- Substance Abuse Treatment and Outcomes
- Cybercrime and Law Enforcement Studies
- Spam and Phishing Detection
- Internet Traffic Analysis and Secure E-voting
- Smoking Behavior and Cessation
- Criminal Law and Evidence
- Network Security and Intrusion Detection
- Crime Patterns and Interventions
- Child and Adolescent Psychosocial and Emotional Development
- Judicial and Constitutional Studies
- Crime, Illicit Activities, and Governance
- Homelessness and Social Issues
- Advanced Malware Detection Techniques
- European and International Law Studies
- International Law and Human Rights
- Behavioral Health and Interventions
- Adolescent Sexual and Reproductive Health
- Cannabis and Cannabinoid Research
- Health Policy Implementation Science
- Youth Development and Social Support
- European Criminal Justice and Data Protection
- Information and Cyber Security
- Alcohol Consumption and Health Effects
- School Health and Nursing Education
- Bullying, Victimization, and Aggression
University of Cambridge
2014-2025
Good Samaritan Foundation
2007-2024
University of Kentucky
2007-2020
Annidis (Canada)
2017
Gray's Inn
2014
Dr Gray's Hospital
2014
Robert Wood Johnson Foundation
2008
Trend Micro (Japan)
2007
Research Network (United States)
2002-2007
Wesleyan University
2005
The present study takes a developmental approach to subgrouping and examines the trajectories of substance use from early adolescence through young adulthood among community sample 481 individuals. patterns were examined, subgroups identified separately for men women alcohol marijuana, psychosocial predictors psychopathology outcomes that differentiated groups identified. results revealed three substantially overlapping both marijuana: onset, late nonuser. Although general which dependent...
This paper will focus on online crime, which has taken off as a serious industry since about 2004. Until then, much of the nuisance came from amateur hackers who defaced websites and wrote malicious software in pursuit bragging rights. But now criminal networks have emerged—online black markets bad guys trade with each other, criminals taking specialized roles. Just Adam Smith's pin factory, specialization led to impressive productivity gains, even though subject is bank card PINs rather...
The present study examined the impact of Project DARE (Drug Abuse Resistance Education), a widespread drug-prevention program, 10 years after administration. A total 1,002 individuals who in 6th grade had either received or standard drug-education curriculum, were reevaluated at age 20. Few differences found between 2 groups terms actual drug use, attitudes, self-esteem, and no case did group have more successful outcome than comparison group. Possible reasons why remains so popular, despite...
Objective: To investigate the prospective influence of individual adolescents' sensation seeking tendency and named peers on use alcohol marijuana, controlling for a variety interpersonal attitudinal risk protective factors. Method: Data were collected from cohort adolescents (N = 428; 60% female) at three points in time, starting eighth grade. Respondents provided information about seeking, positivity family relations, attitudes toward drug use, perceptions their friends' by friends to own...
Banks and other organisations deal with fraudulent phishing websites by pressing hosting service providers to remove the sites from Internet. Until they are removed, fraudsters learn passwords, personal identification numbers (PINs) details of users who fooled into visiting them. We analyse empirical data on website removal times number visitors that attract, conclude is part answer phishing, but it not fast enough completely mitigate problem. The have a good fit lognormal distribution,...
This paper addresses the issue of whether religiosity is really multidimensional as suggested by Glock and Stark numerous other researchers. The in 5-D scales devised Faulkner DeJong (1966) to operationalize Glock-Stark typology were completed 873 students 1967 656 1970 at a small, private liberal-arts university Florida. Each more than adequately met minimum criteria Guttman scaling both data sets. results factor analysis (varimax oblique rotation) 23 items sets indicated predominance...
This research uses differential association, techniques of neutralization, and rational choice theory to study those who operate "booter services": websites that illegally offer denial-of-service attacks for a fee. Booter services provide "easy money" the young males run them. The operators claim they legitimate network testing, despite acknowledging their are used attack other targets. advertised through online communities where skills learned definitions favorable toward offending shared....
Underground forums allow criminals to interact, exchange knowledge, and trade in products services. They also provide a pathway into cybercrime, tempting the curious join those already motivated obtain easy money. Analysing these enables us better understand behaviours of offenders pathways crime. Prior research has been valuable, but limited by reliance on datasets that are incomplete or outdated. More complete data, going back many years, allows for comprehensive evolution their users. We...
In this research, hierarchical linear modeling (HLM) was used to address how school context influences the likelihood of transitioning between stages cigarette smoking as well modifies individual-level risk factor self-regulation. Survey data were collected from 25,186 middle and high students attending 38 public schools in Kentucky. Results show that are less likely increase use with higher levels teacher discipline faculty involvement. The analyses multi-level interactions self-regulation...
Most prior literature examining the relations among attention-deficit/hyperactivity disorder (ADHD), conduct (CD), and substance use abuse suggests that CD fully account for ADHD-substance relation. This study sought to test an alternate theory individuals with symptoms of both ADHD are at a special risk abuse. Relations between childhood symptoms, young adult tobacco, alcohol, marijuana, hard drug dependence were examined in sample 481 adults. interacted predict marijuana such high levels...
The current and lifetime prevalence of heterosexual cohabitation, as well some correlates are examined on the basis data obtained from a nationwide random sample 2,510 young men. Eighteen percent qf respondents had lived with woman fbr six months or more outside bonds matrimony, but at time interviews, only 5 men were cohabiting. While dif'rences observed according to age, size city residence age 18, social class, there was sizable ethnic difference: 29 blacks 16 whites cohabited for least...
In 2012 we presented the rst systematic study of costs cybercrime. this paper, we report what has changed in seven years since. The period seen major platform evolution, with mobile phone replacing PC and laptop as consumer terminal of choice, Android Windows, many services moving to cloud. The use social networks become extremely widespread. executive summary is that about half all property crime, by volume value, is now online. We hypothesised in that might be so; it established...