SEARCH

SEARCH BY CITATION

Cited in:

CrossRef

This article has been cited by:

  1. 1
    Md. Waliur Rahman Miah, John Yearwood, Siddhivinayak Kulkarni, Constructing an inter-post similarity measure to differentiate the psychological stages in offensive chats, Journal of the Association for Information Science and Technology, 2015, 66, 5
  2. 2
    Myles Balfe, Bernard Gallagher, Helen Masson, Shane Balfe, Ruairi Brugha, Simon Hackett, Internet Child Sex Offenders' Concerns about Online Security and their Use of Identity Protection Technologies: A Review, Child Abuse Review, 2015, 24, 3
  3. 3
    Emma Lough, Emma Flynn, Deborah M. Riby, Mapping Real-World to Online Vulnerability in Young People with Developmental Disorders: Illustrations from Autism and Williams Syndrome, Review Journal of Autism and Developmental Disorders, 2015, 2, 1, 1

    CrossRef

  4. 4
    Malcolm Cowburn, Steve Myers, International Encyclopedia of the Social & Behavioral Sciences, 2015,

    CrossRef

  5. 5
    Filipa da Silva Pereira, Marlene Alexandra Veloso de Matos, Álvaro Miguel do Céu Gramaxo Olivei Sampaio, Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance, 2015,

    CrossRef

  6. 6
    Anna Vartapetiance, Lee Gillam, “Our Little Secret”: pinpointing potential predators, Security Informatics, 2014, 3, 1, 3

    CrossRef

  7. 7
    Klaus-Peter Dahle, Robert J. B. Lehmann, Anne Richter, Die Screening Skala Pädophilen Tatverhaltens, Forensische Psychiatrie, Psychologie, Kriminologie, 2014, 8, 3, 208

    CrossRef

  8. 8
    Dimitrios Michalopoulos, Ioannis Mavridis, Marija Jankovic, GARS: Real-time system for identification, assessment and control of cyber grooming attacks, Computers & Security, 2014, 42, 177

    CrossRef

  9. 9
    Helen C. Whittle, Catherine E. Hamilton-Giachritsis, Anthony R. Beech, In Their Own Words: Young Peoples’ Vulnerabilities to Being Groomed and Sexually Abused Online, Psychology, 2014, 05, 10, 1185

    CrossRef

  10. 10
    Henry Hillman, Christopher Hooper, Kim-Kwang Raymond Choo, Online child exploitation: Challenges and future research directions, Computer Law & Security Review, 2014, 30, 6, 687

    CrossRef

  11. 11
    Emilia Bergen, Julia Davidson, Anja Schulz, Petya Schuhmann, Ada Johansson, Pekka Santtila, Patrick Jern, The Effects of Using Identity Deception and Suggesting Secrecy on the Outcomes of Adult-Adult and Adult-Child or -Adolescent Online Sexual Interactions, Victims & Offenders, 2014, 9, 3, 276

    CrossRef

  12. 12
    Steven M. Furnell, Dimitrios Michalopoulos, Ioannis Mavridis, A method to calculate social networking hazard probability in definite time, Information Management & Computer Security, 2013, 21, 1, 16

    CrossRef

  13. 13
    Helen Whittle, Catherine Hamilton-Giachritsis, Anthony Beech, Guy Collings, A review of online grooming: Characteristics and concerns, Aggression and Violent Behavior, 2013, 18, 1, 62

    CrossRef

  14. 14
    Helen Whittle, Catherine Hamilton-Giachritsis, Anthony Beech, Guy Collings, A review of young people's vulnerabilities to online grooming, Aggression and Violent Behavior, 2013, 18, 1, 135

    CrossRef

  15. 15
    Danna M. Gibson, Lynne M. Webb, Virtual Work and Human Interaction Research, 2012,

    CrossRef

  16. 16
    India McGhee, Jennifer Bayzick, April Kontostathis, Lynne Edwards, Alexandra McBride, Emma Jakubowski, Learning to Identify Internet Sexual Predation, International Journal of Electronic Commerce, 2011, 15, 3, 103

    CrossRef

  17. 17
    Tony Docan-Morgan, “You're a Grounded Theorist for the Day”: Teaching Students the Grounded Theory Approach, Communication Teacher, 2010, 24, 4, 203

    CrossRef

  18. 18
    Klaus-Peter Dahle, Jürgen Biedermann, Franziska Gallasch-Nemitz, Christine Janka, Zur rückfallprognostischen Bedeutung des Tatverhaltens bei Sexualdelinquenz, Forensische Psychiatrie, Psychologie, Kriminologie, 2010, 4, 2, 126

    CrossRef

  19. 19
    April Kontostathis, Lynne Edwards, Amanda Leatherman, Text Mining and Cybercrime,