Cyberbullying perpetration: An empirical test of social learning theory in Iran SM Shadmanfaat, CJ Howell, CN Muniz, JK Cochran, S Kabiri, ... Deviant Behavior 41 (3), 278-293, 2020 | 70 | 2020 |
Self-perceptions of English and Welsh constables and sergeants preparedness for online crime: A latent class analysis G Burruss, CJ Howell, A Bossler, TJ Holt Policing: An International Journal 43 (1), 105-119, 2020 | 39 | 2020 |
Website defacement and routine activities: Considering the importance of hackers’ valuations of potential targets CJ Howell, GW Burruss, D Maimon, S Sahani Journal of Crime and Justice 42 (5), 536-550, 2019 | 36 | 2019 |
System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination. CJ Howell, JK Cochran, RA Powers, D Maimon, HM Jones International Journal of Cyber Criminology 11 (1), 2017 | 27 | 2017 |
Malicious spam distribution: A routine activities approach RC Perkins, CJ Howell, CE Dodge, GW Burruss, D Maimon Deviant Behavior 43 (2), 196-212, 2022 | 25 | 2022 |
Risk avoidance behavior on darknet marketplaces CJ Howell, D Maimon, RC Perkins, GW Burruss, M Ouellet, Y Wu Crime & Delinquency 70 (2), 519-538, 2024 | 24 | 2024 |
Datasets for analysis of cybercrime CJ Howell, GW Burruss The Palgrave handbook of international cybercrime and cyberdeviance, 207-219, 2020 | 23 | 2020 |
The predictive ability of self-control and differential association on sports fans' decision to engage in cyber bullying perpetration against rivals SMS Shadmanfaat, CJ Howell, CN Muniz, JK Cochran, S Kabiri, ... International Journal of Cyber Criminology 12 (2), 362-375, 2018 | 22 | 2018 |
Restrictive deterrence and the scope of hackers’ reoffending: Findings from two randomized field trials D Maimon, CJ Howell, GW Burruss Computers in Human Behavior 125, 106943, 2021 | 19 | 2021 |
Honeypots for cybercrime research RC Perkins, CJ Howell Researching cybercrimes: Methodologies, ethics, and critical approaches, 233-261, 2021 | 18 | 2021 |
An examination of email fraudsters’ modus operandi D Maimon, CJ Howell, M Moloney, YS Park Crime & Delinquency 69 (11), 2329-2358, 2023 | 15 | 2023 |
Website defacer classification: A finite mixture model approach GW Burruss, CJ Howell, D Maimon, F Wang Social Science Computer Review 40 (3), 775-787, 2022 | 15 | 2022 |
Situational awareness and public Wi-Fi users’ self-protective behaviors D Maimon, CJ Howell, S Jacques, RC Perkins Security Journal, 1-21, 2022 | 15 | 2022 |
Self-protection in cyberspace: Assessing the processual relationship between thoughtfully reflective decision making, protection motivation theory, cyber hygiene, and victimization CJ Howell University of South Florida, 2021 | 15 | 2021 |
Performance-enhancing drug use among professional athletes: a longitudinal test of social learning theory S Kabiri, SM Shadmanfaat, CJ Howell, C Donner, JK Cochran Crime & Delinquency 68 (5), 867-891, 2022 | 13 | 2022 |
The network of online stolen data markets: How vendor flows connect digital marketplaces M Ouellet, D Maimon, JC Howell, Y Wu The British Journal of Criminology 62 (6), 1518-1536, 2022 | 12 | 2022 |
The restrictive deterrent effect of warning messages sent to active romance fraudsters: An experimental approach F Wang, CJ Howell, D Maimon, S Jacques | 12 | 2020 |
A depiction and classification of the stolen data market ecosystem and comprising darknet markets: a multidisciplinary approach CJ Howell, T Fisher, CN Muniz, D Maimon, Y Rotzinger Journal of Contemporary Criminal Justice 39 (2), 298-317, 2023 | 11 | 2023 |
Performance enhancing drug use among professional athletes: Testing the applicability of key theoretical concepts derived from situational action theory S Shadmanfaat, S Kabiri, LN Miley, CJ Howell, CN Muniz, JK Cochran Journal of Sport and Social Issues 44 (4), 336-355, 2020 | 10 | 2020 |
The illicit ecosystem of hacking: A longitudinal network analysis of website defacement groups RC Perkins, M Ouellet, CJ Howell, D Maimon Social Science Computer Review 41 (2), 390-409, 2023 | 9 | 2023 |