Taking down websites to prevent crime
暂无分享,去创建一个
Ross J. Anderson | Richard Clayton | Alice Hutchings | Ross J. Anderson | R. Clayton | Alice Hutchings
[1] R. Clarke. Situational Crime Prevention: Its Theoretical Basis and Practical Scope , 1983 .
[2] Alice Hutchings,et al. Scripting the crime commission process in the illicit online prescription drug trade , 2015, J. Cybersecur..
[3] R. Clarke,et al. UNDERSTANDING CRIME DISPLACEMENT: AN APPLICATION OF RATIONAL CHOICE THEORY , 1987 .
[4] Tyler Moore,et al. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade , 2011, USENIX Security Symposium.
[5] J. Aldridge,et al. Not an 'Ebay for Drugs': The Cryptomarket 'Silk Road' as a Paradigm Shifting Criminal Innovation , 2014 .
[6] Tyler Moore,et al. Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup , 2015, WEIS.
[7] Peter Grabosky. Secrecy, Transparency and Legitimacy , 2014 .
[8] T. Tyler. Enhancing Police Legitimacy , 2004 .
[9] Graham R. Gibbs,et al. Analyzing Biographies and Narratives , 2014 .
[10] Tyler Moore,et al. The Impact of Incentives on Notice and Take-down , 2008, WEIS.
[11] Gabriella Coleman. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous , 2014 .
[12] Emily B. Laidlaw. The responsibilities of free speech regulators: an analysis of the Internet Watch Foundation , 2012, Int. J. Law Inf. Technol..
[13] Misha Glenny,et al. DarkMarket: Cyberthieves, Cybercops and You , 2011 .
[14] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[15] Tom R. Tyler,et al. The Role of Procedural Justice and Legitimacy in Shaping Public Support for Policing , 2003 .
[16] Tyler Moore,et al. Examining the impact of website take-down on phishing , 2007, eCrime '07.
[17] Graham R. Gibbs,et al. Analyzing Qualitative Data , 2014 .
[18] Tyler Moore,et al. Ethical Dilemmas in Take-Down Research , 2011, Financial Cryptography Workshops.
[19] Paul Francis,et al. A study of prefix hijacking and interception in the internet , 2007, SIGCOMM 2007.
[20] Kathryn Kopel,et al. Operation Seizing Our Sites: How the Federal Government Is Taking Domain Names Without Prior Notice , 2013 .
[21] T. Holt,et al. A Crime Script Analysis of the Online Stolen Data Market , 2015 .
[22] Russell G. Smith. TRENDS & ISSUES in crime and criminal justice , 2006 .
[23] B. Berg. Qualitative Research Methods for the Social Sciences , 1989 .
[24] Tyler Moore,et al. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing , 2009, Financial Cryptography.
[25] Danny Bradbury. Testing the defences of bulletproof hosting companies , 2014, Netw. Secur..