:::

詳目顯示

回上一頁
題名:網路偏差行為與被害特性及其影響因素之研究
作者:簡鳳容
校院名稱:中央警察大學
系所名稱:犯罪防治研究所
指導教授:陳玉書 賴擁連
學位類別:博士
出版日期:2017
主題關鍵詞:網路偏差行為網路被害偏差/被害重疊性非正式社會控制緊張理論網路生活型態網路情境機會cyber deviant behaviorcyber victimizationdeviation / victimization overlapinformal social controlstrain theoryonline lifestyleonline situational opportunity
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:6
本研究以非正式社會控制、一般化緊張理論、日常活動理論及生活型態理論為基礎。主要研究目的在透過網路調查,了解青少年和成人網路偏差行為與網路被害之差異及重疊性,並檢驗上述各理論對青少年和成人網路偏差行為與網路被害之影響,以建構解釋網路偏差行為及被害之理論模式。
研究樣本包括509名網路使用者,其中171名為青少年(33.6%),成人338名(66.4%)。研究結果顯示,網路偏差行為主要以「在網路上以言語攻擊(謾罵)他人」、「與網友交談有關色情或猥褻的話題」為最多。在網路被害方面,「與網友發生言語/意見衝突」、「被網友惡意騷擾」以及「被盜取資料/網路寶物等」,在青少年與成人樣本中皆位居前3類型;但青少年的網路偏差和被害經驗顯著高於成年。相關分析結果顯示,青少年和成人之網路偏差行為及被害皆存在重疊性;且低自我控制、緊張壓力、網路情境機會與青少年和成人網路偏差行為與被害均存在顯著關聯性。迴歸分析結果顯示,教育程度、低自我控制、網路生活型態及網路情境機會對青少年網路偏差行為或被害具顯著影響力,而低自我控制僅對青少年網路偏差行為具顯著影響力。成年的性別、網路情境機會及網路被害對其網路偏差行為有顯著影響力,而其網路被害主要影響因子則為職業、低自我控制、網路生活型態及網路偏差行為。在理論模式建構方面,發現低自我控制、網路生活型態、網路情境機會對於網路偏差行為與網路被害具顯著直接影響力;依附關係和緊張壓力則具間接影響力,為重要的遠因。最後根據研究結果,針對網路偏差行為與被害預防和未來研究相關建議;包括:(1)自我控制影響深遠,故非正式社會控制是第一道防線;(2)解決個體禁錮於網路成癮依賴而誘發之網路偏差行為及網路被害;(3)加強網路教育及風險辨識;(4)網路使用工具應增加網路互動危機辨識機制;(5)有效管理網路情境,以降低其網路偏差動機之產生與負向誘因之刺激;(6)根據不同年齡層之共通性與歧異,採取適當之預防策略;(7)重視偏差與被害重疊之高風險個體;(8)全面考量網路偏差行為與網路被害之因素,建構預防網絡;(9)未來研究建議等。
The main research objective is to understand the differences and similarities between cyber deviant behaviors and cyber victimizations among adolescent and adult groups through online surveyed data. In addition, this study aims to integrate contemporary criminological theories of informal social control, general strain, routine activities, and lifestyle exposure to investigate the effects of those theories on cyber deviant behaviors and cyber victimizations in adolescents and adults to construct a theoretical model for explaining why people committed deviant beahviors and had been victims in cyber world, respectively.
Using secondary data collected in 2008 with 509 internet users, of whom 171 were adolescents (33.6%) and 338 were adults (66.4%), the results show that the most popular cyber deviant behaviors are "attacking others on the Internet with bad words" and "talking to netizens about pornography or embarrassment." In terms of cyber victimizations, the most popular types are "words/conflicts with friends," “malicious harassment by netizens,” and "stolen materials/network treasures" among those surveyed respondents. At the same time, the results indicate that the adolescents ' experiences of cyber deviant behaviors and cyber victimizations are significantly higher than their counterparts of adult group. In terms of Pearson’s Correlation analysis, the results show that there is an overlap between cyber deviant behaviors and cyber victimizations in adolescents and adults, suggesting cyber deviants and cyber victims have significantly similar characteristics. Moreover, the variables of low self-control, general stress, and online situational opportunities are significantly correlated with cyber deviant behaviors and cyber victimizations among adolescents and adults, respectively. The results of Multiple Regression Analysis show that, on one hand, education level, low self-control, online life style and online situational opportunities produce a significant influence on adolescents’ cyber deviation behavior and cyber victimization, while only the variable of low self-control produces a significant influence on adolescents’ cyber deviant behaviors. On the other hand, gender, online situational opportunities and cyber victimizations have a significant influence on adults’ cyber deviant behaviors, whereas the significant factors affecting their cyber victimizations are the variables of occupation, low self-control, cyber lifestyle and cyber deviant behaviors. As for the theoretical model constructions, the results of SEM indicate that low self-control, online life style, and online situational opportunities produce significant and direct influences on cyber deviant behaviors and cyber victimizations, whereas attachment and general stress only produce indirect influences both on cyber deviant behaviors and cyber victimization
Overall, based on the research results, recommendations for cyber deviant behaviors and cyber victimizations prevention strategies are given as follows : (1) Since the influence of self-control is significant but indirective, increasing the level of informal social control is the first step to prevent the probability of being cyber deviants and cyber victims; (2) Solving the cyber deviant behaviors and cyber victimizations should be induced by the individual's ban on Internet addiction dependence; (3) Strengthening online educations and risk identifications is warranted; (4) Cyber use tools should increase the cyber interaction crisis identification mechanism; (5) Effectively manage the cyber situations to reduce the incentives for the occurrence of cyber deviation and negative incentives; (6) Adopting appropriate prevention strategies based on the commonalities and differences of different age groups; (7) Attentions should be paid more on those high-risk individuals with overlapping deviations and victims; (8) Comprehensive consideration of cyber deviantbehavior and cyber victimization factors to construction of prevention networks. The recommendations for future research also have been provided in final.
一、中文


