Thomas J. Holt
Thomas J. Holt
School of Criminal Justice, Michigan State University
Потвърден имейл адрес: msu.edu
ЗаглавиеПозоваванияГодина
Examining the applicability of lifestyle-routine activities theory for cybercrime victimization
TJ Holt, AM Bossler
Deviant Behavior 30 (1), 1-25, 2008
2922008
Digital crime and digital terrorism
RW Taylor, EJ Fritsch, J Liederbach
Prentice Hall Press, 2014
2552014
On-line activities, guardianship, and malware infection: An examination of routine activities theory.
AM Bossler, TJ Holt
International Journal of Cyber Criminology 3 (1), 2009
2202009
Exploring stolen data markets online: products and market forces
TJ Holt, E Lampke
Criminal Justice Studies 23 (1), 33-50, 2010
2022010
Subcultural evolution? Examining the influence of on-and off-line experiences on deviant subcultures
TJ Holt
Deviant Behavior 28 (2), 171-198, 2007
1832007
Examining sex work from the client's perspective: Assessing johns using on-line data
TJ Holt, KR Blevins
Deviant Behavior 28 (4), 333-354, 2007
1642007
Bullying victimization and adolescent mental health: General and typological effects across sex
MG Turner, ML Exum, R Brame, TJ Holt
Journal of Criminal Justice 41 (1), 53-59, 2013
1572013
Low self-control, deviant peer associations, and juvenile cyberdeviance
TJ Holt, AM Bossler, DC May
American Journal of Criminal Justice 37 (3), 378-395, 2012
1562012
An assessment of the current state of cybercrime scholarship
TJ Holt, AM Bossler
Deviant Behavior 35 (1), 20-40, 2014
1552014
The effect of self-control on victimization in the cyberworld
AM Bossler, TJ Holt
Journal of Criminal Justice 38 (3), 227-236, 2010
1442010
Considering the pedophile subculture online
TJ Holt, KR Blevins, N Burkert
Sexual Abuse 22 (1), 3-24, 2010
1412010
Examining the virtual subculture of johns
KR Blevins, TJ Holt
Journal of Contemporary Ethnography 38 (5), 619-648, 2009
1292009
Predicting online harassment victimization among a juvenile population
AM Bossler, TJ Holt, DC May
Youth & Society 44 (4), 500-523, 2012
1262012
Examining the Social Networks of Malware Writers and Hackers.
TJ Holt, D Strumsky, O Smirnova, M Kilger
International Journal of Cyber Criminology 6 (1), 2012
1072012
Examining the forces shaping cybercrime markets online
TJ Holt
Social Science Computer Review 31 (2), 165-177, 2013
992013
Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates
TJ Holt, H Copes
Deviant Behavior 31 (7), 625-654, 2010
942010
A crime script analysis of the online stolen data market
A Hutchings, TJ Holt
British Journal of Criminology 55 (3), 596-614, 2014
922014
Social learning and cyber-deviance: Examining the importance of a full social learning model in the virtual world
TJ Holt, GW Burruss, AM Bossler
Journal of Crime and Justice 33 (2), 31-61, 2010
882010
Exploring the social organisation and structure of stolen data markets
TJ Holt
Global Crime 14 (2-3), 155-174, 2013
772013
Framing dependencies introduced by underground commoditization
K Thomas, D Huang, D Wang, E Bursztein, C Grier, TJ Holt, C Kruegel, ...
762015
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20