References
- Agnew, R. 1985. “A Revised Strain Theory of Delinquency.” Social Forces 64(1):151–67. doi:10.2307/2578977.
- Agnew, R. 1994. “The Techniques of Neutralization and Violence.” Criminology 32(4):555–80. doi:10.1111/j.1745-9125.1994.tb01165.x.
- Ahmed, E., N. Harris, J. Braithwaite, and V. Braithwaite. 2001. Shame Management Through Reintegration. Melbourne: Cambridge University Press.
- Alvarez, A. 1997. “Adjusting to Genocide: The Techniques of Neutralization and the Holocaust.” Social Science History 21(2):139–78. doi:10.2307/1171272.
- Beckhouse, L., J. Tanur, J. Weiler, and E. Weinstein. 1975. “… and Some Men Have Leadership Thrust Upon Them.” Journal of Personality and Social Psychology 31(3):557–66. doi:10.1037/h0076478.
- Bennell, C., L. J. Alison, K. L. Stein, E. K. Alison, and D. V. Canter. 2001. “Sexual Offenses Against Children as the Abusive Exploitation of Conventional Adult-Child Relationships.” Journal of Social and Personal Relationships 18(2):155–71. doi:10.1177/0265407501182001.
- Benson, M. L. 1985. “Denying the Guilty Mind: Accounting for Involvement in a White‐Collar Crime.” Criminology 23(4):583–607. doi:10.1111/j.1745-9125.1985.tb00365.x.
- Bergen, R. 1998. Issues in Intimate Violence. Bergen, R. K. Ed., SAGE Publications, Inc. doi: 10.4135/9781483328348.
- Blumstein, P. W., K. G. Carssow, J. Hall, B. Hawkins, R. Hoffman, and E. Ishem, … D. L. Zimmerman, D. Spens, J. Taylor, D. L. Zimmerman. 1974. “The Honoring of Accounts.” American Sociological Review 39(4):551–66. doi:10.2307/2094421.
- Bohner, G., M. A. Reinhard, S. Rutz, S. Sturm, B. Kerschbaum, and D. Effler. 1998. “Rape Myths as Neutralizing Cognitions: Evidence for a Causal Impact of Anti‐Victim Attitudes on Men’s Self‐Reported Likelihood of Raping.” European Journal of Social Psychology 28(2):257–68. doi:10.1002/(SICI)1099-0992(199803/04)28:2<257:AID-EJSP871>3.0.CO;2-1.
- Budd, C. and J. Anderson. 2011. “Consumer Fraud in Australasia: Results of the Australasian Consumer Fraud Taskforce Online Australia Surveys 2008 and 2009.” Technical and Background Paper 43.
- Burkey, R. C. and T. T. Bensel. 2015. “An Examination and Comparison of Rationalizations Employed by Solo and Co-Offending Female Sex Offenders.” Violence and Gender 2(3):168–78. doi:10.1089/vio.2015.0018.
- Carter, E. 2021. “Distort, Extort, Deceive and Exploit: Exploring the Inner Workings of a Romance Fraud.” The British Journal of Criminology 61(2):283–302. doi:10.1093/bjc/azaa072.
- Chartrand, T. L. and J. L. Lakin. 2013. “The Antecedents and Consequences of Human Behavioral Mimicry.” Annual Review of Psychology 64(1):285–308. doi:10.1146/annurev-psych-113011-143754.
- Chibnall, S. and P. Saunders. 1977. “Worlds Apart: Notes on the Social Reality of Corruption.” The British Journal of Sociology 28(2):138–54. doi:10.2307/590207.
- Cohen, S. 2001. States of Denial: Knowing About Atrocities and Suffering. Hoboken: John Wiley and Sons.
- Coleman, J. W. 1994. Neutralization Theory: An Empirical Application and Assessment. [ Doctoral Dissertation, Oklahoma State University]. Stillwater.
- Coleman, J. W. 2002. The Criminal Elite: The Sociology of White-Collar Crime. New York: St. Martin’s.
- Copes, H. 2003. “Societal Attachments, Offending Frequency, and Techniques of Neutralization.” Deviant Behavior 24(2):101–27. doi:10.1080/01639620390117200.
- Copes, H., L. Vieraitis, and J. M. Jochum. 2007. “Bridging the Gap Between Research and Practice: How Neutralization Theory Can Inform Reid Interrogations of Identity Thieves.” Journal of Criminal Justice Education 18(3):444–59. doi:10.1080/10511250701705404.
- Copley, L. 2014. “Neutralizing Their Involvement: Sex traffickers’ Discourse Techniques.” Feminist Criminology 9(1):45–58. doi:10.1177/1557085113501849.
- Craven, A., S. Brown, and E. Gilchrist. 2006. “Sexual Grooming of Children: Review of the Literature and Theoretical Considerations.” Journal of Sexual Aggression 12(3):287–99. doi:10.1080/13552600601069414.
- Cressey, D. 1953. Other People’s Money: A Study in the Social Psychology of Embezzlement. Glencoe, IL: Free Press.
- Cromwell, P. and Q. Thurman. 2003. “The Devil Made Me Do It: Use of Neutralizations by Shoplifters.” Deviant Behavior 24(6):535–50. doi:10.1080/713840271.
- Cross, C., M. Dragiewicz, and K. Richards. 2018. “Understanding Romance Fraud: Insights from Domestic Violence Research.” The British Journal of Criminology 58(6):1303–22. doi:10.1093/bjc/azy005.
- Cross, C. and T. J. Holt. 2021. “The Use of Military Profiles in Romance Fraud Schemes.” Victims and Offenders 16(3):385–406. doi:10.1080/15564886.2020.1850582.
- Cross, C. and M. Lee. 2022. “Exploring Fear of Crime for Those Targeted by Romance Fraud.” Victims and Offenders 17(5):735–55. doi:10.1080/15564886.2021.2018080.
- Dickinson, T. 2015. “Exploring the Drugs/Violence Nexus Among Active Offenders: Contributions from the St. Louis School.” Criminal Justice Review 40(1):67–86. doi:10.1177/0734016814562422.
- Dickinson, T. 2017. “Non-Violent Threats and Promises Among Closed-Market Drug Dealers.” International Journal of Drug Policy 42:7–14. doi:10.1016/j.drugpo.2016.12.005.
- Dickinson, T. and S. Jacques. 2019. “Drug sellers’ Neutralizations of Guiltless Drug Sales and Avoidance of “Drug dealer” Identities.” International Journal of Drug Policy 73:16–23. doi:10.1016/j.drugpo.2019.07.012.
- Felson, R. B. 1978. “Aggression as Impression Management.” Social Psychology 41(3):205–13. doi:10.2307/3033557.
- Felson, R. B. 1982. “Impression Management and the Escalation of Aggression and Violence.” Social Psychology Quarterly 45(4):245–54. doi:10.2307/3033920.
- Ferraro, K. J. and J. M. Johnson. 1983. “How Women Experience Battering: The Process of Victimization.” Social Problems 30(3):325–39. doi:10.2307/800357.
- Fritsche, I. 2002. “Account Strategies for the Violation of Social Norms: Integration and Extension of Sociological and Social Psychological Typologies.” Journal for the Theory of Social Behaviour 32(4):371–94. doi:10.1111/1468-5914.00194.
- Garfinkel, H. 1956. “Conditions of Successful Degradation Ceremonies.” American Journal of Sociology 61(5):420–24. doi:10.1086/221800.
- Goffman, E. 1959. “The Moral Career of the Mental Patient.” Psychiatry 22(2):123–42. doi:10.1080/00332747.1959.11023166.
- Goffman, E. 1961. Encounters: Two Studies in the Sociology of Interaction. Indianapolis: Bobbs-Merrill.
- Goffman, E. 1967. Interaction Ritual: Essays on Face-To-Face Interaction. Milton Park: Routledge.
- Goffman, E. 1969. Strategic Interaction. Philadelphia: University of Pennsylvania Press.
- Green, G. S. 1997. Occupational Crime. Chicago, IL: Nelson-Hall Publishers.
- Hatfield, E., J. T. Cacioppo, and R. L. Rapson. 1994. Emotional contagion. New York: Cambridge University Press. doi:10.1017/CBO9781139174138.
- Henry, S. Ed. 1990. Degrees of Deviance: Student Accounts of Their Deviant Behavior. Salem: Sheffield Publishing Company.
- Herbert, T. B., R. C. Silver, and J. H. Ellard. 1991. “Coping with an Abusive Relationship: I. How and Why Do Women Stay?” Journal of Marriage and the Family 53(2):311–25. doi:10.2307/352901.
- Hewitt, J. P. and R. Stokes. 1975. “Disclaimers.” American Sociological Review 40(1):1–11. doi:10.2307/2094442.
- Higginson, J. G. 1999. “Defining, Excusing, and Justifying Deviance: Teen mothers’ Accounts for Statutory Rape.” Symbolic Interaction 22(1):25–44. doi:10.1525/si.1999.22.1.25.
- Holt, T. J. and H. Copes. 2010. “Transferring Subcultural Knowledge On-Line: Practices and Beliefs of Persistent Digital Pirates.” Deviant Behavior 31(7):625–54. doi:10.1080/01639620903231548.
- Hunter, C. H. 1984. “Aligning Actions: Types and Social Distribution.” Symbolic Interaction 7(2):155–74. doi:10.1525/si.1984.7.2.155.
- Inbau, F., J. Reid, J. Buckley, and B. Jayne. 2011. Criminal Interrogation and Confessions. Burlington: Jones and Bartlett Publishers.
- Jacobs, B. A. and H. Copes. 2015. “Neutralization without Drift: Criminal Commitment Among Persistent Offenders.” British Journal of Criminology 55(2):286–302. doi:10.1093/bjc/azu100.
- James, V. and J. Gossett. 2018. “Of Monsters and Men: Exploring Serial murderers’ Discourses of Neutralization.” Deviant Behavior 39(9):1120–39. doi:10.1080/01639625.2017.1409980.
- Järvinen, M. and M. L. Kessing. 2021. “Self-Casting and Alter-Casting: Healthcare professionals’ Boundary Work in Response to Peer Workers.” Current Sociology 71(3):414–31. doi:10.1177/00113921211048532.
- Junger, M. 1987. “Women’s Experiences of Sexual Harassment: Some Implications for Their Fear of Crime.” The British Journal of Criminology 27(4):358–83. doi:10.1093/oxfordjournals.bjc.a047688.
- Kamar, E., D. Maimon, D. Weisburd, and D. Shabat. 2022. “Parental Guardianship and Online Sexual Grooming of Teenagers: A Honeypot Experiment.” Computers in Human Behavior 137(2022):107386. doi:10.1016/j.chb.2022.107386.
- Kassin, S. M. 2005. “On the Psychology of Confessions: Does Innocence Put Innocents at Risk?” American Psychologist 60(3):215. doi:10.1037/0003-066X.60.3.215.
- Kemper, T. D. and R. Collins. 1990. “Dimensions of Microinteraction.” American Journal of Sociology 96(1):32–68. doi:10.1086/229492.
- Klenowski, P. M. 2012. “Learning the Good with the bad” are Occupational White-Collar Offenders Taught How to Neutralize Their Crimes?” Criminal Justice Review 37(4):461–77. doi:10.1177/0734016812465874.
- Klockars, C. B. 1974. The Professional Fence. New York: Free Press.
- Knoll, J. 2010. “Teacher Sexual Misconduct: Grooming Patterns and Female Offenders.” Journal of Child Sexual Abuse 19(4):371–86. doi:10.1080/10538712.2010.495047.
- Koon, T. H. and D. Yoong. 2013. “Preying on Lonely Hearts: A Systematic Deconstruction of an Internet Romance Scammer’s Online Lover Persona.” Journal of Modern Languages 23(1):28–40.