王茜(2014)。網路成癮, 網路偏差及網路被害者之關係: 人的聚合還是網路活動場域的聚合?。 臺北大學犯罪學研究所碩士論文。

王怡景(2011)。 從低自我控制、機會及性別探討青少年網路色情使用行為之差異。世新大學社會心理學研究所碩士論文。

王秋惠(2007)。網路詐欺被害特性與被害歷程之研究。中央警察大學犯罪防治研究所碩士論文。

江南逸 (2003)。 國中生使用網路之偏差行為和網路沈迷程度對生活適應之研究。 國立中正大學犯罪防治研究所碩士論文。

李佩珊(2015) 。青少年依附關係、憂鬱與網路成癮的相關研究。國立台南大學諮商與輔導學系碩士論文。
林天佑(2005) 。教育研究倫理準則。教育研究月刊,132,70-86。

林秀怡(2011) 。性別、緊張及青少年偏差與犯罪行為之實徵研究---一般化緊張理論之驗證。 中央警察大學犯罪防治研究所博士論文。

林青穎(2012) 。家長版網路成癮量表之編製及相關研究。 國立彰化師範大學輔導與諮商學系研究所碩士論文。

呂宜芳(2017) 。嚴厲教養對青少年物質使用及暴力偏差之影響。國立台北大學犯罪學研究所碩士論文。

呂敏綺 (2016) 。高中職霸凌受害學生個人特質及相關因素之研究-以嘉義市高中職生為例。中正大學犯罪防治學系碩士論文。

呂詩涵、胡嘉文 (2015) 。 面對網路霸凌的因應之道。 臺灣教育評論月刊, 4(9),57-62。

吳中勤 (2015) 。探討國中青少年偏差行為的社會心理決策歷程。成功大學教育研究所學位論文。

吳智泰(2008) 。高中職學生偏差行為影響因素之調查研究:以嘉義市為例。國立中正大學犯罪防治所碩士論文。

吳嫦娥(2004) 。未成年人網路偏差與被害問題透視。透視犯罪問題,4,26-30。

吳峻豪(2008) 。 國中學生網路使用行為、網路成癮和自我概念之研究-以台中縣
為例。中華大學科技管理研究所碩士論文。

邱皓政 (2011)。 結構方程模式: LISREL 的理論、技術與應用。 雙葉書廊。
周淑如 (2007) 。家庭暴力經驗、 社會支持與國中生偏差行為之關聯性研究。成功大學教育研究所碩士論文。

周愫嫻 (2014) 。青少年網路虛擬身份分與網路被害、 不當行為。 犯罪與刑事司法研究, (22), 45-73。

洪瑞聰(2014) 。國中學生自我控制能力對網路偏差行為之影響。樹德科技大學資訊管理系碩士班學位論文。

徐文堂(2015) 。國中學生LINE使用行為與人際關係、網路霸凌之研究。中華大學科技管理研究所碩士論文。

高碧玲(2016)。3C 產品使用控管對學童自我控制與網路成癮的影響—以台北市某國小高年級學生為例。 國立臺北教育大學數位科技設計學系 (含玩具與遊戲設計碩士班) 學位論文。

翁國峰 (2008) 。非行同儕, 負向情緒與效能影響少年偏差行為發展之研
究。國立中正大學犯罪防治研究所博士論文。

郭祐榕(2009) 。網路霸凌被害者之被害特質分析:以嘉義市地區國中生為例.國立中正大學犯罪防治研究所碩士論文。

郭慧敏(2005) 。從家庭結構、社會控制理論、社會學習理論探討青少年不良行為。 國立台北大學犯罪學研究所碩士論文。

袁振書(2014) 。親子關係與自我控制對國小高年級學童玩網路遊戲之調節效果研究。大葉大學管理學院碩士在職專班論文。

許詩珮(2013) 。大學生網路霸凌現況與受害之人格,因應與憂鬱相關探討。 中原大學心理學研究所學位論文。

許春金 (2013) 。犯罪學 (修訂七版) 。臺北市:三民。

許淑惠 (2007) 。 國小六年級學童網路使用行為,家庭相關因素與網路成癮之研究。 台中靜宜大學管理碩士在職專班碩士論文。

許維維 (2009) 。國中生網路虛擬財物竊盜之加害人與被害人特性分析。臺北大學犯罪學研究所碩士論文。
許甄育(2006) 。緊張因素,負面情緒, 制握信念與與男女性青少年偏差行為之關聯性研究。 成功大學教育研究所碩士論文。

