References
- Abidin, F. N. Z., & Westhead, D. R. (2017). Flexible model-based clustering of mixed binary and continuous data: Application to genetic regulation and cancer. Nucleic Acids Research, 45(7), e53. https://doi.org/https://doi.org/10.1093/nar/gkw1270
- Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47–88. https://doi.org/https://doi.org/10.1111/j.1745-9125.1992.tb01093.x
- Agnew, R. (2006). Pressured into crime: An overview of general strain theory (pp. 238). Roxbury. https://www.amazon.com/Pressured-Into-Crime-Overview-General/dp/0195330757
- Akers, R. L. (1998). Social learning and social structure: A general theory of crime and deviance. Northeastern University Press.
- Akers, R. L. (2009). Social Learning and Social Structure: A General Theory of Crime and Deviance. Transaction.
- Anderson, E. (1999). The code of the street. Decency, violence, and the moral life of the inner city. W.W. Norton Company.
- Ansolabehere, S., & Schaffner, B. F. (2014). Does survey mode still matter? Findings from a 2010 multi-mode comparison. Political Analysis, 22(3), 285–303. https://doi.org/https://doi.org/10.1093/pan/mpt025
- Awan, I., & Zempi, I. (2016). The affinity between online and offline anti-Muslim hate crime: Dynamics and impacts. Aggression and Violent Behavior, 27, 1–8. https://doi.org/https://doi.org/10.1016/j.avb.2016.02.001
- Bail, C. A., Argyle, L. P., Brown, T. W., Bumpus, J. P., Chen, H., Hunzaker, M. B. F., Lee, J., Mann, M., Merhout, F., & Volfovsky, A. (2018). Exposure to opposing views on social media can increase political polarization. Proceedings of the National Academy of Sciences of the United States of America, 115(37), 9216–9221. https://doi.org/https://doi.org/10.1073/pnas.1804840115
- Baron, S. W., Forde, D. R., & Kay, F. M. (2007). Self-control, risky lifestyles, and situation: The role of opportunity and context in the general theory. Journal of Criminal Justice, 35(2), 119–136. https://doi.org/https://doi.org/10.1016/j.jcrimjus.2007.01.001
- Baskin, D. R., & Sommers, I. B. (1997). Casualties of community disorder: Women’s careers in violent crime. Westview.
- Baxter, A. L. A. (2020). When the line between victimization and criminalization blurs: The victim-offender overlap observed in female offenders in cases of trafficking in persons for sexual exploitation in Australia. Journal of Human Trafficking, 6(3), 327–338. https://doi.org/https://doi.org/10.1080/23322705.2019.1578579
- Beckley, A. L., Caspi, A., Arseneault, L., Barnes, J. C., Fisher, H. L., Harrington, H., Houts, R., Morgan, N., Odgers, C. L., Wertz, J., & Moffitt, T. E. (2018). The developmental nature of the victim-offender overlap. Journal of Developmental and Life-Course Criminology, 4(1), 24–49. https://doi.org/https://doi.org/10.1007/s40865-017-0068-3
- Blee, K. M., & Creasap, K. A. (2010). Conservative and right-wing movements. Annual Review of Sociology, 36(1), 269–286. https://doi.org/https://doi.org/10.1146/annurev.soc.012809.102602
- Bleijenbergh, I., Korzilius, H., & Verschuren, P. (2011). Methodological criteria for the internal validity and utility of practice oriented research. Quality & Quantity, 45(1), 145–165. https://doi.org/https://doi.org/10.1007/s11135-010-9361-5
- Bossler, A., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400–420. https://www.cybercrimejournal.com/bosslerholtjan2009.htm
- Bossler, A. M., & Holt, T. J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38(3), 227–236. https://doi.org/https://doi.org/10.1016/j.jcrimjus.2010.03.001
- Bossler, A., Holt, T. J., & May, D. (2012). Predicting online harassment Victimization among a juvenile population. Youth & Society, 44(4), 500–523. https://doi.org/https://doi.org/10.1177/0044118X11407525
- Bowling, B. (2009). Violent racism: Victimisation, policing and social context (B. Williams & H. Goodman-Chong, Eds.), Victims and victimisation: A reader (pp. 45-57). Open University Press.
