-
2
-
-
0037408982
-
Building Trust in Online Auction Markets through an Economic Incentive Mechanism
-
Ba, Sulin, Andrew B. Whinston, and Han Zhang. “Building Trust in Online Auction Markets through an Economic Incentive Mechanism.” Decision Support Systems 35 (2003): 273–286. doi:10.1016/S0167-9236(02)00074-X.
-
(2003)
Decision Support Systems
, vol.35
, pp. 273-286
-
-
Ba, S.1
Whinston, A.B.2
Zhang, H.3
-
3
-
-
84856707624
-
Silk Road: eBay for Drugs
-
Barratt, Monica J. “Silk Road: eBay for Drugs.” Addiction 107, no. 3 (2012): 683–683. doi:10.1111/j.1360-0443.2011.03709.x.
-
(2012)
Addiction
, vol.107
, Issue.3
, pp. 683
-
-
Barratt, M.J.1
-
4
-
-
0000787258
-
Crime and Punishment: An Economic Approach
-
Becker, Gary S. “Crime and Punishment: An Economic Approach.” The Journal of Political Economy 76, no. 2 (1968): 169–217. doi:10.1086/259394.
-
(1968)
The Journal of Political Economy
, vol.76
, Issue.2
, pp. 169-217
-
-
Becker, G.S.1
-
5
-
-
33645081478
-
‘Drive It like You Stole It’: Auto Theft and the Illusion of Normalcy
-
Cherbonneau, Michael, and Heith Copes. “‘Drive It like You Stole It’: Auto Theft and the Illusion of Normalcy.” British Journal of Criminology 46, no. 2 (2006): 193–211. doi:10.1093/bjc/azi059.
-
(2006)
British Journal of Criminology
, vol.46
, Issue.2
, pp. 193-211
-
-
Cherbonneau, M.1
Copes, H.2
-
6
-
-
84859365388
-
Examining the Creation, Distribution, and Function of Malware On-Line
-
Chu, Bill., Thomas J. Holt, and Gail Joon Ahn. Examining the Creation, Distribution, and Function of Malware On-Line. Technical Report for National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018, 2010. http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf
-
(2010)
Technical Report for National Institute of Justice
-
-
Chu, B.1
Holt, T.J.2
Ahn, G.J.3
-
8
-
-
0001244215
-
Modeling Offenders’ Decisions: A Framework for Research and Policy
-
Clarke, Ronald V., and Derek B. Cornish. “Modeling Offenders’ Decisions: A Framework for Research and Policy.” Crime and Justice 6 (1985): 147–185. doi:10.1086/449106.
-
(1985)
Crime and Justice
, vol.6
, pp. 147-185
-
-
Clarke, R.V.1
Cornish, D.B.2
-
9
-
-
85044911536
-
Bounded Rationality of Identity Thieves: Using Offender‐based Research to Inform Policy
-
Copes, Heith, and Lynne M. Vieraitis. “Bounded Rationality of Identity Thieves: Using Offender‐based Research to Inform Policy.” Criminology and Public Policy 8, no. 2 (2009): 237–262. doi:10.1111/j.1745-9133.2009.00553.x.
-
(2009)
Criminology and Public Policy
, vol.8
, Issue.2
, pp. 237-262
-
-
Copes, H.1
Vieraitis, L.M.2
-
11
-
-
0023576254
-
Understanding Crime Displacement: An Application of Rational Choice Theory
-
Cornish, Derek B., and Ronald V. Clarke. “Understanding Crime Displacement: An Application of Rational Choice Theory.” Criminology 25, no. 4 (1987): 933–948. doi:10.1111/j.1745-9125.1987.tb00826.x.
-
(1987)
Criminology
, vol.25
, Issue.4
, pp. 933-948
-
-
Cornish, D.B.1
Clarke, R.V.2
-
13
-
-
84992974149
-
Passing the Buck: Risk Avoidance and Risk Management in the Illegal/Informal Drug Trade
-
Cross, John C. “Passing the Buck: Risk Avoidance and Risk Management in the Illegal/Informal Drug Trade.” International Journal of Sociology and Social Policy 20, no. 9/10 (2000): 68–94. doi:10.1108/01443330010789232.
