暂无分享,去创建一个
[1] Mary Fran T. Malone,et al. Transnational Organized Crime in Latin America , 2014 .
[2] Jennifer Jie Xu,et al. Mining communities and their relationships in blogs: A study of online hate groups , 2007, Int. J. Hum. Comput. Stud..
[3] Tom Carpay,et al. WhatsApp End-to-End Encryption : Are Our Messages Private ? Research project by students of the SnE masters programme , 2019 .
[4] Marcus K. Rogers,et al. A two-dimensional circumplex approach to the development of a hacker taxonomy , 2006, Digit. Investig..
[5] Todd H. Chiles,et al. Integrating variable risk preferences, trust, and transaction cost economics – 25 years on: reflections in memory of Oliver Williamson , 2021, Journal of Institutional Economics.
[6] C. Watkins,et al. Health Advice from Internet Discussion Forums: How Bad Is Dangerous? , 2016, Journal of medical Internet research.
[7] Jason R. C. Nurse,et al. Information Quality and Trustworthiness: A Topical State−of−the−Art Review , 2011 .
[8] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[9] E. Rutger Leukfeldt,et al. Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis , 2017 .
[10] James G. Hunt,et al. The New Look in Motivation Theory for Organizational Research , 1969 .
[11] Amanda Lenhart,et al. Online Harassment, Digital Abuse, and Cyberstalking in America , 2016 .
[12] Danny Bradbury,et al. Unveiling the dark web , 2014, Netw. Secur..
[13] Teo Keipi,et al. Young people as victims of crime on the internet: A population-based study in Finland , 2013 .
[14] D. Wall,et al. Dis-Organised Crime: Towards a Distributed Model of the Organization of Cybercrime , 2015 .
[15] Stephanie Bennett,et al. Hate Crime Offenders: An Expanded Typology , 2002 .
[16] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[17] S. Reicher,et al. The Psychology of Crowd Dynamics , 2008 .
[18] Stefan Savage,et al. An analysis of underground forums , 2011, IMC '11.
[19] Martin C. Libicki,et al. Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar , 2014 .
[20] Yao-Hua Tan,et al. Trust in Cyber-societies: Integrating the Human and Artificial Perspectives , 2000, Lecture Notes in Computer Science.
[21] J. Klausen. Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq , 2015 .
[22] T. Holt,et al. Examining the risk reduction strategies of actors in online criminal markets , 2015 .
[23] Sarah Magdy. A safe space for terrorists , 2016 .
[24] Barbara Perry,et al. Cyberhate: the globalization of hate , 2009 .
[25] Susan Wiedenbeck,et al. On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..
[26] S. Atkinson,et al. Psychology and the hacker-Psychological Incident Handling , 2019 .
[27] J. Wolak,et al. Are blogs putting youth at risk for online sexual solicitation or harassment? , 2008, Child abuse & neglect.
[28] Yong Lu,et al. Social Network Analysis of a Criminal Hacker Community , 2010, J. Comput. Inf. Syst..
[29] K. Williams,et al. From I to we: Social identity and the collective self. , 2000 .
[30] D. Wall. Cybercrime: The Transformation of Crime in the Information Age , 2007 .
[31] Adam M. Bossler,et al. The General Theory of Crime and Computer Hacking: Low Self-control Hackers? , 2011 .
[32] Clifford Stott,et al. On the role of a social identity analysis in articulating structure and collective action: the 2011 riots in Tottenham and Hackney , 2017 .
[33] Kim-Kwang Raymond Choo,et al. Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .
[34] Marc Silverman,et al. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous , 2018 .
[35] Imran Awan. Islamophobia and Twitter: A Typology of Online Hate Against Muslims on Social Media , 2014 .
[36] Sadie Creese,et al. Future scenarios and challenges for security and privacy , 2016, 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI).
[37] Robin M. Kowalski,et al. Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. , 2014, Psychological bulletin.
[38] Marco Balduzzi,et al. Attacks landscape in the dark side of the web , 2017, SAC.
[39] Ian Thornton-Trump. Malicious Attacks and Actors: An Examination of the Modern Cyber Criminal , 2018 .
[40] Jason R. C. Nurse,et al. Identifying Key-Players in Online Activist Groups on the Facebook Social Network , 2015, 2015 IEEE International Conference on Data Mining Workshop (ICDMW).
[41] Bill McCarthy,et al. When Crime Pays: Capital, Competence, and Criminal Success , 2001 .
[42] Sadie Creese,et al. Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.
[43] Hadi Salehi,et al. The Effectiveness of Facebook Groups on Teaching and Improving Writing: Students' Perceptions , 2012 .
[44] Jonathan Lusthaus,et al. Trust in the world of cybercrime , 2012 .
[45] Peter Holtz,et al. Analyzing Internet Forums , 2012, J. Media Psychol. Theor. Methods Appl..
[46] Chris Anderson,et al. Islamophobia, war and non-Muslims as victims: an analysis of online discourse on an English Defence League message board , 2018 .
[47] P. Gerbaudo. Tweets and the Streets: Social Media and Contemporary Activism , 2012 .
[48] A. Maslow. Motivation and Personality , 1954 .
[49] Jason R. C. Nurse. Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit , 2018, The Oxford Handbook of Cyberpsychology.
[50] Nigel Shadbolt,et al. Why forums?: an empirical analysis into the facilitating factors of carding forums , 2013, WebSci.
[51] Thomas J. Holt,et al. Examining the Structure, Organization, and Processes of the International Market for Stolen Data , 2014 .
[52] Donald P. Green,et al. Hate Crime: An Emergent Research Agenda , 2001 .
[53] Peter Grabosky,et al. Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime , 2014 .
[54] Michael A. Xenos,et al. Young people, social media and connective action: from organisational maintenance to everyday political talk , 2015 .
[55] G. Odinot,et al. Organised Cybercrime in the Netherlands : Empirical findings and implications for law enforcement , 2017 .
[56] Michael Goldsmith,et al. Towards Designing a Multipurpose Cybercrime Intelligence Framework , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).
[57] E. Rutger Leukfeldt,et al. A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists , 2017 .
[58] T. Holt,et al. Exploring stolen data markets online: products and market forces , 2010 .
[59] Kusminder Chahal. Supporting victims of hate crime: A practitioner guide , 2016 .
[60] H. Kelley,et al. The social psychology of groups , 1960 .
[61] Paul M. Salmon,et al. It's Dark in There: Using Systems Analysis to Investigate Trust and Engagement in Dark Web Forums , 2015, HCI.
[62] Christian Fuchs,et al. Social media, riots, and revolutions , 2012 .