- Boxell, L., Gentzkow, M., & Shapiro, J. M. (2017). Is the internet causing political polarization? Evidence from demographics. National Bureau of Economic Research. Working Paper 23258. https://doi.org/https://doi.org/10.3386/w23258
- Brenner, J., & Smith, A. (2003). 72% of online adults are social networking site users. Pew Research Center. https://www.pewinternet.org/wp-content/uploads/sites/9/media/Files/Reports/2013/PIP_Social_networking_sites_update_PDF.pdf
- Broidy, L. M., Daday, J. K., Crandall, C. S., Klar, D. P., & Jost, P. F. (2006). Exploring demographic, Structural, and behavioral overlap among homicide offenders and victims. Homicide Studies, 10(3), 155–180. https://doi.org/https://doi.org/10.1177/1088767906288577
- Buil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., & Díaz-Castaño, N. (2021). Cybercrime and shifts in opportunities during COVID-19: A preliminary analysis in the UK. European Societies, 23(sup1), S47–S59. https://doi.org/https://doi.org/10.1080/14616696.2020.1804973
- Callegaro, M., Villar, A., Yeager, D. S., & Krosnick, J. A. (2014). A critical review of studies investigating the quality of data obtained with online panels based on probability and nonprobability samples. In M. Callergaro, R. Baker, J. Betlehem, A. S. Göritz, J. A. Krosnik, & P. J. Lavrakas (Eds.), Online panel research: A data quality perspective (1st Edition ed., pp. 23–53). Wiley.
- Cavezza, C., & McEwan, T. E. (2014). Cyberstalking versus off-line stalking in a forensic sample. Psychology, Crime & Law, 20(10), 955–970. https://doi.org/https://doi.org/10.1080/1068316X.2014.893334
- Chan, J., Ghose, A., & Seamans, R. (2016). The internet and racial hate crimes: Offline spillovers from online access. MIS Quarterly, 40(2), 381–403. https://doi.org/https://doi.org/10.25300/MISQ/2016/40.2.05
- Chang, J. J., Chen, J. J., & Brownson, R. C. (2003). The role of repeat victimization in adolescent delinquent behaviors and recidivism. Journal of Adolescent Health, 32(4), 272–280. https://doi.org/https://doi.org/10.1016/s1054-139x(02)00564-5
- Choi, K.-S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308–333. https://www.cybercrimejournal.com/Choiijccjan2008.htm
- Choi, S., Choi, K.-S., Sungu-Eryilmaz, Y., & Park, H. (2020). Illegal gambling and its operation via the darknet and bitcoin: An application of routine activity theory. The International Journal of Cybersecurity Intelligence and Cybercrime, 3(1), 3–23. https://doi.org/https://doi.org/10.52306/03010220HTLI7653
- Choi, K.-S., Earl, K. J., Park, A., & Della Giustina, J. (2014). Use of synthetic cathinones: Legal issues and availability of darknet. VFAC Review, 7(Sept/Oct, Issue 7), 19–32. https://vc.bridgew.edu/crim_fac/21/
- Choi, K.-S., & Lee, J. R. (2017). Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory. Computers in Human Behavior, 73, 394–402. https://doi.org/https://doi.org/10.1016/j.chb.2017.03.061
- Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608. https://doi.org/https://doi.org/10.2307/2094589
- Cohen, L. E., Kluegel, J. R., & Land, K. C. (1981). Social inequality and predatory criminal victimization: An exposition and test of a formal theory. American Sociological Review, 46(5), 505–524. https://doi.org/https://doi.org/10.2307/2094935
- Collier, B., Horgan, S., Jones, R., & Shepherd, L. A. (2020). The implications of the COVID-19 pandemic for cybercrime policing in Scotland: A rapid review of the evidence and future considerations. In Research Evidence in Policing: Pandemics, 1(pp. 18). Scottish Institute for Policing Research.
