-
1
-
-
84976535517
-
-
ACC (Australian Crime Commission) accessed 2 July 2012
-
ACC (Australian Crime Commission). (2011) Crime profile series of the Australian Crime Commission: Card fraud. http://www.crimecommission.gov.au/sites/default/files/files/FACT%20SHEETS%20JULY%202013/CARD%20FRAUD%20JULY%202013.pdf, accessed 2 July 2012
-
(2011)
Crime Profile Series of the Australian Crime Commission: Card Fraud
-
-
-
2
-
-
84876241517
-
An analysis of Google Translate accuracy
-
accessed 6 November 2013
-
Aiken, M. and Balan, S. (2011) An analysis of Google Translate accuracy. Translation Journal 16(2), http://www .bokorlang.com/Journal/56google.htm, accessed 6 November 2013
-
(2011)
Translation Journal
, vol.16
, pp. 2
-
-
Aiken, M.1
Balan, S.2
-
3
-
-
78651546998
-
Automatic translation in multilingual electronic meetings
-
accessed 6 November 2013
-
Aiken, M., Park, M., Simmons, L. and Lindblom, T. (2009) Automatic translation in multilingual electronic meetings. Translation Journal 13(3), http://www.bokorlang.com/Journal/49meeting.htm, accessed 6 November 2013
-
(2009)
Translation Journal
, vol.13
, pp. 3
-
-
Aiken, M.1
Park, M.2
Simmons, L.3
Lindblom, T.4
-
4
-
-
84899310157
-
Deciphering the hacker underground: First quantitative insights
-
T.J. Holt and B.H. Schell (eds. Hershey PA: Information Science Reference
-
Bachmann, M. (2010) Deciphering the hacker underground: First quantitative insights. In: T.J. Holt and B.H. Schell (eds.) Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. Hershey, PA: Information Science Reference
-
(2010)
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
-
-
Bachmann, M.1
-
6
-
-
35448965701
-
Personal relationships: On and off the internet
-
A.L. Vangelisti and D. Perlman (eds. Cambridge, UK: Cambridge University Press
-
Boase, J. and Wellman, B. (2006) Personal relationships: On and off the internet. In: A.L. Vangelisti and D. Perlman (eds.) The Cambridge Handbook of Personal Relationships. Cambridge, UK: Cambridge University Press
-
(2006)
The Cambridge Handbook of Personal Relationships
-
-
Boase, J.1
Wellman, B.2
-
7
-
-
84936824655
-
Power and centrality: A family of measures
-
Bonacich, P. (1987) Power and centrality: A family of measures. The American Journal of Sociology 92(5): 1170-1182
-
(1987)
The American Journal of Sociology
, vol.92
, Issue.5
, pp. 1170-1182
-
-
Bonacich, P.1
-
9
-
-
74349088317
-
Is it who you know, or how many that counts? Criminal networks and cost avoidance in a sample of young offenders
-
Bouchard, M. and Nguyen, H. (2009) Is it who you know, or how many that counts?. Criminal networks and cost avoidance in a sample of young offenders. Justice Quarterly 27(1): 130-158
-
(2009)
Justice Quarterly
, vol.27
, Issue.1
, pp. 130-158
-
-
Bouchard, M.1
Nguyen, H.2
-
10
-
-
80053402398
-
Fast, cheap, and creative: Evaluating translation quality using Amazon's Mechanical Turk
-
Callison-Burch, C. (2009) Fast, cheap, and creative: Evaluating translation quality using Amazon's Mechanical Turk. Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing, Singapore, Malaysia
-
(2009)
Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing, Singapore, Malaysia
-
-
Callison-Burch, C.1
-
11
-
-
80051780487
-
-
Masters Thesis at the School of Criminology University of Montreal
-
Charest, M. (2007) Classe sociale et réussite criminelle. Masters thesis at the School of Criminology, University of Montreal
-
(2007)
Classe Sociale et Réussite Criminelle
-
-
Charest, M.1
-
13
-
-
0038830409
-
