1,277
Views
39
CrossRef citations to date
0
Altmetric
Original Articles

Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On‐Line Data

Pages 466-487 | Published online: 15 Oct 2010

References

  • Adler , P. A. and Adler , P. 1987 . Membership roles in field research , Newbury Park, CA : Sage .
  • Adler , P. A. and Adler , P. 2007 . The demedicalization of self‐injury: From psychopathology to sociological deviance . Journal of Contemporary Ethnography , 36 : 537 – 570 .
  • Baudrillard , J. 1998 . Jean Baudrillard: Selected writings , Stanford, CA : Stanford University Press .
  • Bell , D. 2001 . An introduction to cyberculture , New York : Routledge .
  • Blevins , K. and Holt , T. J. 2009 . Examining the virtual subculture of johns . Journal of Contemporary Ethnography , 38 : 619 – 648 .
  • Buckler , K. 2008 . The quantitative/qualitative divide revisited: A study of published research, doctoral program curricula, and journal editor perceptions . Journal of Criminal Justice Education , 19 : 383 – 403 .
  • Burkhalter , B. 1999 . “ Reading race online: Discovering racial identity in Usenet discussions ” . In Communities in cyberspace , Edited by: Smith , M. A. and Kollack , P. 60 – 74 . New York : Routledge .
  • Cherny , L. 1999 . Conversation and community: Chat in a virtual world , Stanford, CA : CSLI .
  • Chu , B. , Holt , T. J. and Ahn , G. J. 2010 . Examining the creation, distribution, and function of malware on‐line Technical Report for National Institute of Justice. NIJ Grant No. 2007‐IJ‐CX‐0018. Retrieved April 20, 2010, from http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf
  • Cooper , J. and Harrison , D. M. 2001 . The social organization of audio piracy on the Internet . Media, Culture, and Society , 23 : 71 – 89 .
  • Copes , H. and Williams , P. 2007 . Techniques of affirmation: Deviant behavior, moral commitment, and resistant subcultural identity . Deviant Behavior , 28 : 247 – 272 .
  • Cunningham , S. and Kendall , T. 2009 . Prostitution 2.0: The changing face of sex work Retrieved June 1, 2009, from http://www.toddkendall.net/Pros20_Final.pdf
  • Cunningham , S. and Kendall , T. 2010 . “ Sex for sale: Online commerce in the world’s oldest profession ” . In Crime on‐line: Correlates, causes, and context , Edited by: Holt , T. J. 40 – 75 . Raleigh, NC : Carolina Academic Press .
  • Damphouse , K. 2009 . “ The dark side of the web: Terrorists’ use of the Internet ” . In Crimes of the Internet , Edited by: Schmalleger , F. and Pittaro , M. 573 – 592 . Upper Saddle River, NJ : Pearson Prentice Hall .
  • Denzin , N. 1970 . The research act in sociology , London : Butterworth .
  • Dillman , D. 2000 . Mail and Internet surveys: The tailored design method , New York : John Wiley .
  • DiMarco , A. D. and DiMarco , H. 2003 . “ Investigating cybersociety: A consideration of the ethical and practical issues surrounding online research in chat rooms ” . In Dot.cons: Crime, deviance and identity on the Internet , Edited by: Jewkes , Y. 164 – 179 . Portland, OR : Willan .
  • Durkin , K. F. 2007 . Show me the money: Cybershrews and on‐line money masochists . Deviant Behavior , 28 : 355 – 378 .
  • Durkin , K. F. and Bryant , C. D. 1999 . Propagandizing pederasty: A thematic analysis of the on‐line exculpatory accounts of unrepentant pedophiles . Deviant Behavior , 20 : 103 – 127 .
  • Ebo , B. 1998 . Cyberghetto or cybertopia: Race, class, and gender on the Internet , Westport, CT : Praeger .
  • Edelson , E. 2003 . The 419 scam: Information warfare on the spam front and a proposal for local filtering . Computers and Security , 22 : 392 – 401 .
  • Eysenbach , G. and Till , J. E. 2001 . Ethical issues in qualitative research on Internet communities . British Medical Journal , 323 : 1103 – 1105 .
  • Franklin , J. , Paxson , V. , Perrig , A. and Savage , S. An inquiry into the nature and cause of the wealth of Internet miscreants . Paper presented at the 14th ACM conference on Computer and Communications Security . Alexandria, VA. October‐November .
  • Garcia , A. C. , Standlee , A. I. , Bechkoff , J. and Cui , Y. 2009 . Ethnographic approaches to the Internet and computer‐mediated communication . Journal of Contemporary Ethnography , 38 : 52 – 84 .