陳玉書 (2000) 。女性犯罪之現況與研究發展。中央警察大學學報,36,255-276。

陳玉書、曾百川(2007) 。網路詐欺犯罪理性選擇歷程之質性分析。中央警察大學犯罪防治學報,8,115-146。

陳正昌、程炳林、陳新豐 & 劉子鍵 (2005)。多變量分析方法: 統計軟體應用 (四版)。 台北: 五南。

陳怡璇(2007) 。性別、少年網路偏差與犯罪行為影響因素之研究。中央警察大學犯罪防治研究所碩士論文。

陳怡儒(2010) 。少年網路霸凌被害因素研究-以日常活動理論分析。國立中正大學犯罪防治所碩士論文。

陳昭佑(2010) 。臺北市國小學童家庭環境對網路成癮影響之研究。臺北市立教育大學社會科教育學系碩士論文。

陳客宏(2012) 。臺東縣國小高年級學童人格特質、網路素養與網路偏差行為之研究。國立台東大學教育學所碩士論文。

陳珮汝(2012) 。生活壓力對青少年偏差行為之影響:以社會依附為調節變項。世新大學社會心理研究所碩士論文。

陳志誠、柯巧心、 陳巧珮 (2010) 。線上遊戲犯罪模式分析之實證研究。資訊科技與社會學報,18, 25-50。

陳佳玉(2007) 。通訊金融詐欺犯罪被害特性及歷程之分析。中央警察大學犯罪防治研究所碩士論文。

陳宗義、沈筱娟 (2015) 。從網路犯罪觀點探討虛擬社群之網路人際行為與互動安全因素。 Electronic Commerce Studies, 13(2), 241-270。

陳康怡 (2012) 。隱蔽青年之背景及自我控制與其進行偏差行為的研究。 犯罪與刑事司法研究,(18),1-35。

陳富添、林宜隆 (2001) 。網路偏差行為之初探。 2001 年第五屆資訊管理學術暨警政資訊實務研討會發表之論文,中央警察大學資訊管理學系。

陳富添 (2002) 。網咖青少年網路成癮相關因素之研究。 中央警察大學資訊管理研究所碩士論文。

陳瑛琪(2013) 。青少年網路成癮-現實與虛擬環境間的拉鋸戰。 商管科技季刊, 14(2),165-193。

張必弘(2011) 。網路使用行為、自尊、依附風格與網路成癮關係之探究。國立屏東教育大學資訊科學系碩士論文。

張月馨(2016) 。台灣高中職學生家庭功能、憂鬱傾向與網路成癮之相關研究。國立臺灣師範大學教育心理與輔導學系碩士論文。

張睿芯(2014) 。大學生依附關係、非理性信念與網路成癮之相關研究。 國立臺南大學諮商與輔導學系碩士論文。

張耀中(2009) 。青少年從事網路不當行爲相關因素之分析-以桃園縣國中生爲例。 犯罪與刑事司法研究, (13),1-49。

彭怡芳(2002)。緊張, 負面情緒與青少年偏差行為之研究-以台南地區為例。成功大學教育研究所學位論文。

黃俊祥(2007) 。 少年網路偏差與犯罪行為成因之研究。中央警察大學犯罪防治研究所博士論文。

黃祥益(2006) 。台灣地區少年網路犯罪與被害特性之研究。中央警察大學犯罪防治研究所碩士論文。

黃淨喻(2005) 。青少年我行我素態度對網路犯罪之影響。 靜宜大學青少年兒童福利研究所碩士論文。

黃啟新(2013) 。網路使用行為影響親子、師生、同儕關係之研究:以桃園縣國小高年級學童為例。 臺北市立教育大學公民與社會教學所碩士論文。

黃凱柔(2016) 。新移民與非新移民子女校園霸凌被害經驗之比較研究。國立中正大學犯罪防治學系碩士論文。

黃芳銘、楊金寶(2004) 。從被害者理論探討國中女生網路交友性侵害潛在危險之研究。師大學報,49(1),21-40。

黃曉涵(2010) 。國中生的生活壓力、自我控制與網路沉迷傾向之研究。國立新竹教育大學教育心理與諮商學系碩士論文。

曾育嫺(2013) 。台南市國中生刺激尋求、自我控制能力 對網路偏差行為之相關研究。明道大學資訊傳播學系碩士論文。

曾淑萍、蘇桓玉(2011)。國中學生網路霸凌被害恐懼感之研究。青少年犯罪防治研究期刊,3(2),1-34。

鄒佩璇(2010) 。台北市高中職學生網路成癮行為與其相關因素研究─ 計劃行為理論之應用。 臺灣師範大學健康促進與衛生教育學系學位論文。

楊垂青(2005) 。少年網路沉迷之研究-子女與父母管教之觀點。國立中正大學犯罪防治所碩士論文。

葉雲宏(2008) 。網路詐欺犯罪被害影響因素之研究。中央警察大學犯罪防治研究所碩士論文。

廖有祿(2001) 。電腦犯罪模式及犯罪者特徵分析之研究。中央警察大學博士論文。

廖有祿、李相臣(2007)。電腦犯罪理論與實務。台北:五南。

劉品秀(2007) 。網路交友欺騙類型及被害特質之研究。國立中正大學犯罪防治研究所碩士論文。

劉品薇(2014) 。大學生霸凌受害經驗與網路成癮之關係。 中山醫學大學公共衛生學系碩士班碩士論文。
劉冠琪(2005) 。生活壓力、自我韌性、衝動性格與國中生偏差行為關聯性之研究。國立成功大學教育研究所碩士論文。

