Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Prison culture, management, and in-prison violence
J Wooldredge - Annual Review of Criminology, 2020 - annualreviews.org
Academic attention to violence and other forms of in-prison misconduct is on the rise,
although most research continues to be framed within now stale perspectives. A broader …
although most research continues to be framed within now stale perspectives. A broader …
The psychology of internet fraud victimisation: A systematic review
G Norris, A Brookes, D Dowell - Journal of Police and Criminal Psychology, 2019 - Springer
Existing theories of fraud provide some insight into how criminals target and exploit people
in the online environment; whilst reference to psychological explanations is common, the …
in the online environment; whilst reference to psychological explanations is common, the …
Self‐control and victimization: A meta‐analysis
A consequential development in victimization theory and research was the idea that
individuals with low self‐control self‐select into the various risky behaviors that may …
individuals with low self‐control self‐select into the various risky behaviors that may …
[SÁCH][B] Cyber frauds, scams and their victims
Crime is undergoing a metamorphosis. The online technological revolution has created new
opportunities for a wide variety of crimes which can be perpetrated on an industrial scale …
opportunities for a wide variety of crimes which can be perpetrated on an industrial scale …
[SÁCH][B] Trusted criminals
DO Friedrichs - 2009 - justicediwan.org
This edition of Trusted Criminals was written and went into production during 2008–2009, a
period in which the United States was experiencing its greatest economic crisis since the …
period in which the United States was experiencing its greatest economic crisis since the …
Routine online activity and internet fraud targeting: Extending the generality of routine activity theory
Routine activity theory predicts that changes in legitimate opportunity structures (eg,
technology) can increase the convergence of motivated offenders and suitable targets in the …
technology) can increase the convergence of motivated offenders and suitable targets in the …
Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors
The current study identified the antecedents of being an Internet scam victim and how it
impacts online privacy concerns and privacy protection behaviors. Structural equation …
impacts online privacy concerns and privacy protection behaviors. Structural equation …
An assessment of the current state of cybercrime scholarship
TJ Holt, AM Bossler - Deviant behavior, 2014 - Taylor & Francis
Computers and the Internet have become a vital part of modern life across the world,
affecting communications, finance, and governance. At the same time, technology has …
affecting communications, finance, and governance. At the same time, technology has …
Being pursued online: Applying cyberlifestyle–routine activities theory to cyberstalking victimization
Building upon Eck and Clarke's (2003) ideas for explaining crimes in which there is no face-
to-face contact between victims and offenders, the authors developed an adapted lifestyle …
to-face contact between victims and offenders, the authors developed an adapted lifestyle …
Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses
BW Reyns - Journal of research in crime and delinquency, 2013 - journals.sagepub.com
Objectives: The purpose of the current study was to extend recent work aimed at applying
routine activity theory to crimes in which the victim and offender never come into physical …
routine activity theory to crimes in which the victim and offender never come into physical …