Prison culture, management, and in-prison violence

J Wooldredge - Annual Review of Criminology, 2020 - annualreviews.org
Academic attention to violence and other forms of in-prison misconduct is on the rise,
although most research continues to be framed within now stale perspectives. A broader …

The psychology of internet fraud victimisation: A systematic review

G Norris, A Brookes, D Dowell - Journal of Police and Criminal Psychology, 2019 - Springer
Existing theories of fraud provide some insight into how criminals target and exploit people
in the online environment; whilst reference to psychological explanations is common, the …

Self‐control and victimization: A meta‐analysis

TC Pratt, JJ Turanovic, KA Fox, KA Wright - Criminology, 2014 - Wiley Online Library
A consequential development in victimization theory and research was the idea that
individuals with low self‐control self‐select into the various risky behaviors that may …

[SÁCH][B] Cyber frauds, scams and their victims

M Button, C Cross - 2017 - taylorfrancis.com
Crime is undergoing a metamorphosis. The online technological revolution has created new
opportunities for a wide variety of crimes which can be perpetrated on an industrial scale …

[SÁCH][B] Trusted criminals

DO Friedrichs - 2009 - justicediwan.org
This edition of Trusted Criminals was written and went into production during 2008–2009, a
period in which the United States was experiencing its greatest economic crisis since the …

Routine online activity and internet fraud targeting: Extending the generality of routine activity theory

TC Pratt, K Holtfreter, MD Reisig - Journal of research in …, 2010 - journals.sagepub.com
Routine activity theory predicts that changes in legitimate opportunity structures (eg,
technology) can increase the convergence of motivated offenders and suitable targets in the …

Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors

H Chen, CE Beaudoin, T Hong - Computers in human behavior, 2017 - Elsevier
The current study identified the antecedents of being an Internet scam victim and how it
impacts online privacy concerns and privacy protection behaviors. Structural equation …

An assessment of the current state of cybercrime scholarship

TJ Holt, AM Bossler - Deviant behavior, 2014 - Taylor & Francis
Computers and the Internet have become a vital part of modern life across the world,
affecting communications, finance, and governance. At the same time, technology has …

Being pursued online: Applying cyberlifestyle–routine activities theory to cyberstalking victimization

BW Reyns, B Henson… - Criminal justice and …, 2011 - journals.sagepub.com
Building upon Eck and Clarke's (2003) ideas for explaining crimes in which there is no face-
to-face contact between victims and offenders, the authors developed an adapted lifestyle …

Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses

BW Reyns - Journal of research in crime and delinquency, 2013 - journals.sagepub.com
Objectives: The purpose of the current study was to extend recent work aimed at applying
routine activity theory to crimes in which the victim and offender never come into physical …