Can Forensic Psychology Contribute to Solving the Problem of Cybercrime
暂无分享,去创建一个
[1] Brendesha M. Tynes,et al. Internet Safety Gone Wild? , 2007 .
[2] Derek J. Paulsen,et al. Connecting the dots: assessing the accuracy of geographic profiling software , 2006 .
[3] Daniel D. Langleben,et al. Detection of deception with fMRI: Are we there yet? , 2008 .
[4] E. Loftus,et al. Reconstruction of automobile destruction: An example of the interaction between language and memory , 1974 .
[5] Ronald P. Fisher,et al. Enhancement of Eyewitness Memory with the Cognitive Interview , 1986 .
[6] Robert LaRose,et al. Promoting personal responsibility for internet safety , 2008, CACM.
[7] Empirical Studies on Jury Size , 1998 .
[8] Michele Zito,et al. On the Complexity and Accuracy of Geographic Profiling Strategies , 2005 .
[9] Ann Wolbert Burgess,et al. Criminal profiling from crime scene analysis , 1986 .
[10] R. Blackburn. What is forensic psychology , 1996 .
[11] B. King,et al. Asperger's syndrome: diagnosis and treatment. , 2008, The American journal of psychiatry.
[12] Sandra Walklate,et al. Imagining the Victim of Crime , 2006 .
[13] S. Porter,et al. Reading Between the Lies , 2008, Psychological science.
[14] Holly A. Miller,et al. Perceptions of the Validity and Utility of Criminal Profiling Among Forensic Psychologists and Psychiatrists , 2006 .
[15] Ian M. Handley,et al. Self-Blame Among Sexual Assault Victims Prospectively Predicts Revictimization: A Perceived Sociolegal Context Model of Risk , 2007 .
[16] E F Loftus,et al. Semantic integration of verbal information into a visual memory. , 1978, Journal of experimental psychology. Human learning and memory.
[17] Peter Bull,et al. Detecting Deception from Emotional and Unemotional Cues , 2009 .
[18] Terry M. Gudaitis,et al. The Missing Link in Information Security: Three Dimensional Profiling , 1998, Cyberpsychology Behav. Soc. Netw..
[19] Eugene H. Spafford,et al. Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..
[20] Janis Wolak,et al. Internet prevention messages: targeting the right online behaviors. , 2007, Archives of pediatrics & adolescent medicine.
[21] Robin S. Edelstein,et al. Detecting Lies in Children and Adults , 2006, Law and human behavior.
[22] Nick Nykodym,et al. Criminal profiling and insider cyber crime , 2005, Digit. Investig..
[23] D. Sachau,et al. Secondary Traumatic Stress and Burnout among Law Enforcement Investigators Exposed to Disturbing Media Images , 2010 .
[24] Marcus K. Rogers. The role of criminal profiling in the computer forensics process , 2003, Comput. Secur..
[25] Alison Hunter. High-tech Rascality: Asperger's Syndrome, Hackers, Geeks, and Personality Types in the ICT Industry , 2009 .
[26] Megan Carney,et al. The Trojan Made Me Do It: A First Step in Statistical Based Computer Forensics Event Reconstruction , 2004, Int. J. Digit. EVid..
[27] Michael E Lamb,et al. A structured forensic interview protocol improves the quality and informativeness of investigative interviews with children: a review of research using the NICHD Investigative Interview Protocol. , 2007, Child abuse & neglect.
[28] Ameer Al-Nemrat,et al. Examination of Cyber-criminal Behaviour , 2012 .
[29] Matthew D. Smith,et al. Toulmin's philosophy of argument and its relevance to offender profiling , 2003 .
[30] Maria Papadaki,et al. Considering the potential of criminal profiling to combat hacking , 2007, Journal in Computer Virology.
[31] Seamus O. Ciardhuáin,et al. An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..
[32] A. Scarpa,et al. Community Violence Victimization and Symptoms of Posttraumatic Stress Disorder , 2006, Journal of interpersonal violence.
[33] M. Krause. Identifying and Managing Stress in Child Pornography and Child Exploitation Investigators , 2009 .
[34] R. Fisher,et al. Facilitating children's eyewitness recall with the revised cognitive interview. , 1995, The Journal of applied psychology.