International Journal of Cyber Criminology

Articles from Vol. 7, No. 2, July-December

Adults' Sexual Interest in Children and Adolescents Online: A Quasi-Experimental Study
IntroductionIn previous studies it has been reported that online sexual or romantic relationships between adults and adolescents are often initiated in chat rooms (Briggs, Simon, & Simonsen, 2011; Malesky, 2007; Mitchell, Finkelhor, & Wolak,...
Book Review of Policing Cyber Hate, Cyber Threats and Cyber Terrorism
Book Review of Policing Cyber Hate, Cyber Threats and Cyber Terrorism Policing Cyber Hate, Cyber Threats and Cyber Terrorism. Imran Awan and Brian Blakemore editors, Ashgate, Surrey, England. Pages 201. ISBN: 9781409438168 (hbk)With the growth of digital...
Crime Specific Neutralizations: An Empirical Examination of Four Types of Digital Piracy
IntroductionDigital piracy can be defined as "... the illegal act of copying digital goods - software, digital documents, digital audio (including music and voice) and digital video - for any reason other than backup without explicit permission from...
Cyber Stalking and Cyber Harassment Legislation in the United States: A Qualitative Analysis
IntroductionOver the past two decades, technology has surged into businesses, communities, and the lives of individuals, altering the way that people communicate, study, work, and interact (Baer, 2010). People in various parts of the world can communicate...
Frames of Fraud: A Qualitative Analysis of the Structure and Process of Victimization on the Internet
IntroductionThis paper is a piece of frame analysis (Goffman, 1974) under the conditions of contemporary electronic communication media and from the victims' perspective. Goffman's concept of frame analysis (1974) allows an adequate understanding and...
Individual Differences of Internet Child Pornography Users: Peculiar Findings in a Community-Based Study
IntroductionTechnological advances, such as the Internet and peer-to-peer networks, continue to make it easier and perceivably safer for consumers to access the illicit materials. For instance, the United Kingdom's Internet Watch Foundation's Hotline...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.