  • Gartner Group . 2003 . Gartner says marketers must differentiate e‐mail marketing from spam Retrieved July 14, 2006, from www4.gartner.com/5_about/press_releases/pr29sept2003a.jsp
  • Gauthier , D. A. K. and Chaudoir , N. K. 2004 . Tranny boyz: Cyber community support in negotiating sex and gender mobility among female to male transsexuals . Deviant Behavior , 25 : 375 – 398 .
  • Gauthier , D. K. and Forsyth , C. J. 1999 . Bareback sex, bug chasers, and the gift of death . Deviant Behavior , 20 : 85 – 100 .
  • Grov , C. 2004 . Make me your death slave: Men who have sex with men and use the Internet to intentionally spread HIV . Deviant Behavior , 25 : 329 – 349 .
  • Hagan , J. and McCarthy , B. 1997 . Mean streets: Youth crime and homelessness , Cambridge : Cambridge University Press .
  • Heerwegh , D. 2005 . Effects of personal salutations in e‐mail invitations to participate in a web survey . Public Opinion Quarterly , 69 : 588 – 598 .
  • Herzog , H. A. , Dinoff , B. and Page , J. R. 1997 . Animal rights talk: Moral debate over the Internet . Qualitative Sociology , 20 : 399 – 418 .
  • Hessler , R. , Downing , L. , Beltz , C. , Pelliccio , A. , Powell , M. and Vale , W. 2003 . Qualitative research on adolescent risk using email: A methodological assessment . Qualitative Sociology , 26 : 111 – 124 .
  • Hinduja , S. 2007 . Computer crime investigations in the United States: Leveraging knowledge from the past to address the future . International Journal of Cyber Criminology , 1 : 400 – 420 .
  • Hine , C. , ed. 2005 . Virtual methods: Issues in social research on the Internet , Oxford : Berg .
  • Holt , T. J. 2007a . Subcultural evolution? Examining the influence of on‐ and off‐line experiences on deviant subcultures . Deviant Behavior , 28 : 171 – 198 .
  • Holt , T. J. The market for malware . Paper presented at the Defcon 15 conference . Las Vegas, NV. August .
  • Holt , T. J. 2009 . Examining the role of technology in the formation of deviant subcultures . Social Science Computer Review , doi:10.1177/0894439309351344
  • Holt , T. J. and Blevins , K. R. 2007 . Examining sex work from the client’s perspective: Assessing johns using online data . Deviant Behavior , 28 : 333 – 354 .
  • Holt , T. J. , Blevins , K. R. and Burkert , N. 2010 . Considering the pedophile subculture online . Sexual Abuse , 22 : 3 – 24 .
  • Holt , T. J. , Blevins , K. R. and Kuhns , J. B. 2008 . Examining the displacement practices of johns with on‐line data . Journal of Criminal Justice , 36 : 522 – 528 .
  • Holt , T. J. , Blevins , K. R. and Kuhns , J. B. 2009 . Examining diffusion and arrest avoidance practices among johns . Crime and Delinquency , doi:10.1177/0011128709347087
  • Holt , T. J. and Copes , H. 2010 . Transferring subcultural knowledge online: Practices and beliefs of persistent digital pirates . Deviant Behavior , 31 : 625 – 654 .
  • Holt , T. J. and Graves , D. C. 2007 . A qualitative analysis of Advanced Fee Fraud schemes . International Journal of Cyber‐Criminology , 1 : 137 – 154 .
  • Holt , T. J. and Lampke , E. 2010 . Exploring stolen data markets on‐line: Products and market forces . Criminal Justice Studies , 23 : 33 – 50 .
  • Holt , T. J. , Soles , J. B. and Leslie , L. Characterizing malware writers and computer attackers in their own words . Paper presented at the 2008 International Conference on Information Warfare and Security, Peter Kiewit Institute, University of Nebraska at Omaha . NE. April .
  • Honeynet Research Alliance . 2003 . “ Profile: Automated credit card fraud ” . In Know Your Enemy Paper series Retrieved July 20, 2008, from http://www.honeynet.org/papers/profiles/cc-fraud.pdf
  • Hookway , N. 2008 . Entering the blogosphere: Some strategies for using blogs in social research . Qualitative Research , 8 : 91 – 113 .
  • Jacobs , B. A. 1998 . “ Researching crack dealers: Dilemmas and contradictions ” . In Ethnography at the edge: Crime, deviance, and field research , Edited by: Ferrell , J. and Hamm , M. S. 160 – 177 . Boston, MA : Northeastern University Press .
