Author:
Bada Maria,Chua Yi Ting,Collier Ben,Pete Ildiko
Publisher
Springer International Publishing
Reference50 articles.
1. Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4(1&2), 643–656.
2. Barlett, C., & Coyne, S. M. (2014). A meta-analysis of sex differences in cyberbullying behavior: The moderating role of age. Aggressive Behavior, 40(5), 474–488.
3. Blevins, K. R., & Holt, T. J. (2009). Examining the virtual subculture of johns. Journal of Contemporary Ethnography, 38(5), 619–648.
4. Bossler, A. M., & Burruss, G. W. (2012). The general theory of crime and computer hacking: Low self-control hackers? In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications. Hershey, PA: IGI Global.
5. Bowen, G. A. (2006). Grounded theory and sensitizing concepts. International Journal of Qualitative Methods, 5(3), 12–23.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献