Richard Clayton

ORCID: 0000-0002-1673-918X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Substance Abuse Treatment and Outcomes
  • Cybercrime and Law Enforcement Studies
  • Spam and Phishing Detection
  • Internet Traffic Analysis and Secure E-voting
  • Smoking Behavior and Cessation
  • Criminal Law and Evidence
  • Network Security and Intrusion Detection
  • Crime Patterns and Interventions
  • Child and Adolescent Psychosocial and Emotional Development
  • Judicial and Constitutional Studies
  • Crime, Illicit Activities, and Governance
  • Homelessness and Social Issues
  • Advanced Malware Detection Techniques
  • European and International Law Studies
  • International Law and Human Rights
  • Behavioral Health and Interventions
  • Adolescent Sexual and Reproductive Health
  • Cannabis and Cannabinoid Research
  • Health Policy Implementation Science
  • Youth Development and Social Support
  • European Criminal Justice and Data Protection
  • Information and Cyber Security
  • Alcohol Consumption and Health Effects
  • School Health and Nursing Education
  • Bullying, Victimization, and Aggression

University of Cambridge
2014-2025

Good Samaritan Foundation
2007-2024

University of Kentucky
2007-2020

Annidis (Canada)
2017

Gray's Inn
2014

Dr Gray's Hospital
2014

Robert Wood Johnson Foundation
2008

Trend Micro (Japan)
2007

Research Network (United States)
2002-2007

Wesleyan University
2005

The present study takes a developmental approach to subgrouping and examines the trajectories of substance use from early adolescence through young adulthood among community sample 481 individuals. patterns were examined, subgroups identified separately for men women alcohol marijuana, psychosocial predictors psychopathology outcomes that differentiated groups identified. results revealed three substantially overlapping both marijuana: onset, late nonuser. Although general which dependent...

10.1017/s0954579404044475 article EN Development and Psychopathology 2004-03-01

This paper will focus on online crime, which has taken off as a serious industry since about 2004. Until then, much of the nuisance came from amateur hackers who defaced websites and wrote malicious software in pursuit bragging rights. But now criminal networks have emerged—online black markets bad guys trade with each other, criminals taking specialized roles. Just Adam Smith's pin factory, specialization led to impressive productivity gains, even though subject is bank card PINs rather...

10.1257/jep.23.3.3 article EN The Journal of Economic Perspectives 2009-08-01

10.1016/j.eclinm.2021.100924 article EN cc-by-nc-nd EClinicalMedicine 2021-05-30

The present study examined the impact of Project DARE (Drug Abuse Resistance Education), a widespread drug-prevention program, 10 years after administration. A total 1,002 individuals who in 6th grade had either received or standard drug-education curriculum, were reevaluated at age 20. Few differences found between 2 groups terms actual drug use, attitudes, self-esteem, and no case did group have more successful outcome than comparison group. Possible reasons why remains so popular, despite...

10.1037//0022-006x.67.4.590 article EN Journal of Consulting and Clinical Psychology 1999-01-01

Objective: To investigate the prospective influence of individual adolescents' sensation seeking tendency and named peers on use alcohol marijuana, controlling for a variety interpersonal attitudinal risk protective factors. Method: Data were collected from cohort adolescents (N = 428; 60% female) at three points in time, starting eighth grade. Respondents provided information about seeking, positivity family relations, attitudes toward drug use, perceptions their friends' by friends to own...

10.15288/jsa.1999.60.622 article EN Journal of Studies on Alcohol 1999-09-01

Banks and other organisations deal with fraudulent phishing websites by pressing hosting service providers to remove the sites from Internet. Until they are removed, fraudsters learn passwords, personal identification numbers (PINs) details of users who fooled into visiting them. We analyse empirical data on website removal times number visitors that attract, conclude is part answer phishing, but it not fast enough completely mitigate problem. The have a good fit lognormal distribution,...

10.1145/1299015.1299016 article EN 2007-10-04

This paper addresses the issue of whether religiosity is really multidimensional as suggested by Glock and Stark numerous other researchers. The in 5-D scales devised Faulkner DeJong (1966) to operationalize Glock-Stark typology were completed 873 students 1967 656 1970 at a small, private liberal-arts university Florida. Each more than adequately met minimum criteria Guttman scaling both data sets. results factor analysis (varimax oblique rotation) 23 items sets indicated predominance...

10.2307/1384375 article EN Journal for the Scientific Study of Religion 1974-06-01

This research uses differential association, techniques of neutralization, and rational choice theory to study those who operate "booter services": websites that illegally offer denial-of-service attacks for a fee. Booter services provide "easy money" the young males run them. The operators claim they legitimate network testing, despite acknowledging their are used attack other targets. advertised through online communities where skills learned definitions favorable toward offending shared....

10.1080/01639625.2016.1169829 article EN Deviant Behavior 2016-05-09

Underground forums allow criminals to interact, exchange knowledge, and trade in products services. They also provide a pathway into cybercrime, tempting the curious join those already motivated obtain easy money. Analysing these enables us better understand behaviours of offenders pathways crime. Prior research has been valuable, but limited by reliance on datasets that are incomplete or outdated. More complete data, going back many years, allows for comprehensive evolution their users. We...

10.1145/3178876.3186178 article EN 2018-01-01

In this research, hierarchical linear modeling (HLM) was used to address how school context influences the likelihood of transitioning between stages cigarette smoking as well modifies individual-level risk factor self-regulation. Survey data were collected from 25,186 middle and high students attending 38 public schools in Kentucky. Results show that are less likely increase use with higher levels teacher discipline faculty involvement. The analyses multi-level interactions self-regulation...

10.1037/0278-6133.20.3.196 article EN Health Psychology 2001-01-01

Most prior literature examining the relations among attention-deficit/hyperactivity disorder (ADHD), conduct (CD), and substance use abuse suggests that CD fully account for ADHD-substance relation. This study sought to test an alternate theory individuals with symptoms of both ADHD are at a special risk abuse. Relations between childhood symptoms, young adult tobacco, alcohol, marijuana, hard drug dependence were examined in sample 481 adults. interacted predict marijuana such high levels...

10.1037/0893-164x.17.2.151 article EN Psychology of Addictive Behaviors 2003-06-01

The current and lifetime prevalence of heterosexual cohabitation, as well some correlates are examined on the basis data obtained from a nationwide random sample 2,510 young men. Eighteen percent qf respondents had lived with woman fbr six months or more outside bonds matrimony, but at time interviews, only 5 men were cohabiting. While dif'rences observed according to age, size city residence age 18, social class, there was sizable ethnic difference: 29 blacks 16 whites cohabited for least...

10.2307/351123 article EN Journal of Marriage and Family 1977-05-01

In 2012 we presented the rst systematic study of costs cybercrime. this paper, we report what has changed in seven years since. The period seen major platform evolution, with mobile phone replacing PC and laptop as consumer terminal of choice, Android Windows, many services moving to cloud. The use social networks become extremely widespread. executive summary is that about half all property crime, by volume value, is now online. We hypothesised in that might be so; it established...

10.17863/cam.41598 article EN Workshop on the Economics of Information Security 2019-07-09
Coming Soon ...