  • Jenkins , P. 2001 . Beyond tolerance: Child pornography on the Internet , New York : New York University Press .
  • Jerin , R. and Dolinsky , B. 2001 . You’ve got mail! You don’t want it: Cyber‐victimization and on‐line dating . Journal of Criminal Justice and Popular Culture , 9 : 15 – 21 .
  • Jewkes , Y. and Sharpe , K. 2003 . “ Crime, deviance and the disembodied self: Transcending the dangers of corporeality ” . In Dot.cons: Crime, deviance and identity on the Internet , Edited by: Jewkes , Y. 1 – 14 . Portland, OR : Willan .
  • Jordan , T. and Taylor , P. 1998 . A sociology of hackers . Sociological Review , 46 : 757 – 780 .
  • Kendall , L. 2004 . “ Participants and observers in online ethnography: Five stories about identity ” . In Online social research: Methods, issues, and ethics , Edited by: Johns , M. D. , Chen , S.‐L. S. and Hall , G. J. 125 – 140 . New York : Peter Lang .
  • King , A. and Thomas , J. 2009 . “ You can’t cheat an honest man: Making ($$$ and) sense of the Nigerian e‐mail scams ” . In Crimes of the Internet , Edited by: Schmalleger , F. and Pittaro , M. 206 – 224 . Upper Saddle River, NJ : Pearson Prentice Hall .
  • King , J. E. , Walpole , C. E. and Lamon , K. 2007 . Surf and turf wars online: Growing implications of Internet gang violence . Journal of Adolescent Health , 6 : 66 – 68 .
  • Kivits , J. 2005 . “ Online interviewing and the research relationship ” . In Virtual methods: Issues in social research on the Internet , Edited by: Hine , C. 35 – 50 . Oxford : Berg .
  • Kleck , G. , Tark , J. and Bellows , J. J. 2006 . What methods are most frequently used in research in criminology and criminal justice? . Journal of Criminal Justice , 34 : 147 – 152 .
  • Landreth , B. 1985 . Out of the inner circle , Washington, DC : Microsoft Press .
  • Lee‐Gonyea , J. A. , Castle , T. and Gonyea , N. E. 2009 . Laid to order: Male escorts advertising on the Internet . Deviant Behavior , 30 : 321 – 348 .
  • Leung , L. 2005 . Virtual ethnicity: Race, resistance and the World Wide Web , Burlington, VT : Ashgate .
  • Lofland , J. and Lofland , L. H. 1995 . Analyzing social settings: A guide to qualitative observation and analysis , Belmont, CA : Wadsworth .
  • Loper , D. K. 2000 . The criminology of computer hackers: A qualitative and quantitative analysis (Unpublished doctoral dissertation, Michigan State University, 2000)
  • Malesky Jr , L. A. and Ennis , L. 2004 . Supportive distortions: An analysis of posts on a pedophile Internet message board . Journal of Addictions and Offender Counseling , 24 : 92 – 100 .
  • Mann , C. and Stewart , F. 2002 . “ Internet interviewing ” . In Handbook of Internet research: Context and method , Edited by: Holstein , J. A. and Gubrium , J. F. 603 – 628 . London : Sage .
  • Mann , D. and Sutton , M. 1998 . Netcrime: More changes in the organisation of thieving . British Journal of Criminology , 38 : 201 – 229 .
  • Marx , G. 1998 . An ethics for the new surveillance . Information Society , 14 : 171 – 185 .
  • Meyer , G. R. 1989 . The social organization of the computer underground (Master’s thesis, Northern Illinois University, 1989)
  • Miller , D. and Slater , D. 2000 . The Internet: An ethnographic approach , New York : Berg .
  • Miller , J. 2005 . The status of qualitative research in criminology Retrieved May 17, 2006, from http://www.wjh.harvard.edu/nsfqual/Miller%20Paper.pdf
  • Park , S. , Lee , J. H. and Bae , H. J. 2005 . End user searching: A Web log analysis of NAVER, a Korean web search engine . Library and Information Science Research , 27 : 203 – 221 .
  • Patchin , J. and Hinduja , S. 2007 . What kids do on MySpace . Technology and Learning , 27 : 7 – 27 .
  • Pruitt , M. V. 2008 . Deviant research: Deception, male Internet escorts, and response rates . Deviant Behavior , 29 : 70 – 82 .
  • Quinn , J. F. and Forsyth , C. J. 2005 . Describing sexual behavior in the era of the Internet: A typology for empirical research . Deviant Behavior , 26 : 191 – 207 .
