-
2
-
-
85140528371
-
Cybercrimes and the Internet
-
ed. David S. Wall (New York: Routledge
-
David S. Wall, "Cybercrimes and the Internet," in Crime and the Internet, ed. David S. Wall (New York: Routledge, 2001), 1-17.
-
(2001)
Crime and The Internet
, pp. 1-17
-
-
Wall, D.S.1
-
3
-
-
84925759832
-
The Electronic Cloak: Secret Sexual Deviance in Cybersociety,'
-
ed. Yvonne Jewkes (Portland, OR: Willan Publishing
-
Heather DiMarco, "The Electronic Cloak: Secret Sexual Deviance in Cybersociety," in Dot.cons: Crime, Deviance, and Identity on the Internet, ed. Yvonne Jewkes (Portland, OR: Willan Publishing), 53-67.
-
Dot.cons: Crime, Deviance, and Identity On the Internet
, pp. 53-67
-
-
Dimarco, H.1
-
4
-
-
84899190540
-
Control Systems Security
-
ed. Thomas J. Holt and Bernadette Schell (Hershey, PA: IGI-Global
-
Jake Brodscky and Robert Radvanovsky, "Control Systems Security," in Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, ed. Thomas J. Holt and Bernadette Schell (Hershey, PA: IGI-Global, 2011), 187-204
-
(2011)
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
, pp. 187-204
-
-
Brodscky, J.1
Radvanovsky, R.2
-
6
-
-
33847270657
-
Subcultural Evolution? Examining the Influence of On- and Off-line Experiences on Deviant Subcultures
-
Thomas J. Holt, "Subcultural Evolution? Examining the Influence of On- and Off-line Experiences on Deviant Subcultures," Deviant Behavior 28 (2007): 171-198.
-
(2007)
Deviant Behavior
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
8
-
-
0242440508
-
Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy
-
ed. John Arquilla and David F. Ronfeldt (Santa Monica, CA: RAND
-
Dorothy E. Denning, "Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy," in Networks and Netwars: The Future of Terror, Crime, and Militancy, ed. John Arquilla and David F. Ronfeldt (Santa Monica, CA: RAND, 2001), 239-288
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
, pp. 239-288
-
-
Denning, D.E.1
-
9
-
-
0034561329
-
From Car Bombs to Logic Bombs: The Growing Threat from Information Terrorism
-
Jerrold M. Post, Keven G. Ruby, and Eric D. Shaw, "From Car Bombs to Logic Bombs: The Growing Threat from Information Terrorism," Terrorism and Political Violence 12 (2000): 97-122.
-
(2000)
Terrorism and Political Violence
, vol.12
, pp. 97-122
-
-
Post, J.M.1
Ruby, K.G.2
Shaw, E.D.3
-
11
-
-
0004095933
-
-
2nd ed. (New York: Columbia University Press
-
Bruce Hoffman, Inside Terrorism, 2nd ed. (New York: Columbia University Press, 2006)
-
(2006)
Inside Terrorism
-
-
Hoffman, B.1
-
12
-
-
78650508074
-
The Road to Media Jihad: The Propaganda Actions of Al Qaeda in the Islamic Maghreb
-
Manuel Soriano, "The Road to Media Jihad: The Propaganda Actions of Al Qaeda in the Islamic Maghreb," Terrorism and Political Violence 23 (2010): 72-88.
-
(2010)
Terrorism and Political Violence
, vol.23
, pp. 72-88
-
-
Soriano, M.1
-
14
-
-
79551697398
-
A View of Cyberterrorism Five Years Later
-
ed. Kenneth Himmaed (Sudbury, MA: Jones and Bartlett
-
Dorothy Denning, "A View of Cyberterrorism Five Years Later," in Internet Security: Hacking, Counterhacking, and Society, ed. Kenneth Himmaed (Sudbury, MA: Jones and Bartlett, 2006), 123-139
-
(2006)
Internet Security: Hacking, Counterhacking, and Society
, pp. 123-139
-
-
Denning, D.1
-
15
-
-
84859322573
-
Cyber Terrorism: Menace or Myth?
-
ed. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz (Washington DC: National Defense University
-
Irving Lachow, "Cyber Terrorism: Menace or Myth?," in Cyberpower and National Security, ed. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz (Washington DC: National Defense University, 2009), 123-139.