賴克宗(2005) 。大學生網路犯罪被害研究-以國立中正大學學生為例。國立中正大學犯罪防治所碩士論文。
盧浩權(2004) 。青少年網路沉迷現象與生活壓力, 負面情緒之相關研究-以臺中市高中生為例。靜宜大學青少年兒童福利研究所碩士論文。

盧麗卉(2002)。台北地區高中職學生網路成癮行為及其相關背景因素之探討。 國政治大學教育研究所碩士論文。
蔡田木(2002) 。 個人犯罪被害特性及其成因之研究。中央警察大學犯罪防治研究所博士論文。

蔡其芳(2006) 。線上遊戲竊盜加害與被害特徵之研究。台北大學犯罪學研究所碩士論文。

蔡東敏 (2015) 。台灣城鄉地區國中生偏差行為之比較—以 Agnew一般化緊張理論之分析。 成功大學教育研究所碩士論文。

蔡博忠(2008) 。台東縣高中職學生父母管教態度、 自我控制能力與網路偏差行為傾向之相關研究。 臺東大學教育學系教學科技碩士班碩士論文。

戴怡婷(2015)。 國中生復原力對緊張因素, 負向情緒與偏差行為間關係之影響。 成功大學教育研究所碩士論文。

顏如佑(2005) 。青少年網路成癮相關因子之研究。高雄醫學大學行為科學研究所碩士論文。

簡毓怡(2007) 。青少年網路遊戲玩家的憂鬱情緒, 親子關係適應與網路遊戲成癮之相關研究。 國立彰化師範大學輔導與諮商學系碩士論文。

譚子文(2009) 。社會控制理論依附和參與要素之關聯性研究。 犯罪與刑事司法研究, (13), 51-81。

譚子文、范書菁(2010)。 依附關係、 參與傳統活動、社會緊張因素與台灣地區青少年外向性偏差行為及內向性偏差行為關聯性之研究。 輔導與諮商學報, 32(1),17-42。

