What’s your real age? an empirical analysis of identity fraud in online game
暂无分享,去创建一个
[1] Ali Mili,et al. Defining and computing a value based cyber-security measure , 2011 .
[2] Brad McKenna,et al. Issues In The Study Of Virtual World Social Movements , 2011, PACIS.
[3] R. Lazarus. Coping theory and research: past, present, and future. , 1993, Psychosomatic medicine.
[4] R. Kozinets. Netnography: Doing Ethnographic Research Online , 2009 .
[5] Atsushi Fujita,et al. Exploiting MMORPG log data toward efficient RMT player detection , 2010, Advances in Computer Entertainment Technology.
[6] Jakob J. Assmann,et al. MMOGs as Emerging Opportunities for Research on Virtual Organizations and Teams , 2010, AMCIS.
[7] Edward Castronova,et al. Exodus to the Virtual World: How Online Fun Is Changing Reality , 2007 .
[8] Callie Marie Rennison,et al. National Crime Victimization Survey (NCVS) , 2014 .
[9] Woodrow Barfield,et al. Intellectual Property Rights in Virtual Environments: Considering the Rights of Owners, Programmers and Virtual Avatars , 2006 .
[10] Bert-Jaap Koops,et al. Identity theft, identity fraud and/or identity-related crime , 2006, Datenschutz und Datensicherheit - DuD.
[11] Hao Wang,et al. Measuring and ranking attacks based on vulnerability analysis , 2012, Inf. Syst. E Bus. Manag..
[12] Christophe Roquilly,et al. Control Over Virtual Worlds by Game Companies: Issues and Recommendations , 2011, MIS Q..
[13] Mark W. Bell. Toward a Definition of “Virtual Worlds” , 1970 .
[14] Dahui Li,et al. Fighting identity theft: The coping perspective , 2012, Decis. Support Syst..
[15] Venkatesh Shankar,et al. Network Effects and Competition: An Empirical Analysis of the Home Video Game Industry , 2002 .
[16] Dustin Burke,et al. Behavioral analysis of botnets for threat intelligence , 2011, Information Systems and e-Business Management.
[17] Oz Shy. The Economics of Network Industries , 2001 .
[18] Joseph Farrell,et al. Standardization, Compatibility, and Innovation , 1985 .
[19] Brad McKenna,et al. Social Movements in World of Warcraft , 2011, AMCIS.
[20] C. Shapiro,et al. Network Externalities, Competition, and Compatibility , 1985 .
[21] Wen-Zhan Song,et al. Management and security of remote sensor networks in hazardous environments using over the air programming , 2012, Inf. Syst. E Bus. Manag..
[22] Howard Rheingold,et al. The Virtual Community: Homesteading on the Electronic Frontier , 2000 .