The procedural analysis of offending and its relevance for situational prevention
-
R.V. Clarke (ed. New York: Criminal Justice Press
-
Cornish, D. (1994) The procedural analysis of offending and its relevance for situational prevention. In: R.V. Clarke (ed.) Crime Prevention Studies. Vol. 3. New York: Criminal Justice Press
-
(1994)
Crime Prevention Studies
, vol.3
-
-
Cornish, D.1
-
14
-
-
84864302109
-
Welcome to the scene: A study of social organization and recognition among warez hackers
-
Décary-Hétu, D., Morselli, C. and Leman-Langlois, S. (2012) Welcome to the scene: A study of social organization and recognition among warez hackers. Journal of Research in Crime & Delinquency 49(3): 359-382
-
(2012)
Journal of Research in Crime & Delinquency
, vol.49
, Issue.3
, pp. 359-382
-
-
Décary-Hétu, D.1
Morselli, C.2
Leman-Langlois, S.3
-
15
-
-
84913586397
-
Nouvelles technologies et crime désorganisé: Incursion au coeur d'un réseau de pirates informatiques
-
Dupont, B. (2013) Nouvelles technologies et crime désorganisé: Incursion au coeur d'un réseau de pirates informatiques. Sécurité & Stratégie 11: 25-37
-
(2013)
Sécurité & Stratégie
, vol.11
, pp. 25-37
-
-
Dupont, B.1
-
16
-
-
84891435192
-
Economic consequences
-
S. Ghosh and E. Turrini (eds. Berlin, Germany Springer
-
Erbschloe, M. (2010) Economic consequences. In: S. Ghosh and E. Turrini (eds.) Cybercrimes: A Multidisciplinary Analysis. Berlin, Germany: Springer
-
(2010)
Cybercrimes: A Multidisciplinary Analysis
-
-
Erbschloe, M.1
-
17
-
-
84963781872
-
Covertly probing underground economy marketplaces
-
Bonn, Germany
-
Fallmann, H., Wondracek, G. and Platzer, C. (2010) Covertly probing underground economy marketplaces. Proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Bonn, Germany
-
(2010)
Proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
-
-
Fallmann, H.1
Wondracek, G.2
Platzer, C.3
-
21
-
-
21244490135
-
Statistical machine translation gains respect
-
Geer, D. (2005) Statistical machine translation gains respect. Computer 38(10): 18-21
-
(2005)
Computer
, vol.38
, Issue.10
, pp. 18-21
-
-
Geer, D.1
-
22
-
-
84976560893
-
-
Google accessed 18 June 2013
-
Google. (2013) About Google Translate. https://support.google.com/translate/#2534605, accessed 18 June 2013
-
(2013)
About Google Translate
-
-
-
25
-
-
84879724936
-
Exploring the social organisation and structure of stolen data markets
-
Holt, T.J. (2012) Exploring the social organisation and structure of stolen data markets. Global Crime 14(2-3): 155-174
-
(2012)
Global Crime
, vol.14
, Issue.2-3
, pp. 155-174
-
-
Holt, T.J.1
-
27
-
-
77949555353
-
Exploring stolen data markets online: Products and market forces
-
Holt, T.J. and Lampke, E. (2010) Exploring stolen data markets online: Products and market forces. Criminal Justice Studies 23(1): 33-50
-
(2010)
Criminal Justice Studies
, vol.23
, Issue.1
, pp. 33-50
-
-
Holt, T.J.1
Lampke, E.2
-
28
-
-
55649120692
-
Examining the displacement practices of johns with on-line data
-
Holt, T.J., Blevins, K.R. and Kuhns, J.B. (2008) Examining the displacement practices of johns with on-line data. Journal of Criminal Justice 36(6): 522-528
-
(2008)
Journal of Criminal Justice
, vol.36
, Issue.6
, pp. 522-528
-
-
Holt, T.J.1
Blevins, K.R.2
Kuhns, J.B.3
-
30
-
-
84867688873
-
Examining the social networks of malware writers and hackers
-
Holt, T.J., Strumsky, D., Smirnova, O. and Kilger, M. (2012) Examining the social networks of malware writers and hackers. International Journal of Cyber Criminology 6(1): 891-903
-
(2012)
