-
1
-
-
32544441740
-
Fighting cybercrime: A review and the Taiwan experience
-
DOI 10.1016/j.dss.2004.06.006, PII S0167923604001381
-
W. Chung, H. Chen, W. Chang, and S. Chou, "Fighting cybercrime: a review and the Taiwan experience," Decision Support Systems, vol. 41, pp. 669-682, 2006. (Pubitemid 43233894)
-
(2006)
Decision Support Systems
, vol.41
, Issue.3
, pp. 669-682
-
-
Chung, W.1
Chen, H.2
Chang, W.3
Chou, S.4
-
2
-
-
11344287619
-
Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics
-
DOI 10.1016/j.jcrimjus.2004.10.007, PII S0047235204001175
-
S. Allison, A. Schuck, and K. Lersch, "Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics," J. Crim. Just., vol. 33, pp. 19-29, 2005. (Pubitemid 40076452)
-
(2005)
Journal of Criminal Justice
, vol.33
, Issue.1
, pp. 19-29
-
-
Allison, S.F.H.1
Schuck, A.M.2
Lersch, K.M.3
-
5
-
-
84872165562
-
In the shadow: Illegal markets and economic sociology
-
J. Beckert and F. Wehinger, "In the shadow: Illegal markets and economic sociology," MPIfG discussion paper 11/9.
-
MPIfG Discussion Paper
, vol.11
, Issue.9
-
-
Beckert, J.1
Wehinger, F.2
-
6
-
-
0036013014
-
Flexible hierarchies and dynamic disorder: The drug distribution system in Frankfurt and Milan
-
L. Paoli, "Flexible hierarchies and dynamic disorder: The drug distribution system in Frankfurt and Milan," Drugs: Education, Prevention & Policy, vol. 9, pp. 143-151, 2002.
-
(2002)
Drugs: Education, Prevention & Policy
, vol.9
, pp. 143-151
-
-
Paoli, L.1
-
8
-
-
85040488951
-
Industry self-regulation: An institutional perspective
-
N. Gunningham and J. Rees, "Industry self-regulation: An institutional perspective," Law & Policy, vol. 19, pp. 363-414, 1997. (Pubitemid 128103881)
-
(1997)
Law & policy
, vol.19
, Issue.4
, pp. 363-414
-
-
Gunningham, N.1
Rees, J.2
-
10
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
J. Franklin,V. Paxson, A. Perrig, and S. Savage, "An inquiry into the nature and causes of the wealth of internet miscreants," Proceedings of the 14th ACM conference on Computer and communications security, Conference on Computer and Communications Security, Ed., 2007, pp. 375 - 388.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, Conference on Computer and Communications Security
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
11
-
-
81255134104
-
Underground economy: An overview on professional cybercrime business and the legal challenges that come along with it
-
M. Bellini, P. Brunst, J. Jähnke, Eds. Berlin: Duncker & Humblot
-
J. Spoenle, "Underground economy: An overview on professional cybercrime business and the legal challenges that come along with it," in Current issues in IT security, M. Bellini, P. Brunst, J. Jähnke, Eds. Berlin: Duncker & Humblot, 2010, 67-79.
-
(2010)
Current Issues in IT Security
, pp. 67-79
-
-
Spoenle, J.1
-
12
-
-
70350357344
-
Learning more about the underground economy: A case-study of keyloggers and dropzones
-
M. Backes and P. Ning, Eds. Berlin and Heidelberg: Springer
-
T. Holz, M. Engelberth, and F. Freiling, "Learning more about the underground economy: A case-study of keyloggers and dropzones," in Computer Security - ESORICS, M. Backes and P. Ning, Eds. Berlin and Heidelberg: Springer, 2009, pp. 1-18.
-
(2009)
Computer Security - ESORICS
, pp. 1-18
-
-
Holz, T.1
Engelberth, M.2
Freiling, F.3
-
13
-
-
77949555353
-
Exploring stolen data markets online: Products and market forces
-
T. Holt and E. Lampke, "Exploring stolen data markets online: Products and market forces,". Crim. Just. St., vol. 23, pp. 33 - 50, 2010.
-
(2010)
Crim. Just. St.
, vol.23
, pp. 33-50
-
-
Holt, T.1
Lampke, E.2
-
14
-
-
81255149250
-
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
-
T. Moore, D. Pym, and C. Ioannidis, Eds. New York: Springer
-
C. Herley and D. Florêncio "Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy," in Economics of information security and privacy, T. Moore, D. Pym, and C. Ioannidis, Eds. New York: Springer, 2010, pp. 33-53.
