Phishing and Financial Manipulation

[1]  Godwin J. Udo,et al.  Privacy and security concerns as major barriers for e-commerce: a survey study , 2001, Inf. Manag. Comput. Secur..

[2]  Lorrie Faith Cranor,et al.  Teaching Johnny not to fall for phish , 2010, TOIT.

[3]  Ruth A. Triplett,et al.  Capable Guardians in the Digital Environment: The Role of Digital Literacy in Reducing Phishing Victimization , 2017 .

[4]  E. R. Leukfeldt,et al.  Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks , 2016 .

[5]  E. Rutger Leukfeldt,et al.  Phishing for Suitable Targets in The Netherlands: Routine Activity Theory and Phishing Victimization , 2014, Cyberpsychology Behav. Soc. Netw..

[6]  Thomas J. Holt,et al.  Examining the Relationship Between Routine Activities and Malware Infection Indicators , 2013 .

[7]  Shelby R. Curtis,et al.  Phishing attempts among the dark triad: Patterns of attack and vulnerability , 2018, Comput. Hum. Behav..

[8]  Peter Grabosky,et al.  Telecommunications Fraud in the Digital Age: The Convergence of Technologies , 2001 .

[9]  Christof Paar,et al.  Statistics on Password Re-use and Adaptive Strength for Financial Accounts , 2014, SCN.

[10]  E. Rutger Leukfeldt,et al.  Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis , 2017 .

[11]  Bradford W Reyns,et al.  The Thief With a Thousand Faces and the Victim With None , 2016, International journal of offender therapy and comparative criminology.

[12]  E. R. Leukfeldt,et al.  Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime , 2017 .

[13]  Brigitte Werners,et al.  Phishing: An economic analysis of cybercrime perpetrators , 2016, Comput. Secur..

[14]  E. R. Leukfeldt,et al.  Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis , 2016 .

[15]  T. Holt,et al.  Exploring stolen data markets online: products and market forces , 2010 .

[16]  Peter Grabosky,et al.  Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime , 2014 .

[17]  Aaron Smith and Monica Anderson,et al.  Online Shopping and E-Commerce , 2016 .

[18]  Elmer Lastdrager,et al.  Achieving a consensual definition of phishing based on a systematic review of the literature , 2014, Crime Science.

[19]  Fawn T. Ngo,et al.  Cybercrime Victimization: An Examination of Individual and Situational Level Factors , 2011 .

[20]  Michael D. Reisig,et al.  Perceived Risk of Internet Theft Victimization , 2009 .

[21]  Arun Vishwanath,et al.  Mobile device affordance: Explicating how smartphones influence the outcome of phishing attacks , 2016, Comput. Hum. Behav..

[22]  Andrea Back,et al.  The dark side of social networking sites: Understanding phishing risks , 2016, Comput. Hum. Behav..

[23]  J. V. Wilsem,et al.  Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization , 2011 .

[24]  Steve Love,et al.  Security awareness of computer users: A phishing threat avoidance perspective , 2014, Comput. Hum. Behav..

[25]  Mahesh K. Nalla,et al.  The relationship between receiving phishing attempt and identity theft victimization in South Korea , 2015 .

[26]  T. Holt,et al.  The Effect of Self-Control on Victimization in the Cyberworld , 2010 .

[27]  T. Holt,et al.  Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .

[28]  P. Grabosky Virtual Criminality: Old Wine in New Bottles? , 2001 .

[29]  T. Holt Cybercrime and Digital Forensics , 2015 .

[30]  Andy Gill,et al.  Above and below: measuring crime risk in and around underground mass transit systems , 2014 .

[31]  Robert E. Holtfreter,et al.  Risky remote purchasing and identity theft victimization among older Internet users , 2015 .

[32]  T. Holt Examining the Forces Shaping Cybercrime Markets Online , 2013 .

[33]  Alex Kigerl,et al.  Routine Activity Theory and the Determinants of High Cybercrime Countries , 2012 .

[34]  T. Holt,et al.  An Assessment of the Current State of Cybercrime Scholarship , 2014 .

[35]  Bradford W Reyns,et al.  Online Routines and Identity Theft Victimization , 2013 .

[36]  Thomas J. Holt,et al.  On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory , 2009 .

[37]  D. Wall Catching Cybercriminals: Policing the Internet , 1998 .

[38]  Ronald V. Clarke,et al.  Superhighway Robbery: Preventing E-commerce Crime , 2003 .

[39]  Michel Walrave,et al.  You've got mail! Explaining individual differences in becoming a phishing target , 2018, Telematics Informatics.

[40]  R. Leukfeldt,et al.  Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization , 2016 .

[41]  Kim-Kwang Raymond Choo,et al.  Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .

[42]  Angelos D. Keromytis,et al.  A market-based bandwidth charging framework , 2010, TOIT.

[43]  David S. Wall,et al.  Crime and the Internet , 2001 .

[44]  Kathryn C. Seigfried-Spellar,et al.  Cybercrime and Digital Forensics: An Introduction , 2015 .

[45]  R. Sharma,et al.  An Empirical Analysis of Unsolicited Commercial E-mail , 2014 .

[46]  Markus Jakobsson,et al.  Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , 2006 .

[47]  Shijie Zhou A Survey on Fast-flux Attacks , 2015, Inf. Secur. J. A Glob. Perspect..

[48]  Choon Lin Tan,et al.  A survey of phishing attacks: Their types, vectors and technical approaches , 2018, Expert Syst. Appl..

[49]  Pieter H. Hartel,et al.  Spear phishing in organisations explained , 2017, Inf. Comput. Secur..

[50]  J. V. Wilsem,et al.  Hacking and Harassment—Do They Have Something in Common? Comparing Risk Factors for Online Victimization , 2013 .

[51]  Michael R. Gottfredson,et al.  A general theory of crime. , 1992 .

[52]  Mark Manulis,et al.  Security and Privacy in Online Social Networks , 2010, Handbook of Social Network Technologies.

[53]  Johan van Wilsem Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization , 2011 .

[54]  Kim-Kwang Raymond Choo,et al.  The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..

[55]  Jason R. C. Nurse,et al.  Baiting the hook: factors impacting susceptibility to phishing attacks , 2016, Human-centric Computing and Information Sciences.

[56]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[57]  Michael G. Turner,et al.  Examining Risks and Protective Factors of On-Line Identity Theft , 2012 .

[58]  Bernhard Debatin,et al.  Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..

[59]  M. Williams,et al.  GUARDIANS UPON HIGH: AN APPLICATION OF ROUTINE ACTIVITIES THEORY TO ONLINE IDENTITY THEFT IN EUROPE AT THE COUNTRY AND INDIVIDUAL LEVEL , 2016 .

[60]  Michael D. Reisig,et al.  Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .