Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Melissa L. Ricketts is active.

Publication


Featured researches published by Melissa L. Ricketts.


Deviant Behavior | 2010

Potential Factors of Online Victimization of Youth: An Examination of Adolescent Online Behaviors Utilizing Routine Activity Theory

Catherine D. Marcum; George E. Higgins; Melissa L. Ricketts

The purpose of this study was to investigate Internet usage in a sample of college undergraduates, as well as to consider their experiences with online victimization, through variables representing the three constructs of Routine Activity Theory. A survey was administered to 100-level courses at a mid-sized university in the northeast, which questioned respondents on their Internet behaviors and experiences with victimization during the high school senior and college freshman time period. The findings of the study indicated that participating in behaviors that increased exposure to motivated offenders and target suitability in turn increased the likelihood of the three types of victimization measured. Conversely, taking protective measures against victimization to improve capable guardianship did not decrease the likelihood of victimization. This research provides a significant contribution to the literature as there are few explanatory studies that attempt to identify causal reasoning for the victimization of adolescents online.


Social Science Computer Review | 2009

Digital Piracy

George E. Higgins; Scott E. Wolfe; Melissa L. Ricketts

The rates of digital piracy appear to be increasing, suggesting that additional research that uses new approaches is necessary to evaluate the problem. Using data from undergraduate students (n = 353), the present study explores actual digital piracy and the intention to perform piracy using latent class analysis, develops profiles of these individuals, and provides an analysis of the differences between intentions and actual digital piracy for the groups. The results indicate three separate classes for each form of digital piracy and different profiles for each form of piracy. Actual piracy shows more demographic and social learning theory differences among individuals, whereas scenario-based digital piracy shows more self-control and social learning theory differences among individuals. A cross-tab analysis shows that there are differences between individuals who actually perform digital piracy and those who have the intention to pirate. Research and policy implications are discussed from these findings.


Criminal Justice Review | 2010

Assessing Sex Experiences of Online Victimization: An Examination of Adolescent Online Behaviors Using Routine Activity Theory

Catherine D. Marcum; Melissa L. Ricketts; George E. Higgins

The purpose of this study was to investigate the differences in online victimization between genders, through variables representing the three constructs of routine activity theory. A survey was administered to 100-level courses at a mid-sized university in the northeast, which questioned respondent on their Internet behaviors and experiences during the high school senior and college freshman time period. The findings of the study indicated that participating in behaviors that increased exposure to motivated offenders and target suitability in turn increased the likelihood of victimization for both genders. Conversely, taking protective measures to improve capable guardianship was shown to be the least effective measure, as it did not decrease the likelihood of victimization. This research provides a significant contribution to the literature as there are few explanatory studies that attempt to identify causal reasoning for this behavior.


Journal of Drug Issues | 2009

Nonsocial Reinforcement of the Nonmedical Use of Prescription Drugs: A Partial Test of Social Learning and Self-Control Theories

George E. Higgins; Margaret Mahoney; Melissa L. Ricketts

In this study, we examine the explanation of the nonmedical use of prescription drugs. We test the comparative utility of two theories of drug use (i.e., social learning theory and self-control theory) on the nonmedical use of prescription drug use. Our contribution to social learning theory is the use of an understudied part of the theory—nonsocial reinforcement. We expect the two theories to explain the nonmedical use of prescription drugs. Using data from the 2006 Monitoring the Future Survey (MTF), we showed both theories have a link with the nonmedical use of prescription drugs. A consistent theme was that social learning theory had a consistent link with the nonmedical use of prescription drugs. However, self-control and nonsocial reinforcement have inconsistent links with the nonmedical use of prescription drugs. We discuss the policy implications of these findings.


Journal of Financial Crime | 2008

Identity theft complaints: exploring the state‐level correlates

George E. Higgins; Tom “Tad” Hughes; Melissa L. Ricketts; Scott E. Wolfe

Purpose – Identity theft is an emerging form of criminal behavior, with complaints about the behavior rising. However, little research has explored the correlates of these complaints, especially state‐level correlates. The purpose of this paper is to examine the state‐level characteristics correlated with identity theft complaints.Design/methodology/approach – The present study uses data collected from the 2000 US census and the Federal Trade Commissions 2002 through 2005 reports on identity theft. Regression is used to determine explain identity theft complaints through state‐level characteristics from social disorganization to routine activities theory.Findings – The results indicate that states with more males, higher residential mobility, and more entertainment establishments are likely to have more identity theft complaints. States with more populations that are age 15 and below are less likely to have as many identity theft complaints.Research limitations/implications – The present study only exami...