-
(2000)
International Journal of Sociology and Social Policy
, vol.20
, Issue.9-10
, pp. 68-94
-
-
Cross, J.C.1
-
14
-
-
0012053937
-
Those Who Discourage Crime
-
Felson, Marcus. “Those Who Discourage Crime.” Crime and Place 4 (1995): 53–66.
-
(1995)
Crime and Place
, vol.4
, pp. 53-66
-
-
Felson, M.1
-
15
-
-
77949547807
-
An Inquiry into the Nature and Cause of the Wealth of Internet Miscreants
-
Paper presented at CCS07, Alexandria, VA: November 2, October
-
Franklin, Jason, Vern Paxson, Adrian Perrig, and Stefan Savage. “An Inquiry into the Nature and Cause of the Wealth of Internet Miscreants.” Paper presented at CCS07, Alexandria, VA, October29–November 2, 2007.
-
(2007)
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
17
-
-
84926524514
-
Russian Underground Revisited
-
Goncharov, Max. “Russian Underground Revisited.” Cybercriminal Underground Economy Series. Trend Micro, 2014. http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-russian-underground-revisited.pdf
-
(2014)
Cybercriminal Underground Economy Series
-
-
Goncharov, M.1
-
18
-
-
0037997806
-
The role of consumers’ trust in online-shopping
-
Grahner-Kraueter, Sonja. “The role of consumers’ trust in online-shopping.” Journal of Business Ethics 39 (2002): 43–50.
-
(2002)
Journal of Business Ethics
, vol.39
, pp. 43-50
-
-
Grahner-Kraueter, S.1
-
19
-
-
33745056767
-
The Role of Reputation Systems in Reducing On-Line Auction Fraud
-
Gregg, Dawn G., and Judy E. Scott. “The Role of Reputation Systems in Reducing On-Line Auction Fraud.” International Journal of Electronic Commerce 10 (2006): 95–120. doi:10.2753/JEC1086-4415100304.
-
(2006)
International Journal of Electronic Commerce
, vol.10
, pp. 95-120
-
-
Gregg, D.G.1
Scott, J.E.2
-
20
-
-
84870423433
-
Dealing with a Gendered Economy: Female Drug Dealers and Street Capital
-
Grundetjern, Heidi, and Sveinung Sandberg. “Dealing with a Gendered Economy: Female Drug Dealers and Street Capital.” European Journal of Criminology 9, no. 6 (2012): 621–635. doi:10.1177/1477370812453103.
-
(2012)
European Journal of Criminology
, vol.9
, Issue.6
, pp. 621-635
-
-
Grundetjern, H.1
Sandberg, S.2
-
21
-
-
33748144568
-
Drug Dealing in Open-Air Markets
-
Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services
-
Harocopos, Alex, and Mike Hough. “Drug Dealing in Open-Air Markets.” In Problem Oriented Guides for Police: Response Guide Series (31). Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services, 2005.
-
(2005)
Problem Oriented Guides for Police: Response Guide Series (31)
-
-
Harocopos, A.1
Hough, M.2
-
22
-
-
81255149250
-
Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy
-
Moore Tyler, Pym David J., Ionnidis Christos, (eds), New York: Springer
-
Herley, Cormac, Dinei Florencio. “Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy.” In Economics of Information Security and Privacy, edited by Tyler Moore, David J. Pym, and Christos Ionnidis, 35–53. New York: Springer, 2010.
-
(2010)
Economics of Information Security and Privacy
, pp. 35-53
-
-
Herley, C.1
Florencio, D.2
-
23
-
-
84926524513
-
Target, Neiman Marcus Data Breaches Tip of the Iceberg
-
January
-
Higgins, Kelly J. 2014. “Target, Neiman Marcus Data Breaches Tip of the Iceberg.” Dark Reading, January13. http://www.darkreading.com/attacks-breaches/target-neiman-marcus-data-breaches-tip-o/240165363
-
(2014)
Dark Reading
-
-
Higgins, K.J.1
-
24
-
-
84874510393
-
Examining the Forces Shaping Cybercrime Markets Online
-
Holt, Thomas J. “Examining the Forces Shaping Cybercrime Markets Online.” Social Science Computer Review 31, no. 2 (2013a): 165–177. doi:10.1177/0894439312452998.