International Journal of Cyber Criminology
, vol.6
, Issue.1
, pp. 891-903
-
-
Holt, T.J.1
Strumsky, D.2
Smirnova, O.3
Kilger, M.4
-
31
-
-
44649164693
-
Comparative evaluation of online machine translation systems with legal texts
-
Kit, C. and Wong, T.M. (2008) Comparative evaluation of online machine translation systems with legal texts. Law Library Journal 100(2): 299-321
-
(2008)
Law Library Journal
, vol.100
, Issue.2
, pp. 299-321
-
-
Kit, C.1
Wong, T.M.2
-
34
-
-
84976570511
-
-
accessed 2 July 2012
-
Meijerink, T.J. (2013) Carding: Crime prevention analysis. http://essay.utwente.nl/63027/1/Understanding-processes-of-carding-versie-7-31-1-word.pdf, accessed 2 July 2012
-
(2013)
Carding: Crime Prevention Analysis
-
-
Meijerink, T.J.1
-
35
-
-
0035529695
-
When crime pays: Capital, competence, and criminal success
-
McCarthy, B. and Hagan, J. (2001) When crime pays: Capital, competence, and criminal success. Social Forces 79(3): 1035-1059
-
(2001)
Social Forces
, vol.79
, Issue.3
, pp. 1035-1059
-
-
McCarthy, B.1
Hagan, J.2
-
36
-
-
84879786972
-
-
Thesis in Sociology and Social Research Universiteit Utrecht
-
Monsma, E., Buskens, V., Soudijn, M. and Nieuwbeerta, P. (2010) Partners in cybercrime. an online cybercrime forum evaluated from a social network perspective. Thesis in Sociology and Social Research, Universiteit Utrecht
-
(2010)
Partners in Cybercrime. An Online Cybercrime Forum Evaluated from A Social Network Perspective
-
-
Monsma, E.1
Buskens, V.2
Soudijn, M.3
Nieuwbeerta, P.4
-
38
-
-
5644294738
-
Criminal achievement, offender networks, and the benefits of low self-control
-
Morselli, C. and Tremblay, P. (2004) Criminal achievement, offender networks, and the benefits of low self-control. Criminology 42(3): 773-804
-
(2004)
Criminology
, vol.42
, Issue.3
, pp. 773-804
-
-
Morselli, C.1
Tremblay, P.2
-
39
-
-
33645081699
-
Mentors and criminal achievement
-
Morselli, C., Tremblay, P. and McCarthy, B. (2006) Mentors and criminal achievement. Criminology 44(1): 17-43
-
(2006)
Criminology
, vol.44
, Issue.1
, pp. 17-43
-
-
Morselli, C.1
Tremblay, P.2
McCarthy, B.3
-
40
-
-
82955190605
-
An analysis of underground forums
-
Berlin Germany
-
Motoyama, M., McCoy, D., Levchenko, K., Savage, S. and Voelker, G.M. (2011) An analysis of underground forums. Proceedings of the Conference on Internet Measurement Conference. Berlin, Germany
-
(2011)
Proceedings of the Conference on Internet Measurement Conference
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Savage, S.4
Voelker, G.M.5
-
41
-
-
84871222575
-
Need, connections, or competence? Criminal achievement among adolescent offenders
-
Nguyen, H. and Bouchard, M. (2011) Need, connections, or competence?. Criminal achievement among adolescent offenders. Justice Quarterly 30(1): 44-83
-
(2011)
Justice Quarterly
, vol.30
, Issue.1
, pp. 44-83
-
-
Nguyen, H.1
Bouchard, M.2
-
42
-
-
78149334726
-
Data breaches: What the underground world of 'carding' reveals
-
Peretti, K.K. (2008) Data breaches: What the underground world of 'carding' reveals. Santa Clara Computer & High Tech Law Journal 25(2): 375-413
-
(2008)
Santa Clara Computer & High Tech Law Journal
, vol.25
, Issue.2
, pp. 375-413
-
-
Peretti, K.K.1
-
44
-
-
84928887092
-
Building our defence against credit card fraud: A strategic view
-
Prabowo, H.Y. (2011) Building our defence against credit card fraud: A strategic view. Journal of Money Laundering Control 14(4): 371-386
-
(2011)
Journal of Money Laundering Control
, vol.14
, Issue.4
, pp. 371-386
-
-
Prabowo, H.Y.1
-
45
-