- Kopp, C., J. Sillitoe, and I. Gondal. 2017. “I Am Your Perfect Online Partner.” Analysis of Dating Profiles Used in Cybercrime APJABSS 3(2).
- Kopp, C., J. Sillitoe, I. Gondal, and R. Layton. 2016. “The Online Romance Scam: A Complex Two-Layer Scam.” Journal of Psychological and Educational Research 24(2):144.
- Lea, S., P. Fischer, and K. Evans. 2009, The Psychology of Scams: Provoking and Committing Errors of Judgement. Report for the Office of Fair Trading. www.oft.gov.uk/shared_oft/reports/consumer_protection/oft1070.pdf.
- Leo, R. A. 1995. “Inside the Interrogation Room.” The Journal of Criminal Law and Criminology (1973-) 86(2):266. doi:10.2307/1144028.
- Leo, R. A. 1996. “Inside the Interrogation Room.” Journal of Criminal Law & Criminology 86(2):266–303.
- Lyman, S. 2000. “Accounts: Roots and Foundations.” Pp. 7–13 in Encyclopedia of Criminology and Deviant Behavior, edited by C.D Bryant. Philadelphia: Brunner - Routledge.
- Maruna, S. and H. Copes. 2005. “What Have We Learned from Five Decades of Neutralization Research?” Crime and Justice 32:221–320. doi:10.1086/655355.
- Mills, R. B. and K. Malley-Morrison. 1998. “Emotional Commitment, Normative Acceptability, and Attributions for Abusive Partner Behaviors.” Journal of Interpersonal Violence 13(6):682–99. doi:10.1177/088626098013006002.
- Minor, W. W. 1981. “Techniques of Neutralization: A Reconceptualization and Empirical Examination.” Journal of Research in Crime and Delinquency 18(2):295–318. doi:10.1177/002242788101800206.
- Presser, L. 2008. Been a Heavy Life: Stories of Violent Men. Champaign: University of Illinois Press.
- Quayle, E., S. Allegro, L. Hutton, M. Sheath, and L. Lööf. 2014. “Rapid Skill Acquisition and Online Sexual Grooming of Children.” Computers in Human Behavior 39:368–75. doi:10.1016/j.chb.2014.07.005.
- Ross, S. and R. G. Smith. 2011. “Risk Factors for Advance Fee Fraud Victimization.” Trends & Issues in Crime & Criminal Justice 420:1–6.
- Scherer, K. R. 1984. “On the Nature and Function of Emotion: A Component Process Approach.” Approaches to Emotion 2293(317):31.
- Schlenker, B. R. and B. W. Darby. 1981. “The Use of Apologies in Social Predicaments.” Social Psychology Quarterly 44(3):271–78. doi:10.2307/3033840.
- Schönbach, P. 1990. Account Episodes: The Management or Escalation of Conflict. Cambridge: Cambridge University Press.
- Scott, M. B. and S. M. Lyman. 1968. “Accounts.” American Sociological Review 33(1):46–62. doi:10.2307/2092239.
- Sitkin, S. B. and R. J. Bies. 1993. “Social Accounts in Conflict Situations: Using Explanations to Manage Conflict.” Human Relations 46(3):349–70. doi:10.1177/001872679304600303.
- Sorell, T. and M. Whitty. 2019. “Online Romance Scams and Victimhood.” Security Journal 32(3):342–61. doi:10.1057/s41284-019-00166-w.
- Spitzer, S. P. and B. A. Volk. 1971. “Altercasting the Difficult.” AJN the American Journal of Nursing 71(4):732–38. doi:10.1097/00000446-197104000-00038.
- Stadler, W. A. and M. L. Benson. 2012. “Revisiting the Guilty Mind: The Neutralization of White-Collar Crime.” Criminal Justice Review 37(4):494–511. doi:10.1177/0734016812465618.
- Stokes, R. and J. P. Hewitt. 1976. “Aligning Actions.” American Sociological Review 41(5):838–49. doi:10.2307/2094730.
