-
1
-
-
84925797895
-
Crime, deviance and the disembodied self transcending the dangers of corporeality
-
Y. Jewkes (ed), Y. Jewkes, Ed. Portland, OR Willan Publishing
-
Y. Jewkes, and K. Sharp, "Crime, deviance and the disembodied self Transcending the dangers of corporeality," in In Y. Jewkes (ed), Dot.cons Crime, deviance and identity on the internet, Y. Jewkes, Ed. Portland, OR Willan Publishing, 2003, pp. 1-14.
-
(2003)
Dot.cons Crime, Deviance and Identity on the Internet
, pp. 1-14
-
-
Jewkes, Y.1
Sharp, K.2
-
3
-
-
11344287619
-
Exploring the crime of identity theft prevalence, clearance rates, and victim/offender characteristics
-
S. F. H. Allison, A. M. Schuck, and K. M. Learsch, "Exploring the crime of identity theft prevalence, clearance rates, and victim/offender characteristics," J. Crim. J. vol. 33, pp. 19-29, 2005.
-
(2005)
J. Crim. J
, vol.33
, pp. 19-29
-
-
Allison, S.F.H.1
Schuck, A.M.2
Learsch, K.M.3
-
6
-
-
85140528371
-
Cybercrimes and the internet
-
D. S. Wall (ed.),. New York Routledge
-
D. S. Wall, "Cybercrimes and the internet," D. S. Wall (ed.), Crime and the internet. New York Routledge, 2001, pp. 1-17.
-
(2001)
Crime and the Internet
, pp. 1-17
-
-
Wall, D.S.1
-
8
-
-
78149334726
-
Data breaches what the underground world of "carding" reveals
-
K. K. Peretti, "Data breaches What the underground world of "carding" reveals," Santa Clara Computer &High Technology L. J., vol. 25,pp. 375-413, 2009.
-
(2009)
Santa Clara Computer &High Technology L. J.
, vol.25
, pp. 375-413
-
-
Peretti, K.K.1
-
9
-
-
84885155959
-
The great cyberheist
-
November 14,.
-
J. Verini, "The great cyberheist," The New York Times. November 14, 2010.
-
(2010)
The New York Times
-
-
Verini, J.1
-
10
-
-
84900805032
-
-
Verison, 2012 Data breach investigations report and executive summary, 2012.
-
Verison, 2012 Data breach investigations report and executive summary, 2012. http//www.verisonbusiness.com/resources/reports/rp-databreach- investigations-report-2012-en-xg.pdf.
-
-
-
-
11
-
-
84900815649
-
-
Anti-Phishing Working Group, APWG Phishing activity trneds report, 2nd quarter 2012.
-
Anti-Phishing Working Group, APWG Phishing activity trneds report, 2nd quarter 2012. http//docs.apwg.org/reports/apwg-trends-report-q2-2012.pdf.
-
-
-
-
12
-
-
84858230810
-
Gartner victims of online phishing up nearly 40 percent in 2007
-
J. Rogers, J. "Gartner Victims of online phishing up nearly 40 percent in 2007." SC Magazine, 2007.
-
(2007)
SC Magazine
-
-
Rogers, J.J.1
-
13
-
-
84859365388
-
-
Technical Report for National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018
-
B. Chu, T. J. Holt, and G. J. Ahn, Examining the Creation, Distribution, and Function of Malware On-Line. Technical Report for National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018, 2010.
-
(2010)
Examining the Creation, Distribution, and Function of Malware On-Line
-
-
Chu, B.1
Holt, T.J.2
Ahn, G.J.3
-
14
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
J. Franklin,V. Paxson, A. Perrig, and S. Savage, "An inquiry into the nature and causes of the wealth of internet miscreants," Proceedings of the 14th ACM conference on Computer and communications security, Conference on Computer and Communications Security, Ed., 2007, pp. 375-388
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, Conference on Computer and Communications Security, Ed.
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
15
-
-
77949555353
-
Exploring stolen data markets on-line products and market forces
-
T. J. Holt, and E. Lampke, "Exploring stolen data markets on-line Products and market forces," Crim. Just. St., vol. 23, pp. 33-50, 2010.
-
(2010)
Crim. Just. St.
, vol.23
, pp. 33-50
-
-
Holt, T.J.1
Lampke, E.2
-
16
-
-
84900812269
-
-
Honeynet Research Alliance, 'Profile Automated Credit Card Fraud Know Your Enemy Paper series, 2003
-
Honeynet Research Alliance, 'Profile Automated Credit Card Fraud," Know Your Enemy Paper series, 2003.
-
-
-
-
17
-
-
70350423437
-
The underground economy priceless
-
R Thomas, and J. Martin, "The underground economy Priceless,"login The Usenix Magazine, vol. 31, pp. 7-17, 2006.
-
(2006)
Login the Usenix Magazine
, vol.31
, pp. 7-17
-
-
Thomas, R.1
Martin, J.2
-
18
-
-
82955190605
-
An analysis of underground forums
-
M. Motoyama, D. McCoy, K. Levchenko, S. Savage, and G. M. Voelker, "An Analysis of Underground Forums," IMC'11, pp. 71-79, 2011.
