-
1
-
-
11344287619
-
Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics
-
Allison, S.F.H., Schuck, A.M., & Learsch, K.M. (2005). Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice, 33, 19-29.
-
(2005)
Journal of Criminal Justice
, vol.33
, pp. 19-29
-
-
Allison, S.F.H.1
Schuck, A.M.2
Learsch, K.M.3
-
2
-
-
84982607483
-
Receiving stolen property: The need for systematic inquiry into the fencing process
-
Chappell, D., & Walsh, M. (1974). Receiving stolen property: The need for systematic inquiry into the fencing process. Criminology, 11, 484-497.
-
(1974)
Criminology
, vol.11
, pp. 484-497
-
-
Chappell, D.1
Walsh, M.2
-
3
-
-
33748435812
-
-
Computer Security Institute., Retrieved April 19, 2007, from
-
Computer Security Institute. (2007). Computer crime and security survey. Retrieved April 19, 2007, from http://www.cybercrime.gov/FBI2006.pdf
-
(2007)
Computer Crime and Security Survey
-
-
-
4
-
-
34247732721
-
Grounded theory research: Procedures, canons, and evaluative criteria
-
Corbin, J., & Strauss, A. (1990). Grounded theory research: Procedures, canons, and evaluative criteria. Qualitative Sociology, 13, 3-21.
-
(1990)
Qualitative Sociology
, vol.13
, pp. 3-21
-
-
Corbin, J.1
Strauss, A.2
-
5
-
-
0003815262
-
-
(Studies in Crime, Law, and Justice, 8). Newbury Park, CA: Sage
-
Cromwell, P.F., Olson, J.N., & Avary, D.W. (1991). Breaking and entering: An ethnographic analysis of burglary (Studies in Crime, Law, and Justice, 8). Newbury Park, CA: Sage.
-
(1991)
Breaking and Entering: An Ethnographic Analysis of Burglary
-
-
Cromwell, P.F.1
Olson, J.N.2
Avary, D.W.3
-
6
-
-
77954159677
-
Who buys stolen property? A new look at criminal receiving
-
Cromwell, P.F., Olson, J.N., & Avary, D.W. (1993). Who buys stolen property? A new look at criminal receiving. Journal of Crime and Justice, 16, 75-95.
-
(1993)
Journal of Crime and Justice
, vol.16
, pp. 75-95
-
-
Cromwell, P.F.1
Olson, J.N.2
Avary, D.W.3
-
7
-
-
84992974149
-
Passing the buck: Risk avoidance and risk management in the illegal/ informal drug trade
-
Cross, J.C. (2000). Passing the buck: Risk avoidance and risk management in the illegal/ informal drug trade. International Journal of Sociology and Social Policy, 20, 68-94.
-
(2000)
International Journal of Sociology and Social Policy
, vol.20
, pp. 68-94
-
-
Cross, J.C.1
-
8
-
-
77949547807
-
-
October 29-November 2), Paper presented at CCS07, Alexandria, VA
-
Franklin, J., Paxson, V., Perrig, A., & Savage, S. (2007, October 29-November 2). An inquiry into the nature and cause of the wealth of internet miscreants. Paper presented at CCS07, Alexandria, VA.
-
(2007)
An Inquiry Into the Nature and Cause of The Wealth of Internet Miscreants
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
11
-
-
77949545382
-
TJX breach was twice as big as admitted, banks say
-
Retrieved October 20, 2008, from
-
Goodin, D. (2007). TJX breach was twice as big as admitted, banks say. The Register. Retrieved October 20, 2008, from http://www.theregister.co.uk/2007/10/24/tjx_breach_estimate_grows/
-
(2007)
The Register
-
-
Goodin, D.1
-
14
-
-
33847270657
-
Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures
-
Holt, T.J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171-198.
-
(2007)
Deviant Behavior
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
15
-
-
70350200171
-
A qualitative analysis of advanced fee fraud schemes
-
Holt, T.J., & Graves, D.C. (2007). A qualitative analysis of advanced fee fraud schemes. The International Journal of Cyber-Criminology, 1(1), 137-154.
-
(2007)
The International Journal of Cyber-criminology
, vol.1
, Issue.1
, pp. 137-154
-
-
Holt, T.J.1
Graves, D.C.2
-
16
-
-
77958467314
-
Characterizing malware writers and computer attackers in their own words
-
Peter Kiewit Institute, University of Nebraska Omaha
-
Holt, T.J., Soles, J.B., & Leslie, L. (2008). Characterizing malware writers and computer attackers in their own words. Proceedings of the 2008 International Conference on Information Warfare and Security, Peter Kiewit Institute, University of Nebraska Omaha.
-
(2008)
Proceedings of The 2008 International Conference On Information Warfare and Security
-
-
Holt, T.J.1
Soles, J.B.2
Leslie, L.3
-
17
-
-
77949543969
-
-
Honeynet Research Alliance., (Know Your Enemy Paper Series). Retrieved July 20, 2008, from
-
Honeynet Research Alliance. (2003). Profile: Automated credit card fraud (Know Your Enemy Paper Series). Retrieved July 20, 2008, from http://www.honeynet.org/papers/ profiles/cc-fraud.pdf.