-
(2010)
Economics of Information Security and Privacy
, pp. 33-53
-
-
Herley, C.1
Florêncio, D.2
-
15
-
-
77955018216
-
Covertly probing underground economy marketplaces
-
C. Kreibich and M. Jahnke, Eds. Berlin and Heidelberg: Springer
-
H. Fallmann, G. Wondracek, and C. Platzer, "Covertly probing underground economy marketplaces," in Detection of intrusions and malware, and Vulnerability Assessment, C. Kreibich and M. Jahnke, Eds. Berlin and Heidelberg: Springer, 2010, pp. 101-110.
-
(2010)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 101-110
-
-
Fallmann, H.1
Wondracek, G.2
Platzer, C.3
-
16
-
-
81255138009
-
Zero-day und less-than-zero-day vulnerabilities und exploits
-
C. Zacharias, K. Horst, K.- U- Witt, V. Sommer, M. Anmt, U. Essmann, and L. Mülheims, Eds. Heidelberg: Physica-Verlag
-
H. Pohl, "Zero-day und less-than-zero-day vulnerabilities und exploits," in Forschungsspitzen und Spitzenforschung, C. Zacharias, K. Horst, K.- U- Witt, V. Sommer, M. Anmt, U. Essmann, and L. Mülheims, Eds. Heidelberg: Physica-Verlag, 2009, pp. 113-123.
-
(2009)
Forschungsspitzen und Spitzenforschung
, pp. 113-123
-
-
Pohl, H.1
-
17
-
-
75749102614
-
The economics of online crime
-
T. Moore, R. Clayton, and R. Anderson, "The economics of online crime," J. Econ. Persp., vol. 23, pp. 3-20, 2009.
-
(2009)
J. Econ. Persp.
, vol.23
, pp. 3-20
-
-
Moore, T.1
Clayton, R.2
Anderson, R.3
-
18
-
-
78650247908
-
Playing with shadows: Exposing the black market for online game password theft
-
C. Feng, "Playing with shadows: Exposing the black market for online game password theft," Virus Bull., vol. 18, pp. 207-214, 2008.
-
(2008)
Virus Bull.
, vol.18
, pp. 207-214
-
-
Feng, C.1
-
19
-
-
80052782392
-
-
Cambridge, UK: Polity Press
-
P. Aspers, Markets. Cambridge, UK: Polity Press, 2011.
-
(2011)
Markets
-
-
Aspers, P.1
-
21
-
-
0002116850
-
Production of trust: Institutional sources of economic structure, 1840-1920
-
L. Zucker, "Production of trust: Institutional sources of economic structure, 1840-1920," Res. Org. Behav., vol. 8, pp. 53-111, 1986
-
(1986)
Res. Org. Behav.
, vol.8
, pp. 53-111
-
-
Zucker, L.1
-
22
-
-
84936824352
-
Economic action and social structure: The problem of embeddedness
-
M. Granovetter, "Economic action and social structure: The problem of embeddedness," Am. J. Soc., vol. 91, pp. 481, 1985.
-
(1985)
Am. J. Soc.
, vol.91
, pp. 481
-
-
Granovetter, M.1
-
23
-
-
0011081592
-
Trust, control, and risk in strategic alliances: An integrated framework
-
T. K. Das, and T. Bing-Sheng, "Trust, control, and risk in strategic alliances: An integrated framework," Organization Studies, vol. 22, pp. 251-283, 2001. (Pubitemid 33590943)
-
(2001)
Organization Studies
, vol.22
, Issue.2
, pp. 251-283
-
-
Das, T.K.1
Teng, B.-S.2
-
25
-
-
0002353506
-
Mafia: The price of distrust
-
D. Gambetta, Ed. New York and Oxford: Basil Blackwell
-
D. Gambetta, "Mafia: The price of distrust," in Trust: Making and breaking cooperative relations, D. Gambetta, Ed. New York and Oxford: Basil Blackwell, 1988, pp. 158-175.