-
(2013)
Social Science Computer Review
, vol.31
, Issue.2
, pp. 165-177
-
-
Holt, T.J.1
-
25
-
-
77958509140
-
Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-line Data
-
Holt, Thomas J. “Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-line Data.” Journal of Criminal Justice Education 21, no. 4 (2010): 466–487. doi:10.1080/10511253.2010.516565.
-
(2010)
Journal of Criminal Justice Education
, vol.21
, Issue.4
, pp. 466-487
-
-
Holt, T.J.1
-
26
-
-
84879724936
-
Exploring the Social Organisation and Structure of Stolen Data Markets
-
Holt, Thomas J. “Exploring the Social Organisation and Structure of Stolen Data Markets.” Global Crime 14, no. 2–3 (2013b): 155–174. doi:10.1080/17440572.2013.787925.
-
(2013)
Global Crime
, vol.14
, Issue.2-3
, pp. 155-174
-
-
Holt, T.J.1
-
27
-
-
84885115078
-
An Assessment of the Current State of Cybercrime Scholarship
-
Holt, Thomas J., and Adam M. Bossler. “An Assessment of the Current State of Cybercrime Scholarship.” Deviant Behavior 35, no. 1 (2014): 20–40. doi:10.1080/01639625.2013.822209.
-
(2014)
Deviant Behavior
, vol.35
, Issue.1
, pp. 20-40
-
-
Holt, T.J.1
Bossler, A.M.2
-
28
-
-
77949555353
-
Exploring Stolen Data Markets On-line: Products and Market Forces
-
Holt, Thomas J., and Eric Lampke. “Exploring Stolen Data Markets On-line: Products and Market Forces.” Criminal Justice Studies 23, no. 1 (2010): 33–50. doi:10.1080/14786011003634415.
-
(2010)
Criminal Justice Studies
, vol.23
, Issue.1
, pp. 33-50
-
-
Holt, T.J.1
Lampke, E.2
-
29
-
-
84900812458
-
An Exploration of the Factors Affecting the Advertised Price for Stolen Data
-
Holt, Thomas J., Chua Yi-Ting, and Smirnova Olga. “An Exploration of the Factors Affecting the Advertised Price for Stolen Data.” Ecrime Researchers Summit (eCRS) (2013): 1–10. doi:10.1109/eCRS.2013.6805781.
-
(2013)
Ecrime Researchers Summit (eCRS)
, pp. 1-10
-
-
Holt, T.J.1
Yi-Ting, C.2
Olga, S.3
-
30
-
-
84894283055
-
Examining Diffusion and Arrest Avoidance Practices among Johns
-
Holt, Thomas J., Kristie R. Blevins, and Joseph B. Kuhns. “Examining Diffusion and Arrest Avoidance Practices among Johns.” Crime and Delinquency 60, no. 2 (2014): 261–283. doi:10.1177/0011128709347087.
-
(2014)
Crime and Delinquency
, vol.60
, Issue.2
, pp. 261-283
-
-
Holt, T.J.1
Blevins, K.R.2
Kuhns, J.B.3
-
31
-
-
0040240444
-
Crack Dealers and Restrictive Deterrence: Identifying Narcs
-
Jacobs, Bruce A. “Crack Dealers and Restrictive Deterrence: Identifying Narcs.” Criminology 34, no. 3 (1996b): 409–431. doi:10.1111/j.1745-9125.1996.tb01213.x.
-
(1996)
Criminology
, vol.34
, Issue.3
, pp. 409-431
-
-
Jacobs, B.A.1
-
32
-
-
84993028917
-
Crack Dealers Apprehension Avoidance Techniques: A Case of Restrictive Deterrence
-
Jacobs, Bruce A. “Crack Dealers Apprehension Avoidance Techniques: A Case of Restrictive Deterrence.” Justice Quarterly 13, no. 3 (1996a): 359–381. doi:10.1080/07418829600093011.
