Found: 19
Select item for more details and to access through your institution.
Social Control and Youth Suicidality: Situating Durkheim's Ideas in a Multilevel Framework.
- Published in:
- American Sociological Review, 2008, v. 73, n. 6, p. 921, doi. 10.1177/000312240807300603
- By:
- Publication type:
- Article
Illegal Roaming and File Manipulation on Target Computers.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 3, p. 689, doi. 10.1111/1745-9133.12312
- By:
- Publication type:
- Article
Editorial: Cognition, Behavior and Cybersecurity.
- Published in:
- 2021
- By:
- Publication type:
- Editorial
The Illicit Ecosystem of Hacking: A Longitudinal Network Analysis of Website Defacement Groups.
- Published in:
- Social Science Computer Review, 2023, v. 41, n. 2, p. 390, doi. 10.1177/08944393221097881
- By:
- Publication type:
- Article
A Routine Activities Approach to Evidence-Based Risk Assessment: Findings From Two Simulated Phishing Attacks.
- Published in:
- Social Science Computer Review, 2023, v. 41, n. 1, p. 286, doi. 10.1177/08944393211046339
- By:
- Publication type:
- Article
Website Defacer Classification: A Finite Mixture Model Approach.
- Published in:
- Social Science Computer Review, 2022, v. 40, n. 3, p. 775, doi. 10.1177/0894439321994232
- By:
- Publication type:
- Article
Exposure to Violence in Adolescence and Precocious Role Exits.
- Published in:
- Journal of Youth & Adolescence, 2009, v. 38, n. 3, p. 269, doi. 10.1007/s10964-008-9343-2
- By:
- Publication type:
- Article
Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces.
- Published in:
- British Journal of Criminology, 2022, v. 62, n. 6, p. 1518, doi. 10.1093/bjc/azab116
- By:
- Publication type:
- Article
ON THE RELEVANCE OF SPATIAL AND TEMPORAL DIMENSIONS IN ASSESSING COMPUTER SUSCEPTIBILITY TO SYSTEM TRESPASSING INCIDENTS.
- Published in:
- British Journal of Criminology, 2015, v. 55, n. 3, p. 615, doi. 10.1093/bjc/azu104
- By:
- Publication type:
- Article
Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network.
- Published in:
- British Journal of Criminology, 2013, v. 53, n. 2, p. 319, doi. 10.1093/bjc/azs067
- By:
- Publication type:
- Article
ADOLESCENTS’ VIOLENT VICTIMIZATION IN THE NEIGHBOURHOOD.
- Published in:
- British Journal of Criminology, 2012, v. 52, n. 4, p. 808, doi. 10.1093/bjc/azs013
- By:
- Publication type:
- Article
A Depiction and Classification of the Stolen Data Market Ecosystem and Comprising Darknet Markets: A Multidisciplinary Approach.
- Published in:
- Journal of Contemporary Criminal Justice, 2023, v. 39, n. 2, p. 298, doi. 10.1177/10439862231158005
- By:
- Publication type:
- Article
RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM.
- Published in:
- Criminology, 2014, v. 52, n. 1, p. 33, doi. 10.1111/1745-9125.12028
- By:
- Publication type:
- Article
SEVERE SANCTIONS, EASY CHOICE? INVESTIGATING THE ROLE OF SCHOOL SANCTIONS IN PREVENTING ADOLESCENT VIOLENT OFFENDING*.
- Published in:
- Criminology, 2012, v. 50, n. 2, p. 495, doi. 10.1111/j.1745-9125.2011.00268.x
- By:
- Publication type:
- Article
UNSTRUCTURED SOCIALIZING, COLLECTIVE EFFICACY, AND VIOLENT BEHAVIOR AMONG URBAN YOUTH.
- Published in:
- Criminology, 2010, v. 48, n. 2, p. 443, doi. 10.1111/j.1745-9125.2010.00192.x
- By:
- Publication type:
- Article
Collective efficacy, family attachment, and urban adolescent suicide attempts.
- Published in:
- 2010
- By:
- Publication type:
- journal article
The Restrictive Deterrent Effect of Warning Messages Sent to Active Romance Fraudsters: An Experimental Approach.
- Published in:
- International Journal of Cyber Criminology, 2021, v. 15, n. 1, p. 1
- By:
- Publication type:
- Article
The Secondary Global Market for Hacked Data.
- Published in:
- International Journal of Cyber Criminology, 2018, v. 12, n. 2, p. 408, doi. 10.5281/zenodo.3366118
- By:
- Publication type:
- Article
System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination.
- Published in:
- International Journal of Cyber Criminology, 2017, v. 11, n. 1, p. 63, doi. 10.5281/zenodo.495772
- By:
- Publication type:
- Article