-
(1988)
Trust: Making and Breaking Cooperative Relations
, pp. 158-175
-
-
Gambetta, D.1
-
26
-
-
84925834591
-
Italian organised crime: Mafia associations and criminal enterprises
-
L. Paoli, Italian organised crime: Mafia associations and criminal enterprises, Global Crime, vol. 6, pp. 19-31, 2004.
-
(2004)
Global Crime
, vol.6
, pp. 19-31
-
-
Paoli, L.1
-
27
-
-
81255149255
-
-
Cologne: Max-Planck-Institut für Gesellschaftsforschung, unpublished
-
F. Wehinger, Illegale Märkte. Cologne: Max-Planck-Institut für Gesellschaftsforschung, unpublished.
-
Illegale Märkte
-
-
Wehinger, F.1
-
29
-
-
85145522060
-
Identity theft and fraud
-
Y. Jewkes and M. Yar, Eds. Cullompton: Willan
-
R. Smith, "Identity theft and fraud," in Handbook of internet crime, Y. Jewkes and M. Yar, Eds. Cullompton: Willan, 2010, pp. 273-301.
-
(2010)
Handbook of Internet Crime
, pp. 273-301
-
-
Smith, R.1
-
30
-
-
0012828167
-
Cybercrimes of the 21st century: Crimes against the individual (Part 1)
-
A. Riem, "Cybercrimes of the 21st century: Crimes against the individual (Part 1)," Computer Fraud & Security, pp. 13-17, 2001.
-
(2001)
Computer Fraud & Security
, pp. 13-17
-
-
Riem, A.1
-
32
-
-
81255141791
-
The organization of cybercrime and organized cybercrime
-
M. Bellini, P. Brunst, J. Jähnke, Eds. Berlin: Duncker & Humblot
-
D. Wall, "The organization of cybercrime and organized cybercrime," in Current issues in IT security, M. Bellini, P. Brunst, J. Jähnke, Eds. Berlin: Duncker & Humblot, 2010, pp. 51-66.
-
(2010)
Current Issues in IT Security
, pp. 51-66
-
-
Wall, D.1
-
33
-
-
35348889528
-
Policing diversity in the digital age
-
D. Wall and M. Williams, "Policing diversity in the digital age," Crim. and Crim. Just., vol. 7, pp. 391-415, 2007.
-
(2007)
Crim. and Crim. Just.
, vol.7
, pp. 391-415
-
-
Wall, D.1
Williams, M.2
-
34
-
-
70350423437
-
The underground economy: Priceless
-
R. Thomas and J. Martin, "The underground economy: Priceless," ;LOGIN: The USENIX Magazine, vol. 31, pp. 7-16, 2006.
-
(2006)
LOGIN: The USENIX Magazine
, vol.31
, pp. 7-16
-
-
Thomas, R.1
Martin, J.2
-
35
-
-
81255141793
-
Social networks
-
M. Jakobsson and S. Myers, Eds. Hoboken: John Wiley & Sons
-
A. Genkina and J. Camp, "Social networks," in Phishing and countermeasures: Understanding the increasing problem of electronic identity theft, M. Jakobsson and S. Myers, Eds. Hoboken: John Wiley & Sons, 2007, pp. 523-550.
-
(2007)
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
, pp. 523-550
-
-
Genkina, A.1
Camp, J.2
-
37
-
-
85145536300
-
Hackers, viruses and malicious software
-
Y. Jewkes and M. Yar, Eds. Cullompton: Willan
-
S. Furnell, "Hackers, viruses and malicious software," in Handbook of internet crime, Y. Jewkes and M. Yar, Eds. Cullompton: Willan, 2010, pp. 173-193.
-
(2010)
Handbook of Internet Crime
, pp. 173-193
-
-
Furnell, S.1
-
38
-
-
64249105644
-
-
A. Maurer, Ed. Wiesbaden: VS Verlag für Sozialwissenschaften
-
P. Aspers and J. Beckert, "Märkte," in Handbuch der Wirtschaftssoziologie, A. Maurer, Ed. Wiesbaden: VS Verlag für Sozialwissenschaften, 2008, pp. 225-246.
-
(2008)
Märkte, Handbuch der Wirtschaftssoziologie
, pp. 225-246
-
-
Aspers, P.1
Beckert, J.2
-
39
-
-
55149123066
-
Lone hacks or group cracks: Examing the social organization of computer hackers
-
F. Schmalleger and M. Pittaro, Eds., Upper Saddle River: Pearson Education
-
T. Holt, "Lone hacks or group cracks: Examing the social organization of computer hackers," in Crimes of the internet, F. Schmalleger and M. Pittaro, Eds., Upper Saddle River: Pearson Education, 2008, 336-355.
-
(2008)
Crimes of the Internet
, pp. 336-355
-
-
Holt, T.1
|