Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks
暂无分享,去创建一个
[1] A family business , 1972 .
[2] Damián Zaitch,et al. The social embeddedness of organized crime , 2014 .
[3] Edward R. Kleemans,et al. Organized Crime, Transit Crime, and Racketeering , 2007, Crime and Justice.
[4] H. Bunt,et al. Georganiseerde criminaliteit in Nederland. Derde rapportage op basis van de Monitor Georganiseerde Criminaliteit. , 2007 .
[5] D. Wall. Cybercrime: The Transformation of Crime in the Information Age , 2007 .
[6] Kim-Kwang Raymond Choo. Organised crime groups in cyberspace: a typology , 2008 .
[7] Edward R. Kleemans,et al. Criminal Careers in Organized Crime and Social Opportunity Structure , 2008 .
[8] M. Levi,et al. Researching the organization of serious crimes , 2008 .
[9] Kimberly Peretti. Data Breaches: What the Underground World of Carding Reveals , 2009 .
[10] Stephen McCombie,et al. A Preliminary Profiling of Internet Money Mules: An Australian Perspective , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.
[11] K. Lampe. Human capital and social capital in criminal networks: introduction to the special issue on the 7th Blankensee Colloquium , 2009 .
[12] Yong Lu,et al. Social Network Analysis of a Criminal Hacker Community , 2010, J. Comput. Inf. Syst..
[13] Chei Sian Lee,et al. Determining Services for the Mobile Tourist , 2010, J. Comput. Inf. Syst..
[14] David Kirk,et al. An Overview of Social Network Analysis , 2010 .
[15] T. Holt,et al. Exploring stolen data markets online: products and market forces , 2010 .
[16] John Scott,et al. The SAGE Handbook of Social Network Analysis , 2011 .
[17] M. Soudijn,et al. Cybercrime and virtual offender convergence settings , 2012, Trends in Organized Crime.
[18] David Décary-Hétu,et al. The social network of hackers , 2012 .
[19] Nigel Shadbolt,et al. Structural analysis of online criminal social networks , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.
[20] Virtuele ontmoetingsruimtes voor cybercriminelen , 2012 .
[21] Andy Gill,et al. Above and below: measuring crime risk in and around underground mass transit systems , 2014 .
[22] Elmer Lastdrager,et al. Achieving a consensual definition of phishing based on a systematic review of the literature , 2014, Crime Science.
[23] E. R. Leukfeldt,et al. Cybercrime and social ties , 2014, Trends in Organized Crime.
[24] T. Holt,et al. An Assessment of the Current State of Cybercrime Scholarship , 2014 .
[25] M. Bouchard,et al. Opportunistic Structures of Organized Crime , 2014 .
[26] M. Williams,et al. GUARDIANS UPON HIGH: AN APPLICATION OF ROUTINE ACTIVITIES THEORY TO ONLINE IDENTITY THEFT IN EUROPE AT THE COUNTRY AND INDIVIDUAL LEVEL , 2016 .