-
1
-
-
84867082037
-
The Risk Propensity and Rationality of Computer Hackers
-
Bachmann, M. (2010). The Risk Propensity and Rationality of Computer Hackers. International Journal of Cyber Criminology, 4, 643-656.
-
(2010)
International Journal of Cyber Criminology
, vol.4
, pp. 643-656
-
-
Bachmann, M.1
-
2
-
-
84859365388
-
-
Washington, DC, National Institute of Justice. Retrieved on 14th April 2012 from
-
Chu, B., Holt, T. J., & Ahn, G. J. (2010). Examining the Creation, Distribution, and Function of Malware On-Line. Washington, DC, National Institute of Justice. Retrieved on 14th April 2012 from www.ncjrs.gov./pdffiles1/nij/grants/230112.pdf.
-
(2010)
Examining the Creation, Distribution, and Function of Malware On-Line
-
-
Chu, B.1
Holt, T.J.2
Ahn, G.J.3
-
3
-
-
3242808612
-
-
Retrieved on 14th April 2012 from Computer Security Institute
-
Computer Security Institute. (2012). Computer Crime and Security Survey. Retrieved on 14th April 2012 from http://www.cybercrime.gov/FBI2012.pdf.
-
(2012)
Computer Crime and Security Survey
-
-
-
5
-
-
11344279136
-
Elites, lamers, narcs, and whores: Exploring the computer underground
-
Seattle: Seal Press. L. Cherny & E. R. Weise (Eds.)
-
Gilboa, N. (1996). Elites, lamers, narcs, and whores: Exploring the computer underground. In L. Cherny & E. R. Weise (Eds.) Wired Women (pp. 98-113). Seattle: Seal Press.
-
(1996)
Wired Women
, pp. 98-113
-
-
Gilboa, N.1
-
6
-
-
33745758036
-
-
Cambridge, M A: IBM Thomas J. Watson Research Center. Retrieved on 14th April 2012 from
-
Gordon, S. (2000). Virus writers: The end of innocence? Cambridge, M A: IBM Thomas J. Watson Research Center. Retrieved on 14th April 2012 from http://www.research.ibm.com/antivirus/SciPapers/VB2000SG.pdf
-
(2000)
Virus writers: The end of innocence?
-
-
Gordon, S.1
-
8
-
-
33847270657
-
Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures
-
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171-198.
-
(2007)
Deviant Behavior
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
9
-
-
55149123066
-
Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers
-
Upper Saddle River, NJ: Pearson Prentice Hall F. Schmalleger & M. Pittaro (Eds.)
-
Holt, T. J. (2009a). Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 336-355). Upper Saddle River, NJ: Pearson Prentice Hall.
-
(2009)
Crimes of the Internet
, pp. 336-355
-
-
Holt, T.J.1
-
10
-
-
77958509140
-
Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data
-
Holt, T. J. (2010). Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data. Journal of Criminal Justice Education, 21, 300-321.
-
(2010)
Journal of Criminal Justice Education
, vol.21
, pp. 300-321
-
-
Holt, T.J.1
-
13
-
-
77949555353
-
Exploring stolen data markets on-line: Products and market forces
-
Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets on-line: Products and market forces. Criminal Justice Studies, 23, 33-50.
-
(2010)
Criminal Justice Studies
, vol.23
, pp. 33-50
-
-
Holt, T.J.1
Lampke, E.2
-
14
-
-
77958467314
-
-
Paper presented at the 3rd International Conference on Information Warfare and Security, April 24-25, in Omaha, Nebraska
-
Holt, T. J., Soles, J., & Leslie, L. (2008). Characterizing malware writers and computer attackers in their own words. Paper presented at the 3rd International Conference on Information Warfare and Security, April 24-25, in Omaha, Nebraska.
-
(2008)
Characterizing malware writers and computer attackers in their own words
-
-
Holt, T.J.1
Soles, J.2
Leslie, L.3
-
15
-
-
77949543969
-
-
Retrieved on 14th April 2012 from Honeynet Research Alliance
-
Honeynet Research Alliance. (2003). Profile: Automated Credit Card Fraud. Retrieved on 14th April 2012 from http://www.honeynet.org/papers/profiles/cc-fraud.pdf.
-
(2003)
Profile: Automated Credit Card Fraud
-
-
-
17
-
-
84867661512
-
Profiling. In The Honeynet Project (2nd Ed.)
-
Addison Wesley Professional
-
Kilger, M., Stutzman, J., & Arkin, O. (2004). Profiling. In The Honeynet Project (2nd Ed.), Know your enemy. Addison Wesley Professional.
-
(2004)
Know your enemy
-
-
Kilger, M.1
Stutzman, J.2
Arkin, O.3
-
20
-
-
78149334726
-
Data breaches: What the underground world of "carding" reveals
-
Peretti, K. K. (2009). Data breaches: What the underground world of "carding" reveals. Santa Clara Computer and High Technology Law Journal, 25(2), 375-413.
-
(2009)
Santa Clara Computer and High Technology Law Journal
, vol.25
, Issue.2
, pp. 375-413
-
-
Peretti, K.K.1
-
21
-
-
21244489423
-
-
Westport, CT: Quorum Books
-
Schell, B. H., & Dodge, J. L. (2002). The Hacking of America: Who's Doing it, Why, and How. Westport, CT: Quorum Books.
-
(2002)
The Hacking of America: Who's Doingit, Why, and How
-
-
Schell, B.H.1
Dodge, J.L.2
-
23
-
-
0345257994
-
-
Minneapolis, MN: University of Minnesota Press
-
Thomas, D. (2002). Hacker Culture. Minneapolis, MN: University of Minnesota Press.
-
(2002)
Hacker Culture
-
-
Thomas, D.1
-
24
-
-
70350423437
-
The underground economy: Priceless
-
Thomas, R. & Martin, J. (2006). The underground economy: Priceless. The Usenix Magazine, 31, 7-17.
-
(2006)
The Usenix Magazine
, vol.31
, pp. 7-17
-
-
Thomas, R.1
Martin, J.2
|