-
(2009)
Cyberpower and National Security
, pp. 123-139
-
-
Lachow, I.1
-
16
-
-
0035381384
-
Virtual Criminality: Old Wine in New Bottles?
-
Peter N. Grabosky, "Virtual Criminality: Old Wine in New Bottles?, Social and Legal Studies 10 (2001): 243-249.
-
(2001)
Social and Legal Studies
, vol.10
, pp. 243-249
-
-
Grabosky, P.N.1
-
17
-
-
0007740589
-
Catching Cybercriminals: Policing the Internet
-
David S. Wall, "Catching Cybercriminals: Policing the Internet," Computers & Technology 12 (1998): 201-218.
-
(1998)
Computers & Technology
, vol.12
, pp. 201-218
-
-
Wall, D.S.1
-
18
-
-
84859353998
-
-
Raleigh, NC: Carolina Academic Press
-
Thomas J. Holt, ed., Crime On-line: Correlates, Causes, and Context (Raleigh, NC: Carolina Academic Press, 2010).
-
(2010)
Crime On-line: Correlates, Causes, and Context
-
-
Holt, T.J.1
-
24
-
-
21244489423
-
-
Westport, CT: Quorum Books
-
Bernadette H. Schell and John L. Dodge, The Hacking of America: Who's Doing it, Why, and How (Westport, CT: Quorum Books, 2002).
-
(2002)
The Hacking of America: Who's Doing It, Why, and How
-
-
Schell, B.H.1
Dodge, J.L.2
-
25
-
-
84859353993
-
-
Computer Security Institute, Computer Crime and Security Survey
-
Computer Security Institute, Computer Crime and Security Survey, 2010, http://www.cybercrime.gov/FBI2010.pdf.
-
(2010)
-
-
-
26
-
-
84859296858
-
-
Computer Security Institute, Computer Crime and Security Survey
-
Computer Security Institute, Computer Crime and Security Survey, 2008, http://www.cybercrime.gov/FBI2008.pdf.
-
(2008)
-
-
-
27
-
-
84859296866
-
-
Internet Crime Complaint Center, IC3 2009 Internet Crime Report
-
Internet Crime Complaint Center, IC3 2009 Internet Crime Report, http://www.ic3.gov/media/annualreport/2010_IC3Report.pdf.
-
-
-
-
28
-
-
84859315644
-
-
IDATE, Taking Advantage of Peer-to-Peer: What Is at Stake for the Content Industry?
-
IDATE, Taking Advantage of Peer-to-Peer: What Is at Stake for the Content Industry? (2009), http://www.idate.fr/an/_qdn/an-03/IF282/index_a.htm.
-
(2009)
-
-
-
29
-
-
57649120953
-
Examining the Applicability of Lifestyle- Routine Activities Theory for Cybercrime Victimization
-
Thomas J. Holt and Adam M. Bossler, "Examining the Applicability of Lifestyle- Routine Activities Theory for Cybercrime Victimization," Deviant Behavior 30 (2009): 1-25.
-
(2009)
Deviant Behavior
, vol.30
, pp. 1-25
-
-
Holt, T.J.1
Bossler, A.M.2
-
35
-
-
84859329159
-
Terrorism and Technology: Operationalizing Cyberterrorism and Identifying Concepts
-
ed. Thomas J. Holt (Raleigh, NC: Carolina Academic Press
-
Marjie T. Britz, "Terrorism and Technology: Operationalizing Cyberterrorism and Identifying Concepts," in Crime On-Line: Correlates, Causes, and Context, ed. Thomas J. Holt (Raleigh, NC: Carolina Academic Press, 2010), 193-220
-
(2010)
Crime On-Line: Correlates, Causes, and Context
, pp. 193-220
-
-
Britz, M.T.1
-
38
-
-
85045162951
-
-
New Brunswick, NJ: Transaction Publishers
-
Alex P. Schmid and Albert J. Jongman, Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, & Literature (New Brunswick, NJ: Transaction Publishers, 2005).