- Costello, M., & Hawdon, E. J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and Gender, 5(1), 55–60. https://doi.org/https://doi.org/10.1089/vio.2017.0048
- Costello, M., Hawdon, J., & Ratliff, T. N. (2017). Confronting online extremism: The effect of self-help, collective efficacy, and guardianship on being a target for hate speech. Social Science Computer Review, 35(5), 587–605. https://doi.org/https://doi.org/10.1177/0894439316666272
- Craig, B. M., Hays, R. D., Pickard, A. S., Cella, D., Revicki, D. A., & Reeve, B. B. (2013). Comparison of US panel vendors for online surveys. Journal of Medical Internet Research, 15(11), e260. https://doi.org/https://doi.org/10.2196/jmir.2903
- Cullen, F. T., Unnever, J. D., Hartman, J. L., Turner, M. G., & Agnew, R. (2008). Gender, bullying victimization, and juvenile delinquency: A test of general strain theory. Victims & Offenders, 3(4), 331–349. https://doi.org/https://doi.org/10.1080/15564880802338468
- Daday, J. K., Broidy, L. M., Crandall, C. S., & Sklar, D. P. (2005). Individual, neighborhood, and situational factors associated with violent victimization and offending. Criminal Justice Studies, 18(3), 215–235. https://doi.org/https://doi.org/10.1080/14786010500287347
- Dobrin, A. (2001). The risk of offending on homicide victimization: A case control study. Journal of Research in Crime and Delinquency, 38(2), 154–173. https://doi.org/https://doi.org/10.1177/0022427801038002003
- Espelage, D. L., & Swearer, S. M. (2003). Research on school bullying and victimization: What have we learned and where do we go from here? School Psychology Review, 32(3), 365–383. https://doi.org/https://doi.org/10.1080/02796015.2003.12086206
- Feldman, M., Littler, M., Dack, J., & Copsey, N. (2013). Anti-Muslim Hate Crime and the Far Right. Teeside University. https://pure.hud.ac.uk/en/publications/anti-muslim-hate-crime-and-the-far-right
- Felson, R. B. (1992). “Kick ‘em when they’re down”: Explanations of the relationship between stress and interpersonal aggression and violence. The Sociological Quarterly, 33(1), 1–16. https://doi.org/https://doi.org/10.1111/j.1533-8525.1992.tb00360.x
- Fiegelman, S., Howard, D. E., Xiaoming, L., & Cross, S. I. (2000). Psychosocial and Environmental Correlates of Violence Perpetration among African-American Urban Youth. Journal of Adolescent Health. 27(3), 202–209. https://doi.org/https://doi.org/10.1016/s1054-139x(99)00124-x.PMID:10960219
- Foxman, A., & Wolf, C. (2013). Viral hate: Containing its spread on the internet. Macmillan.
- Freilich, J., Belli, R., & Chermak, S. (2011). United States Extremist Crime Database. (ECDB) 1990–2010. http://www.start.umd.edu/research-projects/united-statesextremist-crime-database-ecdb-1990-2010
- Gershuny, J., Sullivan, O., Sevilla, A., Vega-Rapun, M., Foliano, F., Lamote, D. G., Harms, J., & Walthery, T. (2021). A new perspective from time use research on the effects of social restrictions on COVID-19 behavioral infection risk. PLoS ONE, 16(2), e0245551. https://doi.org/https://doi.org/10.1371/journal.pone.0245551
- Gibson, D., Agarwal, S., Meghani, A., Limaye, R. J., & Labrique, A. (2021). COVID-19 vaccine acceptability and inequity in the United States: Results from a nationally representative survey. medRXiv Preprint. https://doi.org/https://doi.org/10.1101/2021.01.29.21250784
- Gillani, N., Yuan, A., Saveski, M., Vosoughi, S., & Roy, D. (2018). Me, my echo chamber, and I: Introspection on social media polarization. WWW ’18: Proceedings of the 2018 World Wide Web Conference, 823–831. https://doi.org/https://doi.org/10.1145/3178876.3186130
- Gottfredson, M. R. (2009). The empirical status of control theory in criminology. In F. T. Cullen, J. P. Wright, & K. R. Blevins (Eds.), Taking stock: The status of criminological theory (Vol. 15. pp. 77–100). Transaction Publishers.
- Gottfredson, M., & Hirschi, T. (1990). A general theory of crime. Stanford University Press.
