期刊論文1. | Hay, C.、Meldrum, R.、Maon, K.(2010)。Traditional bullying, cyber bullying, and deviance: A general strain theory approach。Journal of Contemporary Criminal Justice,26(2),130-147。 |
2. | Hinduja, S.(2006)。A critical examination of the digital music phenomenon。Critical Criminology,14(4),387-409。 |
3. | Merton, Robert K.(1938)。Social Structure and Anomie。American Sociological Review,3(5),672-682。 |
4. | Hay, C.、Meldrum, R. C.(2010)。Bullying victimization and adolescent self-harm: Testing hypotheses from general strain theory。Journal of Youth and Adolescence,39(5),446-459。 |
5. | Hollis, M. E.、Felson, M.、Welsh, B. C.(2013)。The Capable Guardian in Routine Activities Theory: A Theoretical and Conceptual Reappraisal。Crime Prevention and Community Safety,15(1),65-79。 |
6. | Reyns, B. W.、Henson, B.、Fisher, B. S.(2011)。Being Pursued Online Applying Cyberlifestyle-Routine Activities Theory to Cyberstalking Victimization。Criminal justice and behavior,38(11),1149-1169。 |
7. | 陳玉書(20000300)。女性犯罪之現況與研究發展。中央警察大學學報,36,255-275。 延伸查詢 |
8. | Miethe, T. D.、Meier, R. F.(1990)。Opportunity, choice, and criminal victimization: a test of a theoretical model。Journal of research in crime and delinquency,27(3),243-266。 |
9. | Vakhitova, Z. I.、Reynald, D. M.、Townsley, M.(2016)。Toward the Adaptation of Routine Activity and Lifestyle Exposure Theories to Account for Cyber Abuse Victimization。Journal of Contemporary Criminal Justice,32(2),169-188。 |
10. | Bossler, A. M.、Holt, T. J.(2009)。On-line activities, guardianship, and malware infection: An examination of routine activities theory。International Journal of Cyber Criminology,3(1),400-420。 |
11. | Choi, K. S.、Lee, J. R.(2017)。Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory。Computers in Human Behavior,73,394-402。 |
12. | Donner, C. M.、Marcum, C. D.、Jennings, W. G.、Higgins, G. E.、Banfield, J.(2014)。Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy。Computers in Human Behavior,34,165-172。 |
13. | Higgins, G. E.(2007)。Digital piracy: An examination of low self-control and motivation using short-term longitudinal data。Cyber Psychology and Behavior,10(4),523-529。 |
14. | Hinduja, S.、Patchin, J. W.(2011)。Cyberbullying: A review of the legal issues facing educators。Preventing School Failure: Alternative Education for Children and Youth,55(2),71-78。 |
15. | Holt, T. J.、Bossler, A. M.(2008)。Examining the applicability of lifestyle-routine activities theory for cybercrime victimization。Deviant Behavior,30(1),1-25。 |
16. | Holt, T. J.、Bossler, A. M.、Malinski, R.、May, D. C.(2016)。Identifying predictors of unwanted online sexual conversations among youth using a low self-control and routine activity framework。Journal of Contemporary Criminal Justice,32(2),108-128。 |
17. | Jennings, W. G.、Piquero, A. R.、Reingle, J. M.(2012)。On the overlap between victimization and offending: A review of the literature。Aggression and Violent Behavior,17(1),16-26。 |
18. | Kerstens, J.、Jansen, J.(2016)。The Victim-Perpetrator Overlap in Financial Cybercrime: Evidence and Reflection on the Overlap of Youth's On-Line Victimization and Perpetration。Deviant Behavior,37(5),585-600。 |
19. | Marcum, Catherine D.、Ricketts, Melissa L.、Higgins, George E.(2010)。Assessing sex experiences of online victimization: An examination of adolescent online behaviors using routine activity theory。Criminal justice review,35(4),412-437。 |
20. | Ngo, F. T.、Paternoster, R.(2011)。Cybercrime Victimization: An Examination of Individual and Situational Level Factors。International Journal of Cyber Criminology,5(1),773-793。 |
21. | Ngo, F. T.、Paternoster, R.(2013)。Stalking strain, concurrent negative emotions, and legitimate coping strategies: A preliminary test of gendered strain theory。American Journal of Criminal Justice,38(3),369-391。 |
22. | Pratt, T. C.、Turanovic, J. J.(2016)。Lifestyle and routine activity theories revisited: The importance of "risk" to the study of victimization。Victims and Offenders,11(3),335-354。 |
23. | Reynald, D. M.(2011)。Factors associated with the guardianship of places: Assessing the relative importance of the spatio-physical and sociodemographic contexts in generating opportunities for capable guardianship。Journal of Research in Crime and Delinquency,48(1),110-142。 |
24. | Reingle, J. M.、Staras, S. A.、Jennings, W. G.、Branchini, J.、Maldonado-Molina, M. M.(2012)。The relationship between marijuana use and intimate partner violence in a nationally representative, longitudinal sample。Journal of interpersonal violence,27(8),1562-1578。 |
25. | Reyns, B. W.(2010)。A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers。Crime Prevention and Community Safety,12(2),99-118。 |
26. | Reyns, B. W.、Henson, B.、Fisher, B. S.(2016)。Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from routine activity theory as it applies to online forms of victimization。Journal of Contemporary Criminal Justice,32(2),148-168。 |
27. | Steinmetz, K. F.(2015)。Craft(y)ness: An ethnographic study of hacking。The British Journal of Criminology,55(1),125-145。 |
28. | Van Wilsem, J.(2013)。Hacking and harassment: Do they have something in common? Comparing risk factors for online victimization。Journal of Contemporary Criminal Justice,29(4),437-453。 |
29. | Willison, R.(2006)。Understanding the perpetration of employee computer crime in the organisational context。Information and organization,16(4),304-324。 |
30. | Agnew, R.(2015)。Using General Strain Theory to Explain Crime in Asian Societies。Asian Journal of Criminology,10(2),131-147。 |
31. | Agnew, Robert(1992)。Foundation for a General Strain Theory of Crime and Delinquency。Criminology,30(1),47-88。 |
32. | Barlett, C.、Chamberlin, K.、Witkower, Z.(2017)。Predicting cyberbullying perpetration in emerging adults: a theoretical test of the Barlett Gentile Cyberbullying Model。Aggressive behavior,43(2),147-154。 |
33. | Van Ouytsel, Joris、Ponnet, Koen、Walrave, Michel(2020)。Cyber dating abuse: Investigating digital monitoring behaviors among adolescents from a social learning perspective。Journal of Interpersonal Violence,35(23/24),5157-5178。 |
34. | Yar, Majid(2005)。The novelty of 'Cybercrime': An assessment in light of routine activity theory。European Journal of Criminology,2(4),407-427。 |