-
(2005)
Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, & Literature
-
-
Schmid, A.P.1
Jongman, A.J.2
-
39
-
-
85045162951
-
-
New Brunswick, NJ: Transaction Publishers
-
Alex P. Schmid and Albert J. Jongman, Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, & Literature (New Brunswick, NJ: Transaction Publishers, 2005)
-
(2005)
Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, & Literature
-
-
Schmid, A.P.1
Jongman, A.J.2
-
50
-
-
4944234107
-
Frameworks for Conceptualising Terrorism
-
Alex P. Schmid, "Frameworks for Conceptualising Terrorism," Terrorism and Political Violence 16 (2004): 197-221.
-
(2004)
Terrorism and Political Violence
, vol.16
, pp. 197-221
-
-
Schmid, A.P.1
-
51
-
-
3042691503
-
The Earth Liberation Front and Environmental Terrorism
-
Stefan H. Leader and Peter Probst, "The Earth Liberation Front and Environmental Terrorism," Terrorism and Political Violence 15 (2003): 37-58.
-
(2003)
Terrorism and Political Violence
, vol.15
, pp. 37-58
-
-
Leader, S.H.1
Probst, P.2
-
56
-
-
84859341068
-
Cyberterrorism-Fact or Fancy?
-
Mark M. Pollitt, "Cyberterrorism-Fact or Fancy?" Computer Fraud & Security 2 (1998): 8-10.
-
(1998)
Computer Fraud & Security
, vol.2
, pp. 8-10
-
-
Pollitt, M.M.1
-
57
-
-
84859341068
-
Cyberterrorism-Fact or Fancy?
-
Mark M. Pollitt, "Cyberterrorism-Fact or Fancy?" Computer Fraud & Security 2 (1998): 8-10.
-
(1998)
Computer Fraud & Security
, vol.2
, pp. 8-10
-
-
Pollitt, M.M.1
-
59
-
-
84859315641
-
-
see note 3 above
-
Denning, "Cyberconflict" (see note 3 above), p. 178
-
Cyberconflict"
, pp. 178
-
-
Denning1
-
62
-
-
79955879107
-
-
Washington, DC: National Institute of Justice
-
Hollis Stambaugh, David S. Beaupre, David J. Icove, Richard Baker, Wayne Cassady, Wayne P. Williams, Electronic Crime Needs Assessment For State And Local Law Enforcement (Washington, DC: National Institute of Justice, 2001).
-
(2001)
Electronic Crime Needs Assessment For State and Local Law Enforcement
-
-
Stambaugh, H.1
Beaupre, D.S.2
Icove, D.J.3
Baker, R.4
Cassady, W.5
Williams, W.P.6
-
65
-
-
77956038407
-
Transferring Subcultural Knowledge Online: Practices and Beliefs of Persistent Digital Pirates
-
Thomas J. Holt and Heith Copes, "Transferring Subcultural Knowledge Online: Practices and Beliefs of Persistent Digital Pirates," Deviant Behavior 31 (2010): 625-654.
-
(2010)
Deviant Behavior
, vol.31
, pp. 625-654
-
-
Holt, T.J.1
Copes, H.2
-
73
-
-
84859371119
-
The Women of Stormfront: An Examination of White Nationalist Discussion Threads on the Internet
-
Tammy Castle, "The Women of Stormfront: An Examination of White Nationalist Discussion Threads on the Internet," Internet Journal of Criminology (2011), http://www.internetjournalofcriminology.com/Castle_Chevalier_The_Women_of_Stormfront_An_Examination_of_White_Nationalist_Discussion_Threads.pdf
-
(2011)
Internet Journal of Criminology
-
-
Castle, T.1
-
74
-
-
84859353976
-
-
Stormfront website. www.stormfront.org
-
-
-
-
75
-
-
33846043733
-
-
2nd ed. (Upper Saddle River, NJ: Pearson Prentice Hall
-
Robert W. Taylor, Eric J. Fritsch, John Liederbach, and Thomas J. Holt, Digital Crime and Digital Terrorism, 2nd ed. (Upper Saddle River, NJ: Pearson Prentice Hall, 2010).
-
(2010)
Digital Crime and Digital Terrorism
-
-
Taylor, R.W.1
Fritsch, E.J.2
Liederbach, J.3
Holt, T.J.4
-
77
-
-
84859315632
-
-
See the website http://www.newsaxon.comfordetails.