蘇詠翔 (2010)。網路偏差行為衡量及分析研究。臺北大學資訊管理研究所碩士論文。




二、外文

Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47-88.
Agnew, R. (2001). Building on the foundation of general strain theory: Specifying the types of strain most likely to lead to crime and delinquency. Journal of research in crime and delinquency, 38(4), 319-361.
Agnew, R. (2002). Experienced, vicarious, and anticipated strain: An exploratory study on physical victimization and delinquency. Justice Quarterly, 19(4), 603-632.
Agnew, R. (2005). Why do criminals offend?: A general theory of crime and delinquency. Los Angeles, CA: Roxbury.
Agnew, R. (2006). General strain theory: Current status and directions for further research. Taking stock: The status of criminological theory, 15, 101-23.
Akers Ronald, L., & Sellers Christine, S. (2009). Criminological Theories: Introduction, Evaluation, and Application.
Audal, J., Lu, Q., & Roman, P. (2008). Computer crimes. Am. Crim. L. Rev., 45, 233. Berg,B.L.(2001).Qualtative research methods for the social science.Boston: Allyn and Bacon.
Berg, M. T., & Felson, R. B. (2016). Why are offenders victimized so often?. The Wiley handbook on the psychology of violence, 49-65.
Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400-420.
Bossler, A., & Holt, T. J. (2015). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.
Broidy, L. M., Daday, J. K., Crandall, C. S., Sklar, D. P., & Jost, P. F. (2006). Exploring demographic, structural, and behavioral overlap among homicide Offenders and victims. Homicide Studies, 10(3), 155-180.
Brownfield, D., & Sorenson, A. M. (1993). Self‐control and juvenile delinquency: Theoretical issues and an empirical assessment of selected elements of a general theory of crime. Deviant Behavior, 14(3), 243-264.
Cho, M. K., Kim, H. Y., & Moon, S. S. (2016). The longitudinal effects of influence of parental attachment and emotion regulation on Internet delinquency in early adolescence. Journal of Human Behavior in the Social Environment, 26(7-8), 587-596. Choi, K. S., & Lee, J. R. (2017). Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory. Computers in Human Behavior, 73, 394-402.
Christensen, A. L., & Eining, M. M. (1991). Factors influencing software piracy: Implications for accountants. Journal of Information systems, 5(1), 67-80.
Clarke, R. V., Wortley, R., & Mazerolle, L. (2008). Situational crime prevention.
Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American sociological review, 588-608.
Cohen, L. E., Kluegel, J. R., & Land, K. C. (1981). Social inequality and predatory criminal victimization: An exposition and test of a formal theory. American Sociological Review, 505-524.
Cooley, C. H. (1902). The looking-glass self. O’brien, 126-128.
Craig, W., Harel-Fisch, Y., Fogel-Grinvald, H., Dostaler, S., Hetland, J., Simons-Morton, B., ... & Pickett, W. (2009). A cross-national profile of bullying and victimization among adolescents in 40 countries. International journal of public health, 54, 216-224.
DeLisi, M., & Vaughn, M. G. (2008). The Gottfredson–Hirschi critiques revisited: Reconciling self-control theory, criminal careers, and career criminals. International Journal of Offender Therapy and Comparative Criminology, 52(5), 520-537. Donner, C. M., Marcum, C. D., Jennings, W. G., Higgins, G. E., & Banfield, J. (2014).Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy. Computers in Human Behavior, 34, 165-172.
Dobrin, A. (2001). The risk of offending on homicide victimization: a case control study. Journal of Research in Crime and Delinquency, 38, 154–173.
Durkheim, E. (1933). The Division of Laborin Society. New York: FreePress.
Erikson, E. H., & Erikson, J. M. (1997). The life cycle completed (extended version). WW: Norton & Company.
Fagan, A. A., & Mazerolle, P. (2011). Repeat offending and repeat victimization: Assessing similarities and differences in psychosocial risk factors. Crime &Delinquency, 57(5), 732-755.
Felson, M. (2002). Crime and everyday life. Thousand Oaks, CA: Sage. Felson, M., & Clarke, R. V. (1998). Opportunity makes the thief. Police research series, paper, 98. Foster, D. R. (2004). Can the general theory of crime account for computer offenders: Testing low self-control as a predictor of computer crime offending (Doctoral dissertation).
Francis T. Cullen, Robert Agnew, & Pamela Wilcox(2013). Criminological Theory:Past to Present.Oxford University Press.
Goldstein, S. E. (2016). Adolescents’ Disclosure and Secrecy About Peer Behavior: Links with Cyber Aggression, Relational Aggression, and Overt Aggression. Journal of Child and Family Studies, 25(5), 1430-1440.
Gottfredson, M. R. (2006). The empirical status of control theory in criminology. In F. Cullen, J. P. Wright, & K. R. Blevins(Eds), Talking stock : The status of criminological theory (pp. 77–100). New Brunswick: Transaction Publishers.
Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford University Press.
Gopal, R. D., & Sanders, G. L. (1998). International software piracy: Analysis of key issues and impacts. Information Systems Research, 9(4), 380-397.
Gough, H. G. (1948). A sociological theory of psychopathy. American Journal of Sociology, 53(5), 359-366.
Greenwood, I. D. (2016). Cyber-victimization and delinquency: A general strain perspective. University of Montana, Missoula.
Grifllths, M. D. (1998). Internet addiction: does it really exist?. Gackenbach J. Psychology and the intemet: Intrapersonal, interpersonal, and Transpersonal Implications. New York: Academic Press, 61-75.
Hagan,Frank E.(2003) .Research Methods in Criminal Justice and Criminology. Person Education,Inc. Hay, C., & Meldrum, R. (2010). Bullying victimization and adolescent self-harm: Testing hypotheses from general strain theory. Journal of youth and adolescence, 39(5), 446-459.
Hay, C., Meldrum, R., & Mann, K. (2010). Traditional bullying, cyber bullying, and deviance: A general strain theory approach. Journal of Contemporary Criminal Justice, 26(2), 130-147. Hawking, S. (1996). The illustrated a brief history of time. Bantam. Heyman, R. E., & Slep, A. M. S. (2002). Do child abuse and interparental violence lead to adulthood family violence?. Journal of Marriage and Family, 64(4), 864-870. Hiday, V. A. (2006). Putting community risk in perspective: A look at correlations, causes and controls. International journal of law and psychiatry, 29(4), 316-331. Higgins, G. E., & Makin, D. A. (2004). Does social learning theory condition the effects of low self-control on college students’ software piracy. Journal of Economic Crime Management, 2(2), 1-22. Higgins, G. E., & Makin, D. A. (2004). Self-control, deviant peers, and software piracy. Psychological reports, 95(3), 921-931. Higgins, G. E. (2005). Can low self-control help with the understanding of the software piracy problem?. Deviant Behavior, 26(1), 1-24. Higgins, G. E. (2007). Digital piracy: An examination of low self-control and motivation using short-term longitudinal data. CyberPsychology & Behavior, 10(4), 523-529. Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 12(3), 166-184.
Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self‐control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3-22.
Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students' intentions to pirate movies in the United States. Social Science Computer Review, 25(3), 339-357.
Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Digital piracy: An examination of three measurements of self-control. Deviant Behavior, 29(5), 440-460.
Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2009). Digital piracy: A latent class analysis. Social Science Computer Review, 27(1), 24-40.
Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization. Cambridge, MA: Ballinger.
Hinduja, S. (2004). An empirical test of the applicability of general criminological theories to Internet crime. Michigan State University.
Hinduja, S. (2006). A critical examination of the digital music phenomenon. Critical Criminology, 14(4), 387-409.
Hinduja, S., & Ingram, J. R. (2008). Self-control and ethical beliefs on the social learning of intellectual property theft. W. Criminology Rev., 9, 52-72.
Hinduja, S., & Patchin, J. W. (2011). Cyberbullying: A review of the legal issues facing educators. Preventing School Failure: Alternative Education for Children and Youth, 55(2), 71-78.
Hinduja, S., & Patchin, J. W. (2014). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Corwin Press.
Hirschi, T. (1969). Causes of Delinquency University of California Press Berkeley. CA Google Scholar.
Hoge, R. D., Andrews, D. A., & Leschied, A. W. (1996). An investigation of risk and protective factors in a sample of youthful offenders. Journal of Child Psychology and Psychiatry, 37(4), 419-424.
Hollinger, R. C. (1991). Hackers: Computer heroes or electronic highwaymen?. ACM SIGCAS Computers and society, 21(1), 6-17.
Hollinger, R. C., & Lanza‐Kaduce, L. O. N. N. (1988). The process of criminalization: The case of computer crime laws. Criminology, 26(1), 101-126.
Hollis, M. E., Felson, M., & Welsh, B. C. (2013). The capable guardian in routine activities theory: A theoretical and conceptual reappraisal. Crime Prevention & Community Safety, 15(1), 65-79.
Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1-25. Holtfreter, K., Reisig, M. D., & Pratt, T. C. (2008). Low self‐control, routine activities, and fraud victimization. Criminology, 46(1), 189-220.
Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37(3), 378-395.
Holt, T. J., Bossler, A. M., Malinski, R., & May, D. C. (2016). Identifying predictors of unwanted online sexual conversations among youth using a low self-control and routine activity framework. Journal of Contemporary Criminal Justice, 32(2), 108-128. Hu, Q., Xu, Z., & Yayla, A. A. (2013). Why College Students Commit Computer Hacks: Insights from a Cross Culture Analysis. In PACIS , 104-114.
Jennings, W. G., Higgins, G. E., Tewksbury, R., Gover, A. R., & Piquero, A. R. (2010).A longitudinal assessment of the victim-offender overlap. Journal of Interpersonal Violence, 25(12), 2147-2174.
Jennings, W. G., Piquero, A. R., & Reingle, J. M. (2012). On the overlap between victimization and offending: A review of the literature. Aggression and Violent Behavior, 17(1), 16-26.
Jensen, G. F., & Brownfield, D. (1986). Gender, lifestyles, and victimization: Beyond routine activity. Violence and victims, 1(2), 85-99.
Joinson, A. N. (2003). Understanding the psychology of Internet behaviour: Virtual worlds, real lives. Revista iberoamericana de educación a distancia, 6(2), 190.
Judge, G., Hill, R., Griffiths, W., Lutkepohl, H., & Lee, T. (1988). Introduction to the Theory and Practice of Econometrics. ed.
Jhon Wiley & Sons,. Kerstens, J., & Jansen, J. (2016). The Victim–Perpetrator Overlap in Financial Cybercrime: Evidence and Reflection on the Overlap of Youth’s On-Line Victimization and Perpetration. Deviant Behavior, 37(5), 585-600.
Kigerl, A. (2012). Routine activity theory and the determinants of high cybercrime countries. Social Science Computer Review, 30(4), 470-486.
Langton, L., & Piquero, N. L. (2007). Can general strain theory explain white-collar crime? A preliminary investigation of the relationship between strain and select white-collar offenses. Journal of Criminal Justice, 35(1), 1-15.
Law, D. M., Shapka, J. D., & Olson, B. F. (2010). To control or not to control? Parenting behaviours and adolescent online aggression. Computers in Human Behavior, 26(6), 1651-1656.
Lauritsen, J. L., Sampson, R. J., & Laub, J. H. (1991). The link between offending and victimization among adolescents. Criminology, 29(2), 265-292.
Lauritsen, J. L., & Laub, J. H. (2007). Understanding the link between victimization and offending: New reflections on an old idea. Crime prevention studies, 22, 55. Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263-280.
Marcum, C. D., Ricketts, M. L., & Higgins, G. E. (2010). Assessing sex experiences of online victimization: An examination of adolescent online behaviors using routine activity theory. Criminal justice review, 35(4), 412-437.
Marks, S. R. (1974). Durkheim's theory of anomie. American Journal of Sociology, 80(2), 329-363. Merton, R. K. (1938). Social structure and anomie. American sociological review, 3(5), 672-682.
Mesch, G. S. (2009). Social bonds and Internet pornographic exposure among adolescents. Journal of Adolescence, 32(3), 601-618.
Miethe, T. D., & Meier, R. F. (1990). Opportunity, choice, and criminal victimization: A test of a theoretical model. Journal of research in Crime and Delinquency, 27(3), 243-266.
Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767-772. Mustaine, E. E., & Tewksbury, R. (1998). Predicting risks of larceny theft victimization: A routine activity analysis using refined lifestyle measures. Criminology, 36(4), 829-858.
Mustaine, E. E., & Tewksbury, R. (2002). Sexual assault of college women: A feminist interpretation of a routine activities analysis. Criminal Justice Review, 27(1), 89-123. Neuman, W.L.(2006). Social research methods: Qualtative and quantiatuve approach(6th ed.).Boston,MA:Person Education.
Ngo, F. T. and R. Paternoster. (2011). Cybercrime Victimization: An Examination of Individual and Situational Level Factors. International Journal of Cyber Criminology ,5(1),773–793.
Ngo, F. T., & Paternoster, R. (2013). Stalking strain, concurrent negative emotions, and legitimate coping strategies: A preliminary test of gendered strain theory. American Journal of Criminal Justice, 38(3), 369-391.
Nye, F. I. (1958). Family relationships and delinquent behavior . New York: Wiley. Osuagwu, O., Ogiemien, T., & Okide, S. (2010). Deploying forensics science & technology for resolving national cyber-security challenges. Journal of Mathematics and Technology, 3, 19-25.
Paley, B., Conger, R. D., & Harold, G. T. (2000). Parents' affect, adolescent cognitive representations, and adolescent social development. Journal of Marriage and Family, 62(3), 761-776.
Phillips, E. (2015). Empirical Assessment of Lifestyle-Routine Activity and Social Learning Theory on Cybercrime Offending. Bridgewater State University.
Piquero, A. R., MacDonald, J., Dobrin, A., Daigle, L. E., & Cullen, F. T. (2005). Self-control, violent offending, and homicide victimization: Assessing the general theory of crime. Journal of Quantitative Criminology, 21(1), 55-71.
Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi's general theory of crime: A meta‐analysis. Criminology, 38(3), 931-964.
Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267-296.
Pratt, T. C., Turanovic, J. J., Fox, K. A., & Wright, K. A. (2014). Self‐control and victimization: A meta‐analysis. Criminology, 52(1), 87-116.
Pratt, T. C., & Turanovic, J. J. (2016). Lifestyle and routine activity theories revisited: The importance of “risk” to the study of victimization. Victims & Offenders, 11(3), 335-354.