- Hawdon, J. (2012). Applying differential association theory to online hate groups: A theoretical statement. Finnish Journal of Social Research, 5, 39–47. https://doi.org/https://doi.org/10.51815/fjsr.110713
- Hawdon, E. J., Bernatzky, C., & Costello, M. (2019a). Cyber-routines, political attitudes, and exposure to violence-advocating online extremism. Social Forces, 98(1), 329–354. https://doi.org/https://doi.org/10.1093/sf/soy115
- Hawdon, E. J., Costello, M., Bernatzky, C., & Barrett-Fox, R. (2019b). The perpetuation of online hate: A criminological analysis of factors associated with participating in an online attack. Journal of Hate Studies, 15(1), 157–181. https://doi.org/https://doi.org/10.33972/jhs.166
- Hawdon, E. J., Costello, M., Bernatzky, C., & Restifo, S. (2020). The enthymemes of supporting president trump: Explaining the association between structural location, supporting the president, and agreeing with online extremism. Social Science Computer Review. https://doi.org/https://doi.org/10.1177/0894439320905767
- Henry, D., Dymnicki, A. B., Mohatt, N., Allen, J., & Kelly, J. G. (2015). Clustering methods with qualitative data: A Mixed-methods approach for prevention research with small samples. Prevention Science, 16(7), 1007–1016. https://doi.org/https://doi.org/10.1007/s11121-015-0561-z
- Heyman, R. E., & Smith, A. M. (2002). Do child abuse and interparental violence lead to adulthood family violence? Journal of Marriage and Family, 64(4), 684–870. https://doi.org/https://doi.org/10.1111/j.1741-3737.2002.00864.x
- Hiday, V. A., Swanson, J. W., Swartz, M. S., Borum, R., & Wagner, H. R. (2001). Victimization: A link between mental illness and violence? International Journal of Law and Psychiatry, 24(6), 559–572. https://doi.org/https://doi.org/10.1016/S0160-2527(01)00091-7
- Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3–22. https://doi.org/https://doi.org/10.1080/14786010600615934
- Higgins, G. E., Jennings, W. G., Tewksbury, R., & Gibson, C. L. (2009). Exploring the link between low self-control and violent victimization trajectories in adolescents. Criminal Justice and Behavior, 36(10), 1070–1084. https://doi.org/https://doi.org/10.1177/0093854809344046
- Higgins, G. E., & Makin, D. A. (2004). Does social learning theory condition the effects of low self-control on college students’ software piracy? Journal of Economic Crime Management, 2(2), 1–22. https://doi.org/https://doi.org/10.2466/pr0.95.3.921-931
- Higgins, G. E., & Wilson, A. L. (2006). Low self-control, moral beliefs, and social learning theory in university students’ intentions to pirate software. Security Journal, 19(2), 75–92. https://doi.org/https://doi.org/10.1057/palgrave.sj.8350002
- Hinduja, S., & Ingram, J. (2008). Self-control and ethical beliefs on the social learning of intellectual property theft. Western Criminological Review, 9(2), 52–72. https://www.westerncriminology.org/documents/WCR/v09n2/hinduja.pdf
- Hinduja, S., & Ingram, J. (2009). Social learning theory and music piracy: The differential role of online and offline peer influences. Criminal Justice Studies, 22(4), 405–420. https://doi.org/https://doi.org/10.1080/14786010903358125
- Hinduja, S., & Patchin, J. W. (2007). Offline consequences of online victimization: School violence and delinquency. Journal of School Violence, 6(3), 89–112. https://doi.org/https://doi.org/10.1300/J202v06n03_06
- Hollinger, R. C. (1993). Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal, 4(1), 2–12.
- Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28(2), 171–198. https://doi.org/https://doi.org/10.1080/01639620601131065
- Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25. https://doi.org/https://doi.org/10.1080/01639620701876577
- Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyber-deviance: examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33(2), 31–61. https://doi.org/https://doi.org/10.1080/0735648X.2010.9721287
- Holtfreter, K., Reisig, M. D., & Pratt, T. C. (2008). Low self-control, routine activities, and fraud victimization. Criminology, 46(1), 189–220. https://doi.org/https://doi.org/10.1111/j.1745-9125.2008.00101.x
- Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, 29(4), 334–366. https://doi.org/https://doi.org/10.1080/01639620701588131
- Jacobs, B. A., & Wright, R. (2006). Street Justice: Retaliation in the Criminal Underworld. Cambridge.