-
-
-
-
78
-
-
54349105969
-
Applying the Notion of Noise to Countering Online Terrorism
-
Gabriel Weimann and Katharina Von Knop, "Applying the Notion of Noise to Countering Online Terrorism," Studies in Conflict and Terrorism 23 (2009): 883-902.
-
(2009)
Studies In Conflict and Terrorism
, vol.23
, pp. 883-902
-
-
Weimann, G.1
von Knop, K.2
-
82
-
-
84859296851
-
-
Newsweek, 19 December 2007
-
Vivian Salma, "Ask a Terrorist," Newsweek, 19 December 2007, http://www.newsweek.com/2007/12/19/as-a-terrorist.html.
-
Ask a Terrorist,"
-
-
Salma, V.1
-
83
-
-
84859353973
-
-
See http://www.resistancerecords.com
-
-
-
-
85
-
-
84859353971
-
-
For a description of this and several other terrorist-created video games
-
For a description of this and several other terrorist-created video games.
-
-
-
-
86
-
-
76149110142
-
Innovative Recruitment and Indoctrination Tactics by Extremists: Video Games, Hip Hop, and the World Wide Web
-
ed. James J.F. Forest (Westport, CT: Praeger
-
Madeline Gruen, "Innovative Recruitment and Indoctrination Tactics by Extremists: Video Games, Hip Hop, and the World Wide Web," in The Making of a Terrorist, ed. James J.F. Forest (Westport, CT: Praeger, 2005).
-
(2005)
The Making of a Terrorist
-
-
Gruen, M.1
-
92
-
-
84859369066
-
Social Dynamics and the Future of Technology-Driven Crime
-
ed.Thomas J. Holt and Bernadette Schell (Hershey PA: IGI-Global
-
Max Kilger, "Social Dynamics and the Future of Technology-Driven Crime," in Corporate Hacking and Technology Driven Crime: Social Dynamics and Implications, ed.Thomas J. Holt and Bernadette Schell (Hershey PA: IGI-Global, 2010), 205-227.
-
(2010)
Corporate Hacking and Technology Driven Crime: Social Dynamics and Implications
, pp. 205-227
-
-
Kilger, M.1
-
97
-
-
84859360433
-
-
see note 60 above
-
Taylor, Hackers (see note 60 above).
-
Hackers
-
-
Taylor1
-
98
-
-
84859360433
-
-
see note 60 above
-
Taylor, Hackers (see note 60 above).
-
Hackers
-
-
Taylor1
-
100
-
-
84859365388
-
-
Washington, DC, National Institute of Justice
-
Bill Chu, Thomas J. Holt, and Gail Joon Ahn, Examining the Creation, Distribution, and Function of Malware On-Line (Washington, DC, National Institute of Justice, 2010), http://www.ncjrs.gov./pdffiles1/nij/grants/230112.pdf.
-
(2010)
Examining the Creation, Distribution, and Function of Malware On-Line
-
-
Chu, B.1
Holt, T.J.2
Ahn, G.J.3
-
101
-
-
84859365388
-
-
Washington, DC, National Institute of Justice
-
Bill Chu, Thomas J. Holt, and Gail Joon Ahn, Examining the Creation, Distribution, and Function of Malware On-Line (Washington, DC, National Institute of Justice, 2010), http://www.ncjrs.gov./pdffiles1/nij/grants/230112.pdf.
-
(2010)
Examining the Creation, Distribution, and Function of Malware On-Line
-
-
Chu, B.1
Holt, T.J.2
Ahn, G.J.3
-
102
-
-
84859365388
-
-
Washington, DC, National Institute of Justice
-
Bill Chu, Thomas J. Holt, and Gail Joon Ahn, Examining the Creation, Distribution, and Function of Malware On-Line (Washington, DC, National Institute of Justice, 2010), http://www.ncjrs.gov./pdffiles1/nij/grants/230112.pdf.
-
(2010)
Examining the Creation, Distribution, and Function of Malware On-Line
-
-
Chu, B.1
Holt, T.J.2
Ahn, G.J.3
-
103
-
-
84859353967
-
-
Paper presented at the Department of Defense Cyber Crime Conference, Saint Louis, MO, January 2008
-
Thomas J. Holt, "Examining the Origins of Malware," Paper presented at the Department of Defense Cyber Crime Conference, Saint Louis, MO, January 2008.