-
(1996)
Justice Quarterly
, vol.13
, Issue.3
, pp. 359-381
-
-
Jacobs, B.A.1
-
33
-
-
77954295697
-
Deterrence and Deterrability
-
Jacobs, Bruce A. “Deterrence and Deterrability.” Criminology 48, no. 2 (2010): 417–441. doi:10.1111/j.1745-9125.2010.00191.x.
-
(2010)
Criminology
, vol.48
, Issue.2
, pp. 417-441
-
-
Jacobs, B.A.1
-
35
-
-
21144459619
-
Undercover Deception Clues: A Case of Restrictive Deterrence
-
Jacobs, Bruce A. “Undercover Deception Clues: A Case of Restrictive Deterrence.” Criminology 31, no. 2 (1993): 281–299. doi:10.1111/j.1745-9125.1993.tb01131.x.
-
(1993)
Criminology
, vol.31
, Issue.2
, pp. 281-299
-
-
Jacobs, B.A.1
-
36
-
-
0347177751
-
Managing Retaliation: Drug Robbery and Informal Sanction Threats
-
Jacobs, Bruce A., Volkan Topalli, and Richard Wright. “Managing Retaliation: Drug Robbery and Informal Sanction Threats.” Criminology 38, no. 1 (2000): 171–198. doi:10.1111/j.1745-9125.2000.tb00887.x.
-
(2000)
Criminology
, vol.38
, Issue.1
, pp. 171-198
-
-
Jacobs, B.A.1
Topalli, V.2
Wright, R.3
-
37
-
-
84879624327
-
How Victimized Drug Traders Mobilize Police
-
Jacques, Scott, and Richard Wright. “How Victimized Drug Traders Mobilize Police.” Journal of Contemporary Ethnography 42, no. 5 (2013): 545–575. doi:10.1177/0891241612472057.
-
(2013)
Journal of Contemporary Ethnography
, vol.42
, Issue.5
, pp. 545-575
-
-
Jacques, S.1
Wright, R.2
-
38
-
-
0040236270
-
Strategies to Avoid Arrest: Crack Sellers’ Response to Intensified Policing
-
Johnson, Bruce D., and Mangai Natarajan. “Strategies to Avoid Arrest: Crack Sellers’ Response to Intensified Policing.” American Journal of Police 14, no. 3/4 (1995): 49–69. doi:10.1108/07358549510111947.
-
(1995)
American Journal of Police
, vol.14
, Issue.3-4
, pp. 49-69
-
-
Johnson, B.D.1
Natarajan, M.2
-
39
-
-
0043137654
-
Deception, Detection, and Evasion: A Trade Craft Analysis of Honolulu, Hawaii’s Street Crack-Cocaine Traffickers
-
Knowles, Gordon J. “Deception, Detection, and Evasion: A Trade Craft Analysis of Honolulu, Hawaii’s Street Crack-Cocaine Traffickers.” Journal of Criminal Justice 27, no. 5 (1999): 443–455. doi:10.1016/S0047-2352(99)00015-X.
-
(1999)
Journal of Criminal Justice
, vol.27
, Issue.5
, pp. 443-455
-
-
Knowles, G.J.1
-
40
-
-
0032376197
-
Netcrime: More Change in the Organization of Thieving
-
Mann, David, and Mike Sutton. “Netcrime: More Change in the Organization of Thieving.” British Journal of Criminology 38, no. 2 (1998): 201–229. doi:10.1093/oxfordjournals.bjc.a014232.
-
(1998)
British Journal of Criminology
, vol.38
, Issue.2
, pp. 201-229
-
-
Mann, D.1
Sutton, M.2
-
41
-
-
79959953965
-
Internet Research
-
Silverman David, (ed), Thousand Oaks, CA: SAGE
-
Markham, Annette N. “Internet Research.” In Qualitative Research: Issues of Theory, Method, and Practice, edited by David Silverman, 111–127: Thousand Oaks, CA: SAGE, 2011.
