Historical Evolutions of Cybercrime: From Computer Crime to Cybercrime

[1]  T. M. Tripp,et al.  Managing social media crises with your customers: The good, the bad, and the ugly , 2015 .

[2]  Kyung-shick Choi,et al.  The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity , 2018, The International Journal of Cybersecurity Intelligence and Cybercrime.

[3]  Budi Arief,et al.  Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2--Defenders and Victims , 2015, IEEE Security & Privacy.

[4]  Gurpreet Dhillon,et al.  Computer crimes: theorizing about the enemy within , 2001, Comput. Secur..

[5]  K. Schwab The Fourth Industrial Revolution , 2013 .

[6]  David Maimon,et al.  Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network An Application of the Routine-Activities and Lifestyle Perspective , 2013 .

[7]  Tejaswini Herath,et al.  A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..

[8]  J. Teicher,et al.  Old wine in new bottles? Regulating employee social media use through termination of employment law: A comparative analysis , 2018, Common Law World Review.

[9]  Dan Zureich,et al.  Cybersecurity: The Continuing Evolution of Insurance and Ethics , 2015 .

[10]  M. Yar The Novelty of ‘Cybercrime’ , 2005 .

[11]  Tyler Moore,et al.  Measuring the Cost of Cybercrime , 2012, WEIS.

[12]  Eoghan Casey,et al.  Digital Evidence and Computer Crime - Forensic Science, Computers and the Internet, 3rd Edition , 2011 .

[13]  Robert Moore,et al.  Cybercrime: Investigating High-Technology Computer Crime , 2006 .

[14]  Mats Näslund,et al.  Privacy in machine-to-machine communications A state-of-the-art survey , 2012, 2012 IEEE International Conference on Communication Systems (ICCS).

[15]  Susan J. Westrick Nursing Students’ Use of Electronic and Social Media: Law, Ethics, and E-Professionalism , 2015, Nursing education perspectives.

[16]  Claire Seungeun Lee,et al.  Datafication, dataveillance, and the social credit system as China's new normal , 2019, Online Inf. Rev..

[17]  Kyung-shick Choi Computer Crime Victimization and Integrated Theory: An Empirical Assessment , 2008 .

[18]  Monica Lagazio,et al.  A multi-level approach to understanding the impact of cyber crime on the financial sector , 2014, Comput. Secur..

[19]  A. Bossler Need for Debate on the Implications of Honeypot Data for Restrictive Deterrence Policies in Cyberspace , 2017 .

[20]  C. Peers The scene of the classroom , 2017, Design, Education and Pedagogy.

[21]  Benoît Dupont Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime , 2016, Crime, Law and Social Change.

[22]  John Gyang Chaka,et al.  Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution , 2019, Cloud Security.

[23]  Susan W. Brenner Cybercrime: Criminal Threats from Cyberspace , 2010 .

[24]  T. Holt,et al.  Exploring and Estimating the Revenues and Profits of Participants in Stolen Data Markets , 2016 .

[25]  P. Stearns The Industrial Revolution in World History , 1994 .

[26]  T. Holt Examining the Forces Shaping Cybercrime Markets Online , 2013 .

[27]  Bryanna Hahn Fox,et al.  Federal Bureau of Investigation (FBI) , 2015 .

[28]  M. Peters Technological unemployment: Educating for the fourth industrial revolution , 2017 .

[29]  T. Holt,et al.  An Assessment of the Current State of Cybercrime Scholarship , 2014 .

[30]  Zaid Mohammad Obeidat,et al.  Consumer Revenge Using the Internet and Social Media: An Examination of the Role of Service Failure Types and Cognitive Appraisal Processes , 2017 .

[31]  S. Furnell,et al.  The challenge of measuring cyber-dependent crimes , 2015 .

[32]  D. Wall Cybercrime: The Transformation of Crime in the Information Age , 2007 .

[33]  T. Holt,et al.  Cybercrime in Progress: Theory and prevention of technology-enabled offenses , 2015 .

[34]  Rebecca M. Chory,et al.  Organizational Surveillance of Computer-Mediated Workplace Communication: Employee Privacy Concerns and Responses , 2016 .

[35]  J. West,et al.  Electronic Surveillance at Work , 2016 .

[36]  David Maimon,et al.  Cyber-Dependent Crimes: An Interdisciplinary Review , 2019, Annual Review of Criminology.

[37]  Geir M. Køien,et al.  Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..

[38]  Sandro Gaycken,et al.  Assessing Cyberattacks Against Wireless Networks of the Next Global Internet of Things Revolution: Industry 4.0 , 2017 .

[39]  Michael G. Turner,et al.  Examining Risks and Protective Factors of On-Line Identity Theft , 2012 .

[40]  Majid Yar,et al.  Computer Hacking: Just Another Case of Juvenile Delinquency? , 2005 .

[41]  Howard Rush,et al.  The cybercrime ecosystem: Online innovation in the shadows? , 2013 .

[42]  Michel Cukier,et al.  RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM , 2014 .

[43]  S. Greenstein How the Internet Became Commercial: Innovation, Privatization, and the Birth of a New Network , 2015 .

[44]  Thomas J. Holt,et al.  Examining signals of trust in criminal markets online , 2016, J. Cybersecur..

[45]  Qinyu Liao,et al.  Ransomware: A New Cyber Hijacking Threat to Enterprises , 2009 .

[46]  David Mitch,et al.  The Role of Education and Skill in the British Industrial Revolution , 2018 .

[47]  T. Sorell Human Rights and Hacktivism: The Cases of Wikileaks and Anonymous , 2015 .

[48]  T. Holt,et al.  The online stolen data market: disruption and intervention approaches , 2017 .

[49]  James Curran The internet of history : Rethinking the internet’s past , 2016 .

[50]  D. Wall Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace , 2007 .

[51]  Steve Mansfield-Devine,et al.  : taking , 2016 .

[52]  Eric R. Louderback,et al.  The role of land use and walkability in predicting crime patterns: A spatiotemporal analysis of Miami-Dade County neighborhoods, 2007–2015 , 2019, Security Journal.

[54]  Budi Arief,et al.  Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1--Attackers , 2015, IEEE Security & Privacy.

[55]  Sagar Samtani,et al.  Conducting large-scale analyses of underground hacker communities , 2016 .

[56]  S. Brenner Cybercrime and the Law: Challenges, Issues, and Outcomes , 2012 .

[57]  T. Holt Exploring the social organisation and structure of stolen data markets , 2013 .