关注
C. Jordan Howell
C. Jordan Howell
在 usf.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Cyberbullying perpetration: An empirical test of social learning theory in Iran
SM Shadmanfaat, CJ Howell, CN Muniz, JK Cochran, S Kabiri, ...
Deviant Behavior 41 (3), 278-293, 2020
702020
Self-perceptions of English and Welsh constables and sergeants preparedness for online crime: A latent class analysis
G Burruss, CJ Howell, A Bossler, TJ Holt
Policing: An International Journal 43 (1), 105-119, 2020
392020
Website defacement and routine activities: Considering the importance of hackers’ valuations of potential targets
CJ Howell, GW Burruss, D Maimon, S Sahani
Journal of Crime and Justice 42 (5), 536-550, 2019
362019
System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination.
CJ Howell, JK Cochran, RA Powers, D Maimon, HM Jones
International Journal of Cyber Criminology 11 (1), 2017
272017
Malicious spam distribution: A routine activities approach
RC Perkins, CJ Howell, CE Dodge, GW Burruss, D Maimon
Deviant Behavior 43 (2), 196-212, 2022
252022
Risk avoidance behavior on darknet marketplaces
CJ Howell, D Maimon, RC Perkins, GW Burruss, M Ouellet, Y Wu
Crime & Delinquency 70 (2), 519-538, 2024
242024
Datasets for analysis of cybercrime
CJ Howell, GW Burruss
The Palgrave handbook of international cybercrime and cyberdeviance, 207-219, 2020
232020
The predictive ability of self-control and differential association on sports fans' decision to engage in cyber bullying perpetration against rivals
SMS Shadmanfaat, CJ Howell, CN Muniz, JK Cochran, S Kabiri, ...
International Journal of Cyber Criminology 12 (2), 362-375, 2018
222018
Restrictive deterrence and the scope of hackers’ reoffending: Findings from two randomized field trials
D Maimon, CJ Howell, GW Burruss
Computers in Human Behavior 125, 106943, 2021
192021
Honeypots for cybercrime research
RC Perkins, CJ Howell
Researching cybercrimes: Methodologies, ethics, and critical approaches, 233-261, 2021
182021
An examination of email fraudsters’ modus operandi
D Maimon, CJ Howell, M Moloney, YS Park
Crime & Delinquency 69 (11), 2329-2358, 2023
152023
Website defacer classification: A finite mixture model approach
GW Burruss, CJ Howell, D Maimon, F Wang
Social Science Computer Review 40 (3), 775-787, 2022
152022
Situational awareness and public Wi-Fi users’ self-protective behaviors
D Maimon, CJ Howell, S Jacques, RC Perkins
Security Journal, 1-21, 2022
152022
Self-protection in cyberspace: Assessing the processual relationship between thoughtfully reflective decision making, protection motivation theory, cyber hygiene, and victimization
CJ Howell
University of South Florida, 2021
152021
Performance-enhancing drug use among professional athletes: a longitudinal test of social learning theory
S Kabiri, SM Shadmanfaat, CJ Howell, C Donner, JK Cochran
Crime & Delinquency 68 (5), 867-891, 2022
132022
The network of online stolen data markets: How vendor flows connect digital marketplaces
M Ouellet, D Maimon, JC Howell, Y Wu
The British Journal of Criminology 62 (6), 1518-1536, 2022
122022
The restrictive deterrent effect of warning messages sent to active romance fraudsters: An experimental approach
F Wang, CJ Howell, D Maimon, S Jacques
122020
A depiction and classification of the stolen data market ecosystem and comprising darknet markets: a multidisciplinary approach
CJ Howell, T Fisher, CN Muniz, D Maimon, Y Rotzinger
Journal of Contemporary Criminal Justice 39 (2), 298-317, 2023
112023
Performance enhancing drug use among professional athletes: Testing the applicability of key theoretical concepts derived from situational action theory
S Shadmanfaat, S Kabiri, LN Miley, CJ Howell, CN Muniz, JK Cochran
Journal of Sport and Social Issues 44 (4), 336-355, 2020
102020
The illicit ecosystem of hacking: A longitudinal network analysis of website defacement groups
RC Perkins, M Ouellet, CJ Howell, D Maimon
Social Science Computer Review 41 (2), 390-409, 2023
92023
系统目前无法执行此操作,请稍后再试。
文章 1–20