Future directions in technology-enabled crime: 2007-09
暂无分享,去创建一个
[1] A. Cohen,et al. Crime and Criminal Justice , 1941 .
[2] A. Bandura. Social cognitive theory of personality. , 1999 .
[3] S. Rennie. 21st Century Technologies: Promises and Perils of a Dynamic Future; OECD Forum for the Future , 2000 .
[4] Tadayoshi Kohno,et al. Trust (and mistrust) in secure applications , 2001, CACM.
[5] Robert Deyoung,et al. The Internet's place in the banking industry , 2001 .
[6] Richard Silberglitt,et al. The Global Technology Revolution 2020, In-Depth Analyses: Bio/Nano/Materials/Information Trends, Drivers, Barriers, and Social Implications , 2002 .
[7] Ronggong Song,et al. Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan , 2004, PST.
[8] Evangelos A. Kiountouzis,et al. The insider threat to information systems and the effectiveness of ISO17799 , 2005, Comput. Secur..
[9] A Letter from the Council of Europe: Cybercrime and Organised Crime , 2005 .
[10] Janis Wolak,et al. Police Posing as Juveniles Online to Catch Sex Offenders: Is It Working? , 2005, Sexual abuse : a journal of research and treatment.
[11] Mosad Zineldin,et al. European Business Review , 2006 .
[12] Zhendong Su,et al. Temporal search: detecting hidden malware timebombs with virtual machines , 2006, ASPLOS XII.
[13] Richard Walton,et al. Balancing the insider and outsider threat , 2006 .
[14] George Lawton. Working Today on Tomorrow's Storage Technology , 2006, Computer.
[15] Edward W. Felten,et al. Lessons from the Sony CD DRM Episode , 2006, USENIX Security Symposium.
[16] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[17] Nick Yee,et al. The Demographics, Motivations, and Derived Experiences of Users of Massively Multi-User Online Graphical Environments , 2006, PRESENCE: Teleoperators and Virtual Environments.
[18] Markus Jakobsson,et al. Invasive browser sniffing and countermeasures , 2006, WWW '06.
[19] Roderic Broadhurst,et al. Developments in the global law enforcement of cyber‐crime , 2006 .
[20] Gabriela Kennedy,et al. Outsourcing to China - Risks and benefits , 2006, Comput. Law Secur. Rev..
[21] Randall F. Trzeciak,et al. Common Sense Guide to Prevention and Detection of Insider Threats , 2006 .
[22] Barry Blundell,et al. Google Desktop as a Source of Digital Evidence , 2006, Int. J. Digit. EVid..
[23] Deli Yang. The Impact of Business Environments on Software Piracy , 2007 .
[24] Jennifer Jie Xu,et al. Mining communities and their relationships in blogs: A study of online hate groups , 2007, Int. J. Hum. Comput. Stud..
[25] Kevin Fu,et al. Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.
[26] Russell G. Smith,et al. Consumer Scams in Australia: An Overview , 2007 .
[27] Anny Wong,et al. The global technology revolution China, in-depth analyses : emerging technology opportunities for the Tianjin Binhai new area (TBNA) and the Tianjin economic-technological development area (TEDA) , 2009 .