Bayraktar, F., Machackova, H., Dedkova, L., Cerna, A., & Ševčíková, A. (2015). Cyberbullying: The discriminant factors among cyberbullies, cybervictims, and cyberbully-victims in a Czech adolescent sample. Journal Of Interpersonal Violence, 30(18), 3192-3216.
Brady, P. Q., Randa, R., & Reyns, B. W. (2016). From WWII to the world wide web: A research note on social changes, online 'places,' and a new online activity ratio for routine activity theory. Journal Of Contemporary Criminal Justice, 32(2), 129-147.
Henshaw, M., Ogloff, J. P., & Clough, J. A. (2015). Looking Beyond the Screen: A Critical Review of the Literature on the Online Child Pornography Offender. Sexual Abuse: A Journal Of Research And Treatment, 1079063215603690.
Hui, D. L., Xin, C. W., & Khader, M. (2015). Understanding the behavioral aspects of cyber sexual grooming: Implications for law enforcement. International Journal of Police Science & Management, 17(1), 40-49.
Reyns, B. W., & Henson, B. (2016). The Thief With a Thousand Faces and the Victim With None: Identifying Determinants for Online Identity Theft Victimization With Routine Activity Theory. International Journal Of Offender Therapy & Comparative Criminology, 60(10), 1119-1139.
Reyns, B. W., Henson, B., & Fisher, B. S. (2016). Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from routine activity theory as it applies to online forms of victimization. Journal of Contemporary Criminal Justice, 32(2), 148-168.
Vakhitova, Z. I., Reynald, D. M., & Townsley, M. (2016). Toward the adaptation of routine activity and lifestyle exposure theories to account for cyber abuse victimization. Journal of Contemporary Criminal Justice, 32(2), 169-188.
Westlake, B., Bouchard, M., & Frank, R. (2015). Assessing the Validity of Automated Webcrawlers as Data Collection Tools to Investigate Online Child Sexual Exploitation. Sexual Abuse: A Journal Of Research And Treatment, 1079063215616818.
Wilson, T., Maimon, D., Sobesto, B., & Cukier, M. (2015). The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace. Journal Of Research In Crime And Delinquency, 52(6), 829-855.
Optional or supplemental readings may or may not be available in the library. Find further information about optional readings here.
If you have questions about your required course textbooks, please contact Customer Care at firstname.lastname@example.org