Policing identity crimes
暂无分享,去创建一个
[1] J. V. Maanen,et al. Policing: A View from the Street , 1978 .
[2] R. Ericson,et al. Culture as figurative action. , 1991 .
[3] D. Wall,et al. Policing the Virtual Community: The Internet, Cyberspace and Cyber-Crime , 1997 .
[4] D. Wall. The Chief Constables of England and Wales , 1998 .
[5] Judith Donath,et al. Identity and deception in the virtual community , 1998 .
[6] R. Ericson,et al. The surveillant assemblage. , 2000, The British journal of sociology.
[7] P. Kollock,et al. Communities in Cyberspace , 2002 .
[8] M. Innes. Reinventing Tradition? , 2004 .
[9] Hedieh Nasheri. Economic Espionage and Industrial Spying: Contents , 2004 .
[10] D. Wall. Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace , 2007 .
[11] Jennifer R. Whitson,et al. Identity theft and the care of the virtual self , 2008 .
[12] Stuart Lister,et al. Deconstructing Distraction Burglary: An Ageist Offence? , 2008 .
[13] Audrey Guinchard,et al. Cybercrime: The Transformation of Crime in the Information Age, 2nd edition, Cambridge: Polity (Outline of update) , 2007, SSRN Electronic Journal.
[14] David S. Wall,et al. CYBERCRIME AND THE CULTURE OF FEAR , 2008 .
[15] Joseph Blocher. Reputation as Property in Virtual Economies , 2009 .
[16] David S. Wall,et al. Micro-Frauds: Virtual Robberies, Stings and Scams in the Information Age , 2010 .
[17] Frank Stajano,et al. Understanding scam victims , 2011, Commun. ACM.
[18] P. V. Schijndel. Identity Theft and Fraud , 2011 .
[19] Mattathias Schwartz. DarkMarket: How Hackers Became the New Mafia by Misha Glenny , 2012 .
[20] T. Jones. The politics of the police , 2012 .
[21] Emily Finch,et al. What a tangled web we weave: identity theft and the Internet , 2012 .
[22] M. Angela Sasse,et al. Why Trust Seals Don't Work: A Study of User Perceptions and Behavior , 2012, TRUST.
[23] N. Shadbolt,et al. Trust among cybercriminals? Carding forums, uncertainty and implications for policing , 2013 .
[24] D. Wall. Enemies within: Redefining the insider threat in organizational security policy , 2012, Security Journal.