-
3
-
-
80052980820
-
Online activities, guardianship, and malware infection: An examination of routine activities theory
-
Bossler A. M.,Holt T. J.Online activities, guardianship, and malware infection: An examination of routine activities theory.International Journal of Cyber Criminology. 2009;3:400-420.
-
(2009)
International Journal of Cyber Criminology
, vol.3
, pp. 400-420
-
-
Bossler, A.M.1
Holt, T.J.2
-
5
-
-
77949584268
-
Computer crime victimization and integrated theory: An empirical assessment
-
Choi K. S.Computer crime victimization and integrated theory: An empirical assessment.International Journal of Cyber Criminology. 2008;2:308-333.
-
(2008)
International Journal of Cyber Criminology
, vol.2
, pp. 308-333
-
-
Choi, K.S.1
-
6
-
-
70449508100
-
Zombies and botnets
-
Australian Institute of Criminology. Retrieved December, 28, 2007, from
-
ChooK. R. (2007). Zombies and botnets. Trends and issues in crime and criminal justice. Australian Institute of Criminology. Retrieved December, 28, 2007, fromhttp://www.aic.gov.au/en/publications/current%20series/tandi/321-340/tandi333/view%20paper.aspx.
-
(2007)
Trends and issues in crime and criminal justice
-
-
Choo, K.R.1
-
7
-
-
84859365388
-
-
Washington, DC: National Institute of Justice. Retrieved December, 20, 2011, from
-
ChuB.HoltT. J.AhnG. J. (2010). Examining the creation, distribution, and function of malware online. Washington, DC: National Institute of Justice. Retrieved December, 20, 2011, fromwww.ncjrs.gov./pdffiles1/nij/grants/230112.pdf.
-
(2010)
Examining the creation, distribution, and function of malware online
-
-
Chu, B.1
Holt, T.J.2
Ahn, G.J.3
-
8
-
-
33748435812
-
-
Computer Security Institute. Retrieved September 20, 2011, from
-
Computer Security Institute. (2009). Computer crime and security survey. Retrieved September 20, 2011, fromhttp://www.cybercrime.gov/FBI2009.pdf.
-
(2009)
Computer crime and security survey
-
-
-
10
-
-
34247732721
-
Grounded theory research: Procedures, canons, and evaluative criteria
-
Corbin J.,Strauss A.Grounded theory research: Procedures, canons, and evaluative criteria.Qualitative Sociology. 1990;13:3-21.
-
(1990)
Qualitative Sociology
, vol.13
, pp. 3-21
-
-
Corbin, J.1
Strauss, A.2
-
11
-
-
84874525318
-
-
Newbury Park, CA: Sage
-
Cromwell P. F.,Olson J. N.,Avary D. W.Studies in Crime, Law, and Justice, 8. Newbury Park, CA: Sage; 1991:.
-
(1991)
Studies in Crime, Law, and Justice, 8
-
-
Cromwell, P.F.1
Olson, J.N.2
Avary, D.W.3
-
14
-
-
84874531002
-
-
says report. IT World Today Retrieved May 26, 2012, from
-
DunnJ. E. (2012). Russia cybercrime market doubles in 2011, says report. IT World Today Retrieved May 26, 2012, fromhttp://www.itworld.com/security/272448/russia-cybercrime-market-doubles-2011-says-report.
-
(2012)
Russia cybercrime market doubles in 2011
-
-
Dunn, J.E.1
-
15
-
-
77949547807
-
An Inquiry into the nature and cause of the wealth of internet miscreants
-
Paper presented at CCS07, October 29-November 2, 2007; Alexandria, VA;
-
Franklin J.,Paxson V.,Perrig A.,Savage S.An Inquiry into the nature and cause of the wealth of internet miscreants. Paper presented at CCS07, October 29-November 2, 2007; 2007Alexandria, VA; 2007.
-
(2007)
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
18
-
-
0038473060
-
Police subculture reconsidered
-
Herbert S.Police subculture reconsidered.Criminology. 1998;36:343-369.
-
(1998)
Criminology
, vol.36
, pp. 343-369
-
-
Herbert, S.1
-
19
-
-
33847270657
-
Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures
-
Holt T. J.Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures.Deviant Behavior. 2007;28:171-198.
-
(2007)
Deviant Behavior
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
20
-
-
77958509140
-
Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data
-
Holt T. J.Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data.Journal of Criminal Justice Education. 2010;21:300-321.
-
(2010)
Journal of Criminal Justice Education
, vol.21
, pp. 300-321
-
-
Holt, T.J.1
-
24
-
-
77949555353
-
Exploring stolen data markets online: Products and market forces
-
Holt T. J.,Lampke E.Exploring stolen data markets online: Products and market forces.Criminal Justice Studies. 2010;23:33-50.
-
(2010)
Criminal Justice Studies
, vol.23
, pp. 33-50
-
-
Holt, T.J.1
Lampke, E.2
-
27
-
-
0040240444
-
Crack dealers apprehension avoidance techniques: A case of restrictive deterrence
-
Jacobs B.Crack dealers apprehension avoidance techniques: A case of restrictive deterrence.Criminology. 1996;34:409-431.
