Skip to main content

FPSY 8205 Psychological Aspects of Cybercrimes: Welcome & Course Readings

Welcome to your course guide

Please find your required library readings below. If you have problems with the links below, please contact the Library. If you have APA questions about these materials, please contact the Writing Center.

FPSY 8205 Course Readings

After clicking on a citation below, enter your myWalden user name and password at the prompt.

Please Ask a Librarian if you have any questions about the links.

Argomaniz, J. (2015). European Union responses to terrorist use of the Internet. Cooperation & Conflict, 50(2), 250-268.

Bayraktar, F., Machackova, H., Dedkova, L., Cerna, A., & ŠevĨíková, A. (2015). Cyberbullying: The discriminant factors among cyberbullies, cybervictims, and cyberbully-victims in a Czech adolescent sample. Journal Of Interpersonal Violence, 30(18), 3192-3216. 

Bernstein, A. (2014). Abuse and harassment diminish free speech. Pace Law Review, 35(1), 1–30. (Accession No. edslexF38F8B98)

Brady, P. Q., Randa, R., & Reyns, B. W. (2016). From WWII to the world wide web: A research note on social changes, online 'places,' and a new online activity ratio for routine activity theory. Journal Of Contemporary Criminal Justice, 32(2), 129-147. 

Button, M., Nicholls, C., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian And New Zealand Journal Of Criminology, 47(3), 391-408.

Campbell, E. (2016). Policing paedophilia: Assembling bodies, spaces, and things. Crime, Media, Culture, 1741659015623598.

Choo, K.K.R. (2007). Zombies and botnets. Trends and Issues in Crime and Criminal Justice. 333, 1-6.

Darwinkel, E., Powell, M., & Tidmarsh, P. (n.d). Improving Police Officers' Perceptions of Sexual Offending Through Intensive Training. Criminal Justice And Behavior, 40(8), 895-908.

Donner, C. M., Jennings, W. G., & Banfield, J. (2015). The General Nature of Online and Off-Line Offending Among College Students. Social Science Computer Review, 33(6), 663-679.

Elçi, A. & Seçkin, Z. (2016). Cyberbullying awareness for mitigating consequences in higher education. Journal of Interpersonal Violence, 0886260516646095.

Fiscus , K. (2016). Social media a big part of law enforcement, police in Calhoun county say. The Anniston Star. (Accession No. edsgcl.450330121)

Foley, C., May, D. C., Blevins, K. R., & Akers, J. (2015). An Exploratory Analysis of Cyber-Harassment of K-12 Teachers by Parents in Public School Settings. Educational Policy, 29(6), 879-902.

Gialopsos, B. M., & Carter, J. W. (2015). Offender Searches and Crime Events. Journal of Contemporary Criminal Justice, 31(1), 53-70. 

Goldsmith, A., & Brewer, R. (2015). Digital drift and the criminal interaction order. Theoretical Criminology, 19(1), 112-130. 

Henry, N. & Powell, A. (2016). Sexual violence in the digital age: The scope and limits of criminal law. Social & Legal Studies. 25(4), 397-418.

Henshaw, M., Ogloff, J. P., & Clough, J. A. (2015). Looking Beyond the Screen: A Critical Review of the Literature on the Online Child Pornography Offender. Sexual Abuse: A Journal Of Research And Treatment, 1079063215603690.

Holt, T. (2013). Examining the Forces Shaping Cybercrime Markets Online. Social Science Computer Review, 31(2), 165-177.

Huey, L., Nhan, J., & Broll, R. (n.d). 'Uppity civilians' and 'cyber-vigilantes': The role of the general public in policing cyber-crime. Criminology & Criminal Justice,13(1), 81-97.

Hui, D. L., Xin, C. W., & Khader, M. (2015). Understanding the behavioral aspects of cyber sexual grooming: Implications for law enforcement. International Journal of Police Science & Management, 17(1), 40-49.

Kloess, J. A., Beech, A. R., & Harkins, L. (2014). Online Child Sexual Exploitation: Prevalence, Process, and Offender Characteristics. Trauma, Violence & Abuse, 15(2), 126-139.

Lavorgna, A. (2015). The online trade in counterfeit pharmaceuticals: New criminal opportunities, trends and challenges. European Journal Of Criminology,12(2), 226-241.