Pyrooz, D. C., Decker, S. H., & Moule Jr, R. K. (2015). Criminal and routine activities in online settings: Gangs, offenders, and the Internet. Justice Quarterly, 32(3), 471-499. Rahim, M. M., Seyal, A. H., & Rahman, M. N. A. (1999). Software piracy among computing students: a Bruneian scenario. Computers & Education, 32(4), 301-321. Reynald, D. M. (2009). Guardianship in action: Developing a new tool for measurement. Crime Prevention & Community Safety, 11(1), 1-20.
Reynald, D. M. (2010). Guardians on guardianship: Factors affecting the willingness to supervise, the ability to detect potential offenders, and the willingness to intervene. Journal of Research in Crime and Delinquency, 47(3), 358-390.
Reynald, D. M. (2011). Factors associated with the guardianship of places: Assessing the relative importance of the spatio-physical and sociodemographic contexts in generating opportunities for capable guardianship. Journal of Research in Crime and Delinquency, 48(1), 110-142.
Reynald, D. M. (2011). Guarding against crime: Measuring guardianship within routine activity theory. Ashgate Publishing, Ltd..
Reingle, J. M., Staras, S. A., Jennings, W. G., Branchini, J., & Maldonado-Molina, M. M. (2012). The relationship between marijuana use and intimate partner violence in a nationally representative, longitudinal sample. Journal of interpersonal violence, 27(8), 1562-1578.
Reyns, B. W. (2010). A situational crime prevention approach to cyberstalking victimization:Preventive tactics for internet users and online place managers. Crime Prevention &Community Safety, 12(2), 99-118.
Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being pursued online: Applying cyberlifestyle–routine activities theory to cyberstalking victimization. Criminal justice and behavior, 38(11), 1149-1169.
Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216-238.
Reyns, B. W., Henson, B., & Fisher, B. S. (2016). Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from routine activity theory as it applies to online forms of victimization. Journal of Contemporary Criminal Justice, 32(2), 148-168.
Robins, L. N. (1978). Sturdy childhood predictors of adult antisocial behaviour: Replications from longitudinal studies. Psychological medicine, 8(04), 611-622. Sampson, Robert J., and John H. Laub. "Desistance from crime over the life course." Handbook of the life course. Springer US, 2003. 295-309.
Sampson, R. J., & Lauritsen, J. L. (1990). Deviant lifestyles, proximity to crime, and the offender-victim link in personal violence. Journal of research in crime and delinquency, 27(2), 110-139.
Schreck, C. J. (1999). Criminal victimization and low self-control: An extension and test of a general theory of crime. Justice Quarterly, 16(3), 633-654.
Schreck, C. J., Wright, R. A., & Miller, J. M. (2002). A study of individual and situational antecedents of violent victimization. Justice Quarterly, 19(1), 159-180. Schreck, C. J., Stewart, E. A., & Fisher, B. S. (2006). Self-control, victimization, and their influence on risky lifestyles: A longitudinal analysis using panel data. Journal of Quantitative Criminology, 22(4), 319-340.
Schreck, C. J., & Stewart, E. A. (2011). The victim-offender overlap and its implications for juvenile justice. The Oxford Handbook of Juvenile Crime and Juvenile Justice, 47–72.
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of research in crime and delinquency, 34(4), 495-518.
Shaffer, J. N., & Ruback, R. B. (2002). Violent Victimization as a Risk Factor for Violent Offending among Juveniles. Juvenile Justice Bulletin.
Silver, E. (2002). Mental disorder and violent victimization: the mediating role of involvement in conflicted social relationships. Criminology, 40(1), 191-212.
Silver, E., Arseneault, L., Langley, J., Caspi, A., & Moffitt, T. E. (2005). Mental disorder and violent victimization in a total birth cohort. American Journal of Public Health, 95(11), 2015-2021.
Stack, S., Wasserman, I., & Kern, R. (2004). Adult social bonds and use of internet pornography. Social science quarterly, 85(1), 75-88.
Steinmetz, K. F. (2015). Craft (y) nessAn Ethnographic Study of Hacking. The British Journal of Criminology, 55(1), 125-145.
Steinmetz, K. F., & Nobles, M. R. (Eds.). (2017). Technocrime and Criminological Theory. Routledge.
Stewart, E. A., Elifson, K. W., & Sterk, C. E. (2004). Integrating the general theory of crime into an explanation of violent victimization among female offenders. Justice Quarterly, 21(1), 159-181.
Taylor, T.L. (2006) .Play between Worlds: Exploring Online Game Culture. Cambridge, MA: MIT Press.
Taylor, R. W., Caeti, T. J., Loper, D. K., Fritsch, E. J., & Liederbach, J. (2006). Digital crime and digital terrorism. Upper Saddle River, NJ: Pearson Prentice Hall.
Thong, J. Y., & Yap, C. S. (2000). Information systems and occupational stress: A theoretical framework. Omega, 28(6), 681-692.
Udris, R. (2016). Psychological and Social Factors as Predictors of Online and Offline Deviant Behavior among Japanese Adolescents. Deviant Behavior, 38(7),1-18. Vandebosch, H., & Van Cleemput, K. (2009). Cyberbullying among youngsters: Profiles of bullies and victims. New media & society, 11(8), 1349-1371.
Vakhitova, Z. I., Reynald, D. M., & Townsley, M. (2016). Toward the adaptation of routine activity and lifestyle exposure theories to account for cyber abuse victimization. Journal of Contemporary Criminal Justice, 32(2), 169-188.
Van Wilsem, J. (2011). ‘Bought it, but never got it’Assessing risk factors for online consumer fraud victimization. European Sociological Review, 29(2), 168-178.
Van Wilsem, J. (2013). Hacking and harassment—Do they have something in common? Comparing risk factors for online victimization. Journal of Contemporary Criminal Justice, 29(4), 437-453.
Wiatrowski, M., & Anderson, K. L. (1987). The dimensionality of the social bond. Journal of Quantitative Criminology, 3(1), 65-81.
Willison, R. (2006). Understanding the perpetration of employee computer crime in the organisational context. Information and organization, 16(4), 304-324.
Wilsem, J. V. (2013). Hacking and harassment—Do they have something in common? Comparing risk factors for online victimization. Journal of Contemporary Criminal Justice, 29(4), 437-453.
Winfree Jr, L. T., Taylor, T. J., He, N., & Esbensen, F. A. (2006).
Self-control and variability over time: Multivariate results using a 5-year, multisite panel of youths. Crime & Delinquency, 52(2), 253-286.
Wolfe, S. E., Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2016). Routine cell phone activity and exposure to sext messages: Extending the generality of routine activity theory and exploring the etiology of a risky teenage behavior. Crime & Delinquency, 62(5), 614-644.
Wright, M. F., Aoyama, I., Kamble, S. V., Li, Z., Soudi, S., Lei, L., & Shu, C. (2015). Peer attachment and cyber aggression involvement among Chinese, Indian, and Japanese adolescents. Societies, 5(2), 339-353.
Wysocki, D. K. (2001). “Eat your fingers do the talking”: Sex on an adult chat eine. Readings in deviant behavior, 3(1) ,88-96.
Yar, M. (2005). The Novelty of ‘Cybercrime’ An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2(4), 407-427.
Ybarra, M. L., & Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of child Psychology and Psychiatry, 45(7), 1308-1316.