-
(2003)
Profile: Automated Credit Card Fraud
-
-
-
18
-
-
0040240444
-
Crack dealers apprehension avoidance techniques: A case of restrictive deterrence
-
Jacobs, B. (1996). Crack dealers apprehension avoidance techniques: A case of restrictive deterrence. Criminology, 34, 409-431.
-
(1996)
Criminology
, vol.34
, pp. 409-431
-
-
Jacobs, B.1
-
20
-
-
0347177751
-
Managing retaliation: Drug robbery and informal sanction threats
-
Jacobs, B.A., Topalli, V., & Wright, R. (2000). Managing retaliation: Drug robbery and informal sanction threats. Criminology, 38, 171-198.
-
(2000)
Criminology
, vol.38
, pp. 171-198
-
-
Jacobs, B.A.1
Topalli, V.2
Wright, R.3
-
24
-
-
0032376197
-
Netcrime: More change in the organization of thieving
-
Mann, D., & Sutton, M. (1998). Netcrime: More change in the organization of thieving. British Journal of Criminology, 38, 201-229.
-
(1998)
British Journal of Criminology
, vol.38
, pp. 201-229
-
-
Mann, D.1
Sutton, M.2
-
25
-
-
0031487235
-
Counterfeiting credit cards: Displacement effects, suitable offenders, and crime wave patterns
-
Mativat, F., & Tremblay, P. (1997). Counterfeiting credit cards: Displacement effects, suitable offenders, and crime wave patterns. British Journal of Criminology, 37, 165-183.
-
(1997)
British Journal of Criminology
, vol.37
, pp. 165-183
-
-
Mativat, F.1
Tremblay, P.2
-
26
-
-
34247202096
-
Intelligence-led policing as a framework for responding to terrorism
-
McGarrell, E.F., Freilich, J.D., & Chermak, S. (2007). Intelligence-led policing as a framework for responding to terrorism. Journal of Contemporary Criminal Justice, 23, 142-158.
-
(2007)
Journal of Contemporary Criminal Justice
, vol.23
, pp. 142-158
-
-
McGarrell, E.F.1
Freilich, J.D.2
Chermak, S.3
-
28
-
-
68149146473
-
-
PandaLabs., Retrieved November 1, 2007, from
-
PandaLabs. (2007). Malware infections in protected systems. Retrieved November 1, 2007, from http://research.pandasecurity.com/blogs/images/wp_pb_malware_infections_in_protected_systems.pdf
-
(2007)
Malware Infections In Protected Systems
-
-
-
29
-
-
84858230810
-
Gartner: Victims of online phishing up nearly 40 percent in 2007
-
Retrieved January 20, 2008, from
-
Rogers, J. (2007). Gartner: Victims of online phishing up nearly 40 percent in 2007. SC Magazine. Retrieved January 20, 2008, from http://www.scmagazineus.com/Gartner-Victims-of-online-phishing-up-nearly-40-percent-in-2007/article/99768/
-
(2007)
Sc Magazine
-
-
Rogers, J.1
-
30
-
-
24144457497
-
Stolen-goods markets: Methods of disposal
-
Schneider, J.L. (2005). Stolen-goods markets: Methods of disposal. British Journal of Criminology, 45, 129-140.
-
(2005)
British Journal of Criminology
, vol.45
, pp. 129-140
-
-
Schneider, J.L.1
-
33
-
-
0035582168
-
The stolen goods market in New South Wales, Australia: An analysis of disposal avenues and tactics
-
Stevenson, R.J., Forsythe, L.M.V., & Weatherburn, D. (2001). The stolen goods market in New South Wales, Australia: An analysis of disposal avenues and tactics. British Journal of Criminology, 41, 101-118.
-
(2001)
British Journal of Criminology
, vol.41
, pp. 101-118
-
-
Stevenson, R.J.1
Forsythe, L.M.V.2
Weatherburn, D.3
-
36
-
-
30644459162
-
-
Symantec Corporation., Retrieved October 3, 2005, from
-
Symantec Corporation. (2003). Symantec Internet security threat report. Retrieved October 3, 2005, from http://enterprisesecurity.symantec.com/content/knowledgelibrary.cfm?EID=0
-
(2003)
Symantec Internet Security Threat Report
-
-
-
38
-
-
33846043733
-
-
Upper Saddle River, NJ: Pearson Prentice Hall
-
Taylor, R.W., Caeti, T.J., Loper, D.K., Fritsch, E.J., & Liederbach, J. (2006). Digital crime and digital terrorism. Upper Saddle River, NJ: Pearson Prentice Hall.
-
(2006)
Digital Crime and Digital Terrorism
-
-
Taylor, R.W.1
Caeti, T.J.2
Loper, D.K.3
Fritsch, E.J.4
Liederbach, J.5
-
40
-
-
85140528371
-
Cybercrimes and the Internet
-
In D.S. Wall (Ed.), New York: Routledge
-
Wall, D.S. (2001). Cybercrimes and the Internet. In D.S. Wall (Ed.), Crime and the Internet (pp. 1-17). New York: Routledge.
-
(2001)
Crime and The Internet
, pp. 1-17
-
-
Wall, D.S.1
|