker, S. H., & Moule, R. K. (2015). Criminal and routine activities in online settings: Gangs, offenders, and the Internet. Justice Quarterly, 32, 471–499.
  • Quayle, E., & Taylor, M. (2011). Social networking as a nexus for engagement and exploitation of young people. Information Security Technical Report, 16, 44–50.
  • Reiss, A. J. (1986). Co-offending influences on criminal careers. In A. Blumstein, J. Cohen, J. Roth, & C. Visher (Eds.), Criminal careers and career criminals (pp. 121–160). Washington, DC: National Academy Press.
  • Robbins, S. S., & Stylianou, A. C. (2003). Global corporate web sites: An empirical investigation of content and design. Information & Management, 40, 205–212.
  • Rosenmann, A., & Safir, M. P. (2006). Forced online. Journal of Homosexuality, 51, 71–92.10.1300/J082v51n03_05
  • Salganik, M. J., & Heckathorn, D. D. (2004). Sampling and estimation in hidden populations using respondent-driven sampling. Sociological Methodology, 34, 193–240.10.1111/some.2004.34.issue-1
  • Steel, C. M. S. (2009). Child pornography in peer-to-peer networks. Child Abuse & Neglect, 33, 560–568.
  • Tremblay, P. (1993). Searching for suitable co-offenders. In R. V. Clarke & M. Felson (Eds.), Routine activity and rational choice (pp. 17–36). New Brunswick, NJ: Transaction.
  • Tremblay, P. (2002). Social interactions among paedophiles. Les Cahiers de Recherches Criminologiques, 36, 1–48.
  • Tremblay, P. (2006). Convergence settings for nonpredatory “Boy Lovers”. In R. Wortley & S. Smallbone (Eds.), Situational prevention of child sexual abuse (pp. 145–168). Monsey, NY: Criminal Justice Press.
  • Urboniene, A. (2014). Motivation for blogging: A qualitative approach. International Journal of Global Business Management and Research, 2(2), 1–14. Paper 2.
  • Warr, M. (2002). Companions in crime. Cambridge: Cambridge University Press.10.1017/CBO9780511803956
  • Weerman, F. M. (2003). Co-offending as social exchange. Explaining characteristics of co-offending. British Journal of Criminology, 43, 398–416.10.1093/bjc/43.2.398
  • Westlake, B. G., Bouchard, M., & Frank, R. (2011). Finding the key players in child exploitation networks. Policy and Internet, 3(2), 1–34. Article 6.
  • Westlake, B. G., Bouchard, M., & Frank, R. (2012). Comparing methods for detecting child exploitation content online. Paper presented at the European Intelligence and Security Informatics Conference 2012, Odense, Denmark.
  • Wiseman, J. (1996). SM 101: A realistic introduction. San Francisco, CA: Greenery Press.
  • Wolak, J., Finkelhor, D., & Mitchell, K. J. (2005). Child pornography possessors arrested in Internet-related crimes: Findings from the National Juvenile Online Victimization Study. Alexandria, VA: National Center for Missing & Exploited Children.
  • Wortley, R., & Smallbone, S. (2012). Internet child pornography: Causes, investigation, and prevention. Santa Barbara, CA: ABC-CLIO.
  • Yasrebi, H., Sperisen, P., Praz, V., & Bucher, P. (2009). Can survival prediction be improved by merging gene expression datasets? PLOS One, 4(10), 1–14. doi:10.1371/journal.pone.0007431

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.