Laybats, C. & Tredinnick, L. (2016). Information security. Business Information Review. 33(2), 76-80.

Leppänen, A., Kiravuo, T. & Kaiantie, S. (2016). Policing the cyber-physical space. The Police Journal, 0032258X16647420.

Makin, D. A., & Morczek, A. L. (2015).  Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology. 9(1), 55-119.

Martin, J. (2014). Lost on the Silk Road: Online drug distribution and the 'cryptomarket'. Criminology & Criminal Justice, 14(3), 351-367.

McCuddy, T., & Vogel, M. (2015). More Than Just Friends: Online Social Networks and Offending. Criminal Justice Review (Sage Publications), 40(2), 169-189.

McGuffin, C., & Mitchell, P. (n.d). On domains: Cyber and the practice of warfare. International Journal, 69(3), 394-412.

Peters, M. A. & Besley, T. (2014). Islam and the end of European multiculturalism? From multiculturalism to civic integration. Policy Futures in Education. 12(1), 1-15.

Reyns, B. W., & Henson, B. (2016). The Thief With a Thousand Faces and the Victim With None: Identifying Determinants for Online Identity Theft Victimization With Routine Activity Theory. International Journal Of Offender Therapy & Comparative Criminology, 60(10), 1119-1139. 

Reyns, B. W., Henson, B., & Fisher, B. S. (2016). Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from routine activity theory as it applies to online forms of victimization. Journal of Contemporary Criminal Justice, 32(2), 148-168. 

Smith, G. J. D. (2016). Surveillance, data and embodiment: On the work of being watched. Body & Society. 22(2), 108-139.

Thomas, G. (2016). A case for local neighbourhood policing and community intelligence in counter terrorism. Police Journal, 89(1), 31-54.

Trottier, D. (2015). Coming to terms with social media monitoring: Uptake and early assessment. Crime, Media, Culture, 11(3), 317-333.

Vakhitova, Z. I., Reynald, D. M., & Townsley, M. (2016). Toward the adaptation of routine activity and lifestyle exposure theories to account for cyber abuse victimization. Journal of Contemporary Criminal Justice, 32(2), 169-188.

van Wilsem, J. (n.d). Hacking and Harassment-Do They Have Something in Common? Comparing Risk Factors for Online Victimization. Journal of Contemporary Criminal Justice, 29(4), 437-453.

Vishwanath, A., Harrison, B. & Ng, Y. J. (2016). Suspicion, cognition, and automaticity model of phishing susceptibility. Communication Research 0093650215627483.

Warikoo, A. (2014). Proposed Methodology for Cyber Criminal Profiling. Information Security Journal: A Global Perspective, 23(4-6), 172-178.

Westlake, B., Bouchard, M., & Frank, R. (2015). Assessing the Validity of Automated Webcrawlers as Data Collection Tools to Investigate Online Child Sexual Exploitation. Sexual Abuse: A Journal Of Research And Treatment, 1079063215616818.

Whittaker, E. & Kowalski, R. M. (2014). Cyberbullying via social media. Journal of School Violence. 14(1), 11-29.

Wilson, T., Maimon, D., Sobesto, B., & Cukier, M. (2015). The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace. Journal Of Research In Crime And Delinquency, 52(6), 829-855.

Wolak, J., Evans, L., Nguyen, S., & Hines, D. A. (2013). Online Predators: Myth versus Reality. New England Journal of Public Policy, 25(1), 1-11.

Wolak, J., Finkelhor, D., Mitchell, K. J. & Ybarra, M. L. (2008). Online “predators” and their victims. American Psychologist. 63(2), 111-128.

Wright, M. F. (2015). Cyber victimization and the perceived stress: Linkages to late adolescents’ cyber aggression and psychological functioning. Youth & Society. 47(6), 789-810.

Wright, M.F. (2016). Cyber victimization on college campuses: Longitudinal associations with suicidal ideation, depression, and anxiety. Criminal Justice Review. 41(2), 190-203.

Other Readings

Optional or supplemental readings may or may not be available in the library. Find further information about optional readings here.

If you have questions about your required course textbooks, please contact Customer Care at