-
(1996)
Criminology
, vol.34
, pp. 409-431
-
-
Jacobs, B.1
-
29
-
-
0347177751
-
Managing retaliation: Drug robbery and informal sanction threats
-
Jacobs B. A.,Topalli V.,Wright R.Managing retaliation: Drug robbery and informal sanction threats.Criminology. 2000;38:171-198.
-
(2000)
Criminology
, vol.38
, pp. 171-198
-
-
Jacobs, B.A.1
Topalli, V.2
Wright, R.3
-
30
-
-
0032376197
-
Netcrime: More change in the organization of thieving
-
Mann D.,Sutton M.Netcrime: More change in the organization of thieving.British Journal of Criminology. 1998;38:201-229.
-
(1998)
British Journal of Criminology
, vol.38
, pp. 201-229
-
-
Mann, D.1
Sutton, M.2
-
31
-
-
82955190605
-
An analysis of underground forums
-
Motoyama M.,McCoy D.,Levchenko K.,Savage S.,Voelker G. M.An analysis of underground forums.IMC'11. 2011;:71-79.
-
(2011)
IMC'11
, pp. 71-79
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Savage, S.4
Voelker, G.M.5
-
32
-
-
68149146473
-
-
PandaLabs, Retrieved November 1, 2007, from
-
PandaLabs. (2007). Malware infections in protected systems. Retrieved November 1, 2007, fromhttp://research.pandasecurity.com/blogs/images/wp_pb_malware_infections_in_protected_systems.pdf.
-
(2007)
Malware infections in protected systems
-
-
-
33
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenonmenon
-
Rajab M. A.,Zarfoss J.,Monrose F.,Terzis A.A multifaceted approach to understanding the botnet phenonmenon.IMC'06. 2006;:41-52.
-
(2006)
IMC'06
, pp. 41-52
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
34
-
-
24144457497
-
Stolen-goods markets: Methods of Disposal
-
Schneider J. L.Stolen-goods markets: Methods of Disposal.British Journal of Criminology. 2005;45:129-140.
-
(2005)
British Journal of Criminology
, vol.45
, pp. 129-140
-
-
Schneider, J.L.1
-
35
-
-
0003461534
-
-
(3rd ed.). Thousand Oaks, CA: Sage.;, Thousand Oaks, CA: Sage
-
Silverman D.2010). Interpreting qualitative data: Methods for analyzing talk, text, and interaction (3rd ed.). Thousand Oaks, CA: Sage.Thousand Oaks, CA: Sage; 2010:.
-
(2010)
Interpreting qualitative data: Methods for analyzing talk, text, and interaction
-
-
Silverman, D.1
-
36
-
-
0035582168
-
The stolen goods market in New South Wales Australia: An analysis of disposal avenues and tactics
-
Stevenson R. J.,Forsythe L. M. V.,Weatherburn D.The stolen goods market in New South Wales Australia: An analysis of disposal avenues and tactics.British Journal of Criminology. 2001;41:101-118.
-
(2001)
British Journal of Criminology
, vol.41
, pp. 101-118
-
-
Stevenson, R.J.1
Forsythe, L.M.V.2
Weatherburn, D.3
-
37
-
-
0347389690
-
-
London: Home Office Research and Statistics Directorate
-
Sutton M.Home Office Research Study 178. London: Home Office Research and Statistics Directorate; 1998:.
-
(1998)
Home Office Research Study 178
-
-
Sutton, M.1
-
38
-
-
30644459162
-
-
Symantec Corporation. Retrieved October 3, 2005, from
-
Symantec Corporation. (2003). Symantec Internet security threat report. Retrieved October 3, 2005, fromhttp://enterprisesecurity.symantec.com/content/knowledgelibrary.cfm?EID=0.
-
(2003)
Symantec Internet security threat report
-
-
-
39
-
-
84874545490
-
-
Symantec Corporation.Retrieved May 25, 2012, from
-
Symantec Corporation. (2012). Symantec Internet security threat report, Volume 17.Retrieved May 25, 2012, fromhttp://www.symantec.com/threatreport/.
-
(2012)
Symantec Internet security threat report
, vol.17
-
-
-
41
-
-
33846043733
-
-
(2nd ed.). Upper Saddle River, NJ: Pearson Prentice Hall.;, Upper Saddle River, NJ: Pearson Prentice Hall
-
Taylor R. W.,Fritsch E. J.,Liederbach J.,Holt T. J.Digital crime and digital terrorism. 2010). Digital crime and digital terrorism (2nd ed.). Upper Saddle River, NJ: Pearson Prentice Hall.Upper Saddle River, NJ: Pearson Prentice Hall; 2010:.
-
(2010)
Digital Crime and Digital Terrorism
-
-
Taylor, R.W.1
Fritsch, E.J.2
Liederbach, J.3
Holt, T.J.4
|