- Jennings, W. G., Higgins, G. E., Tewksbury, R., Gover, A. R., & Piquero, A. R. (2010). A longitudinal assessment of the victim-offender overlap. Journal of Interpersonal Violence, 25(12), 2147–2174. https://doi.org/https://doi.org/10.1177/0886260509354888
- Jennings, W. G., Piquero, A. R., & Reingle, J. M. (2012). On the overlap between victimization and offending: A review of the literature. Aggression and Violent Behavior, 17(1), 16–26. https://doi.org/https://doi.org/10.1016/j.avb.2011.09.003
- Jennings, W. G., Tomisich, E. A., Gover, A. R., & Akers, R. L. (2011). Assessing the overlap in dating violence perpetration and victimization among South Korean college students: The influence of social learning and self-control. American Journal of Criminal Justice, 36, 188–206. https://doi.org/https://doi.org/10.1007/s12103-011-9110-x
- Kerstens, J., & Jansen, J. (2016). The victim–perpetrator overlap in financial cybercrime: Evidence and reflection on the overlap of youth’s on-line victimization and perpetration. Deviant Behavior, 37(5), 585–600. https://doi.org/https://doi.org/10.1080/01639625.2015.1060796
- Klevens, J., Duque, L. F., & Ramirez, C. (2002). The overlap and routine activities: Results from a cross-sectional study in Bogota, Columbia. Journal of Interpersonal Violence, 17(2), 206–216. https://doi.org/https://doi.org/10.1177/0886260502017002006
- Kobayashi, L. C., O’Shea, B. Q., Kler, J. S., Nishimura, R., Palavicino-Maggio, C. B., Eastman, M. R., Vinson, W. R., & Finlay, J. M. (2021). Cohort profile: The COVID-19 coping study, a longitudinal mixed-methods study of middle-aged and older adults’ mental health and well-being during the COVID-19 pandemic in the USA. British Medical Journal Open, 11(2), e044965. https://doi.org/https://doi.org/10.1136/bmjopen-2020-044965
- Kranenbarg, M. W., Holt, T. J., & Van Gelder, J.-L. (2019). Offending and victimization in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap. Deviant Behavior, 40(1), 40–55. https://doi.org/https://doi.org/10.1080/01639625.2017.1411030
- Lallie, H., Shepherd, L., Nurse, J., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2020). Cyber security in the age of COVID-19: A timeline and analysis of cybercrime and cyber-attacks during the pandemic. Computers & Security. Advance online publication. https://doi.org/https://doi.org/10.1016/j.cose.2021.102248
- Lara-Cinisomo, S., Xue, Y., & Brooks-Gunn, C. (2009). Hispanic immigrant youth and internalizing behaviors: Examining the links with neighborhood context. RAND Labor and Population Working Paper WR-657, RAND Corporation.
- Lauritsen, J. L., & Laub, J. H. (2007). Understanding the link between victimization and offending: New reflections on an old idea. In M. Hough & M. Maxfield (Eds.), Crime prevention studies 22 (pp. 55–75). Willow Tree Press.
- Lauritsen, J. L., & Quinet, K. F. D. (1995). Repeat victimization among adolescents and young adults. Journal of Quantitative Criminology, 11(2), 143–166. https://doi.org/https://doi.org/10.1007/BF02221121
- Lazuras, L., Barkoukis, V., & Tsorbatzoudis, H. (2017). Face-to-face bullying and cyberbullying in adolescents: Trans-contextual effects and role overlap. Technology in Society, 48, 97–101. https://doi.org/https://doi.org/10.1016/j.techsoc.2016.12.001
- Lehdonvirta, V., & Räsänen, P. (2011). How do young people identify with online and offline peer groups? A comparison between UK, Spain and Japan. Journal of Youth Studies, 14(1), 91–108. https://doi.org/https://doi.org/10.1080/13676261.2010.506530
- Lewis, R., Rowe, M., & Wiper, C. (2019). Online/offline continuities: Exploring misogyny and hate in online abuse of feminists. In K. Lumsden, and E. Harmer (Eds.), Online othering (pp. 121-143). Palgrave Studies in Cybercrime and Cybersecurity.
