Phishing and Financial Manipulation
暂无分享,去创建一个
[1] Godwin J. Udo,et al. Privacy and security concerns as major barriers for e-commerce: a survey study , 2001, Inf. Manag. Comput. Secur..
[2] Lorrie Faith Cranor,et al. Teaching Johnny not to fall for phish , 2010, TOIT.
[3] Ruth A. Triplett,et al. Capable Guardians in the Digital Environment: The Role of Digital Literacy in Reducing Phishing Victimization , 2017 .
[4] E. R. Leukfeldt,et al. Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks , 2016 .
[5] E. Rutger Leukfeldt,et al. Phishing for Suitable Targets in The Netherlands: Routine Activity Theory and Phishing Victimization , 2014, Cyberpsychology Behav. Soc. Netw..
[6] Thomas J. Holt,et al. Examining the Relationship Between Routine Activities and Malware Infection Indicators , 2013 .
[7] Shelby R. Curtis,et al. Phishing attempts among the dark triad: Patterns of attack and vulnerability , 2018, Comput. Hum. Behav..
[8] Peter Grabosky,et al. Telecommunications Fraud in the Digital Age: The Convergence of Technologies , 2001 .
[9] Christof Paar,et al. Statistics on Password Re-use and Adaptive Strength for Financial Accounts , 2014, SCN.
[10] E. Rutger Leukfeldt,et al. Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis , 2017 .
[11] Bradford W Reyns,et al. The Thief With a Thousand Faces and the Victim With None , 2016, International journal of offender therapy and comparative criminology.
[12] E. R. Leukfeldt,et al. Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime , 2017 .
[13] Brigitte Werners,et al. Phishing: An economic analysis of cybercrime perpetrators , 2016, Comput. Secur..
[14] E. R. Leukfeldt,et al. Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis , 2016 .
[15] T. Holt,et al. Exploring stolen data markets online: products and market forces , 2010 .
[16] Peter Grabosky,et al. Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime , 2014 .
[17] Aaron Smith and Monica Anderson,et al. Online Shopping and E-Commerce , 2016 .
[18] Elmer Lastdrager,et al. Achieving a consensual definition of phishing based on a systematic review of the literature , 2014, Crime Science.
[19] Fawn T. Ngo,et al. Cybercrime Victimization: An Examination of Individual and Situational Level Factors , 2011 .
[20] Michael D. Reisig,et al. Perceived Risk of Internet Theft Victimization , 2009 .
[21] Arun Vishwanath,et al. Mobile device affordance: Explicating how smartphones influence the outcome of phishing attacks , 2016, Comput. Hum. Behav..
[22] Andrea Back,et al. The dark side of social networking sites: Understanding phishing risks , 2016, Comput. Hum. Behav..
[23] J. V. Wilsem,et al. Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization , 2011 .
[24] Steve Love,et al. Security awareness of computer users: A phishing threat avoidance perspective , 2014, Comput. Hum. Behav..
[25] Mahesh K. Nalla,et al. The relationship between receiving phishing attempt and identity theft victimization in South Korea , 2015 .
[26] T. Holt,et al. The Effect of Self-Control on Victimization in the Cyberworld , 2010 .
[27] T. Holt,et al. Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .
[28] P. Grabosky. Virtual Criminality: Old Wine in New Bottles? , 2001 .
[29] T. Holt. Cybercrime and Digital Forensics , 2015 .
[30] Andy Gill,et al. Above and below: measuring crime risk in and around underground mass transit systems , 2014 .
[31] Robert E. Holtfreter,et al. Risky remote purchasing and identity theft victimization among older Internet users , 2015 .
[32] T. Holt. Examining the Forces Shaping Cybercrime Markets Online , 2013 .
[33] Alex Kigerl,et al. Routine Activity Theory and the Determinants of High Cybercrime Countries , 2012 .
[34] T. Holt,et al. An Assessment of the Current State of Cybercrime Scholarship , 2014 .
[35] Bradford W Reyns,et al. Online Routines and Identity Theft Victimization , 2013 .
[36] Thomas J. Holt,et al. On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory , 2009 .
[37] D. Wall. Catching Cybercriminals: Policing the Internet , 1998 .
[38] Ronald V. Clarke,et al. Superhighway Robbery: Preventing E-commerce Crime , 2003 .
[39] Michel Walrave,et al. You've got mail! Explaining individual differences in becoming a phishing target , 2018, Telematics Informatics.
[40] R. Leukfeldt,et al. Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization , 2016 .
[41] Kim-Kwang Raymond Choo,et al. Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .
[42] Angelos D. Keromytis,et al. A market-based bandwidth charging framework , 2010, TOIT.
[43] David S. Wall,et al. Crime and the Internet , 2001 .
[44] Kathryn C. Seigfried-Spellar,et al. Cybercrime and Digital Forensics: An Introduction , 2015 .
[45] R. Sharma,et al. An Empirical Analysis of Unsolicited Commercial E-mail , 2014 .
[46] Markus Jakobsson,et al. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , 2006 .
[47] Shijie Zhou. A Survey on Fast-flux Attacks , 2015, Inf. Secur. J. A Glob. Perspect..
[48] Choon Lin Tan,et al. A survey of phishing attacks: Their types, vectors and technical approaches , 2018, Expert Syst. Appl..
[49] Pieter H. Hartel,et al. Spear phishing in organisations explained , 2017, Inf. Comput. Secur..
[50] J. V. Wilsem,et al. Hacking and Harassment—Do They Have Something in Common? Comparing Risk Factors for Online Victimization , 2013 .
[51] Michael R. Gottfredson,et al. A general theory of crime. , 1992 .
[52] Mark Manulis,et al. Security and Privacy in Online Social Networks , 2010, Handbook of Social Network Technologies.
[53] Johan van Wilsem. Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization , 2011 .
[54] Kim-Kwang Raymond Choo,et al. The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..
[55] Jason R. C. Nurse,et al. Baiting the hook: factors impacting susceptibility to phishing attacks , 2016, Human-centric Computing and Information Sciences.
[56] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[57] Michael G. Turner,et al. Examining Risks and Protective Factors of On-Line Identity Theft , 2012 .
[58] Bernhard Debatin,et al. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..
[59] M. Williams,et al. GUARDIANS UPON HIGH: AN APPLICATION OF ROUTINE ACTIVITIES THEORY TO ONLINE IDENTITY THEFT IN EUROPE AT THE COUNTRY AND INDIVIDUAL LEVEL , 2016 .
[60] Michael D. Reisig,et al. Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .