Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe
暂无分享,去创建一个
Pieter H. Hartel | Marianne Junger | Lorena Montoya | Maliheh Heydari | P. Hartel | Lorena Montoya | M. Junger | Maliheh Heydari
[1] Elizabeth V. Mulig,et al. PHISHING, PHARMING AND IDENTITY THEFT , 2007 .
[2] R. Clarke,et al. The Rational Choice Perspective 1 , 2013 .
[3] Guido Schryen,et al. The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis , 2007, Comput. Secur..
[4] Kyung-shick Choi. Computer Crime Victimization and Integrated Theory: An Empirical Assessment , 2008 .
[5] Stefan Savage,et al. Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild , 2014, Internet Measurement Conference.
[6] T. Holt,et al. Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .
[7] Routine Activities and Opportunity Theory , 2015 .
[8] M. Felson,et al. Opportunity Makes the Thief Practical theory for crime prevention , 1998 .
[9] Thomas J. Holt,et al. Examining the Relationship Between Routine Activities and Malware Infection Indicators , 2013 .
[10] T. Holt,et al. Exploring stolen data markets online: products and market forces , 2010 .
[11] Tim Hope,et al. The Phenomena of Multiple Victimization. The Relationship between Personal and Property Crime Risk , 2001 .
[12] Stina Nylander,et al. At home and with computer access: why and where people use cell phones to access the internet , 2009, CHI.
[13] K. Wittebrood,et al. Burglary Victimization in England and Wales, the United States and the Netherlands: A Cross-National Comparative Test of Routine Activities and Lifestyle Theories , 2004 .
[14] Jason Milletary,et al. Technical Trends in Phishing Attacks , 1969 .
[15] Chris Lewis,et al. Fraud typologies and the victims of fraud literature review , 2009 .
[16] J. G. Mohebzada,et al. Phishing in a university community: Two large scale phishing experiments , 2012, 2012 International Conference on Innovations in Information Technology (IIT).
[17] cyberdetective. Convention on Cybercrime , 2007 .
[18] Fawn T. Ngo,et al. Cybercrime Victimization: An Examination of Individual and Situational Level Factors , 2011 .
[19] Bradford W Reyns,et al. Online Routines and Identity Theft Victimization , 2013 .
[20] P. Grabosky. Virtual Criminality: Old Wine in New Bottles? , 2001 .
[21] N. Taylor. Crime against Businesses in Two Ethnically Diverse Communities , 2006 .
[22] Michael G. Turner,et al. Examining Risks and Protective Factors of On-Line Identity Theft , 2012 .
[23] Shane D. Johnson,et al. Preventing repeat victimization: a systematic review , 2012 .
[24] Michael R. Gottfredson. Substantive Contributions of Victimization Surveys , 1986, Crime and Justice.
[25] Bradford W Reyns,et al. The Thief With a Thousand Faces and the Victim With None , 2016, International journal of offender therapy and comparative criminology.
[26] Mark D. Griffiths,et al. Demographic Factors and Playing Variables in Online Computer Gaming , 2004, Cyberpsychology Behav. Soc. Netw..
[27] Michael D. Reisig,et al. Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .
[28] Mark D. Button,et al. Support for the victims of fraud: an assessment of the current infrastructure in England and Wales , 2009 .
[29] A. Aleem,et al. Internet auction fraud: The evolving nature of online auctions criminality and the mitigating framework to address the threat , 2011 .
[30] Tyler Moore,et al. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing , 2009, Financial Cryptography.
[31] E. Rutger Leukfeldt,et al. Phishing for Suitable Targets in The Netherlands: Routine Activity Theory and Phishing Victimization , 2014, Cyberpsychology Behav. Soc. Netw..
[32] M. Lei,et al. Demographic Characteristics and Victimization Risk , 2015 .
[33] Johan van Wilsem,et al. ‘Bought it, but Never Got it’ Assessing Risk Factors for Online Consumer Fraud Victimization , 2013 .
[34] J. V. Wilsem,et al. Hacking and Harassment—Do They Have Something in Common? Comparing Risk Factors for Online Victimization , 2013 .
[35] Jonathan Clough 1. Cybercrime , 2011 .
[36] D. Wall. Cybercrime: The Transformation of Crime in the Information Age , 2007 .
[37] G. Cliff,et al. White Collar Crime: What It Is and Where It's Going , 2014 .
[38] Richard Tewksbury,et al. PREDICTING RISKS OF LARCENY THEFT VICTIMIZATION: A ROUTINE ACTIVITY ANALYSIS USING REFINED LIFESTYLE MEASURES , 1998 .
[39] Zinta S. Byrne,et al. The Psychology of Security for the Home Computer User , 2012, 2012 IEEE Symposium on Security and Privacy.
[40] J. Lynch. Problems and Promise of Victimization Surveys for Cross‐National Research , 2006, Crime and Justice.
[41] M. Junger,et al. Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit , 2013 .
[42] Janet L. Lauritsen,et al. Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents , 1992, Violence and Victims.
[43] T. Holt,et al. An Assessment of the Current State of Cybercrime Scholarship , 2014 .
[44] Janet L. Lauritsen,et al. THE LINK BETWEEN OFFENDING AND VICTIMIZATION AMONG ADOLESCENTS , 1991 .