- Sutherland, Edwin. 1947. Principles of Criminology. 4th ed. Philadelphia: Lippincott.
- Sykes, G. M. and D. Matza. 1957. “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22(6):664–70. doi:10.2307/2089195.
- Tedeschi, J. T. and M. Riess. 1981. “Identities, the Phenomenal Self, and Laboratory Research.” Impression Management Theory and Social Psychological Research 3:22.
- Tomita, S. K. 1990. “The Denial of Elder Mistreatment by Victims and Abusers: The Application of Neutralization Theory.” Violence and Victims 5(3):171–84. doi:10.1891/0886-6708.5.3.171.
- Tomita, S. K. 2000. “Elder Mistreatment: Practice Modifications to Accommodate Cultural Differences.” Journal of Multicultural Social Work 8(3–4):305–26. doi:10.1300/J285v08n03_06.
- Topalli, V. 2005. “When Being Good is Bad: An Expansion of Neutralization Theory.” Criminology 43(3):797–836. doi:10.1111/j.0011-1348.2005.00024.x.
- Topalli, V. 2006. “The Seductive Nature of Autotelic Crime: How Neutralization Theory Serves as a Boundary Condition for Understanding Hardcore Street Offending.” Sociological Inquiry 76(4):475–501. doi:10.1111/j.1475-682X.2006.00167.x.
- Wang, F., C. J. Howell, D. Maimon, and S. Jacques. 2021. “The Restrictive Deterrent Effect of Warning Messages Sent to Active Romance Fraudsters: An Experimental Approach.” International Journal of Cyber Criminology 15(1):1–16.
- Wang, F. and V. Topalli. 2022. “Understanding Romance Scammers Through the Lens of Their Victims: Qualitative Modeling of Risk and Protective Factors in the Online Context.” American Journal of Criminal Justice 1–37. doi: 10.1007/s12103-022-09706-4.
- Warner, S. 2000. Understanding Child Sexual Abuse: Making the Tactics Possible. Gloucester: Handsell.
- Weinstein, E. A. and P. Deutschberger. 1963. “Some Dimensions of Altercasting.” Sociometry 26(4):454–66. doi:10.2307/2786148.
- Weiss, K. G. 2009. ““Boys Will Be boys” and Other Gendered Accounts: An Exploration of victims’ Excuses and Justifications for Unwanted Sexual Contact and Coercion.” Violence Against Women 15(7):810–34. doi:10.1177/1077801209333611.
- Weiss, K. G. 2011. “Neutralizing Sexual Victimization: A Typology of victims’ Non-Reporting Accounts.” Theoretical Criminology 15(4):445–67. doi:10.1177/1362480610391527.
- Whittle, H., C. Hamilton-Giachritsis, A. Beech, and G. Collings. 2013. “A Review of Online Grooming: Characteristics and Concerns.” Aggression and Violent Behavior 18(1):62–70. doi:10.1016/j.avb.2012.09.003.
- Whitty, M. T. 2013a. “Anatomy of the Online Dating Romance Scam.” Security Journal 28(4):443–55. doi:10.1057/sj.2012.57.
- Whitty, M. T. 2013b. “The Scammers Persuasive Techniques Model: Development of a Stage Model to Explain the Online Dating Romance Scam.” British Journal of Criminology 53(4):665–84. doi:10.1093/bjc/azt009.
- Whitty, M. T. 2018. “Do You Love Me? Psychological Characteristics of Romance Scam Victims.” Cyberpsychology, Behavior, and Social Networking 21(2):105–09. doi:10.1089/cyber.2016.0729.
- Whitty, M. T. and T. Buchanan. 2016. “The Online Dating Romance Scam: The Psychological Impact on Victims–Both Financial and Non-Financial.” Criminology and Criminal Justice 16(2):176–94. doi:10.1177/1748895815603773.
- Wright, R. and S. Decker. 1994. Burglars on the Job. Boston: Northeastern University Press.