-
(2011)
Qualitative Research: Issues of Theory, Method, and Practice
, pp. 111-127
-
-
Markham, A.N.1
-
42
-
-
82955190605
-
An Analysis of Underground Forums
-
Motoyama, Marti, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker. “An Analysis of Underground Forums.” IMC’11 (2011): 71–79. doi:10.1145/2068816.2068824.
-
(2011)
IMC’11
, pp. 71-79
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Savage, S.4
Voelker, G.M.5
-
43
-
-
78149334726
-
Data Breaches: What the Underground World of ‘Carding’ Reveals
-
Peretti, Kimberly K. “Data Breaches: What the Underground World of ‘Carding’ Reveals.” Santa Clara Computer and High Technology Law Journal 25 (2009): 375–413.
-
(2009)
Santa Clara Computer and High Technology Law Journal
, vol.25
, pp. 375-413
-
-
Peretti, K.K.1
-
45
-
-
24144457497
-
Stolen-goods Markets: Methods of Disposal
-
Schneider, Jacqueline L. “Stolen-goods Markets: Methods of Disposal.” British Journal of Criminology 45, no. 2 (2005): 129–140. doi:10.1093/bjc/azh100.
-
(2005)
British Journal of Criminology
, vol.45
, Issue.2
, pp. 129-140
-
-
Schneider, J.L.1
-
46
-
-
27844503291
-
Street Prostitution
-
Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice
-
Scott, Michael S., and Kelly Dedel. “Street Prostitution.” In Problem Oriented Policing Guide Series (2). Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice, 2006.
-
(2006)
Problem Oriented Policing Guide Series (2)
-
-
Scott, M.S.1
Dedel, K.2
-
47
-
-
84900831853
-
Why Did Criminals Trust Liberty Reserve
-
May
-
Surowiecki, Jason. 2013. “Why Did Criminals Trust Liberty Reserve.” The New Yorker, May31. http://www.newyorker.com/online/blogs/newsdesk/2013/05/why-did-criminals-trust-liberty-reserve.html
-
(2013)
The New Yorker
-
-
Surowiecki, J.1
-
49
-
-
0036249377
-
Drug Dealers, Robbery and Retaliation: Vulnerability, Deterrence, and the Contagion of Violence
-
Topalli, Volkan, Richard Wright, and Robert Fornango. “Drug Dealers, Robbery and Retaliation: Vulnerability, Deterrence, and the Contagion of Violence.” British Journal of Criminology 42, no. 2 (2002): 337–351. doi:10.1093/bjc/42.2.337.
-
(2002)
British Journal of Criminology
, vol.42
, Issue.2
, pp. 337-351
-
-
Topalli, V.1
Wright, R.2
Fornango, R.3
-
50
-
-
0033476905
-
The Motives and Mechanics of Operating an Illegal Drug Enterprise
-
VanNostrand, Lise-Marie, and Richard Tewksbury. “The Motives and Mechanics of Operating an Illegal Drug Enterprise.” Deviant Behavior 20, no. 1 (1999): 57–83. doi:10.1080/016396299266597.
-
(1999)
Deviant Behavior
, vol.20
, Issue.1
, pp. 57-83
-
-
VanNostrand, L.-M.1
Tewksbury, R.2
-
51
-
-
81255178753
-
The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related Services
-
Athens: IEEE, September
-
Wehinger, Frank. “The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related Services.” Intelligence and Security Informatics Conference, Athens, September12–14, 209–213. IEEE, 2011.
-
(2011)
Intelligence and Security Informatics Conference
, pp. 209-213
-
-
Wehinger, F.1
-
54
-
-
34247657469
-
The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory
-
Yar, Majid. “The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory.” European Journal of Criminology 2, no. 4 (2005): 407–427. doi:10.1177/147737080556056.
-
(2005)
European Journal of Criminology
, vol.2
, Issue.4
, pp. 407-427
-
-
Yar, M.1
|