  • Reid , E. M. 1996 . Informed consent in the study of online communities: A reflection on the effects of computer‐mediated social research . Information Society , 12 : 169 – 174 .
  • Riva , G. 2002 . The sociocognitive psychology of computer‐mediated communication: The present and future of technology‐based interactions . CyberPsychology and Behavior , 5 : 581 – 598 .
  • Rutter , J. and Smith , G. W. H. 2005 . “ Ethnographic presence in a nebulous setting ” . In Virtual methods: Issues in social research on the Internet , Edited by: Hine , C. 81 – 92 . Oxford : Berg .
  • Selwyn , N. and Robson , K. 1998 . E‐mail as a research tool . Social Research Update , : 21 Retrieved November 14, 2005, from http://www.soc.surrey.ac.uk/sru/SRU21.html
  • Sharpe , K. and Earle , S. 2003 . “ Cyberpunters and cyberwhores: Prostitution on the Internet ” . In Dot.cons: Crime, deviance and identity on the Internet , Edited by: Jewkes , Y. 36 – 52 . Portland, OR : Willan .
  • Silverman , D. 2004 . Interpreting qualitative data: Methods for analyzing talk, text, and interaction , (3rd ed.) , Thousand Oaks, CA : Sage .
  • Soothill , K. and Sanders , T. 2005 . The geographical mobility, preferences and pleasures of prolific punters: A demonstration study of the activities of prostitutes’ clients . Sociological Research On‐Line , 10 (1) Retrieved from http://www.socresonline.org.uk/10/1/soothill/soothill.pdf
  • Steel , C. 2006 . Windows forensics: The field guide to corporate computer crime investigations , Somerset, NJ : Wiley .
  • Sveningsson , M. 2004 . “ Ethics in Internet ethnography ” . In Virtual research ethics: Issues and controversies , Edited by: Buchanan , E. A. 45 – 61 . Hershey, PA : Information Science .
  • Taylor , P. A. 1999 . Hackers: Crime in the digital sublime , New York : Routledge .
  • Taylor , R. W. , Fritsch , E. J. , Liederbach , J. and Holt , T. J. 2010 . Digital crime and digital terrorism , (2nd ed.) , Upper Saddle River, NJ : Pearson Prentice Hall .
  • Tewksbury , R. 2003 . Bareback sex and the quest for HIV: Assessing the relationship in Internet personal advertisements of men who have sex with men . Deviant Behavior , 24 : 467 – 482 .
  • Tewksbury , R. 2006 . Click here for HIV: An analysis of Internet‐based bug chasers and bug givers . Deviant Behavior , 27 : 379 – 395 .
  • Tewksbury , R. , Dabney , D. and Copes , H. 2010 . The prominence of qualitative research in criminology and criminal justice scholarship . Journal of Criminal Justice Education , 21 : 391 – 411 .
  • Tewksbury , R. , DeMichele , M. T. and Miller , J. M. 2005 . Methodological orientations of articles appearing in criminal justice’s top journals: Who publishes what and where . Journal of Criminal Justice Education , 16 : 265 – 279 .
  • Thomas , R. and Martin , J. 2006 . The underground economy: Priceless . login , 31 : 7 – 16 .
  • Turkle , S. 1995 . Life on‐screen: Identity in the age of the Internet , New York : Simon & Schuster .
  • Walker , K. 2000 . It’s difficult to hide it: The presentation of self on Internet home pages . Qualitative Sociology , 23 : 99 – 120 .
  • Wall , D. S. 2001 . “ Cybercrimes and the Internet ” . In Crime and the Internet , Edited by: Wall , D. S. 1 – 17 . New York : Routledge .
  • Wall , D. S. 2004 . Digital realism and the governance of spam as cybercrime . European Journal on Criminal Policy and Research , 10 : 309 – 335 .
  • Williams , P. and Copes , H. 2005 . How edge are you? Constructing authentic identities and subcultural boundaries in a Straightedge Internet forum . Symbolic Interaction , 28 : 67 – 89 .
  • Wilson , B. and Atkinson , M. 2005 . Rave and Straightedge, the virtual and the real: Exploring online and offline experiences in Canadian youth subcultures . Youth and Society , 36 : 276 – 311 .
  • Wright , R. T. , Decker , S. H. , Redfern , A. K. and Smith , D. L. 1992 . A snowball’s chance in hell: Doing field research with residential burglars . Journal of Research in Crime and Delinquency , 29 : 148 – 161 .
  • Wright , R. T. and Stein , M. 1996 . Seeing ourselves: Exploring the social production of criminological knowledge in a qualitative methods course . Journal of Criminal Justice Education , 7 : 65 – 77 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.