- Li, T. (2006). A unified view on clustering binary data. Machine Learning, 62(3), 199–215. https://doi.org/https://doi.org/10.1007/s10994-005-5316-9
- Livingstone, S., & Haddon, L. (2009). Kids online: Opportunities and risks for children. Bristol University Press. https://doi.org/https://doi.org/10.2307/j.ctt9qgvds
- Marcum, C. D., Higgins, G. E., Freiburger, T. L., & Ricketts, M. L. (2014). Exploration of the cyberbullying victim/offender overlap by sex. American Journal of Criminal Justice, 39(3), 538–548. https://doi.org/https://doi.org/10.1007/s12103-013-9217-3
- Marks, J., Copland, E., Loh, E., Sunstein, C. R., & Sharot, T. (2019). Epistemic spillovers: Learning others’ political views reduces the ability to assess and use their expertise in nonpolitical domains. Cognition, 188, 74–84. https://doi.org/https://doi.org/10.1016/j.cognition.2018.10.003
- McCuddy, T., & Vogel, M. (2015). More than just friends: Online social networks and offending. Criminal Justice Review, 40(2), 169–189. https://doi.org/https://doi.org/10.1177/0734016814557010
- Miller, B., & Morris, R. G. (2016). Virtual peer effects in social learning theory. Crime and Delinquency, 62(12), 1543–1569. https://doi.org/https://doi.org/10.1177/0011128714526499
- Mitchell, K. J., Finkelhor, D., Wolak, J., Ybarra, M. L., & Turner, H. (2011). Youth internet victimization in a broader victimization context. Journal of Adolescent Health, 48(2), 128–134. https://doi.org/https://doi.org/10.1016/j.jadohealth.2010.06.009
- Morlini, I. (2012). A latent variables approach for clustering mixed binary and continuous variables within a Gaussian mixture model. Advances in Data Analysis and Classification, 6(1), 5–28. https://doi.org/https://doi.org/10.1007/s11634-011-0101-z
- Morris, R., & Blackburn, A. (2009). Cracking the code: An empirical exploration of social learning theory and computer crime. Journal of Crime and Justice, 32(1), 2–32. https://doi.org/https://doi.org/10.1080/0735648X.2009.9721260
- Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173–195. https://doi.org/https://doi.org/10.1177/0734016808325034
- Morris, R. G., & Higgins, G. E. (2010). Criminological theory in the digital age: The case of social learning theory and digital piracy. Journal of Criminal Justice, 38(4), 470–480. https://doi.org/https://doi.org/10.1016/j.jcrimjus.2010.04.016
- Müller, K., & Schwarz, C. (2020). From hashtag to hate crime: Twitter and anti-minority sentiment. SSRN. https://doi.org/http://dx.doi.org/10.2139/ssrn.3149103
- Navarro, R., Larrañaga, E., & Yubero, S. (2018). Differences between preadolescent victims and non-victims of cyberbullying in cyber-relationship motives and coping strategies for handling problems with peers. Current Psychology, 37(1), 116–127. https://doi.org/https://doi.org/10.1007/s12144-016-9495-2
- The New America Foundation International Security Program (n.d.). Terrorism in America 18 years after 9/11. https://www.newamerica.org/international-security/reports/terrorism-america-18-years-after-911/what-is-the-threat-to-the-united-states/
- Newburn, T., & Stanko, B. (1994). Just Boys Doing Business: Men Masculinities, and Crime. Routledge.
- Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773–793. https://www.cybercrimejournal.com/ngo2011ijcc.pdf
- Novo, F., Pereira, F., & Matos, M. (2014). Cyber-aggression among Portuguese adolescents: A study on perpetration, victim offender overlap and parental supervision. International Journal of Cyber Criminology, 8(2), 94–110. https://www.cybercrimejournal.com/novoetalijcc2014vol8issue2.pdf
- Paterson, J., Feehan, M., Butler, S., Williams, M., & Cowley-Malcolm, E. T. (2007). Intimate partner violence within a cohort of Pacific mothers living in New Zealand. Journal of Interpersonal Violence, 22(6), 698–721. https://doi.org/https://doi.org/10.1177/0886260507300596
- Payne, B. K. Criminals work from home during pandemics too: A public health approach to respond to fraud and crimes against those 50 and above. (2020). American Journal of Criminal Justice, 45, 563–577. Advance online publication. https://doi.org/https://doi.org/10.1007/s12103-020-09532-6
- Piquero, A. R., MacDonald, J. M., Dobrin, A., Daigle, L., & Cullen, F. T. (2005). Self-control, violent offending, and homicide victimization: Assessing the general theory of crime. Journal of Quantitative Criminology, 21(1), 55–71. https://doi.org/https://doi.org/10.1007/s10940-004-1787-2