-
Examining the Origins of Malware,
-
-
Holt, T.J.1
-
104
-
-
84859371128
-
-
Paper presented at the Department of Defense Cyber Crime Conference, Saint Louis, MO, January 2008
-
Thomas J. Holt, "Examining the Origins of Malware," Paper presented at the Department of Defense Cyber Crime Conference, Saint Louis, MO, January 2008.
-
Examining the Origins of Malware,
-
-
Holt, T.J.1
-
105
-
-
77958467314
-
-
Paper presented at the International Conference on Information Warfare and Security, Peter Kiewit Institute, University of Nebraska Omaha, April 2008
-
Thomas J. Holt, Joshua B. Soles, and Ludmilla Leslie, "Characterizing Malware Writers and Computer Attackers in Their Own Words," Paper presented at the International Conference on Information Warfare and Security, Peter Kiewit Institute, University of Nebraska Omaha, April 2008.
-
Characterizing Malware Writers and Computer Attackers In their Own Words,
-
-
Holt, T.J.1
Soles, J.B.2
Leslie, L.3
-
106
-
-
84859351151
-
The Attack Dynamics of Political and Religiously Motivated Hackers
-
ed. Tarek Saadawi and Louis Jordan (New York: Strategic Studies Institute
-
Thomas J. Holt, "The Attack Dynamics of Political and Religiously Motivated Hackers," in Cyber Infrastructure Protection, ed. Tarek Saadawi and Louis Jordan (New York: Strategic Studies Institute, 2009), 161-182.
-
(2009)
Cyber Infrastructure Protection
, pp. 161-182
-
-
Holt, T.J.1
-
107
-
-
84859351151
-
The Attack Dynamics of Political and Religiously Motivated Hackers
-
ed. Tarek Saadawi and Louis Jordan (New York: Strategic Studies Institute
-
Thomas J. Holt, "The Attack Dynamics of Political and Religiously Motivated Hackers," in Cyber Infrastructure Protection, ed. Tarek Saadawi and Louis Jordan (New York: Strategic Studies Institute, 2009), 161-182.
-
(2009)
Cyber Infrastructure Protection
, pp. 161-182
-
-
Holt, T.J.1
-
110
-
-
84859360433
-
-
see note 60 above
-
Taylor, Hackers (see note 60 above).
-
Hackers
-
-
Taylor1
-
111
-
-
84859360433
-
-
see note 60 above
-
Taylor, Hackers (see note 60 above).
-
Hackers
-
-
Taylor1
-
113
-
-
84859371123
-
An Interview with Anonymous
-
29 September, 2010
-
Sean Paul Correll, "An Interview with Anonymous," PandaLabs Blog, 29 September, 2010, http://pandalabs.pandasecurity.com/an-interview-with-anonymous/.
-
PandaLabs Blog
-
-
Correll, S.P.1
-
120
-
-
46449106851
-
-
BBC News, 8 February 8, 2006
-
Michael Ward, "Anti-Cartoon Protests Go Online," BBC News, 8 February 8, 2006, http://news.bbc.co.uk/2/hi/technology/4691518.stm.
-
Anti-Cartoon Protests Go Online,"
-
-
Ward, M.1
-
121
-
-
46449106851
-
-
BBC News, 8 February 8, 2006
-
Michael Ward, "Anti-Cartoon Protests Go Online," BBC News, 8 February 8, 2006, http://news.bbc.co.uk/2/hi/technology/4691518.stm.
-
Anti-Cartoon Protests Go Online,"
-
-
Ward, M.1
-
124
-
-
84859338497
-
Zero Day: Coordinated Russia vs Georgia cyber attack in progress
-
11 August 2008
-
Ryan Naraine and Dancho Danchev, "Zero Day: Coordinated Russia vs Georgia cyber attack in progress," ZDNet, 11 August 2008, http://www.zdnet.com/blog/security/coordinated-russia-vs-georgia-cyber-attack-in-progress/1670.
-
ZDNet
-
-
Naraine, R.1
Danchev, D.2
-
132
-
-
79251638534
-
Stuxnet Malware is 'Weapon' out to Destroy... Iran's Bushehr Nuclear Plant
-
21 September, 2010
-
Mark Clayton, "Stuxnet Malware is 'Weapon' out to Destroy... Iran's Bushehr Nuclear Plant," Christian Science Monitor, 21 September, 2010, http://www.csmonitor.com/USA/2010/0921/Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant.