-
(2011)
IMC'11
, pp. 71-79
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Savage, S.4
Voelker, G.M.5
-
19
-
-
81255149250
-
Nobody sells gold for the price of silver dishonesty, uncertainty and the underground economy
-
T. Moore, D. J. Pym, and C. Ioannidis, New York Springer
-
C. Herley, and D. Florencio, "Nobody sells gold for the price of silver Dishonesty, uncertainty and the underground economy," in Economics of information security and privacy, T. Moore, D. J. Pym, and C. Ioannidis, New York Springer, 2010, pp. 33-53.
-
(2010)
Economics of Information Security and Privacy
, pp. 33-53
-
-
Herley, C.1
Florencio, D.2
-
20
-
-
81255178753
-
The dark net Self-regulation dynamics of illegal online markets for identities and related services
-
F. Wehinger, "The dark net Self-regulation dynamics of illegal online markets for identities and related services." Intelligence and Security Informatics Conference, 209-213, 2011.
-
(2011)
Intelligence and Security Informatics Conference
, pp. 209-213
-
-
Wehinger, F.1
-
21
-
-
84900800907
-
Bad sushi beating phishers at their own game
-
N. Dhanjani, and B. Rios. "Bad sushi Beating phishers at their own game." Blackhat, 2008
-
(2008)
Blackhat
-
-
Dhanjani, N.1
Rios, B.2
-
22
-
-
70350357344
-
Learning more about the underground economy a case-study of keyloggers and dropzones
-
M. Backes and P. Ning, (Eds.) Berlin and Heidelberg, Springer
-
T. Holz, M. Engelberth, and F. Freiling, "Learning more about the underground economy A case-study of keyloggers and dropzones," in Computer Security-ESORICS, M. Backes and P. Ning, (Eds.) Berlin and Heidelberg, Springer, 2009, pp. 1-18.
-
(2009)
Computer Security-ESORICS
, pp. 1-18
-
-
Holz, T.1
Engelberth, M.2
Freiling, F.3
-
23
-
-
84885107426
-
Russia cybercrime market doubles in 2011, says report
-
J. E. Dunn, "Russia cybercrime market doubles in 2011, says report," IT World Today, 2012. http//www.itworld.com/security/272448/ russiacybercrime-market-doubles-2011-says-report
-
(2012)
IT World Today
-
-
Dunn, J.E.1
-
25
-
-
33847270657
-
Subcultural evolution? Examining the influence of on-and off-line experiences on deviant subcultures
-
T. J. Holt, "Subcultural evolution? Examining the influence of on-and off-line experiences on deviant subcultures," J. Dev. Beh., vol. 28, pp. 171-198, 2007.
-
(2007)
J. Dev. Beh.
, vol.28
, pp. 171-198
-
-
Holt, T.J.1
-
26
-
-
77958509140
-
Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data
-
T. J. Holt, "Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data," J. Crim. Jus. Ed., vol. 21, pp. 300-321, 2010.
-
(2010)
J. Crim. Jus. Ed.
, vol.21
, pp. 300-321
-
-
Holt, T.J.1
-
27
-
-
84879724936
-
Exploring the social organization and structure of stolen data markets
-
T. J. Holt, "Exploring the social organization and structure of stolen data markets," GC vol. 2, pp. 155-174, 2013
-
(2013)
GC
, vol.2
, pp. 155-174
-
-
Holt, T.J.1
-
28
-
-
79959953965
-
Internet research
-
D. Silverman (ed, 3rd Edition, Thousand Oaks, CA SAGE Publications
-
A. N. Markham, "Internet research," D. Silverman (ed.), Qualitative Research Issues of Theory, Method, and Practice, 3rd Edition, Thousand Oaks, CA SAGE Publications, 2011, pp. 111-127.
-
(2011)
Qualitative Research Issues of Theory, Method, and Practice
, pp. 111-127
-
-
Markham, A.N.1
-
29
-
-
82255174349
-
Positively skewed data revisiting the box-cox power transformation
-
J. Olivier, and M. M. Norberg, "Positively skewed data Revisiting the box-cox power transformation," IJPR, vol. 3, pp. 68-75, 2010.
-
(2010)
IJPR
, vol.3
, pp. 68-75
-
-
Olivier, J.1
Norberg, M.M.2
-
30
-
-
84900831853
-
Why did criminals trust liberty reserve
-
May 31,.
-
J. Surowiecki, "Why did criminals trust liberty reserve," The New Yorker, May 31, 2013. http//www.newyorker.com/online/blogs/newsdesk/2013/05/ why-didcriminals-trust-liberty-reserve.htlm
-
(2013)
The New Yorker
-
-
Surowiecki, J.1
-
31
-
-
84865416232
-
The social network of hackers
-
D. Decary-Hetu, and B. Dupont, "The social network of hackers." GC, vol. 13, pp. 160-173, 2012.
-
(2012)
GC
, vol.13
, pp. 160-173
-
-
Decary-Hetu, D.1
Dupont, B.2
-
32
-
-
84886398422
-
Trust among cybercriminals? Carding forums, uncertainty, and implications for policing
-
M. Yip, C. Webber, and N. Shadbolt, "Trust among cybercriminals? Carding forums, uncertainty, and implications for policing." Pol and Soc, vol. 23, pp. 1-24, 2013.
-
(2013)
Pol and Soc
, vol.23
, pp. 1-24
-
-
Yip, M.1
Webber, C.2
Shadbolt, N.3
|