- Politico. (2017, August 15). Full text: Trump’s comments on white supremacists, ‘alt-left’ in Charlottesville. Politico. https://www.politico.com/story/2017/08/15/full-text-trump-comments-white-supremacists-alt-left-transcript-241662
- Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38(3), 931–964. https://doi.org/https://doi.org/10.1111/j.1745-9125.2000.tb00911.x
- Pratt, T. C., Turanovic, J. J., Fox, K. A., & Wright, K. A. (2014). Self-control and victimization: A meta-analysis. Criminology, 52(1), 87–116. https://doi.org/https://doi.org/10.1111/1745-9125.12030
- Regoeczi, W. (2000). Adolescent violent victimization and offending: Assessing the extent of the link. Canadian Journal of Criminology, 42(4), 493–505. https://www.ojp.gov/ncjrs/virtual-library/abstracts/adolescent-violent-victimization-and-offending-assessing-extent
- Reingle, J. M., Staras, S. A., Jennings, W. G., Branchini, J., & Maldonado-Molina, M. M. (2012). The relationship between marijuana use and intimate partner violence in a nationally representative, longitudinal sample. Journal of Interpersonal Violence, 27(8), 1562–1578. https://doi.org/https://doi.org/10.1177/0886260511425787
- Reisig, M., & Holtfreter, K. (2018). The victim–offender overlap in late adulthood. Journal of Elder Abuse & Neglect, 30(2), 144–166. https://doi.org/https://doi.org/10.1080/08946566.2018.1426512
- Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238. https://doi.org/https://doi.org/10.1177/0022427811425539
- Reyns, B. W., & Fisher, B. S. (2018). The relationship between offline and online stalking victimization: A gender-specific analysis. Violence and Victims, 33(4), 769–786. https://doi.org/https://doi.org/10.1891/0886-6708.VV-D-17-00121
- Rogers, M. K. (2001). A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study [ Unpublished doctoral dissertation] University of Manitoba, Winnipeg.
- Sampson, R. J., & Lauritsen, J. L. (1990). Deviant lifestyles, proximity to crime, and the offender-victim link in personal violence. Journal of Research in Crime and Delinquency, 27(2), 110–139. https://doi.org/https://doi.org/10.1177/0022427890027002002
- Schokkenbroek, J. M., van Ouytsel, J., Hardyns, W., & Ponnet, K. (2021). Adults’ online and offline psychological intimate partner violence experiences. Journal of Interpersonal Violence, 088626052110152. Advance online publication. https://doi.org/https://doi.org/10.1177/08862605211015217
- Schreck, C. J. (1999). Criminal victimization and low self-control: An extension and test of a general theory of crime. Justice Quarterly, 16(3), 633–654. https://doi.org/https://doi.org/10.1080/07418829900094291
- Schreck, C. J., Wright, R. A., & Miller, J. M. (2002). A study of individual and situational antecedents of violent victimization. Justice Quarterly, 19(1), 159–180. https://doi.org/https://doi.org/10.1080/07418820200095201
- Scott, E. (2019, October 2). Trump’s most insulting – And violent – Language is often preserved for immigrants. The Washington Post. https://www.washingtonpost.com/politics/2019/10/02/trumps-most-insulting-violent-language-is-often-reserved-immigrants/
- Shattuck, J., & Risse, M. (2021). Reimagining rights and responsibilities in the united states: hate crimes. Carr Center for Human Rights Policy at the Harvard Kennedy School, 15. https://carrcenter.hks.harvard.edu/files/cchr/files/hate_crimes.pdf
- Silver, E. (2002). Mental disorder and violent victimization: The mediating role of involvement in conflicted social relationships. Criminology, 40(1), 191–212. https://doi.org/https://doi.org/10.1111/j.1745-9125.2002.tb00954.x
- Silver, E., Piquero, A. R., Jennings, W. G., Piquero, N. L., & Leiber, M. (2011). Assessing the violent offending and violent victimization overlap among discharged psychiatric patients. Law and Human Behavior, 35(1), 49–59. https://doi.org/https://doi.org/10.1007/s10979-009-9206-8
- Simmons, A. D., & Bobo, L. D. (2015). Can non-full-probability internet surveys yield useful data? A comparison with full-probability face-to-face surveys in the domain of race and social inequality attitudes. Sociological Methodology, 45(1), 357–387. https://doi.org/https://doi.org/10.1177/0081175015570096
- Singer, S. I. (1987). Victims in a birth cohort. In M. E. Wolfgang, T. P. Thornberry, & R. M. Figlio (Eds.), From boy to man, from delinquency to crime (pp. 163–179). University of Chicago Press.