-
85080711655
-
The ghost in the browser: Analysis of web-based malware
-
Berkeley USA
-
Provos, N., McNamee, D., Mavrimmatis, P., Wang, K. and Modadugu, N. (2007) The ghost in the browser: Analysis of web-based malware. Proceedings of the First Conference on Hot Topics in Understanding Botnets. Berkeley, USA
-
(2007)
Proceedings of the First Conference on Hot Topics in Understanding Botnets
-
-
Provos, N.1
McNamee, D.2
Mavrimmatis, P.3
Wang, K.4
Modadugu, N.5
-
46
-
-
84976554335
-
Book review of diego gambetta: Codes of the underworld: How criminals communicate. Rationality
-
Przepiorka, W. (2010) Book review of diego gambetta: Codes of the underworld: How criminals communicate. Rationality, Markets and Morals Journal 1: 9-11
-
(2010)
Markets and Morals Journal
, vol.1
, pp. 9-11
-
-
Przepiorka, W.1
-
47
-
-
0000952826
-
Premiums for high quality products as returns to reputations
-
Shapiro, C. (1983) Premiums for high quality products as returns to reputations. The Quarterly Journal of Economics 98(4): 659-680
-
(1983)
The Quarterly Journal of Economics
, vol.98
, Issue.4
, pp. 659-680
-
-
Shapiro, C.1
-
48
-
-
84888064808
-
Power in politically charged networks
-
available online 10 June
-
Smith, J.M., Halgin, D.S., Kidwell-Lopez, V., Labianca, G., Brass, D.J. and Borgatti, S.P. (2013) Power in politically charged networks. Social Networks, available online 10 June, doi: 10.1016/j.socnet.2013.04.007
-
(2013)
Social Networks
-
-
Smith, J.M.1
Halgin, D.S.2
Kidwell-Lopez, V.3
Labianca, G.4
Brass, D.J.5
Borgatti, S.P.6
-
50
-
-
70350423437
-
The underground economy: Priceless
-
Thomas, R. and Martin, J. (2006) The underground economy: Priceless. USENIX: Login 31(6): 7-16
-
(2006)
USENIX: Login
, vol.31
, Issue.6
, pp. 7-16
-
-
Thomas, R.1
Martin, J.2
-
52
-
-
84969491355
-
-
UK Cards Association accessed 2 July 2012
-
UK Cards Association. (2012) Annual report 2012. http://www.buzzwordcreative.co.uk/UK-Cards-Annual-Report-2012/html/index.html, accessed 2 July 2012
-
(2012)
Annual Report 2012
-
-
-
53
-
-
77952903083
-
-
Verizon 2010 accessed 2 July 2012
-
Verizon. (2010) 2010 Data breach investigations report. http://www.verizonbusiness.com/resources/reports/ rp-2010-data-breach-report-en-xg.pdf, accessed 2 July 2012
-
(2010)
Data Breach Investigations Report
-
-
-
54
-
-
84869141956
-
-
Verizon 2011 accessed 2 July 2012
-
Verizon. (2011) 2011 Data breach investigations report. http://www.verizonbusiness.com/resources/reports/rp-databreach-investigations-report-2011-en-xg.pdf, accessed 2 July 2012
-
(2011)
Data Breach Investigations Report
-
-
-
57
-
-
84976565157
-
-
Chengdu China
-
Yang, C.C., Ng, T.D., Wang, J., Wei, C. and Chen, H. (2007) Analyzing and Visualizing Gray Web Forum Structure. Proceedings of Pacific-Asia Workshop on Intelligence and Security Informatics. Chengdu, China
-
(2007)
Analyzing and Visualizing Gray Web Forum Structure. Proceedings of Pacific-Asia Workshop on Intelligence and Security Informatics
-
-
Yang, C.C.1
Ng, T.D.2
Wang, J.3
Wei, C.4
Chen, H.5
-
58
-
-
77954521285
-
Studying malicious websites and the underground economy on the Chinese web
-
M.E. Johnson (ed. New York Springer
-
Zhuge, J., Holz, T., Song, C., Guo, J., Han, X. and Zou, W. (2009) Studying malicious websites and the underground economy on the Chinese web. In: M.E. Johnson (ed.) Managing Information Risk and the Economics of Security. New York: Springer
-
(2009)
Managing Information Risk and the Economics of Security
-
-
Zhuge, J.1
Holz, T.2
Song, C.3
Guo, J.4
Han, X.5
Zou, W.6
|