三、網路資料

中央研究院社會學研究所(2007). 台灣社會變遷全紀錄,台灣民眾網路使用頻 率。 取自:http://www.ios.sinica.edu.tw/TSCpedia/index.php
中央研究院社會學研究所(2007). 台灣社會變遷全紀錄,台灣地區民眾上網的主 要目的。取自:http://www.ios.sinica.edu.tw/TSCpedia/index.php
中央研究院社會學研究所(2009). 台灣社會變遷全紀錄,網路犯罪發展趨勢。取 自:http://www.ios.sinica.edu.tw/TSCpedia/index.php
內政部警政署統計室(2017).警政通報:電腦網路犯罪概況。取自: https://www.npa.gov.tw/NPAGip/wSite/ct?xItem=83129&ctNode=12594&mp=1
向陽基金會(2001).e 世代青少年網咖經驗調查報告。取自: http://www.tosun.org.tw/database/900528/
台灣網路資訊中心(2016).網路使用調查報告。取自: https://www.twnic.net.tw/download/200307/200307index.shtml
兒童福利聯盟(2011).兒少網路安全調查報告。 http://www.children.org.tw/news/activity_detail/782
法務部司法官學院犯罪防治研究資料庫(2016) https://www.tpi.moj.gov.tw/ct.asp?xItem=488316&ctNode=35595&mp=302
Goldberg, I. (1996). Internet Addictive Disorder (IAD) Diagnostic Criteria. Retrieved June 2, 2006, from http://www.psycom.net/iadcriteria.html.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
無相關點閱
 
QR Code
QRCODE