- Singh, S. J., & Singh, H. (2012, September 6). The rise of hate crimes can be tied directly to hateful speech. The Daily Beast. https://www.thedailybeast.com/the-rise-of-hate-crimes-can-be-tied-directly-to-hateful-speech
- Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518. https://doi.org/https://doi.org/10.1177/0022427897034004005
- Stewart, E. A., Schreck, C. J., & Simons, R. (2006). “I ain’t gonna let no one disrespect me”: Does the code of the street reduce or increase violent victimization among African American adolescents? Journal of Research in Crime and Delinquency, 43(4), 427–458. https://doi.org/https://doi.org/10.1177/0022427806292338
- Suler, J. (2004). The online disinhibition effect. Cyber Psychology & Behavior, 7(3), 321–326. https://doi.org/https://doi.org/10.1089/1094931041291295
- Trajtenberg, N., Dodel, M., Sanchez, D. R., Cabello, O., & Claro, M. Online and offline victimisation: A cluster analysis of adolescent victims of bullying and cyber-bullying in Chile. (2021). Journal of Children and Media 4(15), 568–587. Advance online publication. https://doi.org/https://doi.org/10.1080/17482798.2021.1902358
- United Nations Office on Drugs and Crime (UNODC). (2012). Global report on trafficking in persons 2012. https://www.unodc.org/documents/data-and-analysis/glotip/Trafficking_in_Persons_2012_web.pdf
- United Nations Office on Drugs and Crime (UNODC). (2016). Global report on trafficking in persons 2016. https://www.unodc.org/documents/data-and-analysis/glotip/2016_Global_Report_on_Trafficking_in_Persons.pdf
- Van Ouytsel, J., Ponnet, K., & Walrave, M. (2017). Cyber dating abuse: Investigating digital monitoring behaviors among adolescents from a social learning perspective. Journal of Interpersonal Violence, 37(23–24), 5157–5178. https://doi.org/https://doi.org/10.1177/0886260517719538
- van Wilsem, J. A. (2013). ‘Bought it, but never got it’ assessing risk factors for online consumer fraud victimization. European Sociological Review, 29(2), 168–178. https://doi.org/https://doi.org/10.1093/esr/jcr053
- Vega, W. A., Rodriguez, M. A., & Gruskin, E. (2009). Health disparities in the latino population. Epidemiologic Reviews, 31(1), 99–112. https://doi.org/https://doi.org/10.1093/epirev/mxp008
- Waasdorp, T. E., & Bradshaw, C. P. (2015). The overlap between cyberbullying and traditional bullying. Journal of Adolescent Health, 56(5), 483–488. https://doi.org/https://doi.org/10.1016/j.jadohealth.2014.12.002
- Walker, L. E. (1979/2017). The battered woman syndrome (4th ed.). Springer.
- Walters, G. D. (2020). Mediating the victim–offender overlap with delinquent peer associations: A preliminary test of the person proximity hypothesis. Criminal Justice Studies, 33(4), 297–315. https://doi.org/https://doi.org/10.1080/1478601X.2020.1711752
- Wegge, D., Vandebosch, H., & Eggermont, S. (2014). Who bullies whom online: A social network analysis of cyberbullying in a school context. Communications, 39(4), 415–433. https://doi.org/https://doi.org/10.1515/commun-2014-0019
- Weinstein, M., Jensen, M. R., & Tynes, B. M. (2021). Victimized in many ways: Online and offline bullying/harassment and perceived racial discrimination in diverse racial–ethnic minority adolescents. Cultural Diversity & Ethnic Minority Psychology, 27(3), 397–407. https://doi.org/https://doi.org/10.1037/cdp0000436
- Widom, C. S. (1989). Child abuse, neglect, and violent criminal behavior. Criminology, 27(2), 251–271. https://doi.org/https://doi.org/10.1111/j.1745-9125.1989.tb01032.x
- Williams, M. L., Burnap, P., Javed, A., Liu, H., & Ozalp, S. (2020). Corrigendum to: Hate in the machine: Anti-black and anti-muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology, 60(1), 93–117. https://doi.org/https://doi.org/10.1093/bjc/azz064
- Wolfgang, M. E. (1958). Patterns in criminal homicide. University of Pennsylvania Press.
- World Bank. (2019). Individuals using the Internet (% of population) – United States. https://data.worldbank.org/indicator/IT.NET.USER.ZS?contextual=aggregate&locations=US
- Zempi, I. (2014). Uncovering islamophobia: The victimisation of veiled Muslim women. University of Leicester.