Crime & Delinquency | 2016

Routine Cell Phone Activity and Exposure to Sext Messages Extending the Generality of Routine Activity Theory and Exploring the Etiology of a Risky Teenage Behavior

Scott E. Wolfe; Catherine D. Marcum; George E. Higgins; Melissa L. Ricketts

Increased cell phone use among adolescents has created new opportunities for deviance and victimization in recent years. One teenage cell phone−based behavior that has received increased attention from a variety of sources including public health researchers, parents, and law enforcement is “sexting” (i.e., a minor receiving sexually explicit photos or videos of another adolescent or adult via cell phone or sending such material to another teenager). Research has revealed that sexting is a risky form of adolescent deviance that is linked with a host of potential negative health consequences (e.g., risky sexual behavior and drug use) and legal ramifications. Despite the importance of the issue, research exploring the risk factors associated with exposure to sexts is virtually nonexistent. Using telephone interview data from a representative sample of adolescents aged 12 to 17 years, the present study applies routine activity theory to explain the receiving of sexts. The results confirm expectations that both exposure-based (e.g., use of a cell phone during school hours) and supervision-based (i.e., school cell phone rules and family cell phone plan) routine cell phone activities are associated with receiving sexts. Overall, the study extends the generality of routine activity theory to teenage sexting, highlights the utility of examining domain-specific routine activity indicators, and offers one of the first theoretically informed analyses concerning the factors associated with adolescent sexting.


International Journal of Police Science and Management | 2010

Policing possession of child pornography online: Investigating the training and resources dedicated to the investigation of cyber crime

Catherine D. Marcum; George E. Higgins; Tina L. Freiburger; Melissa L. Ricketts

The internet is not a single network, limited to one specific type of information or restrictive of the types of users who can access its information. Conversely, the internet is an intercontinental information highway that has enabled people of all ages to communicate with family and friends with lightning-fast speed, share and collect information, and connect with people and companies thousands of miles from their computer (Roberts, Foehr, Rideout, & Brodie, 1999; Rosenbaum et al., 2000; Smith & Rupp, 2002). However, this growth of information technology has introduced a new form of criminality to the criminal justice system: cyber crime (Denning, 1998). The purpose of this research study is to investigate the prevalence of cyber criminality, specifically possession of child pornography, in law enforcement jurisdictions and the types of training which local and State law enforcement agencies currently offer to effectively combat these technological crimes.


Journal of Ethnicity in Criminal Justice | 2010

Ensnared into Crime: A Preliminary Test of Moffitt's Snares Hypothesis in a National Sample of African Americans 1

George E. Higgins; Michael D. Bush; Catherine D. Marcum; Melissa L. Ricketts; EmmaLeigh E. Kirchner

The purpose of the present study was to examine the relation between alcohol use and individual differences in the desistance process from criminal behavior during young adulthood. This study used Moffitts (1993) “snares” hypothesis to posit that alcohol use would slow the desistance process of criminal behavior among African Americans. Using data from the National Longitudinal Survey of the Youth 1997, we conducted dual semiparametric group-based trajectory analysis of criminal behavior and alcohol use among African Americans from ages 16 through 22 (N = 283) using data from the National Longitudinal Survey of the Youth 1997. Results indicate that 3 trajectory groups provided the best representation for the patterns of crime over this period of life. In addition, 4 trajectory groups provided the best representation for the patterns of alcohol use. From our dual-trajectory analysis, we found that African Americans that were desisting slower from crime were using alcohol more often, thus supporting Moffitts snares hypothesis.


Journal of Ethnicity in Criminal Justice | 2005

Self-Control Theory, Race, and Delinquency

George E. Higgins; Melissa L. Ricketts

Abstract Although the literature examining Gottfredson and Hirschis theory is growing, an understudied area of inquiry concerns the role that race plays in the theory. Thus, this study examines the role that race plays in self-control theory. Using a random sample of juveniles from the Gang Resistance and Training (G.R.E.A.T.) evaluation, the findings show that low self-control has a link with delinquency for each race. However, the findings partially support Gottfredson and Hirschis theory, with respect to race. Specifically, the findings show that low self-control has a link with delinquency for whites, but not for blacks.


Journal of Financial Crime | 2015

Becoming someone new: identity theft behaviors by high school students

Catherine D. Marcum; George E. Higgins; Melissa L. Ricketts; Scott E. Wolfe

Purpose – The purpose of the paper is to contribute to the gap in the literature by investigating the identity theft behaviors of adolescents under the age of 18 and the predictors of these behaviors. To better understand the predictors of hacking behaviors in young people, two criminological theories, general theory of crime and social learning theory, are utilized. Design/methodology/approach – A rural county in western North Carolina was chosen to participate in the study. Principals of four high schools in this county agreed to participate. All 9th through 12th graders were recruited for the study. Those who were given parental permission to participate and gave their own assent were given a survey. Findings – Results indicated that low self-control and deviant peer association were in fact associated with identity theft behaviors of juveniles. Originality/value – The literature is scant, if even existent, on research that investigates the identity theft offending behaviors of juveniles.

Collaboration


Dive into the Melissa L. Ricketts's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Catherine D. Marcum

Appalachian State University

View shared research outputs
Top Co-Authors

Avatar

Scott E. Wolfe

University of South Carolina

View shared research outputs
Top Co-Authors

Avatar

Tina L. Freiburger

University of Wisconsin–Milwaukee

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

James D. Griffith

Shippensburg University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Jordana N. Navarro

Tennessee Technological University

View shared research outputs
Researchain Logo
Decentralizing Knowledge