-
Christian Science Monitor
-
-
Clayton, M.1
-
140
-
-
84859371116
-
DHS Fears a Modified Stuxnet Could Attack US Infrastructure
-
20 July, 2011
-
Kim Zetter, "DHS Fears a Modified Stuxnet Could Attack US Infrastructure," Wired Threat Level, 20 July, 2011, http://www.wired.com/threatlevel/2011/07/dhs-fearsstuxnet-attacks/.
-
Wired Threat Level
-
-
Zetter, K.1
-
156
-
-
84879145204
-
In 'Anonymous' Raids, Feds Work From List of Top 1,000 Protesters
-
26 July, 2011
-
Kevin Poulsen, "In 'Anonymous' Raids, Feds Work From List of Top 1,000 Protesters," Wired, 26 July, 2011, http://www.wired.com/threatlevel/2011/07/op_payback/.
-
Wired
-
-
Poulsen, K.1
-
159
-
-
84859304771
-
-
Department of Defense, Washington DC: Department of Defense
-
Department of Defense. Department of Defense Strategy for Operating in Cyberspace, (Washington DC: Department of Defense, 2011), http://www.defense.gov/news/d20110714cyber.pdf.
-
(2011)
Department of Defense Strategy For Operating In Cyberspace
-
-
-
160
-
-
84859304771
-
-
Department of Defense, Washington DC: Department of Defense
-
Department of Defense. Department of Defense Strategy for Operating in Cyberspace, (Washington DC: Department of Defense, 2011), http://www.defense.gov/news/d20110714cyber.pdf.
-
(2011)
Department of Defense Strategy For Operating In Cyberspace
-
-
-
161
-
-
84859304771
-
-
Department of Defense, Washington DC: Department of Defense
-
Department of Defense. Department of Defense Strategy for Operating in Cyberspace, (Washington DC: Department of Defense, 2011), http://www.defense.gov/news/d20110714cyber.pdf.
-
(2011)
Department of Defense Strategy For Operating In Cyberspace
-
-
-
166
-
-
80052980820
-
On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory
-
Adam M. Bossler and Thomas J. Holt, "On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory," International Journal of Cyber Criminology 3 (2010): 400-420
-
(2010)
International Journal of Cyber Criminology
, vol.3
, pp. 400-420
-
-
Bossler, A.M.1
Holt, T.J.2
-
173
-
-
84859338457
-
Using the Internet to Uncover Terrorism's Root Causes
-
ed. James J. F. Forest (Westport, CT: Praeger
-
Joshua Sinai, "Using the Internet to Uncover Terrorism's Root Causes," in Influence Warfare, ed. James J. F. Forest (Westport, CT: Praeger, 2009).
-
(2009)
Influence Warfare
-
-
Sinai, J.1
-
174
-
-
77958509140
-
Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using Online Data
-
Thomas J. Holt, "Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using Online Data," Journal of Criminal Justice Education, 21 (2010): 300-321.
-
(2010)
Journal of Criminal Justice Education
, vol.21
, pp. 300-321
-
-
Holt, T.J.1
-
176
-
-
77949555353
-
Exploring Stolen Data Markets On-line: Products and Market Forces
-
Thomas J. Holt and Eric Lampke, "Exploring Stolen Data Markets On-line: Products and Market Forces," Criminal Justice Studies 23 (2010): 33-50.
-
(2010)
Criminal Justice Studies
, vol.23
, pp. 33-50
-
-
Holt, T.J.1
Lampke, E.2
-
177
-
-
84859319388
-
Terror Webmaster Sentenced in Britain
-
5 July 2007
-
Brian Krebs, "Terror Webmaster Sentenced in Britain," Washington Post, 5 July 2007
-
Washington Post
-
-
Krebs, B.1
-
178
-
-
78149334726
-
Data Breaches: What the Underground World of "Carding" Reveals
-
Kimberly Kiefer Peretti, "Data Breaches: What the Underground World of "Carding" Reveals," Santa Clara Computer and High Technology Law Journal 25 (2009): 375-413.
-
(2009)
Santa Clara Computer and High Technology Law Journal
, vol.25
, pp. 375-413
-
-
Peretti, K.K.1
|