Follow
C. Jordan Howell
Title
Cited by
Cited by
Year
Cyberbullying perpetration: An empirical test of social learning theory in Iran
SM Shadmanfaat, CJ Howell, CN Muniz, JK Cochran, S Kabiri, ...
Deviant Behavior 41 (3), 278-293, 2020
632020
Self-perceptions of English and Welsh constables and sergeants preparedness for online crime: A latent class analysis
G Burruss, CJ Howell, A Bossler, TJ Holt
Policing: An International Journal 43 (1), 105-119, 2020
352020
Website defacement and routine activities: Considering the importance of hackers’ valuations of potential targets
CJ Howell, GW Burruss, D Maimon, S Sahani
Journal of Crime and Justice 42 (5), 536-550, 2019
322019
System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination.
CJ Howell, JK Cochran, RA Powers, D Maimon, HM Jones
International Journal of Cyber Criminology 11 (1), 2017
272017
Datasets for analysis of cybercrime
CJ Howell, GW Burruss
The Palgrave handbook of international cybercrime and cyberdeviance, 207-219, 2020
212020
Malicious spam distribution: A routine activities approach
RC Perkins, CJ Howell, CE Dodge, GW Burruss, D Maimon
Deviant Behavior 43 (2), 196-212, 2022
202022
The predictive ability of self-control and differential association on sports fans' decision to engage in cyber bullying perpetration against rivals
SMS Shadmanfaat, CJ Howell, CN Muniz, JK Cochran, S Kabiri, ...
International Journal of Cyber Criminology 12 (2), 362-375, 2018
192018
Risk avoidance behavior on darknet marketplaces
CJ Howell, D Maimon, RC Perkins, GW Burruss, M Ouellet, Y Wu
Crime & Delinquency 70 (2), 519-538, 2024
172024
Restrictive deterrence and the scope of hackers’ reoffending: Findings from two randomized field trials
D Maimon, CJ Howell, GW Burruss
Computers in Human Behavior 125, 106943, 2021
162021
An examination of email fraudsters’ modus operandi
D Maimon, CJ Howell, M Moloney, YS Park
Crime & Delinquency 69 (11), 2329-2358, 2023
152023
Honeypots for cybercrime research
RC Perkins, CJ Howell
Researching Cybercrimes: Methodologies, Ethics, and Critical Approaches, 233-261, 2021
132021
Website defacer classification: A finite mixture model approach
GW Burruss, CJ Howell, D Maimon, F Wang
Social Science Computer Review 40 (3), 775-787, 2022
122022
Performance-enhancing drug use among professional athletes: a longitudinal test of social learning theory
S Kabiri, SM Shadmanfaat, CJ Howell, C Donner, JK Cochran
Crime & Delinquency 68 (5), 867-891, 2022
112022
Self-protection in cyberspace: Assessing the processual relationship between thoughtfully reflective decision making, protection motivation theory, cyber hygiene, and victimization
CJ Howell
University of South Florida, 2021
112021
Situational awareness and public Wi-Fi users’ self-protective behaviors
D Maimon, CJ Howell, S Jacques, RC Perkins
Security Journal, 1-21, 2022
102022
The restrictive deterrent effect of warning messages sent to active romance fraudsters: an experimental approach
F Wang, CJ Howell, D Maimon, S Jacques
92020
The network of online stolen data markets: How vendor flows connect digital marketplaces
M Ouellet, D Maimon, JC Howell, Y Wu
The British Journal of Criminology 62 (6), 1518-1536, 2022
82022
Performance enhancing drug use among professional athletes: Testing the applicability of key theoretical concepts derived from situational action theory
S Shadmanfaat, S Kabiri, LN Miley, CJ Howell, CN Muniz, JK Cochran
Journal of Sport and Social Issues 44 (4), 336-355, 2020
82020
A depiction and classification of the stolen data market ecosystem and comprising darknet markets: a multidisciplinary approach
CJ Howell, T Fisher, CN Muniz, D Maimon, Y Rotzinger
Journal of Contemporary Criminal Justice 39 (2), 298-317, 2023
72023
The illicit ecosystem of hacking: A longitudinal network analysis of website defacement groups
RC Perkins, M Ouellet, CJ Howell, D Maimon
Social Science Computer Review 41 (2), 390-409, 2023
62023
The system can't perform the operation now. Try again later.
Articles 1–20